TOC & Recently Viewed

Recently Viewed Topics

Welcome to the Tenable Plugin for JIRA

The Tenable Plugin for JIRA provides users with the organizational convenience of managing vulnerabilities detected in Tenable.io and Tenable.sc. When you install the plugin, custom fields are created in JIRA. The application uses these custom fields to organize and manage vulnerabilities detected when running vulnerability scans.

The Tenable Plugin for JIRA receives vulnerability data from Tenable.io and Tenable.sc on a scheduled basis and creates JIRA issues for each vulnerability in the project that you specify. The application creates JIRA tickets according to the following:

  • For every vulnerability plugin, we create a vulnerability issue.
  • For every effected asset, we create a vulnerable host issue and blocking link to the related vulnerability issue. A linked issue is created under the vulnerability task.
  • As assets are remediated, vulnerable host ticket are marked resolved.
  • If all vulnerable host issues related a to a vulnerability issue are marked resolved, the vulnerability issue is marked resolved.
  • If an asset is found to have a vulnerability again, but was previously resolved, the integration reopens the vulnerable host issue.
  • If a vulnerability issue is marked resolved and a new vulnerable host issue is linked to it or a prior vulnerable host issue that was resolved, the vulnerability issue is reopened

  • If Tenable.io assets are marked as terminated or deleted, the integration resolves all related vulnerable host issues

  • All data imports from Tenable.io use the last_found/last_seen fields. This ensures that all issues are updated whenever new information becomes available.

  • All data imports from Tenable.sc use the last_found/last_seen fields. This ensures that all issues are updated whenever new information becomes available.

In Tenable.io, the vulnerability issue and vulnerable host issue titles are automatically generated using the following formula:

  • Vulnerability = pluginname + protocol + port + severity
  • Vulnerable Host = IPV4 + FQDN

In Tenable.sc, the vulnerability issue and vulnerable host Issue titles are automatically generated using the following formula:

  • Vulnerability = pluginname + protocol + port + severity
  • Vulnerable Host = IPV4 + dnsName + repositoryid

 

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.