tenable and hashicorp vault integration guide

45
Tenable and HashiCorp Vault Integration Guide Last Revised: August 17, 2021

Upload: others

Post on 18-Mar-2022

21 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tenable and HashiCorp Vault Integration Guide

Tenable and HashiCorp Vault Integration Guide

Last Revised: August 17, 2021

Page 2: Tenable and HashiCorp Vault Integration Guide

Table of Contents

Welcome to Tenable for HashiCorp Vault 3

Requirements 4

Nessus for HashiCorp Vault 5

Configure Nessus Manager with HashiCorp Vault (Windows and SSH) 6

Configure Nessus Manager with HashiCorp Vault (Database) 12

Enable Database Plugins 19

Configure Nessus Manager with IBM DataPower Gateway 20

Tenable.io for HashiCorp Vault 22

Configure Tenable.io with HashiCorp Vault (Windows and SSH) 23

Configure Tenable.io with HashiCorp Vault (Database) 27

Enable Database Plugins 31

Configure Tenable.io with IBM DataPower Gateway 32

Tenable.sc for HashiCorp Vault 34

Configure Tenable.sc with HashiCorp Vault (Windows) 35

Configure Tenable.sc for HashiCorp Vault (SSH) 38

Configure Tenable.sc for HashiCorp Vault (Database) 41

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 3: Tenable and HashiCorp Vault Integration Guide

Welcome to Tenable for HashiCorp Vault

This document provides information and steps for integrating Tenable applications with HashiCorpVault.

Integrating Tenable applications with HashiCorp Vault provides security administrators with optionsto secure and tightly control access to tokens, passwords, certificates, and encryption keys for pro-tecting machines, applications and sensitive data using the user interface, CLI, or HTTP API.

You can integrate HashiCorp Vault with Tenable.io, Nessus, or Tenable.sc.

The benefits of integrating Tenable applications with HashiCorp Vault include:

l Central management of secrets to reduce secrets sprawl

l Access management to secrets in a multi-cloud world

l A streamline of the lifecycle of secrets making them easier to consume through variousstrategies

For additional information about HashiCorp Vault, see the Hashicorp website.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 4: Tenable and HashiCorp Vault Integration Guide

Requirements

To properly integrate Tenable with HashiCorp Vault you must meet the following requirements.

Tenable Product

You must have an active account for at least one of the following Tenable products to integrate withHashiCorp Vault: Tenable.io, Tenable.sc, or Nessus Manager.

Tenable Role

You must have the appropriate role for your Tenable account as listed below.

Tenable.io - Standard, Scan Manager, Administrator, or System Administrator

Tenable.sc - Any

Nessus Manager - Standard, Administrator, or System Administrator

HashiCorp Vault Requirements

You must have an active HashiCorp Vault account. To create a HashiCorp Vault account, use the fol-lowing steps.

1. Install HashiCorp Vault.

2. Start your HashiCorp Vault server.

3. Create a Secret.

4. Authenticate HashiCorp Vault.

5. Deploy HashiCorp Vault.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 5: Tenable and HashiCorp Vault Integration Guide

Nessus for HashiCorp Vault

View the corresponding section to configure your Nessus application with Hashicorp Vault.

Configure Nessus Manager with HashiCorp Vault (Windows and SSH)

Configure Nessus Manager with HashiCorp Vault (Database)

Configure Nessus Manager with IBM DataPower Gateway

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 6: Tenable and HashiCorp Vault Integration Guide

Configure Nessus Manager with HashiCorp Vault (Windowsand SSH)

Required User Role: Standard, Scan Manager, or Administrator

In Nessus Manager, you can integrate with HashiCorp Vault using Windows or SSH credentials.Complete the following steps to configure Nessus Manager with HashiCorp Vault using these cre-dentials.

Before you begin:

l Ensure you have both a Nessus Manager and HashiCorp Vault account.

To integrate Nessus Managerwith HashiCorp Vault using Windows or SSH credentials:

1. Log in to Nessus Manager.

2. Click Scans.

The My Scans page appears.

3. Click + New Scan.

The Scan Templates page appears.

4. Select a scan template.

The selected scan template Settings page appears.

5. In the Name box, type a name for the scan.

6. In the Targets box, type an IP address, hostname, or range of IP addresses.

7. (Optional) Add a Description, Folder location, Scanner location, and specify Target groups.

8. Click the Credentials tab.

The Credentials options appear. By default, the Categories drop-down box displays Host.

9. In the Categories drop-down, click Host.

10. In the Categories list, click your preferred Host configuration: Windows or SSH.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 7: Tenable and HashiCorp Vault Integration Guide

The selected configuration options appear.

11. In the selected configuration window, click the Authentication method drop-down box.

The Authentication method options appear.

12. Select HashiCorp Vault.

The HashiCorp Vault options appear.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 8: Tenable and HashiCorp Vault Integration Guide

13. Configure the credentials.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 9: Tenable and HashiCorp Vault Integration Guide

Windows and SSH Credentials

Option Description Required

Hashicorp Vault host The Hashicorp Vault IP address or DNSaddress.

Note: If your Hashicorp Vault installation is in asubdirectory, you must include the subdirectorypath. For example, type IP address or host-name / subdirectory path.

yes

Hashicorp Vault port The port on which Hashicorp Vault listens. yes

Authentication Type Specifies the authentication type for con-necting to the instance: App Role or Cer-tificates.

If you select Certificates, additional optionsfor Hashicorp Client Certificate( Required)and Hashicorp Client Certificate PrivateKey (Required) appear. Select the appro-priate files for the client certificate and privatekey.

yes

Role ID The GUID provided by Hashicorp Vault whenyou configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vaultwhen you configured your App Role.

yes

Authentication URL The URL Nessus Manager uses to accessHashicorp Vault.

yes

Namespace The name of a specified team in a multi-teamenvironment.

no

Vault Type The HashiCorp Vault version: KV1, KV2, or yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 10: Tenable and HashiCorp Vault Integration Guide

AD. For additional information aboutHashiCorp Vault versions, see theHashiCorp Vault documentation.

KV1 Engine URL (KV1) The URL HashiCorp Vault uses toaccess the KV1 engine.

yes, if selec-ted for VaultType

KV2 Engine URL (KV2) The URL HashiCorp Vault uses toaccess the KV2 engine.

yes, if selec-ted for VaultType

AD Engine URL (AD) The URL HashiCorp Vault uses toaccess the active directory engine.

yes, if selec-ted for VaultType

Username Source (KV1 and KV2) A drop-down box to specify ifthe username is input manually or pulledfrom Hashicorp Vault.

yes

Username Key (KV1 and KV2) The name in Hashicorp Vaultthat usernames are stored under.

yes

Password Key (KV1 and KV2) The key in Hashicorp Vaultthat passwords are stored under.

yes

Secret Name (KV1, KV2, and AD) The key secret you wantto retrieve values for.

yes

Use SSL If enabled, Nessus Manager uses SSLthrough IIS for secure communications. Youmust configure SSL through IIS in HashicorpVault before enabling this option.

no

Verify SSL Certificate If enabled, Nessus Manager validates theSSL certificate. You must configure SSLthrough IIS in Hashicorp Vault before

no

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 11: Tenable and HashiCorp Vault Integration Guide

enabling this option.

Enable for HashiCorpVault

Enables/disables IBM DataPower Gatewayuse with HashiCorp Vault.

yes

14. Click Save.

Nessus Managersaves the credential.

The My Scans page appears.

What to do next:

Verify the integration is working.

To verify the integration is working:

1. On the My Scans page, click the Launch button to initiate an on-demand scan.

2. Once the scan completes, select the completed scan and look for the following message:

l For Windows: Microsoft Windows SMB Log In Possible: 10394. This result validates thatauthentication was successful.

l For SSH: Plugin ID 97993 It was possible to log into the remote host via SSH using 'pass-word' authentication.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 12: Tenable and HashiCorp Vault Integration Guide

Configure Nessus Manager with HashiCorp Vault (Database)

In Nessus Manager, you can integrate with HashiCorp Vault using database credentials. Completethe following steps to configure Nessus Manager with HashiCorp Vault for database credentials.

Enable Database Plugins in the scanner to display them in the output.

Requirements

Required User Role: Standard, Administrator, or System Administrator

l Nessus Manager account

l HashiCorp Vault account

To integrate Nessus Manager with HashiCorp Vault using database credentials:

1. Log in to Nessus Manager.

2. Click Scans.

The My Scans page appears.

3. Click + New Scan.

The Scan Templates page appears.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 13: Tenable and HashiCorp Vault Integration Guide

4. Select a scan template.

The selected scan template Settings page appears.

5. In the Name box, type a name for the scan.

6. In the Targets box, type an IP address, hostname, or range of IP addresses.

7. (Optional) Add a description, folder location, scanner location, and specify target groups.

8. Click the Credentials tab.

The Credentials options appear. By default, the Categories drop-down box displays Host.

9. In the Categories drop-down box, select Database.

The Database options appear below.

10. In the Categories list, click Database.

The Database options appear.

11. In the Database section, click the Database Type drop-down box.

The Database options appear.

12. In the Database Type drop-down box, click your preferred database: PostgreSQL, DB2,MySQL, SQL Server, Oracle, or Sybase ASE.

The selected Database options appear.

13. In the Auth Type drop-down box, click Hashicorp.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 14: Tenable and HashiCorp Vault Integration Guide

The HashiCorp Vault options appear.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 15: Tenable and HashiCorp Vault Integration Guide

14. Configure the Database credentials.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 16: Tenable and HashiCorp Vault Integration Guide

Option Description Required

Hashicorp Vault host The Hashicorp Vault IP address or DNSaddress.

Note: If your Hashicorp Vault installation is in asubdirectory, you must include the sub-directory path. For example, type IP addressor hostname / subdirectory path.

yes

Hashicorp Vault port The port on which Hashicorp Vault listens. yes

Authentication Type Specifies the authentication type for con-necting to the instance: App Role or Cer-tificates.

If you select Certificates, additional optionsfor Hashicorp Client Certificate andHashicorp Client Certificate Private Keyappear. Select the appropriate files for theclient certificate and private key.

yes

Role ID The GUID provided by Hashicorp Vaultwhen you configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vaultwhen you configured your App Role.

yes

Authentication URL The URL Nessus Manager uses to accessHashicorp Vault.

yes

Namespace The name of a specified team in a multi-team environment.

no

Vault Type The HashiCorp Vault version: KV1, KV2, orAD. For additional information aboutHashiCorp Vault versions, see theHashiCorp Vault documentation.

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 17: Tenable and HashiCorp Vault Integration Guide

KV1 Engine URL (KV1) The URL HashiCorp Vault uses toaccess the KV1 engine.

yes, if youselect KV1Vault Type

KV2 Engine URL (KV2) The URL HashiCorp Vault uses toaccess the KV2 engine.

yes, if youselectKV2Vault Type

AD Engine URL (AD) The URL HashiCorp Vault uses toaccess the active directory engine.

yes, if youselect AD forVault Type

Username Source (KV1 and KV2) A drop-down box to specifywhether the username is input manually orpulled from Hashicorp Vault.

yes

Username Key (KV1 and KV2) The name in HashicorpVault that usernames are stored under.

yes

Password Key (KV1 and KV2) The key in Hashicorp Vaultthat passwords are stored under.

yes

Secret Name (KV1, KV2, and AD) The key secret youwant to retrieve values for.

yes

Use SSL If enabled, Nessus Manager uses SSLthrough IIS for secure communications. Youmust configure SSL through IIS in HashicorpVault before enabling this option.

no

Verify SSL Certificate If enabled, Nessus Manager validates theSSL certificate. You must configure SSLthrough IIS in Hashicorp Vault beforeenabling this option.

no

Database Port The port on which Nessus Manager com-municates with the database.

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 18: Tenable and HashiCorp Vault Integration Guide

Auth Type The authentication method for the databasecredentials.

Oracle values include:

l SYSDBA

l SYSOPER

l NORMAL

yes

Service Type (Oracle databases only) Valid valuesinclude: SID and SERVICE_NAME.

yes

Service (Oracle database only) A specific field forthe configuration for the database.

yes

15. Click Save.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 19: Tenable and HashiCorp Vault Integration Guide

Enable Database Plugins

To enable database plugins:

1. In the scan where you configured the Hashicorp credentials, click the Plugins tab.

The Plugins section appears.

2. Click the Status button.

3. Click Save.

See the chart for database plugin types and corresponding IDs.

Plugin Type Plugin ID

MSSQL 91827

Oracle 91825

MySQL 91823

PostgresSQL 91826

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 20: Tenable and HashiCorp Vault Integration Guide

Configure Nessus Manager with IBM DataPower Gateway

In Nessus Manager, you can integrate with HashiCorp Vault using IBM DataPower Gateway cre-dentials. Complete the following steps to configure Nessus Manager with HashiCorp Vault usingthese credentials.

Required User Role: Standard, Scan Manager, or Administrator

Before you begin:

l Ensure you have both a Nessus Manager and HashiCorp Vault account.

To integrate Nessus Manager with HashiCorp Vault using IBM DataPower Gateway cre-dentials:

1. Log in to Nessus Manager.

2. Click Scans.

The My Scans page appears.

3. Click + New Scan.

The Scan Templates page appears.

4. Select a scan template.

The selected scan template Settings page appears.

5. In the Name box, type a name for the scan.

6. In the Targets box, type an IP address, hostname, or range of IP addresses.

7. (Optional) Add a Description, Folder location, Scanner location, and specify Target groups.

8. Click the Credentials tab.

The Credentials options appear. By default, the Categories drop-down box displays Host.

9. In the Categories drop-down box, select API Gateway.

The API Gateway options appear.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 21: Tenable and HashiCorp Vault Integration Guide

10. In the Categories list, click IBM DataPower Gateway.

The IBM DataPower Gateway options appear.

11. Configure the Credentials.

IBM DataPower Gateway

Option Description Required

Client Certificate The file that contains the PEM certificateused to communicate with the HashiCorpVault host.

yes

Client Certificate Priv-ate Key

The file that contains the PEM private key forthe client certificate.

yes

Client Certificate Priv-ate Key Passphrase

The passphrase for the private key. yes

12. Click Save.

Tenable.io saves the credential.

The My Scans page appears.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 22: Tenable and HashiCorp Vault Integration Guide

Tenable.io for HashiCorp Vault

View the corresponding section to configure your Nessus application with HashiCorp Vault.

Configure Tenable.io with HashiCorp Vault (Windows and SSH)

Configure Tenable.io with HashiCorp Vault (Database)

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 23: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.io with HashiCorp Vault (Windows and SSH)

Required User Role: Standard, Scan Manager, or Administrator

In Tenable.io, you can integrate with HashiCorp Vault using Windows or SSH credentials. Completethe following steps to configure Tenable.io with HashiCorp Vault using these credentials.

Before you begin:

l Ensure you have both a Tenable.io and HashiCorp Vault account.

To integrate Tenable.io with HashiCorp Vault using Windows or SSH credentials:

1. Log in to Tenable.io.

2. In the upper-left corner, click the button.

The left navigation plane appears.

3. In the left navigation plane, click Settings.

The Settings page appears.

4. Click the Credentials widget.

The Credentials page appears. The credentials table lists the managed credentials you havepermission to view.

5. Click the button next to the Credentials title.

The credential form plane appears.

6. In the Host section, click SSH or Windows.

The selected credential options appear.

7. In the Authentication Method drop-down, select HashiCorp Vault.

The HashiCorp Vault options appear.

8. (Required) In the Name box, type a name for the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 24: Tenable and HashiCorp Vault Integration Guide

9. (Optional) Add a Description.

10. Configure the HashiCorp Vault credentials.

Windows and SSH Credentials

Option Description Required

Hashicorp Vaulthost

The Hashicorp Vault IP address or DNSaddress.

Note: If your Hashicorp Vault installation is in asubdirectory, you must include the subdirectorypath. For example, type IP address or hostname /subdirectory path.

yes

Hashicorp Vaultport

The port on which Hashicorp Vault listens. yes

AuthenticationType

Specifies the authentication type for connectingto the instance: App Role or Certificates.

If you select Certificates, additional options forHashicorp Client Certificate( Required) andHashicorp Client Certificate Private Key(Required) appear. Select the appropriate filesfor the client certificate and private key.

yes

Role ID The GUID provided by Hashicorp Vault whenyou configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vault whenyou configured your App Role.

yes

Authentication URL The URL Tenable.io uses to access HashicorpVault.

yes

Namespace The name of a specified team in a multi-teamenvironment.

no

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 25: Tenable and HashiCorp Vault Integration Guide

Vault Type The HashiCorp Vault version: KV1, KV2, or AD.For additional information about HashiCorpVault versions, see the HashiCorp Vault doc-umentation.

yes

KV1 Engine URL (KV1) The URL HashiCorp Vault uses to accessthe KV1 engine.

yes, if youselect the KV1Vault Type

KV2 Engine URL (KV2) The URL HashiCorp Vault uses to accessthe KV2 engine.

yes, if youselect the KV2Vault Type

AD Engine URL (AD) The URL HashiCorp Vault uses to accessthe active directory engine.

yes, if youselect the ADVault Type

Username Source (KV1 and KV2) A drop-down box to specify if theusername is input manually or pulled fromHashicorp Vault.

yes

Username Key (KV1 and KV2) The name in Hashicorp Vaultthat usernames are stored under.

yes

Domain Key (KV1 and KV2) The name in Hashicorp Vaultthat domains are stored under.

no

Password Key (KV1 and KV2) The key in Hashicorp Vault thatpasswords are stored under.

yes

Secret Name (KV1, KV2, and AD) The key secret you want toretrieve values for.

yes

Use SSL If enabled, Tenable.io uses SSL through IIS forsecure communications. You must configureSSL through IIS in Hashicorp Vault beforeenabling this option.

no

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 26: Tenable and HashiCorp Vault Integration Guide

Verify SSL Cer-tificate

If enabled, Tenable.io validates the SSL cer-tificate. You must configure SSL through IIS inHashicorp Vault before enabling this option.

no

Enable forHashiCorp Vault

Enables/disables IBM DataPower Gateway usewith HashiCorp Vault.

yes

11. Click Save.

Tenable.io saves the credential.

What to do next:

Verify the integration is working.

1. On the My Scans page, click the Launch button to initiate an on-demand scan.

2. Once the scan completes, click the completed scan.

The scan details appear.

Look for a message similar to the following:

l For Windows: Microsoft Windows SMB Log In Possible: 10394. This results validatesthat authentication was successful.

l For SSH: Plugin ID 97993 and the corresponding message - It was possible to log intothe remote host via SSH using 'password' authentication. This result validates thatauthentication was successful.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 27: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.io with HashiCorp Vault (Database)

Required User Role: Standard, Scan Manager, or Administrator

In Tenable.io, you can integrate with HashiCorp Vault using Database credentials. Complete the fol-lowing steps to configure Tenable.io with HashiCorp Vault using SSH.

Enable database plugins in the scanner to display them in the output.

Before you begin:

l Ensure you have both a Tenable.io and HashiCorp Vault account.

To integrate Tenable.io with HashiCorp Vault using Database credentials:

1. Log in to Tenable.io.

2. In the upper-left corner, click the button.

The left navigation plane appears.

3. In the left navigation plane, click Settings.

The Settings page appears.

4. Click the Credentials widget.

The Credentials page appears. The credentials table lists the managed credentials you havepermission to view.

5. Click the button next to the Credentials title.

The credential form plane appears.

6. In the Database section, click Database.

The Database options appear.

7. In the Database Type drop-down, select your preferred database type:PostgreSQL, DB2,MySQL, SQL Server, Oracle, or Sybase ASE.

8. In the Auth Type drop-down, select HashiCorp Vault.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 28: Tenable and HashiCorp Vault Integration Guide

The HashiCorp Vault options appear.

9. Configure the HashiCorp Vault Database credentials.

Option Description Required

Hashicorp Vault host The Hashicorp Vault IP address or DNSaddress.

Note: If your Hashicorp Vault installation is ina subdirectory, you must include the sub-directory path. For example, type IP addressor hostname / subdirectory path.

yes

Hashicorp Vault port The port on which Hashicorp Vault listens. yes

Authentication Type Specifies the authentication type for con-necting to the instance: App Role or Cer-tificates.

If you select Certificates, additional optionsfor Hashicorp Client Certificate andHashicorp Client Certificate Private Keyappear. Select the appropriate files for theclient certificate and private key.

yes

Role ID The GUID provided by Hashicorp Vaultwhen you configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vaultwhen you configured your App Role.

yes

Authentication URL The URL Tenable.io uses to accessHashicorp Vault.

yes

Namespace The name of a specified team in a multi-team environment.

no

Vault Type The HashiCorp Vault version: KV1, KV2, or yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 29: Tenable and HashiCorp Vault Integration Guide

AD. For additional information aboutHashiCorp Vault versions, see theHashiCorp Vault documentation.

KV1 Engine URL (KV1) The URL HashiCorp Vault uses toaccess the KV1 engine.

yes, if youselect the KV1Vault Type

KV2 Engine URL (KV2) The URL HashiCorp Vault uses toaccess the KV2 engine.

yes, if youselect the KV2Vault Type

AD Engine URL (AD) The URL HashiCorp Vault uses toaccess the active directory engine.

yes, if youselect the ADVault Type

Username Source (KV1 and KV2) A drop-down box to specifywhether the username is input manually orpulled from Hashicorp Vault.

yes

Username Key (KV1 and KV2) The name in HashicorpVault that usernames are stored under.

yes

Password Key (KV1 and KV2) The key in Hashicorp Vaultthat passwords are stored under.

yes

Secret Name (KV1, KV2, and AD) The key secret youwant to retrieve values for.

yes

Use SSL If enabled, Tenable.io uses SSL through IISfor secure communications. You must con-figure SSL through IIS in Hashicorp Vaultbefore enabling this option.

no

Verify SSL Certificate If enabled, Tenable.io validates the SSL cer-tificate. You must configure SSL through IISin Hashicorp Vault before enabling this

no

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 30: Tenable and HashiCorp Vault Integration Guide

option.

Database Port The port on which Tenable.io communicateswith the database.

yes

Auth Type The authentication method for the databasecredentials.

Oracle values include:

l SYSDBA

l SYSOPER

l NORMAL

yes

Service Type (Oracle databases only) Valid valuesinclude: SID and SERVICE_NAME.

yes

Service (Oracle database only) A specific field forthe configuration for the database.

yes

10. Click Save.

Tenable.io saves the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 31: Tenable and HashiCorp Vault Integration Guide

Enable Database Plugins

To enable database plugins:

1. In the scan where you configured the Hashicorp credentials, click the Plugins tab.

The Plugins section appears.

2. Click the Status button.

3. Click Save.

See the chart for database plugin types and corresponding IDs.

Plugin Type Plugin ID

MSSQL 91827

Oracle 91825

MySQL 91823

PostgresSQL 91826

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 32: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.io with IBM DataPower Gateway

In Tenable.io, you can integrate with HashiCorp Vault using IBM DataPower Gateway credentials.Complete the following steps to configure Tenable.io with HashiCorp Vault using these credentials.

Required User Role: Standard, Scan Manager, or Administrator

Before you begin:

l Ensure you have both a Tenable.io and HashiCorp Vault account.

To integrate Tenable.io with HashiCorp Vault using IBM DataPower Gateway credentials:

1. Log in to Tenable.io.

2. In the upper-left corner, click the button.

The left navigation plane appears.

3. In the left navigation plane, click Settings.

The Settings page appears.

4. Click the Credentials widget.

The Credentials page appears. The credentials table lists the managed credentials you havepermission to view.

5. Click the button next to the Credentials title.

The credential form plane appears.

6. Under API Gateway, click IBM Datapower Gateway.

The IBM DataPower Gateway options appear.

7. (Required) In the Name box, type a name for the credential.

8. (Optional) Add a Description.

9. Configure the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 33: Tenable and HashiCorp Vault Integration Guide

IBM DataPower Gateway

Option Description Required

Client Certificate The file that contains the PEM certificateused to communicate with the HashiCorpVault host.

yes

Client Certificate Priv-ate Key

The file that contains the PEM private key forthe client certificate.

yes

Client Certificate Priv-ate Key Passphrase

The passphrase for the private key. yes

10. Click Save.

Tenable.io saves the credential.

The My Scans page appears.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 34: Tenable and HashiCorp Vault Integration Guide

Tenable.sc for HashiCorp Vault

View the corresponding section to configure your Tenable.sc application with Hashicorp Vault.

Configure Tenable.sc with HashiCorp Vault (Windows)

Configure Tenable.sc for HashiCorp Vault (SSH)

Configure Tenable.sc for HashiCorp Vault (Database)

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 35: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.sc with HashiCorp Vault (Windows)

Required User Role: Any

In Tenable.sc, you can integrate with HashiCorp Vault using Windows credentials. Complete the fol-lowing steps to configure Tenable.sc with HashiCorp Vault using Windows.

Before you begin:

l Ensure you have both a Tenable.sc and HashiCorp Vault account.

Note: HashiCorp Vault provides options for both KV v1 and v2. However, Tenable.sc only supports integrationwith KV v1.

To integrate Tenable.sc with HashiCorp Vault using Windows credentials:

1. Log in to Tenable.sc.

2. Click Scanning > Credentials (administrator users) or Scans > Credentials (organizationalusers).

The Credentials page appears.

3. At the top of the page, click +Add.

The Add Credential page appears.

4. In the Windows section, click HashiCorp Vault.

The HashiCorp Vault Add Credential page appears.

5. In the Name box, type a name for the credential.

6. (Optional) Add a Description.

7. (Optional) Add a Tag to the credential. For additional information about tags, see the Tags sec-tion in the Tenable.sc documentation.

8. In the Windows Hashicorp Vault Credential section, configure the Windows credentials.

Option Default Value Required

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 36: Tenable and HashiCorp Vault Integration Guide

Hashicorp Host The Hashicorp Vault IP address or DNSaddress.

Note: If your Hashicorp Vault installation is ina subdirectory, you must include the sub-directory path. For example, type IP addressor hostname/subdirectory path.

yes

Hashicorp Port The port on which Hashicorp Vault listens. yes

Authenticaton Type Specifies the authentication type for con-necting to the instance: App Role or Cer-tificates.

If you select Certificates, additional optionsfor Hashicorp Client Certificate (Required)and Hashicorp Client Certificate PrivateKey (Required) appear. Select the appro-priate files for the client certificate andprivate key.

yes

Role ID The GUID provided by Hashicorp Vaultwhen you configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vaultwhen you configured your App Role.

yes

Authentication URL The URL used to access Hashicorp Vault. yes

Namespace The name of a specified team in a multi-team environment.

no

Hashicorp Vault Type The type of Hashicorp Vault secrets engine: 

l KV1 — Key/Value Secrets Engine Ver-sion 1

l KV2 — Key/Value Secrets Engine Ver-sion 2

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 37: Tenable and HashiCorp Vault Integration Guide

l AD — Active Directory

KV Engine URL The URL Tenable.sc uses to access theHashicorp Vault secrets engine.

yes

Username Source (Only displays if Hashicorp Vault Type isKV1 or KV2) Specifies if the username isinput manually or pulled from HashicorpVault.

yes

Username key (Only displays if Hashicorp Vault Type isKV1 or KV2) The name in Hashicorp Vaultthat usernames are stored under.

yes

Password key (Only displays if Hashicorp Vault Type isKV1 or KV2) The key in Hashicorp Vaultthat passwords are stored under.

yes

Secret Name The key secret you want to retrieve valuesfor.

yes

Use SSL When enabled, Tenable.sc uses SSL forsecure communications. You must con-figure SSL in Hashicorp Vault beforeenabling this option.

no

Verify SSL When enabled, Tenable.sc validates theSSL certificate. You must configure SSL inHashicorp Vault before enabling this option.

no

9. Click Submit.

Tenable.sc saves the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 38: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.sc for HashiCorp Vault (SSH)

Required User Role: Any

In Tenable.sc, you can integrate with HashiCorp Vault using SSH credentials.

Before you begin:

l Ensure you have both a Tenable.sc and HashiCorp Vault account.

Note: HashiCorp Vault provides options for both KV v1 and v2.

To integrate Tenable.sc with HashiCorp Vault using SSH credentials:

1. Log in to Tenable.sc.

2. Click Scanning > Credentials (administrator users) or Scans > Credentials (organizationalusers).

The Credentials page appears.

3. At the top of the page, click +Add.

The Add Credential page appears.

4. Scroll to the SSH section.

5. In the Windows section, click HashiCorp Vault.

The HashiCorp Vault Add Credential page appears.

6. In the Name box, type a name for the credential.

7. (Optional) Add a Description.

8. (Optional) Add a Tag to the credential. For additional information about tags, see the Tags sec-tion in the Tenable.sc documentation.

9. In the SSH Hashicorp Vault Credential section, configure the SSH credentials.

Option Default Value Required

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 39: Tenable and HashiCorp Vault Integration Guide

Hashicorp Host The Hashicorp Vault IP address or DNS address.

Note: If your Hashicorp Vault installation is in a sub-directory, you must include the subdirectory path. Forexample, type IP address or hostname/sub-directory path.

yes

Hashicorp Port The port on which Hashicorp Vault listens. yes

AuthenticationType

Specifies the authentication type for connecting tothe instance: App Role or Certificates.

If you select Certificates, additional options forHashicorp Client Certificate (Required) andHashicorp Client Certificate Private Key(Required) appear. Select the appropriate files forthe client certificate and private key.

yes

Role ID The GUID provided by Hashicorp Vault when youconfigured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vault whenyou configured your App Role.

yes

AuthenticationURL

The URL used to access Hashicorp Vault. yes

Namespace The name of a specified team in a multi-teamenvironment.

no

Hashicorp VaultType

The type of Hashicorp Vault secrets engine: 

l KV1 — Key/Value Secrets Engine Version 1

l KV2 — Key/Value Secrets Engine Version 2

l AD — Active Directory

yes

KV Engine URL The URL Tenable.sc uses to access theHashicorp Vault secrets engine.

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 40: Tenable and HashiCorp Vault Integration Guide

Username Source (Only displays if Hashicorp Vault Type is KV1or KV2) Specifies if the username is input manu-ally or pulled from Hashicorp Vault.

yes

Username key (Only displays if Hashicorp Vault Type is KV1or KV2) The name in Hashicorp Vault that user-names are stored under.

yes

Password key (Only displays if Hashicorp Vault Type is KV1or KV2) The key in Hashicorp Vault that pass-words are stored under.

yes

Secret Name The key secret you want to retrieve values for. yes

Use SSL When enabled, Tenable.sc uses SSL for securecommunications. You must configure SSL inHashicorp Vault before enabling this option.

no

Verify SSL When enabled, Tenable.sc validates the SSL cer-tificate. You must configure SSL in HashicorpVault before enabling this option.

no

10. Click Submit.

Tenable.sc saves the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 41: Tenable and HashiCorp Vault Integration Guide

Configure Tenable.sc for HashiCorp Vault (Database)

Required User Role: Any

In Tenable.sc, you can integrate with HashiCorp Vault using database credentials. Complete the fol-lowing steps to configure Tenable.sc with HashiCorp Vault using database.

Before you begin:

l Ensure you have both a Tenable.sc and HashiCorp Vaultaccount.

Note: [[[Undefined variable Integrations.HashiCorp Vault]]] provides options for, both, KV v1 and v2. However,Tenable.sc only supports integration with KV v1.

To integrate Tenable.sc with HashiCorp Vault using database credentials:

1. Log in to Tenable.sc.

2. Click Scanning > Credentials (administrator users) or Scans > Credentials (organizationalusers).

The Credentials page appears.

3. At the top of the page, click +Add.

The Add Credential page appears.

4. Go to the Database section.

5. Click the database type that you want to use. (IBM DB2, MySQL, Oracle Database, Post-greSQL, or SQL Server)

6. In the Name box, type a name for the credential.

7. (Optional) Add a Description.

8. (Optional) Add a Tag to the credential. For additional information about tags, see the Tags sec-tion in the Tenable.sc documentation.

9. (For Oracle only) Click the Source drop-down to select a source type.

10. In the database credential section, click the Authentication Method drop-down.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 42: Tenable and HashiCorp Vault Integration Guide

11. Select HashiCorp Vault.

12. In the Database Credential section, configure the database credentials.

Option Description Required

Port (Oracle, IBM,MySQL, PostgreSQL,SQL Server)

The port on which Tenable.sc communicateswith the database.

yes

SID (MySQL) The security identifier used to connect to thedatabase.

yes

Authentication (Oracle,SQL Server)

(Oracle) The role type used for the databaseauthentication. (Normal, System Operator,Sys- tem Database Administrator)

(SQL Server) The authentication mode thedata- base uses. (SQL or Windows)

yes

Database Name (IBM,PostgreSQL)

The name of the database. no

Instance Name (SQLServer)

The SQL server name. yes

Hashicorp Host (Required) The Hashicorp Vault IP addressor DNS address.

Note: If your Hashicorp Vault installation is in asubdirectory, you must include the subdirectorypath. For example, type IP address or host-name/subdirectory path.

yes

Hashicorp Port (Required) The port on which HashicorpVault listens.

yes

Authentication Type(Oracle, SQL Server)

(Oracle) The role type used for the databaseauthentication. (Normal, System Operator,or System Database Administrator)

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 43: Tenable and HashiCorp Vault Integration Guide

(SQL Server) The authentication mode thedatabase uses. (SQL or Windows)

Service Type (Oracle) The unique SID or Service Name that iden-tifies your database.

yes

Service (Oracle) The SID or Service Name value for yourdatabase instance.

Note: The Service value must match the Ser-vice Type option parameter selection.

yes

Authentication Type Specifies the authentication type for con-necting to the instance: App Role or Cer-tificates.

If you select Certificates, additional optionsfor Hashicorp Client Certificate (Required)and Hashicorp Client Certificate PrivateKey (Required) appear. Select the appro-priate files for the client certificate and privatekey.

yes

Role ID The GUID provided by Hashicorp Vault whenyou configured your App Role.

yes

Role Secret ID The GUID generated by Hashicorp Vaultwhen you configured your App Role.

yes

Authentication URL The URL Tenable.sc uses to accessHashicorp Vault.

yes

Namespace The name of a specified team in a multi-teamenvironment.

no

Hashicorp Vault Type The type of Hashicorp Vault secrets engine: 

l KV1 — Key/Value Secrets Engine Ver-

yes

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 44: Tenable and HashiCorp Vault Integration Guide

sion 1

l KV2 — Key/Value Secrets Engine Ver-sion 2

l AD — Active Directory

KV Engine URL The URL Tenable.sc uses to access theHashicorp Vault secrets engine.

yes

Username Source (Only displays if Hashicorp Vault Type isKV1 or KV2) Specifies if the username isinput manually or pulled from HashicorpVault.

yes

Username key (Only displays if Hashicorp Vault Type isKV1 or KV2) The name in Hashicorp Vaultthat usernames are stored under.

no

Username (Only displays if Username Source isManual Entry) The name in Hashicorp Vaultthat usernames are stored under.

yes

Password key (Only displays if Hashicorp Vault Type isKV1 or KV2) The key in Hashicorp Vault thatpasswords are stored under.

no

Secret Name The key secret you want to retrieve valuesfor.

yes

Use SSL When enabled, Tenable.sc uses SSL forsecure communications. You must configureSSL in Hashicorp Vault before enabling thisoption.

no

Verify SSL When enabled, Tenable.sc validates the SSLcertificate. You must configure SSL inHashicorp Vault before enabling this option.

no

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective

Page 45: Tenable and HashiCorp Vault Integration Guide

13. Click Submit.

Tenable.sc saves the credential.

Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-

marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective