Monitoring virtual computing technologies for vulnerabilities is essential to securing a network against exploitation. The pervasive implementation of virtual computing technologies complicates vulnerability management and remediation efforts. By leveraging vulnerability data gathered by Nessus, SecurityCenter is able to provide detailed insight into vulnerabilities related to virtual computing technologies deployed in an environment.
The Virtual Computing Summary report provides insight into vulnerabilities associated with various virtual computing technologies that may expose an organization to increased risk of exploitation. Vulnerabilities related to common virtual computing technology vendors and software are specifically tracked. Virtual computing technologies are being increasingly deployed in place of physical devices, and as a result can be targeted for exploitation. By monitoring the network specifically for vulnerabilities in virtual computing technologies, security teams can more effectively secure the network against exploitation and intrusion.
The elements in this report leverage data gathered by active vulnerability scanning with Tenable Nessus and can also use passive vulnerability detection with Tenable Passive Vulnerability Scanner (PVS). The data collected is filtered to provide insight into the vulnerabilities related to virtual computing technologies in the environment. Vulnerabilities are tracked by time, severity, and exploitability in order to provide a more complete view of the security status of the network. Security teams can use all of the elements in this report to assist in identifying, monitoring, and remediating virtual computing technology vulnerabilities that may expose their organization to risk.
This report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the SecurityCenter Feed under the category Threat Detection & Vulnerability Assessments. The report requirements are:
- SecurityCenter 5.3.1
- Nessus 6.6.2
Tenable SecurityCenter provides extensive network monitoring by leveraging a unique combination of detection, reporting, and pattern recognition utilizing industry recognized algorithms and models. SecurityCenter is continuously updated to detect advanced threats and vulnerabilities. Tenable constantly analyzes information from our unique sensors, delivering continuous visibility and critical context and enabling decisive action that transforms the security program from reactive to proactive. Continuous vulnerability analysis enables security teams to more effectively tailor remediation efforts. Monitoring the network to ensure that all systems are secured against vulnerabilities is essential to ongoing security efforts. Tenable’s extensive network monitoring capabilities can verify that systems are successfully scanned regularly and secured against vulnerabilities, enabling ongoing improvements to an organization’s security posture.
The following chapters are included in this report:
- Executive Summary: This chapter provides a high-level overview of the vulnerability status of the environment as related to the virtual computing technologies in use. Vulnerabilities are tracked by severity, vendor, and time in order to provide a broad understanding of virtual computing technology vulnerabilities present in the network. Since virtual computing technologies can be configured as network ingress points, vulnerabilities should be carefully monitored and remediated quickly.
- Vulnerability Status at a Glance: This chapter provides insight into the specific vulnerabilities detected that are related to virtual computing technologies. The following two tables provide lists of the vulnerabilities related to virtual technologies detected in the past seven and thirty days. The tables list the plugin name, severity, and total count of relevant vulnerabilities detected. Security teams can use the tables to track the detection of new virtual computing vulnerabilities.
- Critical Vulnerability Information: The Virtual Computing Criticals at a Glance table in this chapter lists the critical vulnerabilities related to virtual computing technologies detected in the environment. Relevant vulnerabilities are filtered by the critical severity level in order to focus on the vulnerabilities that present the highest level of risk to the organization. For each vulnerability, the plugin ID, name, severity, family, and description are listed, along with a list of the impacted IP addresses. Security teams can use this component to identify and remediate the highest risk vulnerabilities.
- Detailed Vulnerability Summary: This chapter provides detailed information about virtual computing technology vulnerabilities detected in the environment. Vulnerabilities are separated by vendor and analyzed in multiple ways in order to provide a thorough depiction of the vulnerabilities impacting the network. Each element in this chapter provides detailed information about the virtual technology vulnerabilities that could impact the security of the organization.