Tenable Cloud Security (Ermetic) Step by Step

Tenable’s acquisition of Ermetic was a pivotal move to strengthen its cloud security capabilities, notably emphasizing cloud identity and entitlement management. Tenable completed the acquisition of Ermetic in October 2023 for $265 million.

https://www.tenable.com/cloud-security

Ermetic is an Israeli cybersecurity startup specializing in cloud-native application protection platforms (CNAPP) and cloud infrastructure entitlement management (CIEM), providing advanced solutions for risk visibility, access control, and cloud security analytics across AWS, Azure, and GCP.

Introduction & Architecture

 Tenable integrated Ermetic's capabilities into its Tenable One Exposure Management Platform, directly enhancing contextual risk visibility, prioritization, and remediation not just across cloud assets, but also identities—addressing modern cloud threats that increasingly target misconfigured permissions and toxic access combinations.

The Tenable CNAPP automates complex cloud infrastructure security operations. It unifies full asset discovery, deep risk analysis, runtime threat detection and compliance reporting, combined with granular visualization and step-by-step guidance. Using an identity-first approach, Tenable Cloud Security dramatically reduces your cloud attack surface and enforces least privilege at scale.​

The acquisition positioned Tenable as a leader in unified CNAPP and CIEM by combining agentless/cloud-native assessment, identity management, compliance, and exposure analysis in simple workflows. This supports organizations in managing cloud security even without deep in-house cloud expertise.

  • Multi-cloud Asset Management and Unified Visibility. Benefit from deep, centralized visibility into all of the identities, data, infrastructure and workloads in your cloud environment.
  • Cloud Workload Protection (CWP). Scan and detect critical risks identifying vulnerabilities, exposed secrets / sensitive data, malware and misconfigurations across virtual machines, containers and serverless functions.
  • Secure Cloud Identities and Entitlements (CIEM). Surface findings that are near impossible to detect manually and enjoy precise, automated remediation.
  • Self-Service Just-in-Time (JIT) Access. Get speedy approval for as-needed access, minimizing the cloud attack surface and avoiding the risk of unrevoked long-standing privileges.
  • Kubernetes Posture Management (KSPM). Ensure Kubernetes clusters are secure by default or, should a misconfiguration be detected, proactively alert about the issues so relevant stakeholders can quickly mitigate them.
  • Automated Remediation. Speed up remediation of cloud infrastructure risks by executing automated response actions to fix problems.
  • Full Stack Risk Analysis & Prioritization. Leverage full stack analysis to surface risk – including toxic scenarios that can expose sensitive data – and deliver actionable insights.
  • Governance and Compliance (CSPM). Simplify cloud compliance with a single platform that continuously scans configurations and resources across clouds, identifies violations and automates remediation.
  • IaC Security to Shift Left. Uncover misconfigurations and other risks in Infrastructure as Code (IaC), to harden cloud infrastructure environments as part of the CI/CD pipeline.
  • Cloud Detection and Response. Apply continuous behavioral analysis and anomaly detection to quickly identify and investigate cloud threats.

Dashboard

 

Your Tenable Products:

https://us.app.ermetic.com/customer/

Dashboard after onboarded your cloud accounts:

Onboard Azure Environment

 Tenable Cloud Security Dashboard - Settings - Accounts - Azure

Add Microsoft Entra ID Tenant

Add Azure Organization - subscription

select Entra id tenant

Add Organization

To onboard an Azure organization, first onboard the Microsoft Entra ID tenant that’s linked to the organization. Afterwards, you can proceed with organization onboarding. Do you want to onboard the tenant now?

Add Subscriptions

Select the Tenant added in previous step

Select Subscription ID:

Enable Permissions:

Choose which features to enable, keeping in mind that each feature requires different permissions. You can modify your selection after the initial onboarding. For more information about required permissions, see the 

documentation

Monitoring (read-only)
Gain full visibility for all cloud assets, including information about permissions, subscription usage, and security configurations.

Data Resources Scanning (Data Protection)
Scan and classify cloud resources. For more information about enabling data protection and required permissions, see the 

documentation

Workload Protection
Scan VM instances and container image registries for vulnerabilities and misconfigurations.

Remediation (read-write)
Allow Tenable to make changes in your environment. This lets you automatically remediate findings with one click.

Just-In-Time Access (User Access Administrator)
Grant users access to cloud accounts for a predetermined period of time and on an as-needed basis.

Assign Roles:

      ARM (Azure Portal)

      A. Click here to create a Custom deployment.

    • B.
      Configure the project and instance details as follows:
      • Subscription: Choose the subscription you want to add
      • Region: Specify a single region
      • Principal ID is set to:

        c84108b3-77f7-445f-a29a-3976ca1f777d
      • Data Protection Permissions is set to false
      • Workload Protection Permissions is set to true
      • Remediation Permissions is set to false
      • Just In Time Access Permissions is set to true
    • C.
      Click Review + create
    • D.
      Click Create
    • E.
      Wait until the deployment is completed successfully

    Manual (Azure Portal)

    • A.
      Login to

      Azure portal

      , and choose the Subscription you want to add.

    • B.
      Assign roles to the Tenable Cloud Security Connector app by repeating the steps below for each of the following roles:
      • 1.
        Reader
      • 2.
        Key Vault Reader
      • 3.
        Azure Kubernetes Service Cluster User Role
      • 4.
        Azure Kubernetes Service RBAC Reader
      • 5.
        Disk Snapshot Contributor (Virtual Machine Scanning)
      • 6.
        User Access Administrator (JIT)
    • C.
      Navigate to Access Control (IAM) and click on Add -> Add role assignment
    • D.
      Search for and select a role from the list above and click Next
    • E.
      Click + Select members
    • F.
      Search for and select Tenable Cloud Security Connector and then click Select
    • G.
      Click Next and then click Review + assign to finish. Repeat these steps for all additional roles.

    Inventory

    Azure Resources:
    Cloud Prorviders - Azure - Virtual Machines - VM - Findings 
    • High - Virtual Machine has vulnerabilities that should be addressed
    • High - Virtual Machine has an unpatched operating system
    • Medium - Public Virtual Machine

    Software:

    Identity Providers - Microsoft Entra ID

    Drill Down to APP's IAM:

    Cloud Security

     Data

    Configure the following settings (Object Storage, Managed DB, Data Platform) and scope to fine-tune how Tenable Cloud Security scans your data across object storagemanaged database, and data platform resources. 

    The scan frequency depends on multiple factors, such as the resource type, size, and data updates. Generally speaking, scanning occurs once every 2-7 days. Contact Technical Support for more information about changing this frequency.

    IaC

    Configure the following settings on the IaC settings page.
    Settings > Cloud Security > IaC



    IAM

    Configure the following settings on the IAM settings page.
    Settings > Cloud Security > IAM


    Within the context of excessive permissionsTenable Cloud Security enforces a learning period for the following activities, during which no new findings (related to excessive permissions) are created:

    • When a new human identity is created - the default is 90 days (configurable via IAM settings).
    • When a new service/machine identity is created - the default is 90 days (configurable via IAM settings).
    • When the permissions of an identity are changed - 30 days

    Network:

    Configure the following settings on the Network settings page:

    To enable the Network Scanner:

    1. In the Tenable Cloud Security Console, make sure you are in the correct scope.
    2. Go to Settings > Cloud Security > Network.
    3. Click on the Network Scanner tab.
    4. In the Scanner row, click the three dots menu icon and select Edit.
    5. In the Edit Setting window, click Enable.
    6. Click Save.

    The scanner originates traffic from:

    • 3.147.184.122
    • 3.19.220.21

    Vendors

    A vendor refers to a 3rd party that operates within your cloud environment - typically through AWS IAM roles, Microsoft Entra ID Application, or integrations. These entities require access to your environment to deliver their services. Accurately mapping vendors improves visibility into external access and strengthens your overall security posture.

    The Vendor feature allows you to manage 3rd party vendor mappings, providing enhanced visibility and control over external access to your cloud environments.



    Workload

    Configure the following settings on the Workload settings page.
    Settings > Cloud Security > Workload



    Tenable attempts to scan every virtual machine as soon as 24 hours have elapsed from the previous scan.

    Secrets

    Tenable Cloud Security scans for exposed secrets, such as access keys, tokens, and passwords, that are embedded in cloud resource configurations or infrastructure code. When detected, these secrets appear in relevant findings to help security teams assess and remediate the risk.

    To enable Secret Masking:

    1. In the Tenable Cloud Security Console, make sure the Organization account scope is selected.
    2. Go to Settings > Cloud Security > Secrets.
    3. In the Secret masking row, click the three dots menu icon and select Edit.
    4. In the Edit Setting window, click Enable.
    5. Click Save

    Onboarding AWS account

     

    Onboarding AWS account into Tenable Cloud Security:

    Explore

    Permissions Query

    Identity Intelligence

    Risks

    Policies

    Azure only Cloud Policies - 210 Items

    All Platforms total is 547 items.

    Operations

    Add an Automation Rule:

    Reports

    Generated Reports

    Compliance:

    Full list:

    Tenable Best Practices

    Enabled
    83%

    CIS AKS 1.2.0

    Enabled
    100%

    CIS Azure 2.0.0

    Enabled
    84%

    CIS Azure 3.0.0

    Enabled
    67%

    CIS Azure 4.0.0

    Enabled
    55%

    CIS Kubernetes 1.8.0

    Enabled
    100%

    CIS RedHat OpenShift Container Platform 1.5.0

    Enabled
    100%

    Microsoft Cloud Security Benchmark V1

    Enabled
    87%

    CSA CCM 4.0.2

    Disabled

    Essential Eight

    Disabled

    GDPR

    Disabled

    HIPAA

    Disabled

    ISMS-P (Korea)

    Disabled

    ISO 27001:2022

    Disabled

    LGPD (Brazil)

    Disabled

    MITRE ATT&CK v13

    Disabled

    NIST 800-171 Rev2

    Disabled

    NIST 800-53 Rev5

    Disabled

    NIST CSF 1.1

    Disabled

    NIST SP 800-190

    Disabled

    NYDFS 23 NYCRR 500

    Disabled

    PCI DSS 4.0

    Disabled

    GDPR:

    Settings

    Accounts

    Code:

    Integrations

    Licensing : Standard 

    Functionality Matrix

    Each license supports a different set of features and functionality, as described in the table below. For more information about licensing, contact your Tenable representative.

    Category Functionality JIT CIEM Standard Enterprise
    Coverage AWS, Azure, GCP, OCI
    Federated identity providers
    (for example, Ping Identity, Microsoft Entra ID, Okta)
    Sovereign Clouds
    (e.g. US Govcloud)
    Kubernetes (GKE, EKS, AKS, OKE) 1 1
    Risk Assessment and Remediation Cloud Inventory
    Public exposure policies
    (IAM only)
    Custom risk policies
    (IAM only)
    Misconfiguration policies
    (IAM only)
    Exposed secrets
    Compliance management
    AI-SPM
    Infrastructure as Code CI/CD pipelines / repositories
    Inventory
    Misconfigurations
    Network exposure
    Least privilege recommendations
    Admission Controller
    Advanced Identity and Access Management Identity-based least privilege recommendations
    Resource-based least privilege recommendations
    On-demand least privilege recommendations
    Permissions Query
    Identity Intelligence
    Excessive Permissions
    Workload Protection2 Vulnerability Scanning - SaaS
    Host-based compliance3
    PII detection3
    Stored secrets3
    CI/CD scanning
    Registry scanning
    Scan workloads onsite
    Scan Kubernetes Workloads for Vulnerabilities (via agent)
    Data Protection Managed databases
    Public and private storage
    Cloud Detection and Response Activity Log - 30 Days 30 Days 90 Days
    Anomaly detection
    Workload Malware detection3
    Platform API Access
    Reports
    Integrations
    Automations
    Automatic remediation
    Role-based access control
    Tenable JIT Access Manage eligibilities
    Request access
    Review access requests
    View audit trail information

    1 Only clusters are visible

    2 Covers virtual machines and containerized workloads

    3 Planned capabilities

    Offboard Cloud Accounts

    https://docs.ermetic.com/docs/offboarding-cloud-accounts

    Offboard Azure Subscriptions

    Follow these steps to offboard Azure subscriptions and/or organizations.

    1. Remove the role assignments that you added to the Tenable Cloud Security app during onboarding.
    2. Remove the Tenable Cloud Security app from Microsoft Entra ID.
    3. Delete the organization/subscription from the Tenable Cloud Security Console:
      • Organization: Navigate to Settings > Integrations > Azure Organization, and then click Delete next to the relevant organization.

      • Subscription: Navigate to Accounts > Azure, and then click Delete next to the relevant subscription.

        If the subscription/s or folder/s belongs to an organization which is configured to automatically onboard new subscriptions, you need to delete the organization first.

    Video


    References

    • https://docs.ermetic.com/docs/aws-overview
    • https://docs.ermetic.com/docs/azure-overview
    • https://docs.ermetic.com/docs/licensing
    • https://www.youtube.com/watch?v=nCGU_GeX_uo

    版权声明:
    作者:Mr李
    链接:https://www.techfm.club/p/226065.html
    来源:TechFM
    文章版权归作者所有,未经允许请勿转载。

    THE END
    分享
    二维码
    < <上一篇
    下一篇>>