Tenable.io for Thycotic

Similar documents
How-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018

How-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

PVS Subscription Registration Process

Nessus Manager Registration Process

Tenable for Palo Alto Networks

How-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018

How-to Guide: Tenable Core Web Application Scanner for Microsoft Azure. Last Updated: May 16, 2018

Tenable for McAfee epolicy Orchestrator

How to Register for Training

Tenable for McAfee epolicy Orchestrator

How to Add, Deactivate, or Edit a Contact

How to Transition from Nessus to SecurityCenter Reports

Tenable for Google Cloud Platform

Services. This document. describes how comments and. it is in. Tenable.io and. Tenable.io

Tenable for ServiceNow. Last Updated: March 19, 2018

Tenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0. Last Revised: January 16, 2019

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

Pulse Secure Policy Secure

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

How-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019

SecurityCenter 5.1 Upgrade Guide. November 12, 2015 (Revision 2)

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

SailPoint IdentityIQ 6.4

ForeScout Extended Module for Tenable Vulnerability Management

SecurityCenter Upgrade Guide. July 21, 2015 (Revision 1)

Qualys Cloud Platform (VM, PC) v8.x Release Notes

How-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018

Vulnerability Management

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

Tenable.io User Guide. Last Revised: November 03, 2017

SecurityCenter 4.8.x Upgrade Guide. December 16, 2014 (Revision 1)

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Click Studios. Passwordstate. Remote Session Launcher. Installation Instructions

ForeScout Extended Module for Qualys VM

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Nessus Enterprise for Amazon Web Services (AWS) Installation and Configuration Guide

CAMSCANNER TURN YOUR PHONE AND TABLET INTO SCANNER FOR

Security in the Privileged Remote Access Appliance

Comodo Endpoint Security Manager Professional Edition Software Version 3.5

Cloud Customer Architecture for Securing Workloads on Cloud Services

Colligo Engage Console. User Guide

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Managing Microsoft 365 Identity and Access

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

NTP Software File Auditor for Windows Edition

Comodo Certificate Manager

Installation Components for Scan to Worldox Canon MFP Application

Chapter 5: Vulnerability Analysis

Implementing Infoblox Data Connector 2.0

ForeScout CounterACT. Configuration Guide. Version 4.3

Cloud FastPath: Highly Secure Data Transfer

Security in Bomgar Remote Support

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

DIGIPASS Authentication for O2 Succendo

VMware AirWatch Certificate Authentication for EAS with ADCS

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

ClearPass and Tenable.sc Integration Guide. Tenable.sc. Integration Guide. ClearPass. ClearPass and Tenable.sc - Integration Guide 1

How to Secure Your Cloud with...a Cloud?

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Evolve Link Proposal to [Institution] for ebooks ScienceDirect. for Brightspace by D2L

NTP Software File Reporter Analysis Server

Bomgar SIEM Tool Plugin Installation and Administration

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

Protecting Critical Infrastructure. SCADA Network Security Monitoring

Configuring Vulnerability Assessment Devices

App Gateway Deployment Guide

DefendX Software Control-QFS for Isilon Installation Guide

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

Go mobile. Stay in control.

Tenable Nessus Customer Loyalty Program to Purchase PVS Subscription

July 18, (Revision 3)

SIEM Tool Plugin Installation and Administration

Risk Intelligence. Quick Start Guide - Data Breach Risk

Nessus v6 SCAP Assessments. November 18, 2014 (Revision 1)

Privileged Remote Access SIEM Tool Plugin Installation and Administration

See What You ve Been Missing

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

SecurityCenter 5.0 SCAP Assessments. May 28, 2015 (Revision 2)

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Compliance Audit Readiness. Bob Kral Tenable Network Security

McAfee Security Connected Integrating epo and MFECC

ForeScout CounterACT. Assessment Engine. Configuration Guide. Version 1.0

Forescout. Configuration Guide. Version 4.4

Installation of RHEL 5 for Tenable SecurityCenter Evaluation

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Google Identity Services for work

Google Authenticator User Guide

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

Speed Up Incident Response with Actionable Forensic Analytics

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

PowerBroker Password Safe Version 6.6

Transcription:

How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com. Security administrators know that conducting network vulnerability assessments means getting access to and navigating an ever-changing sea of usernames, passwords and privileges. By integrating Thycotic Secret Server with Tenable.io, customers now have even more choice and flexibility for reducing the credentials headache. The combined Tenable.io-Thycotic solution works when a Tenable.io scan policy is configured to query a Thycotic Secret Server for privileged credentials. At the time of the scan, Tenable.io sends a request to Thycotic to request the privileged account credentials to be used. Thycotic then provides the privileged account credentials back to Tenable.io, and the provided credentials are then used to log in to the target system to identify vulnerabilities and misconfigurations. Benefits of integrating Tenable.io with Thycotic Secret Server include: Credentials stored in Thycotic Secret Server no longer need to be managed and updated directly within the Tenable.io platform Reduce the time and effort needed to document where credentials are stored within the entire organizational environment Automatically enforce security policies within specific departments or for specific business unit requirements, which simplifies compliance Reduce the risk of unsecured privileged accounts and credentials across the enterprise Integration Requirements The following are required in order to integrate Tenable.io with Thycotic Secret Server: Thycotic Secret Sever version 8.9 or higher Tenable.io, Tenable s cloud platform for vulnerability management The integration requires enabling the Thycotic Secret Server web services API, which is available in Secret Server Professional and up as well as the hosted version of Secret Server.

Integrating With Thycotic Secret Server Tenable.io can be configured to perform credentialed network scans of both Windows and Linux systems using Thycotic s password management solution. Thycotic s integration with Tenable.io is seamless, so credentials are configured similarly to other credentialed network scans. Configuring Windows Credentials Log in to Tenable.io and click Scans and then + New Scan to configure Tenable.io for credentialed scans of Windows systems using Thycotic s password management solution. Select a Scan Template for the scan type required for your scan. For demonstration purposes, the Advanced Network Scan template will be used. 2

To configure a credentialed scan for Windows systems using Thycotic s password management solution, enter a descriptive Name and enter the IP address(es) or hostname(s) of the scan Targets. Once the Name and Targets have been configured, click on Credentials (highlighted below) and then select Windows from the left-hand menu (highlighted below). 3

Click the Authentication method drop-down and select Thycotic Secret Server. Configure each field for Windows authentication. Refer to Table 1 Thycotic Windows Credentials below for a description of each field. Once the Windows credentials have been configured, click Save to finalize the changes. 4

Table 1 Thycotic Windows Credentials Option Description Username The target system(s) username Domain This is an optional field if the above username is part of a domain Thycotic Secret Name Thycotic Secret Server URL Thycotic Login Name The value ( Secret Name ) that the secret is stored as on the Thycotic server URL of the Thycotic Secret Server, which sets the transfer method, target and target directory. This information can be found in Admin > Configuration > Application Settings > Secret Server URL on the Thycotic server. The username used to authenticate to the Thycotic server Thycotic Password Thycotic Organization (optional) Thycotic Domain (optional) The password associated with the Thycotic Login Name This is an optional value used in cloud instances of Thycotic to define which organization should be queried This is an optional value set if the domain value is set for the Thycotic server Verify SSL Certificate Use the Custom_CA setup method to validate SSL servers certificates To verify the integration is working, click the Launch button (highlighted below) to initiate an on-demand scan. 5

Once the scan has completed, select the completed scan and look for Plugin ID 10394 (shown below), which validates that authentication was successful. If the authentication is not successful, refer to the Troubleshooting section of this document. Configuring Linux Credentials Configuring Linux credentialed scans follows the same basic steps as Windows credentialed scans with only a few minor differences. Log in to Tenable.io and click Scans and then + New Scan to begin the Linux credentialed scan configuration. 6

Select a Scan Template for the scan type required for your scan. For demonstration purposes, the Advanced Network Scan template will be used. To configure a credentialed scan for Linux systems using Thycotic s password management solution, enter a descriptive Name and enter the IP address(es) or hostname(s) of the scan Targets. 7

Once the Name and Targets have been configured, click on Credentials (highlighted below) and then select SSH from the menu (highlighted below). Click the Authentication method drop-down and select Thycotic Secret Server. 8

Configure each field for SSH authentication. Refer to Table 2 Thycotic SSH Credentials below for a description of each field. Once the SSH credentials have been configured, click Save to finalize the changes. Table 2 Thycotic SSH Credentials Option Description Username The target system(s) username Thycotic Secret Name Thycotic Secret Server URL Thycotic Login Name The value ( Secret Name ) that the secret is stored as on the Thycotic server URL of the Thycotic Secret Server, which sets the transfer method, target and target directory. This information can be found in Admin > Configuration > Application Settings > Secret Server URL on the Thycotic server. The username used to authenticate to the Thycotic server Thycotic Password Thycotic Organization (optional) Thycotic Domain (optional) The password associated with the Thycotic Login Name This is an optional value used in cloud instances of Thycotic to define which organization should be queried This is an optional value set if the domain value is set for the Thycotic server Verify SSL Certificate Use the Custom_CA setup method to validate SSL servers certificates 9

To verify the integration is working, click the Launch button (highlighted below) to initiate an on-demand scan. Once the scan has completed, select the completed scan and look for Plugin ID 12634, which validates that authentication was successful. If the authentication is not successful, refer to the Troubleshooting section of this document Troubleshooting Tenable.io offers the ability to enable plugin debugging, which will allow for easier troubleshooting and resolution should issues arise. Enabling plugin debugging attaches available debug logs from plugins to the vulnerability output of the scan it is enabled on. To enable plugin debugging, navigate to scan Settings and click Advanced in the left-hand menu (highlighted below). 10

Select the Enable plugin debugging checkbox and click Save to finalize the change. About Tenable Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats and reduces exposure and loss. With more than one million users and more than 21,000 customers worldwide, organizations trust Tenable for proven security innovation. Tenable customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com. 11