Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe
  • Twitter
  • Facebook
  • LinkedIn

Tenable's Commitment to Security in the Wake of Solorigate

Tenable's Commitment to Security in the Wake of Solorigate

As Tenable's chief security officer I'm simultaneously protecting our own systems while addressing the concerns of our customers around the world. Here's what I've learned so far.  

The most profound fallout from the SolarWinds hack can't be measured by the number of companies affected or the number of records stolen. The hack, which reportedly involved malicious code embedded in what appeared to be legitimate updates to SolarWinds Orion software, rightfully creates doubts about the security of software supply chains. 

I'm acutely aware of how anxiety-inducing this is. My role as chief security officer for Tenable requires me to simultaneously lead the charge to protect our own internal operations while also addressing the concerns we're hearing from customers around the world about our products and the infrastructure behind them. Let me first address the latter.

Tenable does not use the SolarWinds Orion platform. However, we have actioned all indicators of compromise and artifacts, and updated our detections and protections related to this activity. In addition, we are closely monitoring our own software development practices.

The security and availability of our systems, products and customer data is of the utmost importance to us. We understand that you must trust and have confidence in the resiliency of our infrastructure, which is why we deploy and maintain a rigorous security program. Tenable has implemented a robust information security management system with a specific focus on providing secure products and services for employees, customers and partners.

As part of our secure software development lifecycle (SSDLC) and quality processes, Tenable performs peer code reviews of all source code, static application security testing, dynamic application security testing, third party dependency reviews and vulnerability scans. We have implemented a strict roles-based access control model around our code repositories, technology stack and environments. Furthermore, we have deployed automation to enforce these settings while constantly reviewing token and credential usage. In addition, our program and several Tenable products are undergoing or have completed third-party reviews for certification and accreditation, including our recently completed ISO 27001:2013 and National Information Assurance Partnership (NIAP) compliance.

Now, let's talk about that supply chain. Like most CSOs, I'm responsible for securing and managing upwards of 40 distinct software products our organization uses in the course of business. The sophistication of the SolarWinds breach immediately raises questions about whether the same tactics are being deployed in any of the products we use. The thought that any apparently trustworthy, vendor-issued updates to any of those products could, in fact, be spoofed easily triggers a downward spiral of doubt and suspicion. Like you, I've been inundated with questions from my business leaders, our governance risk and compliance committee and many colleagues, including:

  • How do we know any of the other software we're using to manage and secure our infrastructure hasn't been compromised?

  • What are we doing to ensure that our third-party vendors are engaging in optimal cyber hygiene practices to reduce our risk?

  • How will this breach change the way we're managing and securing our infrastructure?


These queries, in turn, are spurring me to ask some tough questions of the third-party vendors we use. Below are some of the key questions I've been asking; I share these in hopes that they will aid you in understanding the right questions to ask of your own third-party vendors:

  • Tell us how you integrate security into your software development process. 

  • What does your code-review process look like? Describe your organization's practices for performing the following: 

    • code reviews;

    • static application security testing;

    • dynamic application security testing;

    • third-party dependency reviews; 

    • vulnerability scans; and

    • penetration tests.

  • Do you employ a strict roles-based access control model and separation of duties around your code repositories, technology stack and environments?

  • Have you deployed automation to enforce roles-based access control settings while constantly reviewing token and credential usage?

  • Have you established security gates in your software development processes?

  • When was the last time your organization completed third-party security reviews for certification and accreditation?


There's no panacea for the scourge of attacks on the software supply chain. The ripple effects of the SolarWinds breach will be felt across our industry for some time to come. At Tenable, we remain deeply committed to the security and protection of our customers, our products and the broader community.

Learn more

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 30 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 30 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Get a Demo

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin

FREE FOR 30 DAYS

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a Demo

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.

Request a Demo

Tenable.ad

Continuously detect and respond to Active Directory attacks. No agents. No privileges. On-prem and in the cloud.