Realize the Value of Your Data within Tenable One

Once you deploy and configure all of the Tenable One point products, you can use the Tenable Inventory, Lumin Exposure View, and Attack Path Analysis to pull in data from these point products and get the most value out of that data.

Tenable Inventory

To get the most out of your data within Tenable Inventory:

  • Join existing tags into new platform tags that reflect the aggregation of data types (for example, PCI scope assets can include Hosts, Web Applications, and Computing Resources).

For more information, see the Tenable Inventory User Guide.

Lumin Exposure View

Here are some things you can do in Lumin Exposure View that can get you up and running with your newly imported data:

  • Configure the general settings for Lumin Exposure View and its exposure cards:

    • Set your Sparkline Timespan

    • Set your default Benchmark Industry

    • Set your Card Targets and Category Targets

    • Set your default trend period

    • De-select the Overall SLA and Low SLA options

    • Adjust Graph Range SLA setting to see how it changes your scores

  • Use the relevant tags that have been created in Tenable Inventory to create new custom exposure cards:

    • For example, after consideration, you may find that you want to include 20 tags within custom exposure cards.

  • Consider using custom SLAs for each tag within the exposure cards. This means each environment can be under different regulations requiring varying SLAs.

For more information, see the Lumin Exposure View User Guide.

Attack Path Analysis

To get the most out of your data within Attack Path Analysis:

  • Gain insight from the Attack Path Analysis Dashboard:

    • Compare your data over time. How many critical assets are in your environment, and how many attack paths lead to these assets? 

  • Review your Findings within the Attack Path Analysis:

    • Are there any paths that are particularly troublesome in your environment?

  • Interact with the Mitre Att&ck Heatmap to view a holistic view of your data based on the enterprise tactics and techniques from Mitre Att&ck.

  • Discover potential threats by generating Attack Path queries:

    • Create Blast Radius queries based on assets of interest — Are there assets that have a high AES that could be mitigated and ultimately resolve more than one attack path?

    • Create Asset Exposure Graph queries for critical assets — What paths exist to critical assets?

For more information, see the Attack Path Analysis User Guide.