Tenable Vulnerability Management uses connectors, including third-party data connectors, to import assets from other platforms. Tenable Vulnerability Management supports connectors for Tenable Vulnerability Management and Tenable Container Security.
Tenable Vulnerability Management Connectors
Vulnerability Management includes connectors for AWS, GCP, and Microsoft Azure. To use Tenable Vulnerability Management connectors to scan your assets, you must first configure the platform the connector integrates with, then create the connector, as described in the appropriate section for your platform:
After you configure platforms and create connectors, you can manage connectors from the Settings page in Tenable Vulnerability Management.
Note: When using cloud connectors. Tenable recommends allowlisting the IP addresses for the region in which the Tenable Vulnerability Management site resides.
The licensing implications are as follows:
- Assets discovered through the connectors do not count against the license until and unless the asset is scanned for vulnerabilities. Discovery through the connector is free.
- Assets discovered through the connectors that did become licensed fall off the license the day after the asset was terminated. This event can be observed via the connector.
- When an asset is terminated, Tenable Vulnerability Management stops matching scan results to the asset. The asset is also deleted from the default view of the assets table.
When an asset is deleted, Tenable Vulnerability Management purges the asset and any associated findings in Explore, and releases the asset’s license. For more information, see Delete Assets.
Container Security Connectors
For information about Tenable Container Security connectors, see Configure Tenable Container Security Connectors to Import and Scan Images.
To view the supported plugins for AWS and Azure, see the Tenable Plugins page. Use the filter Supported Sensors to view the Frictionless Assessment plugins.