STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.x Security Technical Implementation Guide

V-253842

CAT II (Medium)

The Tanium documentation identifying recognized and trusted indicator of compromise (IOC) streams must be maintained.

Rule ID

SV-253842r997266_rule

STIG

Tanium 7.x Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001414

Discussion

Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service. An IOC stream can be downloaded manually or on a scheduled basis. The items in an IOC stream can be manipulated separately after they are imported.

Check Content

Consult with the Tanium system administrator to determine if the Threat Response module is being used. If it is not, this is not applicable.

Review the documented list of IOC trusted stream sources.

If the site uses an external source for IOCs and the IOC trusted stream source is not documented, this is a finding.

Fix Text

Prepare and maintain documentation identifying the Threat Response trusted stream sources.