Data Sources
A data source is any product that feeds data into the Attack Path Analysis interface. Once you have configured a data source for use with Tenable One, the application automatically ingests data from that Tenable One product.
You can configure the following Tenable products as data sources:
-
Deploy Tenable Vulnerability Management according to the steps outlined in the Tenable Vulnerability Management User Guide, or based on guidelines received directly from Tenable Professional Services.
-
Configure Tenable Vulnerability Management for use with Tenable One by:
-
Creating and applying asset tags
-
Creating and launching scans to generate asset data
-
Tip: For more detailed information on configuring Tenable Vulnerability Management for use with Tenable One, see the Tenable Vulnerability Management topic in the Tenable One Deployment Guide.
-
Deploy Tenable Security Center according to the steps outlined in the Tenable Security Center User Guide, or based on guidelines received directly from Tenable Professional Services.
-
Once you have installed Tenable Security Center, follow the Tenable One Synchronization steps outlined in the Tenable Security Center User Guide.
Tip: For more detailed information on configuring Tenable Security Center for use with Tenable One, see the Tenable Security Center topic in the Tenable One Deployment Guide.
-
Deploy Tenable Web App Scanning according to the steps outlined in the Tenable Web App Scanning User Guide, or based on guidelines received directly from Tenable Professional Services.
-
Create some quick scans to provide a high-level assessment of the target to establish your baseline.
Tip: For more detailed information on configuring Tenable Web App Scanning for use with Tenable One, see the Tenable Web App Scanning topic in the Tenable One Deployment Guide.
Deploy Tenable Cloud Security according to the steps outlined in the Tenable Cloud Security User Guide, or based on guidelines received directly from Tenable Professional Services.
Tip: For more detailed information on configuring Tenable Cloud Security for use with Tenable One, see the Tenable Cloud Security topic in the Tenable One Deployment Guide.
-
If necessary, activate Tenable Identity Exposure for use within your Tenable One platform.
-
Deploy Tenable Identity Exposure according to the steps outlined in the Tenable Identity Exposure User Guide, or based on guidelines received directly from Tenable Professional Services.
-
Configure Tenable Identity Exposure for use with Tenable One by:
-
Downloading and configuring the license file
-
Downloading and installing the Secure Relay
-
Configuring Forests
-
Tip: For more detailed information on configuring Tenable Identity Exposure for use with Tenable One, see the Tenable Identity Exposure topic in the Tenable One Deployment Guide.
-
Deploy Tenable Attack Surface Management according to the steps outlined in the Tenable Attack Surface Management User Guide, or based on guidelines received directly from Tenable Professional Services.
-
Configure Tenable Attack Surface Management for use with Tenable One by:
-
Configuring domains within Tenable Attack Surface Management
-
Configuring data sets and confirming your entire attack surface is present
-
Tip: For more detailed information on configuring Tenable Attack Surface Management for use with Tenable One, see the Tenable Attack Surface Management topic in the Tenable One Deployment Guide.
-
Install the Tenable OT Security appliance according to the steps outlined in the Tenable OT Security User Guide.
-
(Optional) If you want to pair your sensors with the Industrial Core Platform (ICP), install the OT Security Sensor according to the steps outlined in the Tenable OT Security User Guide.
-
Generate a Tenable OT SecurityLinking Key and determine your Cloud Site according to the steps outlined in the Tenable Vulnerability Management User Guide. Copy and save this information to link the connector to Tenable One.
-
Integrate your Tenable OT Security appliance with Tenable One according to the steps outlined in the Tenable OT Security User Guide.
Tip: For more detailed information on configuring Tenable OT Security for use with Tenable One, see the Tenable OT Security topic in the Tenable One Deployment Guide.
Data Timing
Data within Attack Path Analysis refreshes on the following cadence:
-
Asset Data — Asset information is updated every time the asset is seen as part of a scan.
-
Tag Application — When a tag is first created, it can take several hours to assign the tag to the appropriate asset, depending on the number of assets and the tag's rules.
-
Tag Reevaluation — Every 12 hours, Attack Path Analysis automatically reevaluates tags to ensure they apply to newly discovered assets, and are removed from any inactive assets.
-
Tenable Cloud Security data — Attack Path Analysis automatically refreshes Tenable Cloud Security data every 24 hours.