Check: TANS-SV-000021
Tanium 6.5 STIG:
TANS-SV-000021
(in versions v1 r3 through v1 r2)
Title
The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions. (Cat I impact)
Discussion
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the private key to digitally sign documents and pretend to be the authorized user. Both the holders of a digital certificate and the issuing authority must protect the computers, storage devices, or whatever they use to keep the private keys.
Check Content
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \Certs folder and choose “Properties”. Select the “Security” tab and click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read Only permissions. If the owner of the directory is not the [Tanium service account] and/or System has more privileges than Read Only, this is a finding. Navigate to the \Program Files\Tanium\Tanium Server\Certs folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Validate System and the [Tanium service account] have Read-Only permissions to each of the individual files. If System and the [Tanium service account] have more than Read-Only permissions to any of the individual files, this is a finding. Navigate to the \Program Files\Tanium\Tanium Server\content_public_keys folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Validate the [Tanium service account] privileges to Read-Only. Validate system privileges to Read-Only Validate System has Read-Only permissions and is applied to child objects. Validate [Tanium service account] has Read-Only permissions and is applied to child objects. If the [Tanium service account] and system permissions to the \content_public_keys folder is greater than Read-Only and/or the Read-Only permissions have not been applied to child objects, this is a finding.
Fix Text
Access the Tanium Server interactively. Logon with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \Certs folder and choose “Properties”. Select the “Security” tab and click on the “Advanced” button. Change the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Navigate to the \Program Files\Tanium\Tanium Server\Certs folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. For the following files, reduce System and the [Tanium service account] to Read-Only: Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \content_public_keys folder, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Reduce [Tanium service account] privileges to Read-Only. Reduce system privileges to Read-Only. Reduce System to Read-Only permissions. – apply to child objects. Reduce [Tanium service account] to Read-Only permissions. – apply to child objects.
Additional Identifiers
Rule ID: SV-81575r1_rule
Vulnerability ID: V-67085
Group Title: SRG-APP-000176
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000186 |
The information system, for PKI-based authentication, enforces authorized access to the corresponding private key. |
Controls
Number | Title |
---|---|
IA-5 (2) |
Pki-Based Authentication |