Tenable Cloud Security
Onboarding Portal
Tenable Cloud Security
Basics and Getting Started
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Note: You will be required to log in to Tenable Cloud Security to view some of the resources below. If you do not have Tenable Cloud Security credentials, please contact your account representative.
Major Onboarding Steps
To get started with Tenable Cloud Security, follow the steps below.
- 1 Set up your environment
- 2 Identify owners for relevant security areas
- 3 Address critical findings
- 4 Remediate findings
Resources:
Think about the people/roles that make up your security team (for example, IAM professionals, DevSecOps, etc.). Create scheduled reports to communicate and assign findings to specific owners for remediation.
Resources:
- Docs: Create automation rules
- Docs: Create scheduled reports
Once your environment is onboarded, it's time to tackle the most critical security issues discovered by Tenable Cloud Security. Different colors/icons are used to indicate the various risk severity levels that the findings pose to your organization. Start your journey by reviewing issues like third-party access or root accounts without MFA.
Resources:
Once findings have been reviewed and the risk context examined, you can remediate findings based on a continuous analysis of your entire multi-cloud environment. Tenable Cloud Security lets you automatically remediate findings at the click of a button within the console, or you can manually remediate outside of the solution using Tenable's guided remediation steps.
Resources:
- Docs: Remediate findings
Major Onboarding Steps
To get started with Tenable Cloud Security, follow the steps below.
Resources:
Think about the people/roles that make up your security team (for example, IAM professionals, DevSecOps, etc.). Create scheduled reports to communicate and assign findings to specific owners for remediation.
Resources:
- Docs: Create automation rules
- Docs: Create scheduled reports
Once your environment is onboarded, it's time to tackle the most critical security issues discovered by Tenable Cloud Security. Different colors/icons are used to indicate the various risk severity levels that the findings pose to your organization. Start your journey by reviewing issues like third-party access or root accounts without MFA.
Resources:
Once findings have been reviewed and the risk context examined, you can remediate findings based on a continuous analysis of your entire multi-cloud environment. Tenable Cloud Security lets you automatically remediate findings at the click of a button within the console, or you can manually remediate outside of the solution using Tenable's guided remediation steps.
Resources:
- Docs: Remediate findings
Best Practices
Use these best practices to get the most from your investment and set the foundation for becoming a power user:
- Integrate Tenable Cloud Security with your ticketing, notification, and SIEM tools such as Jira, ServiceNow, Slack, Teams and Splunk.
- Connect your CI/CD Pipeline and code repositories. Scan your infrastructure-as-code (IaC) and address configuration issues before your deployment. Sync the code associated with your cloud resources and trace cloud findings back to their source code.
- Create and configure reports to communicate with relevant stakeholders on internal compliance, external audit and general security activities.