Tenable One: New Attack Path Endpoints
Tenable has released new Exposure Management Attack Path endpoints that provide advanced filtering capabilities, making it easier to retrieve the top attack paths leading to critical assets and the top attack techniques in your environment.
Tenable Attack Path helps you understand how adversaries might chain vulnerabilities and misconfigurations to achieve their objectives. Each attack path consists of one or more attack techniques that adversaries use to progress through your environment and compromise critical assets.
For more information, see Top Attack Paths and Top Attack Techniques in the Tenable Exposure Management User Guide.
The following endpoints are now available:
| Endpoint | Name | Description |
|---|---|---|
| POST /api/v1/t1/apa/top-attack-paths/search | Search attack paths | Returns a list of the top attack paths leading to critical assets. The response includes details about each attack path, such as associated techniques, nodes, and metadata. |
| POST /api/v1/t1/apa/top-attack-techniques/search | Search attack techniques | Returns a list of the top attack techniques in your organization that match the specified search criteria. The response includes details about each technique, such as MITRE ATT&CK framework information, mitigations, and metadata. |
These new endpoints replace the deprecated Attack Path Analysis endpoints previously announced in the Attack Path Analysis: Upcoming Changes and Attack Path Analysis: Deprecated Endpoints.
