Menu
Ask ACAS: Powered by Tenable

The Cyber Exposure Platform For ACAS Compliance

The Assured Compliance Assessment Solution (ACAS) program provides an integrated Cyber Exposure platform that enables vulnerability management solutions through 4 primary methods, active scanning, agent scanning, passive analysis, and log analysis. It provides your unit with the analytics and vulnerability data to meet ACAS requirements and to be compliant with USCYBERCOM Order; TASKORD 17-0019 Scanning and Remediation. The platform also supports DISA STIG audits using SCAP files and Tenable developed audit files. ACAS allows customers to follow the 5 life cycle steps in the Cyber Exposure Life Cycle.

  • Discover - Identify and map every asset across any computing environment
  • Assess - Understand the cyber exposure of all assets, including vulnerabilities, misconfigurations and other security health indicators
  • Analyze - Understand exposures in context, to prioritize remediation based on asset criticality, threat context and vulnerability severity
  • Fix - Prioritize which exposures to fix first, if at all, and apply the appropriate remediation technique
  • Measure - Measure and benchmark cyber exposure to make better business and technology decisions

The new ACAS contract now includes Nessus® Agents and Log Correlation Engine® (LCE®) to allow customers to close the Cyber Exposure Gap and have more analytics related to vulnerabilities on the network. By combining all 4 data collection methods, analysts are able to create alerts when logged events take place, and better anticipate or prevent data breaches related to vulnerabilities found on the network.

ACAS User Group Coming Soon

Tenable is forming an ACAS User Group and your input is extremely valuable to us.

Register Now

Best Practices in Assessing Cyber Exposure

Read about scanning strategies and options with Tenable.sc on-prem solution

Get the Whitepaper

Learn more about ACAS

View the solution brief for more information

Download Now

ACAS Overview

Harness the power of ACAS with the most comprehensive view of deployed assets and potential weaknesses

Learn more

Beyond ACAS

Prepare now for the evolution in IT security: Tenable’s SecurityCenter Continuous View

Learn more

Frequently Asked Questions

Your DISA ACAS questions, answered by the experts

Learn more

Training

Accelerate your learning with targeted ACAS training

Learn more

Support

Get specialized ACAS support and resources

Learn more

Blog posts

Check back soon for more blog posts
Read more

Events

Check back soon for more Federal events.
View more Tenable events

Ask a question, get information, start a discussion

Join the Community