STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.x Operating System on TanOS Security Technical Implementation Guide

V-254873

CAT I (High)

The Tanium Operating System (TanOS) must use a FIPS-validated cryptographic module to provision digital signatures.

Rule ID

SV-254873r959036_rule

STIG

Tanium 7.x Operating System on TanOS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000185CCI-002450

Discussion

FIPS 140-2 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Un-validated cryptography is viewed by NIST as providing no protection to the information or data - in effect the data would be considered unprotected plaintext. If the agency specifies that the information or data be cryptographically protected, then FIPS 140-2 is applicable. In essence, if cryptography is required, then it must be validated. Cryptographic modules that have been approved for classified use may be used in lieu of modules that have been validated against the FIPS 140-2 standard. The cryptographic module used must have at least one validated digital signature function. This validated hash algorithm must be used to generate digital signatures for all cryptographic security function within the product being evaluated. Satisfies: SRG-OS-000550, SRG-OS-000530

Check Content

1. Access the Tanium Server interactively.

2. Log on to the TanOS server with the tanadmin role.

3. Press "A" for "Appliance Configuration Menu," and then press "Enter".

4. Press "A" for "Security," and then press "Enter".

5. Press "X" for "Advanced Security," and then press "Enter".

If the FIPS 140-2 setting is currently disabled or persistently disabled, this is a finding.

Fix Text

1. Access the Tanium Server interactively.

2. Log on to the TanOS server with the tanadmin role.

3. Press "A" for "Appliance Configuration Menu," and then press "Enter".

4. Press "A" for "Security," and then press "Enter".

5. Press "X" for "Advanced Security," and then press "Enter".

6. Press "1" for "FIPS 140-2 mode (disabled/enabled)".

7. Type "yes" to confirm enabling FIPS 140-2 Mode, and then press "Enter".

8. Press "Enter" at the confirmation prompt that instructs the user to reboot the appliance.

9. Type "RR" and press "Enter" to return to the root menu.

10. Press "B" for "Appliance Maintenance," and then press "Enter".

11. Press "B" for "Reboot/Shutdown," and then press "Enter".

12. Press "1" for "Reboot the appliance," and then press "Enter".

13. Type "Yes" and then press "Enter" to reboot the appliance and complete the configuration.