STIGQter STIGQter: STIG Summary: Tanium 7.3 Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 22 Jan 2021:

The Tanium Detect must be configured to receive IOC streams only from trusted sources.

DISA Rule

SV-234084r612749_rule

Vulnerability Number

V-234084

Group Title

SRG-APP-000039

Rule Version

TANS-SV-000008

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Detect".

Expand the left menu.

Click the "Management" tab.

Select "Sources".

Click "New Source".

Select the specified Source from the list.

Fill out the specified information.

Select "Create".

Check Contents

Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used, if not this is Not Applicable.

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Detect".

Expand the left menu.

Click the "Management" tab.

Select "Sources".

Verify all configured Detect Streams are configured to a documented trusted source.

If any configured Detect Stream is configured to a stream that has not been documented as trusted, this is a finding.

Vulnerability Number

V-234084

Documentable

False

Rule Version

TANS-SV-000008

Severity Override Guidance

Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used, if not this is Not Applicable.

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Detect".

Expand the left menu.

Click the "Management" tab.

Select "Sources".

Verify all configured Detect Streams are configured to a documented trusted source.

If any configured Detect Stream is configured to a stream that has not been documented as trusted, this is a finding.

Check Content Reference

M

Target Key

5259

Comments