Integrate IoT Security with Tenable
Focus
Focus
IoT Security

Integrate IoT Security with Tenable

Table of Contents
Integrate IoT Security through Cortex XSOAR with Tenable.
Where Can I Use This?What Do I Need?
  • IoT Security (Managed by IoT Security)
  • IoT Security subscription for an advanced IoT Security product (Enterprise Plus, Industrial OT, or Medical)
One of the following Cortex XSOAR setups:
  • An IoT Security Third-party Integration Add-on license that includes a cohosted, limited-featured Cortex XSOAR instance
  • A full-featured Cortex XSOAR server
In addition to continuously and passively monitoring network traffic to discover devices and assess risk, IoT Security supports the integration of third-party vulnerability scanners such as Tenable.io. You might want to perform an on-demand vulnerability scan to get deeper insights on device vulnerabilities or if IoT Security detects anomalous behavior warranting investigation of a particular device. IoT Security incorporates the scan results such as CVEs into its ongoing risk score assessments. It can also send detected vulnerabilities to a CMMS as work orders for tracking and resolving.
When you initiate a vulnerability scan from the IoT Security portal, it sends a command through Cortex XSOAR to Tenable.io in the cloud. Tenable then relays the scan command to a Nessus scanner, and after the scan is complete, Tenable returns the results in a PDF report through XSOAR to IoT Security. The flow is illustrated step-by-step below.
Integrating with Tenable requires either a full-featured Cortex XSOAR server or the purchase and activation of an IoT Security third-party integration add-on license, which comes with a free cohosted Cortex XSOAR instance. The basic plan includes a license for three integration add-ons, one of which can be used for Tenable. The advanced plan includes a license for all supported third-party integrations.