Tenable.io Vulnerability Management

The Tenable.io integration utilizes the Archer IT Security Vulnerabilities Program use case to catalog network devices along with vulnerability data sourced from Tenable.io. This enables organizations to pinpoint assets in need of remediation by considering both the business priority of the asset and the severity of the detected vulnerability.

Important: The information in this publication is provided "as is". Archer makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Client is solely responsible for ensuring that the installation of the application is performed in a secure manner. Archer recommends clients perform a full security evaluation prior to implementation.

Archer Exchange: With the Archer Exchange, the Archer team and our trusted partners have created a broad selection of supplemental, value-added offerings to help you get your unique risk management program on the right path, right from the start. You can leverage the Archer Exchange offerings to expand the use of Archer solutions into new business processes and address specific industry, geographic, regulatory, or technical requirements. The Archer Exchange features a fast and agile development cycle, enabling quick delivery of new and updated offerings for trending issues and connections to innovative technologies.

Release notes

Last updated

Published Date

Summary

2025.10

April 2026

  • Updated support for parameters and platform version support

  • Enhanced API processing by leveraging the previousRunContext token to consume data in phased run

  • Simplified output generation by replacing XSLT transformations with inline XML file creation

  • The JavaScript Transporter in Data Feed Manager has been updated to use Fetch instead of Request. Fetch is a modern JavaScript API for making HTTP requests, offering a simpler and more powerful alternative to the older Request library.
    For more information, see the following blog post: Data Feed Manager JavaScript Transporter Scripts Require Update.

  • Recertified on Archer platform 2025.10

2025.04

July 2025

  • Data Feed mapping has been updated for 2025.04 use case updates.

  • Tenable Plugin Data Feed has been enhanced to expedite the Plugins ingestion.

2024.11

April 2025

Initial release available:

  • Archer on-premises clients on Archer Platform version 2024.11 and later

  • Archer SaaS clients

Overview

Tenable.io is a cloud-based cybersecurity platform designed to help organizations manage and assess their cybersecurity posture. It provides continuous visibility and critical insights into the security status of an organization's assets, networks, and vulnerabilities.

The integration of Tenable.io with the Archer IT & Security Vulnerabilities Program use case enables customers to leverage the discovered devices and catalog those network devices with the vulnerability library. With Archer, clients can then identify which assets require remediation based on the business priority of that asset.

Key features & benefits

The Tenable.io Vulnerability Management integration with Archer enables organizations to do the following:

  • Supplement the Vulnerability Library application with plugin content, which includes extensive CVE coverage.

  • Discover and catalog of assets, including unauthorized assets.

  • Capture network vulnerabilities using scanning technologies.

  • Gain quick visibility to assess risk posture on critical infrastructure devices.

  • Validate vulnerabilities inside Archer once scanners no longer detect vulnerabilities.

  • Identify which vulnerabilities with automated prioritization, that combines vulnerability data, threat intelligence and data science.

Benefits:

  • Reduce the risk of security breaches by identifying and addressing vulnerabilities.

  • Continuously scan networks, systems, and applications to detect vulnerabilities in real-time and stay up-to-date security posture.

  • Assess severity and potential impact of vulnerabilities and prioritize which vulnerabilities to address first based on their potential risk to the business.

  • Comprehensive reporting and documentation of vulnerabilities, remediation efforts, and compliance status.

Components & architecture

Prerequisites (ODA and system requirements)

Components

Prerequisites

Archer Solution Area(s)

IT & Security Risk Management

Archer Use Case(s)

  • IT Security Vulnerabilities Program

  • Enterprise Catalog

Archer Applications

  • Devices

  • Vulnerability Library

  • Vulnerability Scan Results

Uses Custom Objects

No

Requires Archer On-Demand Application (ODA) License

Zero (0) Archer On-Demand Application licenses required.

Archer requirements

Archer Platform Release 2025.04 and later

Supported Archer Environments

  • Archer SaaS

  • Note: This offering is available only to Archer SaaS clients on Archer Platform Release 2025.04 or later, which has the updates to the Archer IT Security Vulnerabilities Program required for this offering. While a prior version was available for on-premises clients in Archer Platform Release 2024.11, the current offering does not support on-premises environments

Partner/Vendor Requirements

Valid Tenable.io license is required. Additional fees may apply.

Architecture diagram

The following diagram shows the relationships between the applications that make up the Tenable.io Vulnerability Management integration.

A diagram of a software system  AI-generated content may be incorrect.

Data feeds

Tenable.io provides a REST API that allows for the capability to script in interactions directly with the Tenable.io server. With Archer JavaScript Transporter, clients can easily authenticate to the server and make multiple, dependent API calls extracting large amounts of data in a single data feed. 

The following table lists the data feeds provided with this integration.

Data Feed

Description     

Tenable.io Plugins

This JavaScript Transporter feed retrieves configured Tenable.io plugin definitions. The extracted plugin data is imported into and used by the Vulnerability Library application to support vulnerability identification and management.

Tenable.io Assets Generate

This JavaScript Transporter feed initiates the Tenable.io Assets Export job using the https://cloud.tenable.com/assets/export API endpoint. The feed triggers the export process but does not create or update any records in Archer. Asset ingestion is performed by the Tenable.io Assets Ingest data feed. The time required for the feed to run varies based on the volume of Tenable.io data. You can configure Archer settings to define how devices are uniquely identified within your organization.

Tenable.io Assets Ingest

This data feed imports asset inventory into the Devices application. The feed runs after the Assets Generate feed, which initiates the asset export job, to ensure the most current asset data is available. The feed retrieves asset inventory discovered based on the scanner configuration defined in the Assets Generate feed. The imported asset data is then used within the Devices application.

Tenable.io Vulnerability Generate

This JavaScript Transporter feed initiates the vulnerability export job using the https://cloud.tenable.com/vulns/export endpoint. This feed does not create or update any records in Archer. Vulnerability ingestion is performed by the Assets Vulnerability data feed. The time required for the feed to run varies based on the volume of Tenable.io data. You can configure the feed to filter which vulnerabilities are ingested.

Tenable.io Vulnerability Ingest

This data feed imports vulnerability data into the Vulnerability Scan Results application. The feed runs after the Vulnerability Generate feed, which initiates the vulnerability extraction job. The feed retrieves vulnerabilities detected on each asset based on the configurations defined in the Vulnerability Generate feed.

Related applications

Application

Use Case

Primary Purpose(s) of the Relationship

Vulnerability Library

IT Securities Vulnerabilities Program (IT Security & Risk Management)

  • The Vulnerability Library application represents a catalog of vulnerability data collected from the National Vulnerabilities Database (NVD)/National Institute of Standards and Technology (NIST).

  • The Vulnerability Library is updated each week or month by data feeds depending on the source.

Vulnerability Scan Results

IT Securities Vulnerabilities Program (IT Security & Risk Management)

  • The Vulnerability Scan Results application stores the issues that result from every new record that is created from the vulnerability scanner such as Device Name, IP, owner, department, description, notes, recommendations and much more.

  • These records will contain the technical recommendation for each scan result and allow for reporting on the total number of issues, regardless of which system detects it.

Vulnerability Reference Lists

IT Securities Vulnerabilities Program (IT Security & Risk Management)

  • The Vulnerability Reference Lists application provides a repository of public vulnerability references collected from the National Vulnerabilities Database (NVD)/National Institute of Standards and Technology (NIST).

  • The application provides a list of entries, each containing a vulnerability identification number, a type, and a public reference for known Cyber Security vulnerabilities.

  • The URL found in the application contains a list of public references detailing information about the vulnerability, such as a description, consequences of the vulnerability, and potential mitigation strategies.

Devices

IT Asset Catalog

  • The Devices application serves as a central repository of knowledge about your business critical devices and their business criticality.

  • It allows organizations to manage devices (for example, servers, desktops, and network devices) and their relationships, to ensure they are being protected according to management expectations.

Impacted use case

The following Archer use case is impacted: IT Securities Vulnerabilities Program

Additional resources

The following additional resources are available for this offering:

Set up the data feeds

Before you begin

You must install all package files before importing data feeds. Package files include the IT Security Vulnerabilities Program use case package, the Enterprise Catalog package, and the Issues Management prerequisite use case package. For more information, see the “Installing the Packages” section of the IT Security Vulnerabilities Program use case in the Archer Help Center.

Data feed order

Import and run the data feeds in the following order.

  1. (Optional) NVD Data Feeds

    For information on setting up the NVD data feeds, see NIST National Vulnerability Database (NVD) Integration.

  2. Tenable.io Plugins 2025.10

  3. Run both Generate data feeds:

    • Tenable.io Assets Generate 2025.10

    • Tenable.io Vulnerability Generate 2025.10

      A time gap of ~5 hours has been provided between Assets Generate and Ingest data feeds. If the Assets Generate takes more time than 5 hours to complete due to high volume of Assets data, adjust the time gap between the data feeds accordingly.

  4. Tenable.io Assets Ingest 2025.10

  5. Tenable.io Vulnerability Ingest 2025.10

Configure the JavaScript Transporter settings

Complete the following steps before you configure the Vulnerability Generate and Ingest data feeds.

Set up the Tenable.io data feeds (new)

Important: Before you upload a JavaScript file, configure JavaScript Transporter settings in the Archer Control Panel. For more information, see Configure the JavaScript Transporter Settings. With the exception of the optional parameters specified in this procedure, changes to the  JavaScript Transporter configuration file can only be achieved in a hosted environment with a Professional Services engagement. For more information, contact your account representative.

  1. Go to the Manage Data Feeds page.

    1. From the menu bar, click Admin menu.

    2. Under Integration, click Data Feeds.

  2. In the Manage Data Feeds section, click Import.

  3. Locate and select the applicable data feed file:

    • Tenable.io Plugins 2025.10.dfx5

    • Tenable.io Assets Generate 2025.10.dfx5

    • Tenable.io Assets Ingest 2025.10.dfx5

    • Tenable.io Vulnerability Generate 2025.10.dfx5

    • Tenable.io Vulnerability Ingest 2025.10.dfx5

  4. Click Open.

  5. In the General Information section, in the Status field, select Active.

  6. In the Additional Properties section, enable Optimize Calculations.

  7. Click the Transport tab.

  8. In the Transport Configuration section, complete the following:

    1. Click Upload.

    2. From the Upload JavaScript File dialog, click Add New.

    3. Locate and select the signed-TenableIO_1.0.4.1.js file and click Open.

    4. From the Upload JavaScript File dialog, click OK.

  9. Provide custom parameters. The following tables describe the required and optional parameters and their supported values.

    Important: The keys and values are case-sensitive and cannot include extra spaces at the end of the strings. The listed values are in place by default but can be configured to suit your environment.
    When increasing custom parameters settings to a higher value, you may also need to increase the 'Max Memory Limit' settings in the Archer Control Panel accordingly. Set the minimum value of the 'Max Memory Limit' setting to 2048 MB.

  10. For each key type, determine whether you want it to be Protected or Plain Text. Selecting Protected encrypts the key value for the specified key in the log.

  11. Click the Source Definition tab. Click the Tokens sub-tab. Verify token values.

    The following table describes token values to verify.

    Token

    Value

    LastRunTime

    (Populated by feed)

    PreviousRunContext (Populated by feed)
  12. Note: For more information about tokens, see "Data Feed Tokens" in the Platform Help.

  13. Verify that key field values are not missing from the data feed setup window.

  14. Click Save.

Field mapping reference

The following sections list the mappings of the source and target fields in each data feed.

Schedule & run the Tenable.io data feeds

Note: The data feeds are dependent on the Tenable.io API response data volume and their run time might take longer than the session timeout set for the Archer Services Parameter account. The data feed might fail due to 'Invalid session token'. If this happens, increase the session timeout of Archer Service Parameter. See the following article in the Archer Community for details https://www.archerirm.community/s/article/Failure-of-Long-Running-Jobs-for-Data-Imports-or-Content-Deletion-in-Archer.

A data feed must be active and valid to successfully run. A successful data feed run processes all input data, completes all expected record updates, and does not report any failures in the Run Details Report.

Validating a data feed

The Data Feed Manager validates the information when a data feed is scheduled. If any information is invalid, the data feed displays an error message. You can save the data feed and correct the errors later, but the data feed does not process until you make corrections.

Running a data feed

You can set up data feeds to run automatically at regular intervals. This reduces the time and effort required to import data from an external file.

You can initiate data feeds at various times and configure them to run in regular increments for an indefinite period of time.

You can run the data feed immediately.

To prevent excess server load, schedule data feeds on a staggered basis. Archer recommends scheduling a maximum of 10 data feeds to run at a time.

Setting up a reference data feed

A reference feed allows you to specify another feed. This indicates to the Data Feed Service that this feed will start running as soon as the referenced feed completes successfully.

  1. Go to the Run Configuration tab > Schedule section.

  2. Do one of the following to schedule your data feed.

    • Run on Schedule. You can configure your data feed to run on a defined schedule.

    • Run After. The Data Feed Services starts the current data feed after the referenced data feed completes successfully.

    • Run Now.

  3. Save the feed.

Data feed scenarios

The following section describes common data feed run scenarios and their expected behavior. Each scenario includes a use case, required configuration parameters, and run details.

Important: The Vulnerabilities and Assets integrations require two separate Archer data feed instances: One configured with the Generate objective and one configured with the Ingest objective. These feeds are typically scheduled so that the Generate feed runs first, followed by the Ingest feed after sufficient time has elapsed for Tenable.io to complete the export process. For small exports this is usually a few minutes; larger historical loads may require additional time.

Scenario 1: Standard incremental vulnerability load

Use case

A daily scheduled feed that imports vulnerabilities observed since the previous run.

Generate feed configuration

Parameter

Value

feedType

Vulnerability

objective

Generate

since

(empty; resolves to LastRunTime)

state

open, reopened, fixed

Ingest feed configuration

Parameter

Value

feedType

Vulnerability

objective

Ingest

chunkLimit

0 (process all chunks in a single run)

Behavior

The Generate feed creates a new export job containing vulnerability changes since LastRunTime. The Ingest feed identifies the most recent export job with a FINISHED status, downloads all chunks, and writes records to Archer in one run.

After ingestion completes, PreviousRunContext is set to: {uuid}-{total}-{total}

Because the number of processed chunks equals the total, subsequent Ingest runs will search for a newer export job rather than attempting to resume the prior one.

Scenario 2: Large vulnerability base load (chunked)

Use case

An initial load of all historical vulnerability data. Large exports may contain hundreds of chunks and cannot be processed in a single Archer run.

Generate feed configuration (run once)

Parameter

Value

feedType

Vulnerability

objective

Generate

since

2020-01-01 (or empty for full history back to 2000-01-01)

num_assets

500

Ingest feed configuration (scheduled repeatedly)

Parameter

Value

feedType

Vulnerability

objective

Ingest

chunkLimit

10 (process 10 chunks per run)

Behavior

Each Ingest run processes up to chunkLimit chunks and stores progress in PreviousRunContext using the format:

{uuid}-{processed}-{total}

Subsequent runs resume from the saved offset. When processed == total, the load is complete. Future Ingest runs then look for a newer export job and exit if none is found.

Example progression (200 total chunks, chunkLimit = 10)

Run

PreviousRunContext In

Action

PreviousRunContext Out

1

(empty)

Processes chunks 1–10

abc123-10-200

2

abc123-10-200

Processes chunks 11–20

abc123-20-200

20

abc123-190-200

Processes chunks 191–200

abc123-200-200

21

abc123-200-200

No newer export job found

(unchanged)

Scenario 3: Vulnerability load filtered by severity and state

Use case

Import only open Critical and High vulnerabilities for a risk-prioritized view.

Generate feed configuration

Parameter

Value

feedType

Vulnerability

objective

Generate

since

Empty (resolves to LastRunTime)

severity

critical, high

state

open, reopened

Ingest feed configuration

Parameter

Value

feedType

Vulnerability

objective

Ingest

chunkLimit

0

Behavior

The Generate feed passes severity and state filters in the POST /vulns/export request. Filtering is applied server-side by Tenable.io, and only matching records appear in the export.

The Ingest feed requires no additional configuration changes; filtering is performed exclusively during the Generate phase.

Scenario 4: Plugin base load (chunked)

Use case

An initial load of the complete Tenable.io plugin library.

Feed configuration

Parameter

Value

feedType

Plugins

type

initialLoad

iterationLimit

10

size

1000

Behavior

The last_updated value is forced to 2000-01-01, ensuring all plugins are included. Each run processes up to 10 pages (10,000 plugin records total) and stores the last processed page number in PreviousRunContext.

Processing resumes from the stored page number in the next run. When all pages have been processed, PreviousRunContext is set to -1. Subsequent runs detect this value and return immediately.

Example progression

Run

PreviousRunContext

In

Action

PreviousRunContext Out

1

(empty)

Processes pages 1–10

10

2

10

Processes pages 11–20

20

N

X

Plugin catalog exhausted

-1

N+1

-1

Returns immediately

-1

Scenario 5: Standard incremental plugin load

Use case

A daily scheduled feed that imports plugins added or updated since the last run.

Feed configuration

Parameter

Value

feedType

Plugins

type

Empty

size

1000

Behavior

The last_updated parameter resolves to LastRunTime (formatted as YYYY-MM-DD). All matching pages are processed in a single run with no iteration limit.

PreviousRunContext is not used for incremental plugin loads.

Scenario 6: Standard incremental asset load

Use case

A daily scheduled feed that imports assets created since the previous run.

Generate feed configuration

Parameter

Value

feedType

Assets

objective

Generate

created_at

Empty (resolves to LastRunTime)

chunk_size

1000

Certification environment

Date Tested: April 2026

Product Name

Version Information

Operating System

Archer

2025.10

Virtual Appliance

Tenable.io

NA

NA