Check: TANS-SV-000048
Tanium 7.x STIG:
TANS-SV-000048
(in versions v2 r1 through v1 r1)
Title
The Tanium documentation identifying recognized and trusted folders for Threat Response Local Directory Source must be maintained. (Cat II impact)
Discussion
Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Threat Response can be configured to retrieve the IOC content on a regularly scheduled basis. The items in an IOC stream can be manipulated separately after they are imported.
Check Content
Consult with the Tanium system administrator to review the documented list of folder maintainers for Threat Response Local Directory Source. If the site does not leverage Local Directory Source to import IOCs, this finding is not applicable. If the site does use Local Directory Source to import IOCs and the folder maintainers are not documented, this is a finding.
Fix Text
Prepare and maintain documentation identifying the Tanium Threat Response Local Directory Source maintainers.
Additional Identifiers
Rule ID: SV-253865r997287_rule
Vulnerability ID: V-253865
Group Title: SRG-APP-000039
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001414 |
Enforce approved authorizations for controlling the flow of information between connected systems based on organization-defined information flow control policies. |
Controls
Number | Title |
---|---|
AC-4 |
Information Flow Enforcement |