Get Started with OT Security
Use the following getting started sequence to install and start using OT Security.
Before you Begin
-
Prerequisites — Review the system, hardware, virtual, and license requirements for OT Security.
-
System Requirements — Review the requirements to install and run Tenable Core + OT Security.
-
Access Requirements — Review the internet and port requirements to run Tenable Core + OT Security.
-
Network Considerations — Review the network interfaces to connect OT Security.
-
Firewall Considerations — Review the ports that must be open for OT Security to function correctly.
-
Introduction to Tenable OT Security — Go through the training material for an understanding of OT Security.
-
Install OT Security ICP
OT Security is an application running on top of the Tenable Core operating system, and it is subject to the base requirements of Tenable Core. Use the following guidelines to install and configure Tenable Core + OT Security.
To install OT Security:
-
- Install OT Security ICP Hardware Appliance - Set up OT Security as a hardware appliance.Note: Tenable-provided Tenable Core hardware comes with Tenable Core+ OT Security pre-installed. If you are installing an older or dated appliance, you might opt for a clean install. For more information, see Clean Install Tenable Core + Tenable OT Security on Tenable-Provided Hardware.
-
Install OT Security ICP Virtual Appliance— Deploy Tenable Core + OT Security as a virtual machine using the pre-configured .ova file containing the standard virtual machine configuration, or customize your appliance using the installation .iso file.
- Install OT Security ICP Hardware Appliance - Set up OT Security as a hardware appliance.
-
Connect OT Security to the Network— Connect OT Security hardware and virtual appliance to the network.
-
- Set up Tenable Core — Configure Tenable Core via CLI or the user interface.
-
Install OT Security on Tenable Core - Manually complete the installation of Tenable OT Security in Tenable Core.
-
Configure OT Security Settings using Setup Wizard — Use the setup wizard to configure basic settings in OT Security.
-
Log in to the OT Security console and configure the User Info, Device, System Time, and Port Separation settings.
-
-
Activate OT Security License — Activate your license after you complete the OT Security installation.
Use OT Security
-
Enable OT Security — Enable OT Security after you activate your license.
-
Start using OT Security — Configure your monitored networks, port separation, users, groups, authentication servers, and so on to start using OT Security.
Tip: To gain hands-on experience and to obtain Tenable OT Security Specialist Certification, take the Tenable OT Security Specialist Course.
Expand OT Security into Tenable One
Integrate OT Security with Tenable One and leverage the following features:
-
In Lumin Exposure View, reveal converged risk levels and uncover hidden weaknesses across the IT-OT boundary. You can continuously monitor and track potential vulnerabilities with enhanced OT data:
-
Review the Operational Technology exposure card.
-
Configure the exposure view settings to set customized card target, and to configure your Remediation SLA and SLA Efficiency based on your company policy.
-
Create a custom exposure card based on business context, and include the new tag you created in Tenable Inventory.
-
-
In Tenable Inventory, enrich asset discovery with OT-specific insights, such as firmware versions, vendors, models & operational states. Access OT intelligence that standard IT security tools cannot provide:
-
Review your OT assets to understand the strategic nature of the interface. This should help set your expectations on what features to use within Tenable Inventory, and when.
-
Create a new dynamic tag for your OT assets, where:
-
Operator = Host System Type
-
Value = PLC
-
-
-
In Attack Path Analysis, expose vulnerable network paths that could disrupt key operations like production lines or data centers. You can track OT communication paths and unauthorized changes:
-
On the Discover tab, use the Operational Technology (OT) Tenable-provided queries to identify crucial OT related attack paths that exist within your environment.
-
Search for specific OT system types and assets using the Custom Query Builder.
-
On the Mitre Att&ck Heatmap, select the ICS heatmap option to focus on ICS (Industrial Control Systems) tactics and techniques.
-