Tenable.sc integrations with the Vulnerability Response application
Summarize
Summary of Tenable.sc Integrations with the Vulnerability Response Application
The Tenable.sc integrations within the Vulnerability Response application enhance asset and vulnerability management by facilitating seamless data handling between Tenable.sc and ServiceNow. Starting with Vulnerability Response v20.0, the integration indicates whether asset scans are valid through the "Agent exists" column.
Show less
Key Features
- Tenable.sc Assets Integration: Prevents duplicate discovered items by importing both open and fixed vulnerability data, updating the state of vulnerable items accordingly.
- Tenable.sc Plugin Integration: Imports current plugin data from Tenable.sc, ensuring that only active vulnerabilities are processed.
- Tenable.sc Fixed Vulnerabilities Integration: Imports fixed vulnerabilities based on severity filters and updates existing vulnerable items. An optional feature can create visible items for fixed detections.
- Tenable.sc Open Vulnerabilities Integration: Triggered after fixed vulnerabilities are processed, it imports active vulnerabilities and creates corresponding vulnerable items.
- Tenable.sc Scan Credential Integration: Retrieves scan credentials for use in initiating scans through ServiceNow.
- Tenable.sc Backfill Vulnerabilities Integration: Imports any missed vulnerabilities from the past week, though it is inactive by default and can impact performance.
- User Authentication: Supported for versions 5.13 and later of Tenable.sc, with automatic token refresh to maintain integration continuity.
Key Outcomes
By utilizing these integrations, ServiceNow customers can expect improved visibility into vulnerability states, streamlined asset management, and timely updates on both open and fixed vulnerabilities. The integrations help ensure that only relevant and current vulnerability data is processed, promoting efficient remediation efforts and reducing the risk of overlooking critical vulnerabilities.
The Tenable.sc integrations in the Vulnerability Response Integration with Tenable application.
Starting with Vulnerability Response v20.0, if an asset is scanned by an agent, the "Agent exists" column in the Discovered Items list displays the value as "true." This indicates that the scan is authentic.
List of Tenable.sc integrations
Multi-source is supported for all the Tenable.io and Tenable.sc integrations. You can add and deploy multiple instances of the following integrations across your environment from Setup Assistant in Vulnerability Response. You can also install and configure the Vulnerability Response Integration with Tenable application from Setup Assistant.
- Tenable.sc is an on-premises integration that gives you the option to use a MID Server if the Tenable.sc product and your ServiceNow AI Platform instance are in the same environment.
- If the Tenable.sc product and your ServiceNow AI Platform instance aren’t in the same environment, you’re required to use a MID Server.
| Integration | Description |
|---|---|
| Tenable.sc Assets Integration |
To avoid creating duplicate discovered items with imported asset data, the Asset Integration of the Tenable.sc product is comprised of two integrations.
|
| Tenable.sc Plugin Integration |
|
| Tenable.sc Fixed Vulnerabilities Integration |
The output of this integration is Closed/Fixed vulnerable items (VIs). It also creates assets and third-party entries if they don't exist. This integration run is a scheduled run. It’s a chained integration which means after a run is successfully completed, the Tenable.sc Open Vulnerabilities Integration described next is triggered. Note:
By default, the family IDs 0 and 39 are excluded from this integration. |
| Tenable.sc Open Vulnerabilities Integration |
Note:
By default, the family IDs 0 and 39 are excluded from this integration. |
| Tenable.sc Scan Credential Integration |
|
| Tenable.sc Backfill Vulnerabilities Integration |
|
User authentication and Tenable.sc
User authentication is supported by your ServiceNow AI Platform® instance and version 5.13 of the Tenable.sc product. User authentication is required if you’re using version 5.12 and earlier of the Tenable.sc product.
When you select user authentication for the Tenable.sc integrations, tokens might expire and be replaced during integration runs. In the Notes column on the Vulnerability Integration Run record (VIN), the following message is displayed for a process when a token expires, Error: Token validation is failed. No action is required if this message is displayed. Expired tokens are automatically refreshed in the background and the message doesn’t indicate a pause or error with the integration process.