STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Tanium 7.3 Security Technical Implementation Guide

V-234070

CAT II (Medium)

Documentation defining Tanium functional roles must be maintained.

Rule ID

SV-234070r960792_rule

STIG

Tanium 7.3 Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-000213

Discussion

System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame.

Check Content

Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. 

If the documentation does not define functional roles, this is a finding.

Fix Text

Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. 

If the documentation does not define functional roles, this is a finding.