Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Getting Started with Tenable.ot Operations Report

by Cesar Navas
April 9, 2020

As networks converge between Information Technology (IT) and Operational Technology (OT), organizations struggle to achieve complete visibility of their network. By using Tenable.ot and Tenable.sc together, security directors can see a complete picture of the network. Tenable.sc can connect with Tenable.ot and incorporate risk scores such as Vulnerability Priority Rating (VPR) and Common Vulnerability Scoring System (CVSS) vectors to fully understand risk. As Tenable expands into OT markets, organizations have the opportunity to perform risk analysis based on OT and IT data in a single unified platform with Tenable.ot and Tenable.sc.

One of the difficult tasks for an organization is effectively distinguishing between application, hardware, and operating system vulnerabilities. By analyzing data collected by Tenable.ot and Tenable.sc, organizations are able to use Common Platform Enumeration (CPE) string to determine both the platform type and the vendor of vulnerabilities.

When an organization tracks down potential issues with a particular asset, it is helpful for the organization to know when the asset was either first seen or last seen. Knowing when the asset was first or last seen can help an analyst determine when the asset may have last been in a working state or when it may have encountered some issues. The first seen and last seen attributes used in this report are not the same as those attributes in Tenable.sc, because the attributes in the report are derived from the Asset Information Plugin from Tenable.ot. The Last Observed and First Discovered attributes in Tenable.sc describe the last time the vulnerability was imported into the cumulative database and when the vulnerability was first entered in the database. The First Seen and Last Seen attributes In Tenable.ot describe the first and last time Tenable.ot detected the asset.

This operations report assists an organization in fully understanding the OT network and allows them to take a deep dive into the vulnerabilities and assets within. Furthermore, this report allows an organization to effectively plan, track, and verify any unpatched or troublesome assets. The organizations are even able to track down assets that may be in non-expected run statuses. The Executive Summary helps to put the remaining chapters in perspective by providing an outlook on how vulnerable the network is, where the vulnerabilities are, and the spreads of the CVSS and VPR scores.

Reports, a comprehensive collection of dashboards, Assurance Report Cards, and assets are available in the Tenable.sc feed. The reports are located in the Compliance & Configuration Assessment category. The report requirements are:

  • Tenable.sc 5.4.0 
  • Tenable.ot

     

As threats to cloud, IT, and OT are exposed, organizations that practice Cyber Exposure are able to use Tenable.sc to reduce their Cyber Exposure gap. Tenable.ot helps to expand an enterprise’s visibility and merge traditional Vulnerability Management (VM) practices to include IT and OT. Using the advanced reporting capabilities of Tenable.sc, risk managers are able to bring data from OT networks into a single VM platform. The OT data can then be reviewed and assessed alongside the IT VM data for a wholistic picture of cyber risk.    

This report contains the following chapters: 

Executive Summary: In the Executive Summary chapter, the operations team is quickly informed of the vulnerability status of the OT network. Knowing the vulnerability status of the OT network allows the operations team to better understand where their patch management focus should be placed.

Asset Detection 2019 Summary: The Asset Detection 2019 Summary chapter assists the operations team in understanding when devices were last seen and first seen during the 2020 calendar year. The chapter begins with matrix indicators which allow the operations team to remove any tables in the next section that they may not need.

Asset Detection 2020 Summary: The Asset Detection 2020 Summary chapter assists the operations team in understanding when devices were last seen and first seen during the 2020 calendar year. The chapter begins with matrix indicators which allow the operations team to remove any tables in the next section that they may not need.

Operational Risk Rating Summary: The Operational Risk Rating Summary chapter provides an Operational Risk Rating matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.

Run Status Asset Summary: The Run Status Asset Summary chapter provides an Asset by Run Status matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.

Criticality Rating Summary: The Criticality Rating Summary chapter provides a Criticality Rating matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.

Asset Detail: The Asset Detail chapter builds upon the assets that were shown throughout the report and drills into them for greater detail. If the operations team decides they want more information on a specific host, they can find the asset details in this chapter.

Try for Free Buy Now

Try Tenable.io

FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Get FREE Advanced Support

with purchase of Nessus Professional

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.