Check: TANS-SV-000020
Tanium 7.0 STIG:
TANS-SV-000020
(in versions v1 r2 through v1 r1)
Title
The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication. (Cat II impact)
Discussion
Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When receiving data, applications need to leverage protection mechanisms, such as TLS, SSL VPNs, or IPsec.
Check Content
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to Program Files >> Tanium >> Tanium Server. Locate the SOAPServer.crt file. Double-click on the file to open the certificate. Select the "Details" tab. Scroll down through the details to find and select the "Enhanced Key Usage" Field. If there is no "Enhanced Key Usage" field, this is a finding. In the bottom screen, verify "Server Authentication" and "Client Authentication" are both identified. If "Server Authentication" and "Client Authentication" are not both identified, this is a finding.
Fix Text
Request or regenerate the certificate being used to include both the "Server Authentication" and "Client Authentication" objects.
Additional Identifiers
Rule ID: SV-93393r1_rule
Vulnerability ID: V-78687
Group Title: SRG-APP-000175
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000185 |
The information system, for PKI-based authentication, validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information. |
Controls
Number | Title |
---|---|
IA-5 (2) |
Pki-Based Authentication |