Tenable One + Tenable Identity Exposure Presentation
Tenable One + Tenable Identity Exposure Presentation
- Cyber Exposure
Management –
Novan Tambunan
Presales Engineer
“By 2026, organizations prioritizing their security
investments based on a continuous exposure
management programme will be three times less
likely to suffer fromfrom
to suffer a breach.”
a breach.”
https://www.tenable.com/analyst-research/2022-gartner-exposure-management-report
Attack Lifecycle
Need Protection Across the Entire Attack Lifecycle
Proactiv Reactive
e
Threats with Risks Attacks
Block/Stop Breach
Identi
ty
Cloud IT
Web App OT
TYPE OF FLAWS ENTRY POINT
ES
DUL
INTERNE MO
T
EXTERNAL
ATTACK 3 attributes
MAPPING make the modern
SURFACE AGENTLESS CLOUD
attack surface more difficult RM
ASSESSMENT
To address the TFO
A
MULTI- than
IAC ever
POLICY to defend:
evolving attack PL
CLOUD ASSESSMENT And a broad
DYNAMIC
surface, Tenablesuite
have of
RESEARC Powered
RAPIDLY GROWING
WEBAPP built out a range of
CE H AE
products by market
to
IA ASSESSMENT S S
leading
C
CLOUD HOSTED sensors and predict
VP AC and
data
capabilities to prioritize the
R R
HIGHLY
SCANNERS DYNAMIC
NESSUS
DATA
exposures
science
WEB- LOCAL
NESSUS
adaptively assess
that
LAKE
matter
and
APPS research
INCREASINGLY
SCANNERS every asset type and
INTERCONNECTED
ENDPOIN
IT
T technology
AGENTS
AGENTLESS ACTIVE
DIRECTORY
UNIFIED EXPOSURE
IDENTITY
AUDITING
MANAGEMENT PLATFORM
FOR MODERN ATTACK
SURFACE
VPR VULNERABILITY PRIORITY
RATING
Leverages supervised machine learning algorithms to
calculate the priority of a vulnerability based on the real
threat posed.
Key Drivers include
Threat Threat Exploitabilit Vulnerability Threat
Recency Intensity y Age Sources
EXPOSURE MANAGEMENT PLATFORM
EXPOSURE ANALYTICS
Data Aggregation, Risk Prioritization & Recommendations, Benchmarking
EXTERNAL
VULNERABILI
ATTACK
TY WEB APP CLOUD IDENTITY
SURFACE
MANAGEMEN SECURITY SECURITY SECURITY
MANAGEMEN
T
T
Example Tenable.sc+ Deployment – Tenable.io Cloud Scanners
Cloud
Infrastructure REGION 1
SCAN
REGION 2
SCAN
M VMWare ESXi VMWare ESXi VMWare ESXi
Sweep Scan
Tenable.io - Cloud/
Remote Agent Management
Workforce
REGION 3
SCAN
12
Full Coverage Tenable Deployment
The network vulnerability sensor
SCAN
Tenable.io cloud
Scanners / Agent management
LOG
Splunk
SCAN
Tenable.sc
VM on-prem REGION 2
SCAN
1 SNIFF
3
SOC REGION 3
1
4
Credentialed/Agent Scans vs. Non-Credentialed
Tenable SC On Premise Management Management Console Cloud 1 Gbps x 2 NiCs 180 Days : 2 TB, for
Console (Hardware Required) 8 x 3GHz cores 16 GB RAM Recommended Vulnerability Trending
Network Scanner
Tenable Nessus VM Internal Scanner Network & Asset Scanner per 1 Gbps x 2 NiCs
(Internal Asset) 1000 asset/scan 8 x 2GHz cores 16 GB RAM Recommended Minimum 100 GB
Tenable Nessus VM Scanner Network & Asset Scanner
Cloud Based (External Asset) (No Hardware Required)
Portable Scanner
Tenable Nessus VM Scanner (Internal Network & Asset Scanner per 1 Gbps x 1 NiCs
Asset) 1000 asset/scan 8 x 2GHz cores 16 GB RAM Recommended Minimum 100 GB
AntiDDo
Add On S
Use Case Sample
Asset Vulnerability Next Gen FW SIEM, SOAR, UEBA,
FIM, NetMon
VulScan by NGFW by SOC
Website
XXX 📌
Kenali attack- 📌 ML-Powered & CDSS Aset
surface Informasi
📌 Scanning 📌 Visibilitas lebih
otomatis dalam Perusahaa
📌 Saran perbaikan 📌 Sec Lifecycle n
Review
Insider 📌 Dukungan MSSP 📌 Dukungan MSSP Data
Threat Pribadi
Identify Protect Detect (PDP)
Threats Assets & Respons Incidents
Data
Patch Management ZTNA
Sensitif
FixPatch SASE
eMail
XXX Automated PenTest Endpoint Security NDR
PenTest EDR NDR
Introducing
Tenable.ad
ICS & SCADA
E-MAIL
Active Directory holds
the keys to
everything
• Governs authentication, holds all
CORPORATE DATA
passwords
USERS & CREDENTIALS
• Manages access rights to every vital asset
• Manages how servers and users interact
• A complex, evolving architecture that
APPLICATIONS
becomes
unmanageable over time
• Accumulates technical debt
CLOUD RESOURCES
Security Analysis, and identify missing security checks
The mother of all cyber-risks: The two methods to attack a system
For the attacker, there are only two technical ways to attack
a system (firewall, application, server, workstation, printer,
etc.): use an unpatched vulnerability or use a
misconfiguration
Enhances your
team’s User Objects
Configuration & AD Schema
understanding of (Identity)
AD security with
Contextual
Information of the
deviances
S
E
Tenable.ad Web Primary DC
Portal - Domain A
D
L
N
S
M
M
Primary DC
- Domain B
Security Tools vLAN
Customer Data
Center
Directory Listener S
D S Security Engine Storage
E M Manager
L
Legend/Key
Connectivity list & details
On-premises network flows
26
System Requirements for On Prem Tenable AD – PoC Purpose (Small Size)
•CPU: 4 cores, at least 2.6 GHz •CPU: 4 cores, at least 2.6 GHz
•Memory: 16 GB •Memory: 16 GB
•Disk: 30 GB •Disk: 500 GB
•OS: Windows Server 2016, Windows Server •OS: Windows Server 2016, Windows Server
2019, Windows Server 2022 2019,
•Tenable AD Software Installer (download link) Windows Server 2022
•Tenable AD Software Installer (download lin
Tenable AD Security Engine Nodes
DL
TLS 1.2 Connection
TCP\443
Directory AD FOREST
Listener 1
SE Primary DC -Primary DC -
Domain C Domain D
S
M
Tenable.ad Managed
Containers
Customer Data Center
Tenable Azure Tenant
Directory Listener S
DL SE Security Engine
M
Legend/Key
BEHIND ALMOST
EVERY BREACH
HEADLINE IS
AN INSECURE
ACTIVE
DIRECTORY
There is more beneath the surface
Compliance audits 2
Unintended
Unknown problems 7
Active Directory Misconfigurations
Configuration
Configuration
Lateral 4 vulnerabilities 8
Weaknesses
Movement
Modern /
Privilege escalation 9
5 Stealthy attacks
pathways
Dangerous Poor Administrative
6 10
relationships practices
11 Post-exploitation back
doors / persistence
30
Real-time, Automated, and Continuous AD Alert
EDR/AV are not enough
31
DISRUPT ATTACK
PATHS
Initial Foothold
via phishing or vulnerability
SECURE YOUR
UNCOVER NEW ATTACK PATHS
• Continuously identify new vulnerabilities and
2 misconfigurations
EXPOSURE ANALYTICS
Data Aggregation, Risk Prioritization & Recommendations, Benchmarking
EXTERNAL
VULNERABILI
ATTACK
TY WEB APP CLOUD IDENTITY
SURFACE
MANAGEMEN SECURITY SECURITY SECURITY
MANAGEMEN
T
T
Tenable Product • Exposure View
At-A-Glance
• Attack Path Analysis
Portfolio: •
•
Asset Inventory
Minimum 300 assets
Vulnerability
Risk-Based Vulnerability Management
Assessment
Minimum 300
Scan Scan Unlimited Minimum 100 Minimum 65 Minimum 65 Minimum 300
Minimum 500 IPs cloud resource
Unlimited IPs IPs assets assets assets Users
workloads
On Prem or
On Prem On Prem On Prem On Prem Cloud Cloud Cloud
Cloud
Infrastructure Traditional IT
Traditional IT Traditional IT Cloud Security
Traditional IT as Code (IaC) Traditional IT Assets
Assets Assets Infrastructure as Active Directory
Assets Attack Surface Assets Modern IT
OT Assets Modern IT Assets Code (IaC)
Mgmt. (ASM) Assets
• No API EASM includes Bundled with • Strong Can add modules Provides Asset • Security from Finds
•
• Mostly 5 domains and Tenable.sc to see preference of for: Criticality build-time to Vulnerabilities
used by unlimited sub- IT & OT assets gov customers • Web Rating & run time • Detects
pen domains • Can come as Application Benchmarking • Infrastructure attacks in real
testers Tenable.sc+ Security capabilities as Code time
• Best used including • PCI ASV • • Hunts for
Remediation of
in single passive Code threats
site up to scanner & ACR • Investigates
50 assets • EASM available in Tenable ONE, Tenable.io, Tenable.sc incidents
• Continuous discovery, inventorying, and monitoring of internet
facing assets on a bi-weekly or daily basis.
• Minimum 65 observable objects
2 Minutes Demo
Demo Samples
Demo Samples
Demo Tenable OT
Demo Samples – Attack Path
Analysis
Blast Radius helps to
evaluate lateral
movements in the Active
Directory from a Attack Path helps
potentially exposed asset you anticipate
the privilege
escalation
technique that an
attacker will use
to reach a
business asset
from a specific
entry point&
Asset Exposure measures the security communicate to
exposure of an asset and tackle all the management
escalation paths to this asset.
41
4
1
Demo Samples – Lumin
Cyber Risks Assesment
Steps Benefit
1. Assets Discovery Automation 1.Eliminate manual process for asset
discovery
2. Conduct risks assessment.
2.Always steps ahead before breach
3. Prepare for remediation plan. happen
Gain visibility
across a growing,
dynamic, Apply context to Communicate
interconnected anticipate threats cyber risk at all levels
modern attack and prioritize efforts of the organization to
surface to prevent attacks make better decisions
EXPOSURE MANAGEMENT PLATFORM
EXPOSURE ANALYTICS
Data Aggregation, Risk Prioritization & Recommendations, Benchmarking
EXTERNAL
VULNERABILI
ATTACK
TY WEB APP CLOUD IDENTITY
SURFACE
MANAGEMEN SECURITY SECURITY SECURITY
MANAGEMEN
T
T