Tenable Cloud Security

Note: Currently, Tenable One only supports the ingestion of Tenable Cloud Security data. For more information, contact your Tenable Representative.

Deploy Tenable Cloud Security

Deploy Tenable Cloud Security according to the steps outlined in the Tenable Cloud Security User Guide, or based on guidelines received directly from Tenable Professional Services.

Note: You must have Tenable Cloud Security login credentials to access the Tenable Cloud Security User Guide.

Configure Tenable Cloud Security for Use in Tenable One

There are no specific steps to take in order to configure Tenable Cloud Security for use with Tenable One outside of the normal Tenable Cloud Security configuration steps. For more information, see the Tenable Cloud Security User Guide.

Known Limitations

Be aware of the following limitations when using Tenable Cloud Security in Tenable One:

  • Vulnerability Priority Rating (VPR) is exposed for some findings in Tenable Cloud Security.

  • Asset Criticality Rating (ACR) is NOT exposed or customizable in Tenable Cloud Security.

  • Attack Path Analysis does not currently support generating Tenable Cloud Security attack paths.

Onboarding Milestones

Tenable suggests you complete the following milestones to ensure your success before proceeding with your Tenable One deployment process:

  • In Lumin Exposure View, gain critical business context and get business-aligned cyber exposure score for cloud & hybrid services, processes and functions. Track overall cloud risk and understand the risk contribution of cloud assets and identities to your overall cyber exposure score, including by asset type, cloud vendor, or by tags:

    • Review the Global exposure card to understand your holistic score. Click Per Exposure to understand what factors are driving your score, and by how much.

    • Review the Cloud Security exposure card.

    • Configure the exposure view settings to set your Remediation SLA and SLA Efficiency based on your company policy.

    • Create a custom exposure card based on business context (for example, Cloud Resource Type, Asset Criticality, Resource Supporting what Application, Internal/External Web Applications, or Dev/Test/Prod).

  • In Tenable Inventory, enhance asset intelligence and gain deeper asset insights, including related attack paths, tags, exposure cards, users, relationships and more. Improve risk scoring by gaining a more complete view of asset exposure, with an asset exposure score that assesses total asset risk and asset criticality.

    • Review your Tenable Cloud Security assets to understand the strategic nature of the interface. This should help set your expectations on what features to use within Tenable Inventory, and when.

    • Review the Tenable Queries that you can use, edit, and bookmark.

    • Familiarize yourself with the Global Search query builder and its objects and properties. Bookmark custom queries for later use.

      Tip: To get a quick view of what properties are available:
      • In the query builder, type has. A list of suggested asset properties appears.
      • Customize the list by adding a column. A list of available columns/properties appears.
    • Drill down into the asset details page to view asset properties and all associated context views.
    • (Optional) Create a tag that combines different asset classes.

  • In Attack Path Analysis, optimize risk prioritization by exposing risky attack paths that traverse the attack surface, including web apps, IT, OT, IoT, identities, ASM, and prevent material impact. Streamline mitigation by identifying choke points to disrupt attack paths with mitigation guidance, and gain deep expertise with AI insights.

    • View the Attack Path Analysis Dashboard for a high-level view of your vulnerable assets such as the number of attack paths leading to these critical assets, the number of open findings and their severity, a matrix to view paths with different source node exposure score and ACR target value combinations, and a list of trending attack paths.

      • Review the Top Attack Path Matrix and click the Top Attack Paths tile to view more information about paths leading to your “Crown Jewels”, or Cloud Resources with a sensitive label.

      You can adjust these if needed to ensure you’re viewing the most critical attack path data and findings.

    • On the Findings page, view all attack techniques that exist in one or more attack paths that lead to one or more critical assets by pairing your data with advanced graph analytics and the MITRE ATT&CK® Framework to create Findings, which allow you to understand and act on the unknowns that enable and amplify threat impact on your assets and information.

    • On the Discover page, generate attack path queries to view your assets as part of potential attack paths:

      Then, you can view and interact with the Attack Path Query and Asset Query data via the query result list and the interactive graph.

What to do next

Deploy Tenable Identity Exposure.