OT Security Instances
OT Security protects industrial networks by providing industrial and critical infrastructure operations with visibility, security, and control to ensure safe facility operation while reducing overall risk. You can use Tenable Security Center to analyze OT Security asset and vulnerability data alongside your data from other scanners.
When you configure data synchronization from OT Security to Tenable Security Center, OT Security sends asset and vulnerability data to an agent repository in Tenable Security Center. OT Security communicates with Tenable Security Center using the Tenable Security Center API.
Note: It is important to restrict the data OT Security collects to only the desired host IP address ranges. For example, if OT Security collects information on 1100 hosts and Tenable Security Center is licensed for 1000 hosts, OT Security sends all of the data to Tenable Security Center and Tenable Security Center will indicate that you exceeded your host count. For more information, see License Requirements.
Before you begin:
- Deploy OT Security, as described in the OT Security User Guide.
- Begin vulnerability assessment in OT Security, as described in the OT Security User Guide.
To fully configure data synchronization from OT Security to Tenable Security Center:
-
Add a designated agent repository for OT Security data in Tenable Security Center, as described in Add a Repository.
- Using the OT Security API, configure the Tenable Security Center integration to specify the sync schedule, import repository, and authentication.
What to do next:
- View scan results from OT Security, as described in View Scan Results.
- View vulnerability data filtered by your OT Security repository, as described in Vulnerability Analysis.