Set up the Tenable connector
With Tenable, businesses identify and mitigate vulnerabilities across networks, systems, and applications. By integrating Tenable, Veracode Risk Manager (VRM) leverages its insights to recommend the best next actions for your security teams, ensuring seamless alignment with your broader tool stack and promoting a unified, strategic approach to security management.
Complete the following tasks to set up your VRM connector for Tenable.
Create Tenable API keys
Before you begin:
Ensure your Tenable user account has the CanView permission for all assets. To check your permissions in Tenable, select My Account > Permissions.
To complete this task:
-
Log in to your Tenable account.
-
Select My Account > API Keys.
-
Select Generate. The page displays the generated custom API keys.
-
Copy the access key and secret key to a secure location. You will not be able to view them again after you leave the page.
Create a VRM connector
- In VRM, from the left navigation menu, select the Settings icon
.
- Select Add Connector.
- Select the Tenable tile.
- Enter a name for the connector.
- For API Key, paste the access key you generated in Tenable.
- For Secret, paste the secret key you generated in Tenable.
- If you want to pull findings from an on-premises Tenable instance, replace the default endpoint URL with the URL of the on-premises instance.
- Select Add Connector.
Validate your data
After successfully connecting the Tenable Connector within VRM, it will take some time for VRM to fetch the findings.
After the connector has completed the fetch, validate that VRM correctly ingested the data.
- In VRM, select Findings
from the left navigation menu.
- Select the Findings Source filter and select Tenable.
The Findings table lists the Tenable vulnerability findings.