Gaining organizational effectiveness

The four key organizational governance steps to maximizing the value that is delivered by Comply are as follows:

1An organization's vulnerability management program intersects with change management governance to drive remediation activities. For example, when to run reports, implementation of remediation activities, such as patching activities, as well as functional work schedules, such as the follow the sun model, authorized maintenance windows, and change control activities.

Change management

Develop a tailored, dedicated change management process that aligns with the organizational vulnerability management program to enable patching and configuration changes for a streamlined process using Comply.

  • Update SLAs and align activities to key resources for Comply, where applicable. See Comply maturity and RACI chart.
  • Designate change or maintenance windows for various scenarios, where applicable. For example, set up third-party reporting technologies and integration with ticket systems, such as SIEM, Database Power BI, and Tableau.
  • Identify internal and external dependencies to the vulnerability management process. For example, achieve effective integrations with SIEM, Database Power BI, and Tableau with Comply.

  • Create a Tanium steering group (TSG) for discovery activities to expedite reviews and approvals of processes that align with SLAs and vulnerability management processes, as applicable.

RACI chart

A RACI chart identifies the team or resource who is Responsible, Accountable, Consulted, and Informed, and serves as a guideline to describe the key activities across the security, risk / compliance, and operations teams. Every organization has specific business processes and IT organization demands. The following table represents Tanium’s point of view for how organizations should align functional resources against compliance and vulnerability management. Use the following table as a baseline example.

Task Security Team Risk / Compliance Team Operations Team CISO Rationale
Establish a Vulnerability Management Program R/A R/A C I Align to the organizational Vulnerability Management Program, which is used to make Comply implementation decisions such as report scheduling. For example, whether the schedules use the "follow the sun" model.

The organizational Vulnerability Management Program is also used to make decisions about remediation needs that are driven by data provided by Comply, such as:

  1. Implementation of remediation activities, such as patching
  2. Authorized maintenance windows
  3. Change control activities

Findings verification: define policy assessment frequency I I I R/A Define policy assessment frequency in alignment with any regulatory requirements. Schedule assessments in Comply to meet the frequency requirements.
Findings verification: define assessment requirements (regulatory) I I I R/A Define policy requirements in alignment with any regulatory requirements. Create assessments in Comply to meet the policy requirements.
Operationalize assessment policies R/A I I C Publish and distribute the assessment policies aligned to any regulatory requirements.
Execute assessment policies I R/A I I After policies are created and published, execute the policies using Comply to define targets for assessments, create compliance profiles, and identify a vulnerability baseline.
Implement configuration compliance assessments I R/A I I Implement the policies for the configuration compliance workflow by creating configuration compliance assessments in Comply.
Implement vulnerability assessments I R/A I I Implement the policies for the vulnerability management workflow by creating vulnerability reports in Comply.
Conduct report: vulnerability scan, network unauthenticated scan, and configuration compliance scan I R/A I I Run assessments against identified targets based on policies.
Assessments validation: distribute, review, and take action on findings I R/A I C/I Take the results from the assessment activities and distribute, review, and take action on the findings. After the risk report is completed, the CISO team will validate the risk assessment results to identify criticality to implement controls, where applicable.
Remediate findings: apply patches I I R/A I Changes to mitigate or take action on identified risks. For example, use Tanium Patch to install a patch on an endpoint to fix a vulnerability.
Remediate findings: update software I I R/A I Changes to mitigate or take action on identified. For example, use Tanium Patch to update software on an endpoint to fix a vulnerability.
Remediate findings: configuration changes I I R/A I Changes to mitigate or take action on identified risks that will implement a change in the configuration of a specific endpoint or device. This change may be a permanent change from the temporary controls implemented or a new change based on risk report, such as using Tanium to quarantine a device or shutting down a device.
Evaluate and iterate on results I R/A I I Operations and Security teams inform the Risk / Compliance Team that controls are applied so they can verify the results. Then, the workflow starts over to continually evaluate risk posture in security and vulnerability management.
Tanium Comply Workflow (click image to enlarge)

Organizational alignment

Successful organizations use Tanium across functional silos as a common platform for high-fidelity endpoint data and unified endpoint management. Tanium provides a common data schema that enables security, operations, and risk / compliance teams to assure that they are acting on a common set of facts that are delivered by a unified platform.

In the absence of cross-functional alignment, functional silos often spend time and effort in litigating data quality instead of making decisions on how to improve configuration compliance and reduce vulnerabilities.

Operational metrics

Comply maturity

Managing compliance and vulnerability management programs successfully includes operationalization of the technology and measuring success through key standards metrics. The four key processes to measure and guide operational maturity of your Tanium Comply program are as follows:

Process Description
Usage how and when Tanium Comply is used in your organization, and is Tanium the sole tool or is it supplemented by other tools, such as a remote assessment tool for network devices.
Automation how automated Tanium Comply is, and how well is it used in automation of other systems
Functional Integration how integrated Tanium Comply is across IT security, IT operations, patch and software deployment, and Asset Management teams
Reporting how is data from Tanium Comply used by people and systems within the organization

Standards metrics

In addition to the key compliance and vulnerability management programs, the key standards metric that aligns to the operational maturity of the Tanium Comply program to achieve maximum value and success is as follows:

Executive Metrics Comply Coverage Endpoints with Critical or High Vulnerabilities

The number of endpoints in each of these categories:

  • Optimal: Endpoints where Comply is operational
  • Needs attention: Endpoints with an underlying issue that might impact Comply, such as low disk space, out of date scan engine, or out of date Comply tools
  • Unsupported: Endpoints with an operating system version that is not supported by Comply

For steps to investigate endpoints that are categorized as Needs Attention or Unsupported, see Monitor and troubleshoot Comply Coverage.

For operating system and Tanium Client versions supported by Comply, see Requirements.

Percentage of endpoints that have executed vulnerability reports which found at least 1 critical or high severity vulnerability.
Instrumentation Uses the Comply - Coverage Status sensor to return the number of endpoints where Comply is optimal, needs attention, and is unsupported. Number of endpoints that have had a vulnerability report which resulted in 1 or more critical or high severity vulnerabilities divided by the number of endpoints that have run a vulnerability report.
Why this metric matters If you are not scanning all endpoints, then you are at risk. If you have a significant number of endpoints with outstanding high or critical vulnerabilities, you are at greater risk.

Vulnerability Findings

Use vulnerability findings to aid in determining levels of compliance and remediation needs.

Vulnerability Level Definition

Endpoint has at least 1 high vulnerability found


Endpoint has no high vulnerabilities but has at least 1 medium vulnerability found

Low Endpoint has no high or medium vulnerabilities but has at least 1 low vulnerability found
Not scored Endpoint has no high, medium, or low vulnerabilities but has at least 1 unscored vulnerability found
No Vulnerabilities Endpoint has been scanned in the last 30 days with no vulnerabilities found
Not scanned Endpoint has not been scanned in the last 30 days


Use the following table to determine the maturity level for Tanium Comply in your organization.

    Level 1
Level 2
Level 3
Level 4
Level 5
Process Usage Comply installed and configured. One or more users have access and are asking basic questions. Third-party components uploaded and deployments created. Configuration compliance and vulnerability assessments configured.

Customized configuration compliance and vulnerability assessments configured (client based, remote authenticated, and network unauthenticated).

Custom standards created and used for organizational reports. Custom vulnerability sources configured and in use. Ongoing maintenance of checks and standards.
Automation Only manual, ad hoc assessments in use. Only manual, ad hoc reports in use. Automated, recurring configuration compliance and vulnerability assessments. Customized configuration compliance and vulnerability assessments running. Documented compliance and vulnerability management life cycle with SLAs on mitigation time frames. Configuration compliance and vulnerability risk data used as input to threat hunting activities by correlating risk data with security alerts to determine risk scoring for environment.
Functional integration Comply installed, but not operationalization. Using default Comply dashboards and reports within Tanium Reporting. Creating custom Comply dashboards and reports within Tanium Reporting. Integration with third-party reporting technologies, integration with IT ticket systems, automated workflow with Tanium Patch for approval and deployment of patches, automated export into data repository/warehouse) Integration with remediation process and capabilities. Integration with Tanium Benchmark for additional context around enterprise risk.
Reporting Manual; Reporting for Operators only through Comply Manual; Export of recurring assessments Automated; Export through Tanium Connect Automated; Third-party technologies reporting from Comply Automated; Third-party technologies reporting from Comply

Compliance Percentage (of scanned endpoints)

0-49% 51-65% 66-85% 86-95% >95%
Comply Coverage (for managed endpoints) 0-49% 51-65% 66-85% 86-95% >95%