Provider capabilities

Provider capabilities TENABLE

Name Description
Reliable updates Capability of security updates that do not impact the availability of the protected system through compatibility checks performed prior to database / component and process control system software / configuration updates.
Network event correlation analysis Analysis according to built-in rules for network event correlation
Certification of the main ICS providers Verification of cybersecurity functionalities or capabilities indicated by ICS providers
Configuration control Design and maintenance of configuration standards. Configuration change management. Configuration status evaluation
Compliance Centralized management of regulatory and legal requirements. Identification of the responsibilities and those responsible for monitoring and complying with the applicable regulations and laws in force. Definition of functions and competencies and documentary requirements. Definition of necessary committees. Identification and establishment of owners and custodians. Background check and definition of the required job position.
Secure network design Provide specifications for secure network design, segmentation, addressing, and communication protocols
Cybersecurity assessment Provide minimally invasive industrial cybersecurity assessment. First step in establishing security requirements within the context of operational needs, this can also provide meaningful information on security levels, even less deployment of protection technologies
Risk and Vulnerability Management Management of technological and operational risk, analysis of the impact of business processes or operation. Analysis and management of vulnerabilities, historical monitoring of Vulnerabilities. Identification and planning of necessary resources, processes and responsibilities. Definition of risk approach and methodology. Management of the review by management.
Hardware and software inventory Obtain data from both Hardware and Software equipment in order to form a dynamic inventory. Manage an inventory of hardware and software either automated or manual.
Whitelist in prevention mode White list; prevention mode (lock)