STIGQter STIGQter: STIG Summary: Tanium 7.0 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 27 July 2018:

Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.

DISA Rule

SV-93315r1_rule

Vulnerability Number

V-78609

Group Title

SRG-APP-000033

Rule Version

TANS-CN-000006

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Analyze the users configured in the Tanium interface.

Determine least privileged access required for each user to perform their respective duties.

Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role.

If appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users.

Ensure AD sync re-populates the Tanium Users' associated Roles accordingly.

Check Contents

Consult with the Tanium System Administrator to review the documented list of Tanium users.

Analyze the users configured in the Tanium interface.

Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles.

Validate Active Directory security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface.

If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Vulnerability Number

V-78609

Documentable

False

Rule Version

TANS-CN-000006

Severity Override Guidance

Consult with the Tanium System Administrator to review the documented list of Tanium users.

Analyze the users configured in the Tanium interface.

Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles.

Validate Active Directory security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface.

If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Check Content Reference

M

Target Key

3215

Comments