STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.3 Security Technical Implementation Guide

V-234070

CAT II (Medium)

Documentation defining Tanium functional roles must be maintained.

Rule ID

SV-234070r960792_rule

STIG

Tanium 7.3 Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000213

Discussion

System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame.

Check Content

Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. 

If the documentation does not define functional roles, this is a finding.

Fix Text

Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. 

If the documentation does not define functional roles, this is a finding.