| Product | Dependencies | Data source | Access required | Protocol | Data Collected | Notes |
|---|---|---|---|---|---|---|
| Tenable Vulnerability Management | Computer | Active vulnerabilities detected by Tenable Vulnerability Management plugins | ||||
| Tenable OT Security | OT Device | Active vulnerabilities detected by detected by Tenable OT Security plugins | ||||
| Tenable Vulnerability Management | OT Device | Active network connections | ||||
| Tenable Vulnerability Management | Computer | Active vulnerabilities detected by Tenable Vulnerability Management plugins | ||||
| Tenable OT Security | OT Device | Active vulnerabilities detected by detected by Tenable OT Security plugins | ||||
| Tenable Vulnerability Management | OT Device | Active network connections | ||||
| Tenable Vulnerability Management | Computer | Active vulnerabilities detected by Tenable Vulnerability Management plugins | ||||
| Tenable OT Security | OT Device | Active vulnerabilities detected by detected by Tenable OT Security plugins | ||||
| Tenable Vulnerability Management | OT Device | Active network connections |
Framework: MITRE ATT&CK
Family: Initial Access, Lateral Movement
Technique: Exploitation of Remote Services
Products Required: Tenable Vulnerability Management and Tenable OT Security