Check: TANS-SV-000018
Tanium 7.x STIG:
TANS-SV-000018
(in versions v2 r2 through v1 r1)
Title
Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications. (Cat II impact)
Discussion
In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of a Tanium Server. The communication requirements for these Clients are identical to the Server-to-Client requirements. Without proper firewall configurations, proper TCP communications may not take place as necessary for application functionality. Additionally, without proper configuration, organizations may lose complete visibility into endpoints that cannot connect directly to the Tanium Server. For more information, refer to https://docs.tanium.com/platform_deployment_reference/platform_deployment_reference/network_ports.html.
Check Content
Note: If a Zone Server is not being used, this is not applicable. 1. Consult with the Tanium system administrator to verify which firewall is being used as a host-based firewall on the Tanium Zone Server. 2. Access the host-based firewall configuration on the Tanium Zone Server. 3. Validate a rule exists for the following: Port Needed: Tanium Clients to Zone Server over TCP port 17472, bidirectionally. If a host-based firewall rule does not exist to allow TCP port 17472, bidirectionally, from Tanium Clients to the Tanium Zone Server, this is a finding.
Fix Text
Consult with the personnel who maintain the Enterprise Security Suite to configure host-based and network firewall rules to allow the following: Tanium Clients or Zone Clients over TCP port 17472, bidirectionally.
Additional Identifiers
Rule ID: SV-253849r1043177_rule
Vulnerability ID: V-253849
Group Title: SRG-APP-000142
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000382 |
Configure the system to prohibit or restrict the use of organization-defined prohibited or restricted functions, system ports, protocols, software, and/or services. |
Controls
Number | Title |
---|---|
CM-7 |
Least Functionality |