STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Tanium 7.0 Security Technical Implementation Guide

V-241058

CAT II (Medium)

The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.

Rule ID

SV-241058r960804_rule

STIG

Tanium 7.0 Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-001414

Discussion

OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/3rd party paid repositories. These documents are used to automate the passive validation of vulnerabilities on systems and therefore require a reasonable level of confidence in their origin. Non-approved OVAL definitions lead to a false sense of security when evaluating an enterprise environment.

Check Content

Consult with the Tanium System Administrator to review the documented list of trusted OVAL feeds.

If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for passive vulnerability scanning, this finding is "Not Applicable".

Otherwise, if the site does use "Tanium Comply" and the source for OVAL content is not documented, this is a finding.

Fix Text

If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for passive vulnerability scanning, this finding is "Not Applicable".

Prepare and maintain documentation identifying the source of OVAL feeds that will be used by "Tanium Comply" module.