Tenable Hardening Guide
Vulnerability management platform hardening for Tenable.io and Security Center including user access, scanning security, and agent configuration
Overview
Tenable is a leading vulnerability management platform protecting millions of assets across enterprises worldwide. As a critical security tool with privileged access to infrastructure, Tenable configurations directly impact vulnerability visibility and security posture. Proper hardening ensures vulnerability data integrity and prevents unauthorized access to sensitive security information.
Intended Audience
- Security engineers managing vulnerability programs
- IT administrators configuring Tenable
- GRC professionals using compliance features
- SOC analysts managing vulnerability data
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Tenable.io and Tenable Security Center security including administrator account protection, SAML SSO, credential management, and hardening assessment configuration.
Table of Contents
- Administrator Security
- Authentication Configuration
- Scanning & Credential Security
- Hardening Assessments
- Compliance Quick Reference
1. Administrator Security
1.1 Protect Administrator Accounts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Administrator accounts have the highest level of access and pose significant security risk if compromised. Proper protection is essential.
Rationale
Why This Matters:
- Admins can create accounts, modify configs, delete data
- Compromised admin credentials can expose entire security program
- Destructive capabilities require additional protection
ClickOps Implementation
Step 1: Protect Non-SSO Admin Accounts
- Navigate to: Settings → Accounts → Users
- For non-SSO admin accounts:
- Use strong passwords (20+ characters)
- Store passwords in password vault
- Enable MFA for each admin
Step 2: Limit Admin Access
- Minimize number of administrators (2-3 for redundancy)
- Use principle of least privilege
- Create separate accounts for admin vs. daily use
Step 3: Document Admin Accounts
- Maintain list of all admin accounts
- Document business justification
- Review quarterly
Time to Complete: ~30 minutes
1.2 Implement Role-Based Access Control
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Configure granular roles to implement least privilege access.
ClickOps Implementation
Step 1: Review Built-in Roles
- Navigate to: Settings → Accounts → Roles
- Review available roles:
- Administrator: Full access
- Standard User: Scanning and viewing
- Scan Operator: Scanning only
- Read Only: View only
Step 2: Create Custom Roles
- Click Create Role
- Configure granular permissions:
- Asset access
- Scan management
- Report access
- User management
- Apply minimum necessary permissions
Step 3: Assign Roles Appropriately
- Limit Administrator to essential personnel
- Use Standard User for vulnerability teams
- Use Read Only for stakeholders
1.3 Monitor Administrator Activity
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Monitor and audit administrator activities.
ClickOps Implementation
Step 1: Access Activity Log
- Navigate to: Settings → Activity Log
- Review logged events for admin users
- Export logs for SIEM integration
Step 2: Configure Alerts
- Set up alerts for:
- Admin login events
- Configuration changes
- User creation/deletion
- Role modifications
Step 3: Regular Reviews
- Weekly review of admin activity
- Investigate anomalies
- Document findings
2. Authentication Configuration
2.1 Configure SAML Single Sign-On
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO for centralized identity management.
Rationale
Why This Matters:
- SAML provides single sign-on capability
- Improved security through IdP controls
- Centralized identity management
- Simplifies compliance auditing
ClickOps Implementation
Step 1: Configure SAML in Tenable
- Navigate to: Settings → SAML
- Enable SAML authentication
- Configure:
- IdP SSO URL
- IdP Certificate
- Entity ID
Step 2: Configure Identity Provider
- Create SAML application in IdP
- Configure attribute mappings:
- NameID (email)
- Groups (for role mapping)
- Download IdP metadata
Step 3: Enable for Users
- Enable SAML for each user
- Disable password login option
- Force SSO authentication
Step 4: Test and Enforce
- Test SSO authentication
- Verify role mapping
- Enable enforcement
Time to Complete: ~1 hour
2.2 Enforce Multi-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require MFA for all users, enforced through SSO or native settings.
ClickOps Implementation
Step 1: Enable Native MFA (Non-SSO)
- Navigate to: Settings → Accounts → Users
- Enable MFA requirement per user
- Configure supported methods
Step 2: Enforce via IdP (SSO)
- Configure MFA in IdP
- Ensure all users subject to MFA
- Use phishing-resistant methods for admins
2.3 Configure Session Security
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Configure session timeout and security settings.
ClickOps Implementation
Step 1: Configure Session Timeout
- Navigate to: Settings → Security
- Configure session settings:
- Idle timeout: 15-30 minutes
- Maximum session: 8 hours
- Apply to all users
3. Scanning & Credential Security
3.1 Secure Scan Credentials
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Securely manage credentials used for authenticated scanning.
Rationale
Why This Matters:
- Your organization is responsible for securing scan credentials
- Tenable encrypts credentials when stored
- Best practices must align with risk appetite
ClickOps Implementation
Step 1: Create Dedicated Scan Accounts
- Create service accounts for scanning
- Grant minimum required permissions:
- Read access for vulnerability scanning
- Local admin only if required for patches
- Never use domain admin accounts
Step 2: Configure Credential Vaults
- Navigate to: Scans → Credentials
- Configure vault integration:
- CyberArk
- HashiCorp Vault
- Thycotic
- Retrieve credentials dynamically
Step 3: Credential Rotation
- Establish rotation schedule (90 days)
- Automate rotation if possible
- Verify scanning after rotation
3.2 Secure Agent Linking Keys
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 7.1 |
| NIST 800-53 | SC-12 |
Description
Securely manage Nessus Agent linking keys.
Rationale
Why This Matters:
- Linking keys associate agents to your instance
- Once linked, key regeneration doesn’t affect existing agents
- Protect keys during initial deployment
ClickOps Implementation
Step 1: Manage Linking Keys
- Navigate to: Settings → Sensors → Linked Agents
- View linking key
- Regenerate if compromised
Step 2: Secure Deployment
- Use secure methods to distribute keys
- Deploy via endpoint management
- Remove keys from deployment scripts after use
Step 3: Configure Agent Security
- Enable FIPS mode if required
- Configure SSL ciphers
- Enable local encryption
3.3 Configure Scan Security Settings
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 7.1 |
| NIST 800-53 | RA-5 |
Description
Configure appropriate scan settings for security and performance.
ClickOps Implementation
Step 1: Configure Scan Policies
- Navigate to: Scans → Policies
- Create policies for different use cases:
- Full vulnerability assessment
- Authenticated scanning
- Compliance assessment
Step 2: Configure Network Settings
- Configure appropriate scan intensity
- Avoid production impact
- Use maintenance windows
Step 3: Enable Encryption
- Ensure all scanner communications encrypted
- Use TLS for API communications
- Configure secure protocols
4. Hardening Assessments
4.1 Configure CIS Benchmark Audits
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Configure compliance auditing using CIS Benchmarks.
Rationale
Why This Matters:
- Hardening standards are key to cyber security
- CIS benchmarks are well-documented standards
- Tenable supports CIS audit files
ClickOps Implementation
Step 1: Enable Compliance Scanning
- Navigate to: Scans → Policies → Compliance
- Select CIS Benchmark templates
- Configure for your environment
Step 2: Configure Audit Files
- Select appropriate CIS benchmark:
- Level 1 (baseline)
- Level 2 (hardened)
- Customize for your environment
- Document exceptions
Step 3: Schedule Assessments
- Schedule compliance scans
- Configure reporting
- Track remediation
4.2 Configure DISA STIG Audits
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Configure DISA STIG assessments for government compliance.
ClickOps Implementation
Step 1: Select STIG Audit Files
- Navigate to: Scans → Policies → Compliance
- Select DISA STIG templates
- Configure for applicable systems
Step 2: Customize Settings
- Configure applicable findings
- Document exceptions
- Set severity levels
4.3 Monitor Hardening Posture
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Use dashboards to monitor hardening compliance posture.
ClickOps Implementation (Security Center)
Step 1: Configure Dashboards
- Navigate to: Dashboards
- Add hardening dashboard components:
- Compliance score trends
- Top failing checks
- Remediation progress
Step 2: Configure Alerts
- Set up alerts for:
- Compliance score drops
- Critical findings
- New non-compliant assets
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Tenable Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/MFA | 2.1 |
| CC6.2 | RBAC | 1.2 |
| CC6.6 | Admin protection | 1.1 |
| CC7.1 | Vulnerability scanning | 3.3 |
| CC7.2 | Hardening assessment | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | Tenable Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 2.1 |
| IA-2(1) | MFA | 2.2 |
| AC-6 | Least privilege | 1.2 |
| RA-5 | Vulnerability scanning | 3.3 |
| CM-6 | Configuration assessment | 4.1 |
Appendix A: References
Official Tenable Documentation:
- Trust and Assurance
- Tenable Documentation
- Harden Nessus
- Tenable Vulnerability Management Security Best Practices Guide
- SAML Single Sign-On
- Add a SAML Configuration
- Tenable Security Center Best Practices Guide
API & Developer Tools:
Compliance Frameworks:
- ISO 27001, SOC 2 Type II, FedRAMP (authorized products), CSA STAR – via Trust and Assurance
- Tenable supports customer compliance with CIS Controls, NIST, PCI DSS, HIPAA, and DISA STIG through its audit capabilities
Security Incidents:
- (2025-09) Tenable confirmed a data breach exposing customer contact details and support case information. Unauthorized actors accessed data in Tenable’s Salesforce CRM via a compromised integration with the Salesloft Drift marketing application. Core vulnerability assessment products and the Tenable One platform were not affected. Tenable revoked credentials, rotated tokens, and removed the Drift integration.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with admin security, authentication, and hardening assessments | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide