Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Cloud Security
Onboarding Portal

Tenable Cloud Security
Basics and Getting Started

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Note: You will be required to log in to Tenable Cloud Security to view some of the resources below. If you do not have Tenable Cloud Security credentials, please contact your account representative.

Major Onboarding Steps

To get started with Tenable Cloud Security, follow the steps below.

Think about the people/roles that make up your security team (for example, IAM professionals, DevSecOps, etc.). Create scheduled reports to communicate and assign findings to specific owners for remediation.

Resources:

Once your environment is onboarded, it's time to tackle the most critical security issues discovered by Tenable Cloud Security. Different colors/icons are used to indicate the various risk severity levels that the findings pose to your organization. Start your journey by reviewing issues like third-party access or root accounts without MFA.

Resources:

Once findings have been reviewed and the risk context examined, you can remediate findings based on a continuous analysis of your entire multi-cloud environment. Tenable Cloud Security lets you automatically remediate findings at the click of a button within the console, or you can manually remediate outside of the solution using Tenable's guided remediation steps.

Resources:

Major Onboarding Steps

To get started with Tenable Cloud Security, follow the steps below.

1 Set up your environment
2 Identify owners for relevant security areas

Think about the people/roles that make up your security team (for example, IAM professionals, DevSecOps, etc.). Create scheduled reports to communicate and assign findings to specific owners for remediation.

Resources:

3 Address critical findings

Once your environment is onboarded, it's time to tackle the most critical security issues discovered by Tenable Cloud Security. Different colors/icons are used to indicate the various risk severity levels that the findings pose to your organization. Start your journey by reviewing issues like third-party access or root accounts without MFA.

Resources:

4 Remediate findings

Once findings have been reviewed and the risk context examined, you can remediate findings based on a continuous analysis of your entire multi-cloud environment. Tenable Cloud Security lets you automatically remediate findings at the click of a button within the console, or you can manually remediate outside of the solution using Tenable's guided remediation steps.

Resources:

Best Practices

Use these best practices to get the most from your investment and set the foundation for becoming a power user:

  • Create and configure reports to communicate with relevant stakeholders on internal compliance, external audit and general security activities.