Indicators of Exposure

Tenable Identity Exposure measures the security maturity of your AD infrastructures through Indicators of Exposure (IoEs) and assigns severity levels to the flow of events that it monitors and analyzes. Tenable Identity Exposure triggers alerts when it detects security regressions.

Tenable Identity Exposure IoEs come with a range of features designed to boost your investigative capabilities :

  • Searchable and filterable: Effortlessly explore the IoE by applying filters based on forest and domain.

  • Export capability: Deviance object will allow you to export the IoE’s in CSV format.

  • Action on IoE incidents : Remove an exposure from the whitelist/re-enable it.

The data from the IoE include:

  • Information section: This section provides executive summary about each Indicator of Exposure (IoE), including known attack tools, affected domains, and relevant documentation.

  • Vulnerability details:This section provides more in depth information above the misconfiguration in Active Directory.

  • Deviant Objects: This section highlights misconfigurations in Active Directory that may contribute to broader attack surfaces.

  • Recommendation: This section guides you through effective configuration strategies to minimize your attack surface.

Level of Severity

Severity levels allow you to assess the severity of the detected vulnerabilities and to prioritize remediation actions.

The Indicators of Exposure pane shows IoEs as follows:

  • By severity level using color codes.

  • Vertically — from most severe to least severe(red for top priority and blue for least priority).

  • Horizontally — from most complex to least complex. Tenable Identity Exposure computes the complexity indicator dynamically to indicate the level of difficulty to remediate the deviant IoE.

Severity Description
Critical — Red Shows how to prevent attacks and compromise of the Active Directory by certain unprivileged users.
High — Orange

Deals with either post-exploitation techniques leading to credential theft or security bypass or with exploitation techniques that require chaining to be dangerous.

Medium — Yellow Indicates a limited risk for the Active Directory infrastructure.
Low — Blue Shows good security practices. Certain business contexts may allow low-impact deviances that do not necessarily affect AD security. These deviances have an impact on the AD only if an administrator makes an error such as by activating an inactive account.

See also