Check: TANS-SV-000023
Tanium 6.5 STIG:
TANS-SV-000023
(in versions v1 r3 through v1 r2)
Title
The Tanium Module server must be installed on a separate system. (Cat II impact)
Discussion
Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by configuring the Module Server on a separate system. When X509 smartcard certificates (CAC or PIV tokens) are used for access to the Tanium Server, the Tanium Module server must be on a separate system. In order to restrict access to the Tanium Server resulting from an attack on the Module Server, it is recommended that the Tanium Module Server be installed on a separate system or VM from the Tanium Server. Adding to this recommendation, if the Tanium Server is configured to accept X509 Smartcard certificates (also referred to as CAC or PIV tokens) in lieu of username/password logon, the requirement becomes explicit and the Tanium Module Server must be installed on a separate system or VM.
Check Content
Note: If the server being validated is the Module server, this check is Not Applicable. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Click “Start” and access Server Manager. Select Local Server. Click "Tools". Select "Services". If the Tanium Module Server service is "Running", this is a finding.
Fix Text
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Click “Start” and access Server Manager. Select Local Server. Click "Tools" Select "Services". Disable the Tanium Module Server service.
Additional Identifiers
Rule ID: SV-81579r1_rule
Vulnerability ID: V-67089
Group Title: SRG-APP-000211
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001082 |
The information system separates user functionality (including user interface services) from information system management functionality. |
Controls
Number | Title |
---|---|
SC-2 |
Application Partitioning |