Check: TANS-SV-000020
Tanium 6.5 STIG:
TANS-SV-000020
(in versions v1 r3 through v1 r2)
Title
The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication. (Cat II impact)
Discussion
Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When receiving data, applications need to leverage protection mechanisms, such as TLS, SSL VPNs, or IPSEC.
Check Content
Access the Tanium Module server interactively and log on as an Administrator. Navigate to the \Program Files\Tanium\Tanium Server directory. Locate the SOAPServer.crt file and double-click on it to open the certificate. Select the “Details” tab. Scroll down through the details to find and select the “Extended Key Usage” Field. If there is no “Extended Key Usage” field, this is a finding. In the bottom screen, verify "TLS Web Server Authentication" and "TLS Web Client Authentication" are both identified. If "TLS Web Server Authentication" and "TLS Web Client Authentication" are not both identified, this is a finding.
Fix Text
Request or regenerate the certificate being used to include both the serverAuth and clientAuth objects.
Additional Identifiers
Rule ID: SV-81573r1_rule
Vulnerability ID: V-67083
Group Title: SRG-APP-000175
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000185 |
The information system, for PKI-based authentication, validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information. |
Controls
Number | Title |
---|---|
IA-5 (2) |
Pki-Based Authentication |