Tenable Integration with TigerTrust
TigerTrust integrates with Tenable for certificate vulnerability management and compliance.
API Configuration
Configure Tenable.io integration:
tenable: access_key: $TENABLE_ACCESS_KEY secret_key: $TENABLE_SECRET_KEY features: vulnerability_sync: true asset_correlation: true compliance_reports: true
Vulnerability Correlation
Correlate certificate vulnerabilities:
# Tenable plugin IDs for SSL/TLS issues ssl_plugins = [ "10863", # SSL Certificate Expiry "51192", # SSL Self-Signed Certificate "15901", # SSL Certificate Hostname Mismatch "57582", # SSL/TLS Protocol Detection "65821", # SSL RC4 Cipher Suites Supported ] # Match Tenable findings with TigerTrust certificates vulnerabilities = tenable.get_findings(plugin_ids=ssl_plugins) tigertrust.correlate_vulnerabilities(vulnerabilities)
SSL/TLS Assessment
Comprehensive SSL analysis:
| Finding | Severity | TigerTrust Action | |---------|----------|-------------------| | Expired Certificate | Critical | Auto-renew | | Weak Key Size | High | Flag for rotation | | Deprecated Protocol | Medium | Update configuration | | Self-Signed | Medium | Issue proper certificate |
Compliance Reporting
Generate compliance reports:
compliance_reports: - name: PCI-DSS SSL Compliance framework: pci-dss controls: - 4.1 # Strong cryptography - 4.2 # Secure protocols schedule: weekly - name: NIST TLS Compliance framework: nist-800-52 schedule: monthly
Asset Synchronization
Sync certificate assets with Tenable:
{ "asset": { "hostname": "api.example.com", "type": "SSL Certificate", "attributes": { "common_name": "api.example.com", "issuer": "DigiCert", "expiry": "2024-12-31", "key_size": 2048, "protocol": "TLSv1.3" } } }
Risk Scoring
Prioritize certificate remediation:
- Combine Tenable CVSS with TigerTrust risk
- Factor in business criticality
- Account for exposure level
- Generate prioritized remediation list
Strengthen certificate security with Tenable and TigerTrust.