Tenable Inventory Metrics

The following metrics are used to assess data within Tenable Inventory:

Data Timing

Data within Tenable Inventory refreshes on the following cadence:

  • Asset Data — Asset information is updated every time the asset is seen as part of a scan.

  • Tag Application — When a tag is first created, it can take several hours to assign the tag to the appropriate asset, depending on the number of assets and the tag's rules.

  • Tag Reevaluation — Every 12 hours, Tenable Inventory automatically reevaluates tags to ensure they apply to newly discovered assets, and are removed from any inactive assets.

Cyber Exposure Score (CES)

Tenable Inventory calculates a dynamic CES that represents exposure risk as an integer between 0 and 1000, based on the Asset Exposure Score (AES) values for assets. Higher CES values indicate higher risk.

Note: Tenable Inventory does not include assets older than 90 days in your CES.

CES Category CES Range
High 650 to 1000
Medium 350 to 649
Low

0 to 349

Asset Exposure Score (AES)

Tenable Inventory calculates a dynamic AES for each asset on your network to represent the asset's relative exposure as an integer between 0 and 1000. A higher AES indicates higher exposure.

Note: Tenable Inventory does not calculate an AES for unlicensed assets.

AES Category AES Range
High 650 to 1000
Medium 350 to 649
Low

0 to 349

Asset Criticality Rating (ACR)

Tenable assigns an ACR to each asset on your network to represent the asset's relative criticality as an integer from 1 to 10. A higher ACR indicates higher criticality.

ACR Category ACR Range
Critical

9 to 10

High 7 to 8
Medium 4 to 6
Low

1 to 3

Because Tenable Vulnerability Management calculates ACR values every 24 hours, you may need to wait up to 24 hours to view the ACR after scanning the asset on your network.

Tenable Inventory Categories

Tenable Inventory products refer to data sources as Categories. For more information, see Data Sources.

Additionally, Tenable Inventory uses specific icons to represent these within the user interface.

Category Icon

Cloud Resources

Note: Currently, Tenable One only supports the ingestion of Legacy Tenable Cloud Security data. For more information, contact your Tenable Representative.

Web Applications

Identity Exposure

Computing Resources