Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

구독

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform: Complete Visibility with Asset Inventory and Discovery

Complete Visibility with Asset Inventory and Discovery in Tenable OT

Explore how Tenable One for OT/IoT helps organizations stay ahead in today's evolving threat landscape with end-to-end visibility and cyber risk prioritization across IT, OT and IoT.

Visibility serves as the cornerstone of security, offering organizations the means to monitor, analyze, and safeguard their digital infrastructure effectively. By maintaining a comprehensive inventory of IT, OT and IoT devices, organizations can gain insights into their network topology, identify potential weak points and ensure adherence to security policies. Moreover, real-time visibility enables security teams to proactively mitigate threats before they can escalate into a full-blown crisis.

However, achieving visibility over IT and OT domains presents a challenge, exacerbated by the diverse nature of these devices and their disparate systems. Traditional security measures designed for IT environments fall short when applied to the unique characteristics of OT and IoT ecosystems. This creates the need for specialized solutions tailored to specific enterprise requirements. In the first and second posts of this three-part blog series, we highlighted key challenges that limit the modern enterprise’s ability to protect its OT and IoT assets. In this post, we dive deeper into four strategies to gain complete IT, OT and IoT asset visibility, and how Tenable’s exposure management platform can improve your security posture.

1. Discover assets and monitor risks

OT and IoT environments comprise a diverse range of devices with varying management methods and communication protocols. To address these unique requirements, a blend of passive and active discovery and monitoring approaches should be applied to achieve an accurate and up-to-date inventory, and to identify asset-related risks, such as misconfigurations and vulnerabilities.

However, OT and IoT devices have unique characteristics, so if you try to discover them using detection tools designed for IT assets you may end up with errors, memory overload and unexpected downtime. For this reason, you should use tools designed to discover OT and IoT assets in order to maintain uptime and reliability.

For example,passive discovery techniques that listen to network traffic can be used to safely identify OT and IoT assets. This method listens to network communications and analyzes patterns to determine the presence of devices. Passive discovery has the added benefit of detecting new devices as they are added to the network, as well as assets that may come and go periodically that also pose a risk. Passive listening can also identify some of the unique characteristics of assets, which can be used to identify them and to populate a subset of asset details. 

With a baseline understanding of the IoT and OT assets in the network, and of their identifying characteristics, we can apply native communications – those designed specifically to interact with a specific asset – to actively discover additional asset details, such as firmware version and configuration, as well as asset risks, including vulnerabilities, misconfigurations and changes in configuration. 

By continuously monitoring the network through passive listening and periodically conducting active queries, organizations can adapt their security measures to the evolving threat landscape and changes in the network environment.

OT IT IoT Asset Inventory View
In this Tenable OT asset inventory view we can see all IT, OT, and IoT assets, their details and related events, allowing you to conduct comprehensive asset management.

2. Maintain an inventory of assets and risk details

Asset details play a key role in supporting various functions across the organization, but are vital to effectively scale prioritization and remediation of security risks. We explore some of the key attributes below and their relevance to security. 

Device Information

  • Device type: Identifying the type of device (e.g., PLC, SCADA system, sensor, IoT device) provides insights into its functionality and purpose within the network.
  • Make and model: Knowing the make and model of the device helps in understanding its specifications, capabilities, and potential vulnerabilities.
  • Firmware/software Version: Tracking firmware or software versions is essential for identifying known vulnerabilities and ensuring that devices are up-to-date with security patches.
  • Serial number: Assigning unique identifiers to devices facilitates asset tracking, identification of asset owner, and management.

Network Connectivity

  • IP address: Recording IP addresses enables network mapping and facilitates monitoring and management of device connectivity.
  • MAC address: MAC addresses aid in uniquely identifying devices on the network and can be used for access control and security purposes.
  • Port configuration: Understanding which ports your devices are utilizing helps in assessing potential attack vectors and securing network access points.
  • Network segmentation: Identifying which network segments your devices belong to assists in implementing appropriate security controls and isolation measures.

Configuration and Settings

  • Default credentials: Identifying devices with default or weak credentials helps mitigate the risk of unauthorized access and credential-based attacks.
  • Configuration parameters: Documenting device configurations, such as communication protocols, encryption settings and access controls, ensures consistency and facilitates security auditing.
  • Access controls: Understanding who has access to configure or interact with devices, and the level of permissions they possess, is crucial for enforcing security policies and preventing unauthorized changes.

Operational Data

  • Operational status: Monitoring the operational status of devices provides insights into their health, performance and availability.
  • Sensor data: For IoT devices, capturing sensor data such as temperature, humidity, or pressure readings may be critical for operational monitoring and decision-making.
  • Data flow: Understanding how data is collected, processed, and transmitted by devices helps in assessing data security risks and compliance requirements.

Physical Location

  • Geographical location: Knowing the physical location of devices assists in asset tracking, maintenance planning and responding to physical security incidents.
  • Environmental conditions: Documenting environmental factors such as temperature, humidity and exposure to hazardous conditions helps in assessing device reliability and lifespan.

Lifecycle Information

  • Installation date: Tracking when devices were installed provides insights into their lifecycle and helps in planning maintenance and replacement schedules.
  • End-of-life/support date: Identifying devices approaching end-of-life or end-of-support enables proactive measures to mitigate risks associated with outdated technology.

Risk and Activity Monitoring:

  • Vulnerabilities: Identifying known vulnerabilities in assets is useful to determine the Vulnerability Priority Rating (VPR).
  • Network Activity: Identifying traffic source, type, destination and volume is useful in identifying anomalous communications, such as those with external destinations.
  • Conversations: Identifying conversations detected in the network, with details about the time they occurred, and involved assets is useful in asset mapping. 

3. Visualize attack paths to prioritize risk

Asset details, risk information and communications are also vital for network mapping and prioritization of risk. All too often, breaches in OT and IoT environments originate with vulnerable IT assets, which when compromised give hackers elevated privileges and allow them to carry out attacks, such as ransomware. An understanding of asset relationships is vital to map and visualize attack vectors or paths which are at high risk of exploitation. To identify the most critical attack vector, it’s necessary to factor in multiple parameters and use a risk-based approach. When mapped, factors such as asset risk level, attack path length, communication methods, and external vs internal connectivity allow for improved prioritization and remediation. That way you can, for example, minimize or reduce access to external networks, or close ports and remove services that are not vital, which contribute to higher risk exposure. 

Attack vectors in Tenable OT
In this attack-vector view from Tenable OT, we can see asset-to-asset connectivity, including external connectivity which can lead to lateral movement and compromise of OT assets.

While technically all identities are assets that must be managed, it is important to call out that most domain-specific security tools lack discovery and visibility into identities and their associated risks. For example, these tools typically don’t identify misconfigurations that can lead to excessive permissions, or that can leave identities vulnerable to exploitation, such as weak passwords. 

In the world of OT in particular, the implications of visibility gaps for identities and risk can be great because asset downtime can have a high cost and sometimes lead to unsafe working conditions or even loss of life. OT/IoT security tools, and identity security tools that can integrate with a holistic exposure management platform, can be of great value, because they can feed all relevant asset information needed to do cross-domain attack path analysis. For more insights on this, read this blog series’ second post “How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform: The Importance of Contextual Prioritization.

4. Quantify business exposure with asset tagging

As we explained in that second blog, the ability to logically group and tag assets within Tenable One for OT/IoT is an important element for defining an Asset Criticality Rating (ACR). Device type, make and model, physical location, and network segment can all be used to group and tag assets that are associated with mission critical OT and IoT environments. For example, network segmentation that indicates a cooling system is part of a manufacturing plant floor, as opposed to part of a cafeteria, can be used to elevate the ACR. Similarly, a workstation on the production plant can do more damage than a personal laptop in a guest network. 

Asset tags in Tenable One for OT/IoT can also be used to aggregate multiple asset groups to create exposure cards aligned to critical business functions and to determine an overall Cyber Exposure Score (CES) for a business function. Similarly, human and machine identities with access to the same network segments as OT and IoT assets can be aligned to the same exposure card. In this way, total risk can be considered and used for prioritization of resources and investments. 

Manufacturing Plant Exposure Card
Tenable One for OT/IoT uses data from Tenable OT Security and from Tenable Identity Exposure to quantify the overall level of cyber risk at a manufacturing plant.

Gain complete visibility across the entire attack surface

Tenable One for OT/IoT helps organizations gain visibility across the modern attack surface – IT, OT and IoT assets; focus efforts to prevent likely attacks; and accurately communicate cyber risk to support optimal business performance. The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources, containers, web apps, identity systems, and OT and IoT assets, builds on the speed and breadth of vulnerability coverage from Tenable Research, and adds comprehensive analytics to prioritize actions and communicate cyber risk.

Tenable One for OT/IoT enables organizations to:

  • Get comprehensive visibility of all assets and their vulnerabilities, whether on-premises or in the cloud, and understand where the assets are exposed to risk.
  • Anticipate threats and prioritize efforts to prevent attacks by using generative AI and the industry's largest data set of vulnerability and exposure context.
  • Communicate exposure risk to business leaders and stakeholders with clear KPIs, benchmarks and actionable insights.
  • Leverage the broadest vulnerability coverage spanning IT assets, cloud resources, containers, web apps and identity systems.
  • Integrate with third-party data sources and tools for enhanced exposure analysis and remediation. 

Tenable One for OT/IoT moves organizations past point solutions and organizational silos to achieve complete visibility and an accurate inventory of IT assets across the entire modern attack surface, including OT and IoT devices.

Schedule a free consultation and demo

OT/IoT용 Tenable One이 조직에 어떤 도움이 되는지 알아보시겠습니까?Schedule a free consultation to receive a quick technical demo and to discuss how we can help improve your security program and results. 

For more information about Tenable One for OT/IoT, visit tenable.com/products/tenable-one and sign up for our webinar “The Invisible Bridge: Recognizing The Risk Posed by Interconnected IT, OT and IoT Environments” for a deep dive on the topics covered in this post.

자세히 알아보기

관련 기사

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

5 FQDN

$3,578

지금 구매

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구매

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절감하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구매하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구매하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구매하여 비용을 더 절감하십시오.

지원 및 교육 추가