03/24/2025 | News release | Archived content
Each Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to make the shift from vulnerability management to exposure management. In this blog, Tenable Senior Staff Information Security Engineer Arnie Cabral, who is leading the company's internal exposure management journey, shares his experiences. You can read the entire Exposure Management Academy series here.
In my role as an information security engineer at Tenable, I am directly involved in transitioning our own security infrastructure from traditional vulnerability management to a more proactive exposure management approach. The first steps required strategic planning, policy realignment and resource allocation.
The need to move beyond simply identifying vulnerabilities drove Tenable's transition. We needed to focus on managing real-world exposures that pose significant risk to our security posture.
They say a journey of a thousand miles begins with a single step. At Tenable, our shift to exposure management in our internal infrastructure began with a simple realization. We knew that, although it is critical to modern cybersecurity, vulnerability management alone doesn't provide a complete picture of cyber risk.
Traditional vulnerability management typically involves scanning assets for known vulnerabilities and remediating them based on severity scores. However, true security risk management requires a broader view that includes misconfigurations, attack surface visibility and real-time threat intelligence.
To start our move to cyber exposure management, we reframed our existing policies to align with the new approach. This was not just a simple editing exercise, although there was some carry-over from the current policies.
Instead, we redefined our objectives and transformed our policies to ensure alignment with emerging risk-based exposure management frameworks.
With our new exposure management policy in place, we created a foundation to ensure our security teams have clear guidelines on how to assess, prioritize and remediate exposures beyond just addressing common vulnerabilities and exposures (CVEs).
As we completed the policy, we understood the new approach would need to incorporate:
Alongside the policy we developed, our team drafted a project plan to operationalize security exposure management. This plan included:
Smaller organizations could manage this process with common tools like spreadsheets. But larger enterprises, like ours, usually turn to platforms like Jira and Confluence to help the process. Of course, no plan would be complete without Gantt charts that provide a visual understanding of the project structure and timeline.
My advice is to use tools that help you reach your goals without adding unnecessary process overhead. For example, a platform that integrates data from multiple siloed security tools from multiple vendors gives you a continuous and complete view of your environment and an accurate risk profile.
One of the key challenges in this transition was the complexity of security operations. Traditional vulnerability management mostly relies on vulnerability scanning assets with Nessus scanners and agents, but the move to exposure management required incorporating other elements, including:
Our teams had to ensure remediation workflows could handle this broader scope while maintaining efficiency. This led to discussions about automation and orchestration - essentially, we wanted to understand how we could centralize the triage and response process without overloading security teams.
If your organization is embarking on, or considering starting, your own exposure management journey, here are exposure management best practices and key takeaways from Tenable's experience:
The transition from vulnerability management to exposure management is a necessary evolution in cybersecurity strategy.
As attack surfaces expand and threats become more sophisticated, your organization needs to adopt a more holistic approach to cyber risk reduction. Although the journey can be complex and resource-intensive, the benefits - increased visibility, better risk prioritization and improved security outcomes - make it a worthwhile investment. I'm excited about what lies ahead and look forward to sharing more about our journey.