Get Started with OT Security

Use the following getting started sequence to install and start using OT Security.

Tip: Click a box to view the relevant task.

Check Prerequisites

Install OT Security ICP

OT Security is an application running on top of the Tenable Core operating system, and it is subject to the base requirements of Tenable Core. Use the following guidelines to install and configure Tenable Core + OT Security.

To install OT Security:

  1. Install OT Security ICP

  2. Connect OT Security to the Network— Connect OT Security hardware and virtual appliance to the network.

  3. Configure OT Security ICP

    1. Set up Tenable Core — Configure Tenable Core via CLI or the user interface.
    2. Install OT Security on Tenable Core - Manually complete the installation of Tenable OT Security in Tenable Core.

    3. Configure OT Security Settings using Setup Wizard — Use the setup wizard to configure basic settings in OT Security.

  4. Activate OT Security License — Activate your license after you complete the OT Security installation.

Use OT Security

Launch OT Security

  1. Enable OT Security — Enable OT Security after you activate your license.

  2. Start using OT Security — Configure your monitored networks, port separation, users, groups, authentication servers, and so on to start using OT Security.

    Tip: To gain hands-on experience and to obtain Tenable OT Security Specialist Certification, take the Tenable OT Security Specialist Course.

Expand OT Security into Tenable One

Note: This requires a Tenable One license. For more information about trying Tenable One, see Tenable One.

Integrate OT Security with Tenable One and leverage the following features:

  • Access the Exposure View page, where you can reveal converged risk levels and uncover hidden weaknesses across the IT-OT boundary. You can continuously monitor and track potential vulnerabilities with enhanced OT data:

  • Access the Exposure Signals page, where you can generate exposure signals that use queries to search for asset violations. Simply put, if an asset is impacted by a weakness related to the query, then the asset is considered a violation. Using this, you can gain visibility into your most critical risk scenarios.

    • Find top active threats in your environment with up-to-date feeds from Tenable Research.

    • View, generate, and interact with the data from queries and their impacted asset violations.

    • Create custom exposure signals to view business-specific risks and weaknesses

  • Access the Inventory page, enrich asset discovery with OT-specific insights, such as firmware versions, vendors, models & operational states. Access OT intelligence that standard IT security tools cannot provide:

    • View and interact with the data on the Assets tab:

      • Review your AD assets to understand the strategic nature of the interface. This should help set your expectations on what features to use within Tenable Exposure Management, and when.

      • Familiarize yourself with the Global Asset Search and its objects and properties. Bookmark custom queries for later use.

      • Find devices, user accounts, software, cloud assets, SaaS applications, networks, and their weaknesses.

      • Drill down into the Asset Details page to view asset properties and all associated context views.
    • View and interact with the data on the Weaknesses tab:

      • View key context on vulnerability and misconfiguration weaknesses to make the most impactful remediation decisions.

    • View and interact with the data on the Software tab:

      • Gain full visibility of the software deployed across your business and better understand the associated risks.

      • Identify what software may be out of date, and which pieces of software may soon be End of Life (EoL).

    • View and interact with the data on the Findings tab:

      • View instances of weaknesses (vulnerabilities or misconfigurations) appearing on an asset, identified uniquely by plugin ID, port, and protocol.

      • Review insights into those findings, including descriptions, assets affected, criticality, and more to identify potential security risks, visibility on under-utilized resources, and support compliance efforts.

  • Access the Attack Path page, where you can optimize risk prioritization by exposing risky attack paths that traverse the attack surface, including web apps, IT, OT, IoT, identities, ASM, and prevent material impact. Streamline mitigation by identifying choke points to disrupt attack paths with mitigation guidance, and gain deep expertise with AI insights (Not supported in FedRAMP environments).

    • View the Dashboard tab for a high-level view of your vulnerable assets such as the number of attack paths leading to these critical assets, the number of open attack techniques and their severity, a matrix to view paths with different source node exposure score and ACR target value combinations, and a list of trending attack paths.

      • Review the Top Attack Path Matrix and click the Top Attack Paths tile to view more information about paths leading to your “Crown Jewels”, or assets with an ACR of 7 or above.

      You can adjust these if needed to ensure you’re viewing the most critical attack path data.

    • On the Top Attack Techniques tab, view all attack techniques that exist in one or more attack paths that lead to one or more critical assets by pairing your data with advanced graph analytics and the MITRE ATT&CK® Framework to create attack techniques, which allow you to understand and act on the unknowns that enable and amplify threat impact on your assets and information.

    • On the Top Attack Paths tab, generate attack path queries to view your assets as part of potential attack paths:

      Then, you can view and interact with the Attack Path Query and Asset Query data via the query result list and the interactive graph.

    • Interact with the MITRE ATT&CK Heatmap tab, select the ICS heatmap option to focus on ICS (Industrial Control Systems) tactics and techniques

  • View and interact with the data in the Tags page: