Get Started with OT Security

Use the following getting started sequence to install and start using OT Security.

Tip: Click a box to view the relevant task.

Before you Begin

Install OT Security ICP

OT Security is an application running on top of the Tenable Core operating system, and it is subject to the base requirements of Tenable Core. Use the following guidelines to install and configure Tenable Core + OT Security.

To install OT Security:

  1. Install OT Security ICP

  2. Connect OT Security to the Network— Connect OT Security hardware and virtual appliance to the network.

  3. Configure OT Security ICP

    1. Set up Tenable Core — Configure Tenable Core via CLI or the user interface.
    2. Install OT Security on Tenable Core - Manually complete the installation of Tenable OT Security in Tenable Core.

    3. Configure OT Security Settings using Setup Wizard — Use the setup wizard to configure basic settings in OT Security.

  4. Activate OT Security License — Activate your license after you complete the OT Security installation.

Use OT Security

Launch OT Security

  1. Enable OT Security — Enable OT Security after you activate your license.

  2. Start using OT Security — Configure your monitored networks, port separation, users, groups, authentication servers, and so on to start using OT Security.

    Tip: To gain hands-on experience and to obtain Tenable OT Security Specialist Certification, take the Tenable OT Security Specialist Course.

Expand OT Security into Tenable One

Note: This requires a Tenable One license, for more information about trying Tenable One, see Tenable One - Exposure Management Platform.

Integrate OT Security with Tenable One and leverage the following features:

  • In Lumin Exposure View, reveal converged risk levels and uncover hidden weaknesses across the IT-OT boundary. You can continuously monitor and track potential vulnerabilities with enhanced OT data:

  • In Tenable Inventory, enrich asset discovery with OT-specific insights, such as firmware versions, vendors, models & operational states. Access OT intelligence that standard IT security tools cannot provide:

    • Review your OT assets to understand the strategic nature of the interface. This should help set your expectations on what features to use within Tenable Inventory, and when.

    • Create a new dynamic tag for your OT assets, where:

      • Operator = Host System Type

      • Value = PLC

  • In Attack Path Analysis, expose vulnerable network paths that could disrupt key operations like production lines or data centers. You can track OT communication paths and unauthorized changes:

    • On the Discover tab, use the Operational Technology (OT) Tenable-provided queries to identify crucial OT related attack paths that exist within your environment.

    • Search for specific OT system types and assets using the Custom Query Builder.

    • On the Mitre Att&ck Heatmap, select the ICS heatmap option to focus on ICS (Industrial Control Systems) tactics and techniques.