| Product | Dependencies | Data source | Access required | Protocol | Data Collected | Notes |
|---|---|---|---|---|---|---|
| Tenable Web App Scanning | Web Applications | Read-only | Any | Injection OR XXE Vulnerabilities | ||
| Tenable Vulnerability Management | Cloud instances | Read-only | Any | Vulnerabilities | ||
| Tenable Cloud Security | IaaS | Read-only | Any | Security Groups | ||
| Tenable Vulnerability Management | Computers | Read-only | Any | Vulnerabilities | ||
| Tenable Attack Surface Management | External Assets | Read-only | Any | External Assets | ||
| Tenable Web App Scanning | Web Applications | Read-only | Any | Injection OR XXE Vulnerabilities | ||
| Tenable Cloud Security | IaaS | Read-only | Any | Cloud Network data | ||
| Tenable Web App Scanning | Web Applications | Read-only | Any | Injection OR XXE Vulnerabilities | ||
| Tenable Cloud Security | IaaS | Read-only | Any | Cloud Network data |
Framework: MITRE ATT&CK
Family: Initial Access, Persistence
Technique: Exploit Public-Facing Application