Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Data Access and Integrity

by Megan Daudelin
January 22, 2016

Data Access and Integrity Dashboard Screenshot

Monitoring data access and integrity is essential to the risk management process. By understanding where sensitive or valuable information is kept and who has access to it, security teams can better ensure file security and integrity. Tenable.sc is able to integrate with Nessus, the Nessus Network Monitor (NNM), and the Log Correlation Engine (LCE) to monitor file access and signs of data leakage.

The Data Access and Integrity dashboard monitors data access and related vulnerabilities on the network. Specific plugins are used to indicate the presence of sensitive, proprietary, or questionable data. Specific events and vulnerabilities related to data access, leakage, and integrity are listed for review. Plugin IDs are used to filter for vulnerabilities related to file access and sharing, copyrighted files, and data storage. By monitoring data access, security teams can remediate vulnerabilities and adjust access policies as necessary to improve the security of their environment.

The components in the Data Access and Integrity dashboard present vulnerabilities and events related to data access and potential leaks. Indicators are used to show the presence of potentially questionable or high-risk data, such as torrent files or malware. Lists of events related to file access and data leak allow security teams to determine whether data integrity may be compromised. Counts of events by IP address are tracked to show which hosts generate the greatest counts of file integrity events so that necessary steps can be taken. All of the components can be modified to focus on specific subnets or assets that hold data of particular concern. Organizations can use the information provided to better understand the accessibility and vulnerability of data within their network.

This dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. This dashboard can be easily located in the Tenable.sc  Feed under the category Monitoring. The dashboard requirements are:

  • Tenable.sc 4.8.2
  • Nessus 8.6.0
  • NNM 5.9.0
  • LCE 6.0.0

Tenable.sc Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. The Nessus Network Monitor (NNM) performs deep packet inspection to enable discovery and assessment of operating systems, network devices, hypervisors, databases, tablets, phones, web servers, cloud applications, and critical infrastructure. The Log Correlation Engine (LCE) performs deep log analysis and correlation to continuously discover and track systems, applications, cloud infrastructure, trust relationships, and vulnerabilities. By integrating with Nessus, NNM, and LCE, Tenable.sc CV’s continuous network monitoring is able to detect systems and vulnerabilities across the enterprise.

Listed below are the included components:

  • Sensitive Data – Potential Sensitive Information: An indicator-based component triggers when certain elements are detected by an active Nessus scan. Such as material that may contain copyright information, office files, or NFS exports.
  • Data Access and Integrity – Data Access Vulnerabilities: The Data Access Vulnerabilities table lists the top ten vulnerabilities related to data access by count.
  • Questionable Hosting – Questionable Content Hosted: This component presents indicators of possible questionable content hosted on web servers on the network, including hosting .ini files, torrent files, archive files (which might contain sensitive data), media files (which might be copyrighted), and malware, as well as linking to malicious content, and serving possibly malicious script and iFrame tags.
  • Data Access and Integrity – File Access Events: The File Access Events table lists the most common events related to file access over the past 24 hours.
  • File Integrity Monitoring – IP Addresses With File Integrity Events: The IP Addresses with File Integrity Events table lists the IP addresses that have file change events attributed to them in the past 15 days.
  • Data Access and Integrity – Data Leak Events: The Data Leak Events table lists the most common events related to potential data leaks over the past 24 hours.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training