Check: TANS-SV-000036
Tanium 6.5 STIG:
TANS-SV-000036
(in versions v1 r3 through v1 r2)
Title
The Tanium Server certificate must be signed by a DoD Certificate Authority. (Cat II impact)
Discussion
The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings, customers often conclude that a "self-signed" certificate is an acceptable risk. However, in production environments it is critical that a SSL certificate signed by a Trusted Certificate Authority be used on the Tanium Server in lieu of an untrusted and insecure "self-signed" certificate.
Check Content
Access the Tanium Server console via a web browser. When connected, review the Certificate for the Tanium Server. (In Internet Explorer, right-click on the page, select “Properties”, click on the “Certificates” tab.) On the “General” tab, validate the Certificate shows as issued by DOD CA-##. On Certification “Path” tab, validate the path top-level is DoD Root CA 2. If the certificate authority is not DoD Root, this is a finding.
Fix Text
Request or regenerate the certificate from a DoD Certificate Authority.
Additional Identifiers
Rule ID: SV-81603r1_rule
Vulnerability ID: V-67113
Group Title: SRG-APP-000427
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002470 |
Only allow the use of organization-defined certificate authorities for verification of the establishment of protected sessions. |
Controls
Number | Title |
---|---|
SC-23(5) |
Allowed Certificate Authorities |