As networks converge between Information Technology (IT) and Operational Technology (OT), organizations struggle to achieve complete visibility of their network. By using Tenable.ot and Tenable.sc together, security directors can see a complete picture of the network. Tenable.sc can connect with Tenable.ot and incorporate risk scores such as Vulnerability Priority Rating (VPR) and Common Vulnerability Scoring System (CVSS) vectors to fully understand risk. As Tenable expands into OT markets, organizations have the opportunity to perform risk analysis based on OT and IT data in a single unified platform with Tenable.ot and Tenable.sc.
One of the difficult tasks for an organization is effectively distinguishing between application, hardware, and operating system vulnerabilities. By analyzing data collected by Tenable.ot and Tenable.sc, organizations are able to use Common Platform Enumeration (CPE) string to determine both the platform type and the vendor of vulnerabilities.
When an organization tracks down potential issues with a particular asset, it is helpful for the organization to know when the asset was either first seen or last seen. Knowing when the asset was first or last seen can help an analyst determine when the asset may have last been in a working state or when it may have encountered some issues. The first seen and last seen attributes used in this report are not the same as those attributes in Tenable.sc, because the attributes in the report are derived from the Asset Information Plugin from Tenable.ot. The Last Observed and First Discovered attributes in Tenable.sc describe the last time the vulnerability was imported into the cumulative database and when the vulnerability was first entered in the database. The First Seen and Last Seen attributes In Tenable.ot describe the first and last time Tenable.ot detected the asset.
This operations report assists an organization in fully understanding the OT network and allows them to take a deep dive into the vulnerabilities and assets within. Furthermore, this report allows an organization to effectively plan, track, and verify any unpatched or troublesome assets. The organizations are even able to track down assets that may be in non-expected run statuses. The Executive Summary helps to put the remaining chapters in perspective by providing an outlook on how vulnerable the network is, where the vulnerabilities are, and the spreads of the CVSS and VPR scores.
Reports, a comprehensive collection of dashboards, Assurance Report Cards, and assets are available in the Tenable.sc feed. The reports are located in the Compliance & Configuration Assessment category. The report requirements are:
- Tenable.sc 5.4.0
As threats to cloud, IT, and OT are exposed, organizations that practice Cyber Exposure are able to use Tenable.sc to reduce their Cyber Exposure gap. Tenable.ot helps to expand an enterprise’s visibility and merge traditional Vulnerability Management (VM) practices to include IT and OT. Using the advanced reporting capabilities of Tenable.sc, risk managers are able to bring data from OT networks into a single VM platform. The OT data can then be reviewed and assessed alongside the IT VM data for a wholistic picture of cyber risk.
This report contains the following chapters:
Executive Summary: In the Executive Summary chapter, the operations team is quickly informed of the vulnerability status of the OT network. Knowing the vulnerability status of the OT network allows the operations team to better understand where their patch management focus should be placed.
Asset Detection 2019 Summary: The Asset Detection 2019 Summary chapter assists the operations team in understanding when devices were last seen and first seen during the 2020 calendar year. The chapter begins with matrix indicators which allow the operations team to remove any tables in the next section that they may not need.
Asset Detection 2020 Summary: The Asset Detection 2020 Summary chapter assists the operations team in understanding when devices were last seen and first seen during the 2020 calendar year. The chapter begins with matrix indicators which allow the operations team to remove any tables in the next section that they may not need.
Operational Risk Rating Summary: The Operational Risk Rating Summary chapter provides an Operational Risk Rating matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.
Run Status Asset Summary: The Run Status Asset Summary chapter provides an Asset by Run Status matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.
Criticality Rating Summary: The Criticality Rating Summary chapter provides a Criticality Rating matrix and table which establish the systems within each range and the top 10 most severe systems. The matrix and table are then followed by iterators with tables based on each category.
Asset Detail: The Asset Detail chapter builds upon the assets that were shown throughout the report and drills into them for greater detail. If the operations team decides they want more information on a specific host, they can find the asset details in this chapter.