Tenable Security Center - Vulnerabilities

About

Tenable Security Center is a vulnerability management platform. Managed on premises and powered by Nessus technology, the Tenable Security Center suite of products provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.

Use Tenable Security Center to get a risk-based view of your IT, security, and compliance posture so that you can quickly identify, investigate, and prioritize vulnerabilities.

Why You Should Integrate

Adding Tenable Security Center as a source provides visibility into devices scanned by Tenable Security Center and surfaces and vulnerabilities those devices may have.

How Does the Integration Work

This integration pulls devices using the /analysis endpoint of Tenable Security Center's REST API. It looks for devices that have been seen in the last 5 days by any Tenable Security Center plugin and retrieves vulnerabilities from those devices.

This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.

⚠️

If you haven't already, please review our instructions for configuring the integration before proceeding with the instructions below.

Configuration Options

No integration-specific configuration needed

External Documentation

Creating credentials

You'll be asked to provide source credentials that Sevco will use to connect to Tenable Security Center. The following link will step you through creating API keys: https://docs.tenable.com/security-center/Content/GenerateAPIKey.htm

Required permissions

The API Keys must have the following permissions:

  • Must be generated with the Security Manager role
  • Must have access to all repositories

Contact Us

If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits link located in the upper right hand corner of the documentation.