Custom Roles
Custom roles allow you to create and manage user roles with precisely defined permissions tailored to your organization’s operational and security needs. You can create custom roles for users on your Tenable Vulnerability Management instance to fine-tune access for different teams, ensuring users have only the rights necessary for their responsibilities, for example, to create scans but not delete them, or view reports but not modify policies.
Note: A user's access to resources on the account may be limited by their permissions, regardless of their role.
Custom Role Privileges
The following privileges are available for use when creating custom roles within Tenable Vulnerability Management. You can also edit a custom role to remove privileges. Which privileges you can add to or remove from a role depend on the area of Tenable Vulnerability Management where each privilege applies.
| Privilege | Definition | Examples | 
|---|---|---|
| Read | Allows view-only access for the user to ensure auditors, compliance officers, or executives can access the data they need without the risk of modifying objects. | 
                                                                
  | 
                                                        
| 
                                                                 Write  | 
                                                            Lets a user make changes to an object (like a scan, asset group, dashboard, or report) but still stops short of giving them full administrative control. | 
                                                                
  | 
                                                        
| 
                                                                 Manage  | 
                                                            
                                                                 Grants the user the ability to create, edit, configure, and delete objects within their assigned scope - such as scans, policies, dashboards, assets, or repositories - depending on where the privilege is applied. Note: When you add the Manage privilege to a custom role, Tenable automatically adds the Read privilege as well. You cannot disable the Read privilege unless you first disable the Manage privilege.  | 
                                                            
                                                                
  | 
                                                        
| Manage Own | Allows the user to view, modify, and delete only exports that the user created. | 
                                                                 View, modify, or delete a scheduled export that you created.  | 
                                                        
| Manage All | Allows the user to view, modify, and delete exports, including exports that others created. | 
                                                                
  | 
                                                        
| Share | Empowers the user to share specific objects they have access to with other users, groups, or roles within their organization — such as scans, dashboards, reports, policies, or assets. This privilege is primarily about collaboration and data visibility: it lets a user decide who else can view, run, or modify the resources they control. | 
                                                                
  | 
                                                        
| Use | Gives the user the ability to access and apply an existing object, such as a scan policy, credential, or dashboard, without modifying or managing it. This enables a user to leverage objects that have already been created (for example, by an administrator or scan manager), while preventing them from editing, deleting, or sharing those objects. | 
                                                                
  | 
                                                        
| Create | Allows the user to build new objects or configurations within the system without granting broader control over the application. | 
                                                                
  | 
                                                        
| Edit | 
                                                                 Enables the user to modify existing tags within Tenable Inventory without creating new tags or deleting them.  | 
                                                            Edit a tag in Tenable Inventory. | 
| Import | Allows the user to upload scans so they can be used or analyzed in Tenable Web App Scanning. | 
                                                                
  | 
                                                        
| Search | Allows the user to create search queries within Attack Path Analysis. | 
                                                                
  | 
                                                        
| Save | Lets the user save a query for later use within Attack Path Analysis. | 
                                                                 Save a query as a bookmark within the Top Attack Pathssection of Attack Path Analysis.  | 
                                                        
| 
                                                                 Asset Category: 
  | 
                                                            Allows the user to access assets from the relevant data sources within Tenable Inventory and Lumin Exposure View. | 
                                                                
  | 
                                                        
| Submit PCI | Allows the user to submit Tenable Vulnerability Management or Tenable Web App Scanning scans for PCI ASV review. | 
                                                                 Submit a scan for PCI ASV review from the Scan Details page.  |