Tenable-Provided Roles and Privileges
Tenable-provided roles are a set of predefined user privileges within Tenable Vulnerability Management that broadly determine the functions a user can access and the actions they can perform. These roles provide a structured, tiered approach to managing access, ensuring users only have the capabilities necessary for their security responsibilities. When you create a user account, you must assign one of these roles, which automatically grants a specific set of privileges.
- Roles — Roles allow you to manage privileges for major functions in Tenable Vulnerability Management and control which Tenable Vulnerability Management modules and functions users can access.
- Permissions — Permissions allow you to manage access to data, such as Tags, Assets, and their Findings.
Simply put, roles are the actions you can take in a product, and permissions determine the data to which you can perform those actions.
Tenable Vulnerability Management Roles
The primary Tenable-provided roles used for Tenable Vulnerability Management, from most restricted to most privileged, include:
Basic
Basic users can run and view scans assigned to them, but they don’t have the ability to configure the platform, manage other users, or control system settings. Their role is designed for day-to-day vulnerability assessment tasks within the boundaries set by Administrators or Scan Managers.
Core Capabilities of a Basic User
-
Scan Usage
-
Launch scans that have been shared with them or that they own.
-
View results of scans they created or were given access to.
-
Stop or pause scans they are permitted to run.
-
Share their own scans with other users, if allowed.
-
Receive scan assignments from Scan Managers or Administrators.
-
-
Results and Reporting
-
View scan results for their own scans or assigned scans.
-
Generate, filter, and export reports (PDF, CSV, etc.) for those scans.
-
Use dashboards and findings to track vulnerabilities related to their scope.
-
-
Assets and Policies
-
Use existing scan policies made available by Scan Managers or Administrators.
-
Assign scans to specific assets or asset groups they have permission to see.
-
Scan Operator
Scan Operators can operate and manage scans within assigned assets, repositories, or networks. These users are generally focused on running and managing vulnerability scans, but not necessarily creating or administering broader system configurations.
Core Capabilities of a Scan Operator
-
Run Scans
-
Launch or start scans that have already been created or assigned to them.
-
Pause, resume, or stop scans they have permission to operate.
-
-
View Scan Status and Results
-
View scan status (running, completed, stopped, failed, etc.) and progress metrics during active scans.
-
Access and review scan results for scans they have run or that are shared with them.
-
Export scan data (e.g., as reports in CSV or PDF formats).
-
-
Manage Assigned Scans
-
Clone or modify existing scans if permitted within their access group.
-
Re-run scans using existing configurations or schedules.
-
Standard
Standard is a built-in role designed for regular users who need to view and work with vulnerability data, but who do not require administrative or configuration privileges. A Standard user has access primarily for viewing, analyzing, and reporting on vulnerability data that has already been collected. They can see assets, dashboards, and reports shared with them, but they cannot create, modify, or launch scans unless specifically granted additional privileges.
Core Capabilities of a Standard User
-
View Vulnerability Data
-
Access vulnerabilities, assets, dashboards, and reports assigned to their access group.
-
Review findings, severity levels, and vulnerability trends.
-
Filter or search vulnerability data to support analysis or remediation tracking.
-
-
Utilize Dashboards and Reporting
-
View and interact with built-in or shared dashboards.
-
Filter or search vulnerability data to support analysis or remediation tracking.
-
Generate vulnerability reports using available templates or saved filters and export results for analysis.
-
-
Collaborate Within Scope
-
Comment on findings or work within remediation workflows if enabled.
-
Access shared data and insights within their assigned access group or assets.
-
Scan Manager
The Scan Manager’s purpose is to create, manage, and oversee vulnerability scans and scan results without having unrestricted system-wide control. A scan manager user can fully manage scans but does not have administrative powers over the platform or users.
Core Capabilities of a Standard User
-
Scan Creation and Management
-
Create, configure, launch, and schedule vulnerability scans.
-
Define targets and asset groups for scans.
-
Edit or delete scans they own or have been granted access to.
-
Share scans with other users or groups (with rights granted by an Administrator).
-
Assign scan permissions.
-
-
Asset and Scanner Usage
-
Use available scanners and scan zones (assigned by an Administrator).
-
Assign scans to specific scanners.
-
Manage scan distribution across scanner resources.
-
-
Results and Reporting
-
View scan results for the scans they own or manage.
-
Generate and export reports (PDF, CSV, etc.).
-
Administrator
Administrators have the highest level of permissions and can perform both security management and system configuration tasks. Their role is to control the overall deployment, user access, and operational setup of the product environment.
Core Capabilities of an Administrator
-
User and Role Management
-
Create, modify, disable, or delete user accounts.
-
Assign roles, permissions, and group memberships.
-
Enforce security policies like password requirements or authentication methods.
-
-
System Configuration
-
Configure global system settings (network settings, logging, notifications, authentication, etc.).
-
Integrate Tenable with external systems (LDAP/AD, SIEMs, ticketing systems, APIs).
-
Set up and manage access controls.
-
-
Scan and Asset Management
-
Create, configure, launch, and schedule vulnerability scans.
-
Manage scanners and scan zones.
-
Define scan policies and templates for other users.
-
Add, organize, and monitor assets or asset groups.
-
-
Plugin and Update Management
-
Control plugin updates for Tenable platforms.
-
Ensure scanners have the latest detection capabilities.
-
-
Data and Reporting
-
Access all vulnerability data, scan results, and reports across the environment.
-
Configure report templates and dashboards.
-
Share or restrict visibility of findings to other users.
-
-
Security and Compliance Oversight
-
Configure compliance scans (CIS, DISA STIG, PCI DSS, etc.).
-
Manage audit files and compliance templates.
-
Review and enforce organization-wide remediation strategies.
-
-
User Management
-
Define user roles and scope of data access.
-
Oversee activity logs and audit trails.
-
Revoke user or system access when necessary.
-
Tenable Vulnerability Management Role Privileges
The following table describes privileges associated with each Tenable-provided Tenable Vulnerability Management user role, organized by privilege and function.
Area | Tenable Vulnerability Management-Provided Roles and Privileges | ||||
---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | |
Activity Logs | view, export | - | - | - | - |
API Keys | view, modify | view, modify | view, modify | view, modify | view, modify |
Account Settings | view, modify | view, modify | view, modify | view, modify | view, modify |
Agents | view, delete | view, delete | - | - | - |
Agent Freeze Windows | view, create, modify, delete | view, create, modify, delete | - | - | - |
Agent Groups | view, create, modify, delete | view, create, modify, delete | - | - | - |
Agent Settings | view, modify | view, modify | - | - | - |
Assets | view, modify, export, delete | view, modify, export, delete | view, modify, export, delete | view, modify, export, delete | view, export |
Connectors | view, create, modify, delete | - | - | - | - |
Dashboards | view, create, modify, export, delete | view, create, modify, export, delete | view, create, modify, export, delete | view, create, modify, export, delete | view, create, modify, export, delete |
Exclusions | view, import, export, delete | view, import, export, delete | - | - | - |
Exports | view, modify, export, delete | - | - | - | - |
Findings | view, export | view, export | view, export | view, export | view, export |
General Settings | view, modify | - | - | - | - |
Managed Credentials | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete |
Recast Rules | view, create, modify, delete | - | - | - | - |
Reports | view, run, create, modify, delete | view, run, create, modify, delete | view, run, create, modify, delete | view, run, create, modify, delete | view |
Scan Results | view, export, delete | view, export, delete | view, export, delete | view, export, delete | view, export, delete |
Scans1 | view, import, run, create, modify, delete | view, import, run, create, modify, delete | view, import, run, create, modify, delete | view, import, run, create2, modify3, delete | view4, import |
Scanner Groups | view, create, modify, delete | view, create, modify, delete | - | - | - |
Sensors | view, add, modify, delete | view, add, modify, delete | - | - | - |
Shared Collections | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view |
Tags5 | view, create tag category, create tag value, delete, export, assign, unassign | view, create tag value, delete, assign, unassign | view, delete, assign, unassign6 | view, delete, assign, unassign | view, assign, unassign |
User Groups | view, create, modify, delete, export | - | - | - | - |
Users | view, create, modify, delete | - | - | - | - |
Other Tenable One Platform Product Roles and Privileges
Within Tenable Vulnerability Management, you can also apply privileges for other applications within the Tenable One platform. For more information, see Tenable One Product Architecture in the Tenable One Deployment Guide.
The following tables describe privileges associated with each product's available user roles, organized by function in their respective product.
Tenable Web App Scanning-Provided Roles and Privileges
Area | Tenable Web App Scanning-Provided Roles and Privileges | |||||
---|---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | ||
Dashboards | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view | view |
Tenable-Provided Scan Templates | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view | - | - |
Scans (also requires scan permissions) |
view, import, create, modify, run, delete | view, import, create, modify, run, delete | view, create, modify, run, delete | view, create7, modify8, run, delete, move to trash | view | view |
Managed Credentials | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete | view, create, modify, delete |
Scan Permissions |
view, create, modify, delete9 | view, create, modify, delete10 | view, create, modify, delete11 | view, create, modify, delete12 | - | - |
Scan Results (also requires scan permissions) |
view, delete | view, delete | view, delete | view, delete | view, delete | view, delete |
Tenable Exposure Management-Provided Roles and Privileges
Area | Tenable Exposure Management-Provided Roles and Privileges | ||||
---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | |
Settings | manage, read | read | read | read | read |
Access to Asset Type | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity |
Export | manage own | manage own | manage own | manage own | manage own |
Exposure Card |
create, share, read | create, share, read | create, share, read | share, read | read |
Finding | manage, read | manage, read | read | read | read |
Query | search, save | search, save | search, save | search | search |
Tag |
create, edit | create, edit | - | - | - |
Third-Party Connectors | create, manage, read | - | - | - | - |
Tenable Identity Exposure-Provided Roles and Privileges
Area | Tenable Identity Exposure-Provided Roles and Privileges | |
---|---|---|
Global Administrator |
Custom | |
Entire Application | Read, Edit, Create |
User roles are defined in the application. For more information, see Roles. |
Tenable Attack Surface Management-Provided Roles and Privileges
Area | Tenable Attack Surface Management-Provided Roles and Privileges | |||
---|---|---|---|---|
Business Administrator | Cloud Connector Manager | Active User | View-Only User | |
Inventory |
manage, add, modify, delete | add, modify, leave | add, modify, leave | view |
Suggestions | manage, add, modify, delete | manage, add, modify, delete | manage, add, modify, delete | view |
Subscriptions | manage, add, modify, delete | manage, add, modify, delete | manage, add, modify, delete | view |
Dashboard | manage, add, modify, delete | manage, add, modify, delete | manage, add, modify, delete | view |
Reports | manage, add, modify, delete | manage, add, modify, delete | manage, add, modify, delete | view |
Txt Records | manage, modify, delete | manage, modify, delete | manage, modify, delete | view |
Activity Logs | view | view | view | view |
User Accounts | manage, modify, delete | - | - | - |
Business | manage, modify | - | - | - |
Cloud connectors | manage, add, modify, delete | manage, add, modify, delete | view | view |
Tenable Cloud Security-Provided Roles and Privileges
Area | Tenable Cloud Security-Provided Roles and Privileges | ||
---|---|---|---|
Administrator |
Collaborator | Viewer | |
Console Tabs | view | view | view |
Reports | view, create, schedule, delete | view, create, schedule, delete | view, create |
Inventory | view, manage, generate policy | view, manage, generate policy | - |
Findings | view, share, manage, disable | view, share, manage | view, share |
Administration | view, manage, audit | - | - |
Tenable PCI ASV-Provided Roles and Privileges
Area | Tenable PCI ASV-Provided Roles and Privileges | |
---|---|---|
Administrator |
Other | |
Entire Application | view, import, run, create, modify, delete | - |
Lumin Exposure View-Provided Roles and Privileges
Area | Lumin Exposure View-Provided Roles and Privileges | ||||
---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | |
Settings | manage, read | read | read | read | read |
Access to Asset Type | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity |
Export | manage own | manage own | manage own | manage own | manage own |
Exposure Card |
create, share, read | create, share, read | create, share, read | share, read | read |
Tenable Inventory-Provided Roles and Privileges
Area | Tenable Inventory-Provided Roles and Privileges | ||||
---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | |
Access to Asset Type | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity | computing resource (host), cloud resource, web application, identity |
Export | manage own | manage own | manage own | manage own | manage own |
Tag |
create, edit | create, edit | - | - | - |
Attack Path Analysis-Provided Roles and Privileges
Area | Attack Path Analysis-Provided Roles and Privileges | ||||
---|---|---|---|---|---|
Administrator |
Scan Manager | Standard | Scan Operator | Basic | |
Export | manage own | manage own | manage own | manage own | manage own |
Finding | manage, read | manage, read | read | read | read |
Query | search, save | search, save | search, save | search | search |