Attack Path Analysis Metrics

The following metrics are used to assess data within Attack Path Analysis:

Data Timing

Data within Attack Path Analysis refreshes on the following cadence:

  • Asset Data — Asset information is updated every time the asset is seen as part of a scan.

  • Tag Application — When a tag is first created, it can take several hours to assign the tag to the appropriate asset, depending on the number of assets and the tag's rules.

  • Tag Reevaluation — Every 12 hours, Attack Path Analysis automatically reevaluates tags to ensure they apply to newly discovered assets, and are removed from any inactive assets.

Cyber Exposure Score (CES)

Attack Path Analysis calculates a dynamic CES that represents exposure risk as an integer between 0 and 1000, based on the Asset Exposure Score (AES) values for assets. Higher CES values indicate higher risk.

Note: Attack Path Analysis does not include assets older than 90 days in your CES.

CES Category CES Range
High 650 to 1000
Medium 350 to 649
Low

0 to 349

Asset Exposure Score (AES)

Attack Path Analysis calculates a dynamic AES for each asset on your network to represent the asset's relative exposure as an integer between 0 and 1000. A higher AES indicates higher exposure.

Note: Attack Path Analysis does not calculate an AES for unlicensed assets.

AES Category AES Range
High 650 to 1000
Medium 350 to 649
Low

0 to 349

Asset Criticality Rating (ACR)

Tenable assigns an ACR to each asset on your network to represent the asset's relative criticality as an integer from 1 to 10. A higher ACR indicates higher criticality.

ACR Category ACR Range
Critical

9 to 10

High 7 to 8
Medium 4 to 6
Low

1 to 3

Because Tenable Vulnerability Management calculates ACR values every 24 hours, you may need to wait up to 24 hours to view the ACR after scanning the asset on your network.

Attack Path Analysis Categories

Attack Path Analysis products refer to data sources as Categories. For more information, see Data Sources.

Additionally, Attack Path Analysis uses specific icons to represent these within the user interface.

Category Icon

Cloud Resources

Note: Currently, Tenable One only supports the ingestion of Legacy Tenable Cloud Security data. For more information, contact your Tenable Representative.

Web Applications

Identity Exposure

Computing Resources