Detecting a vulnerability is easy. Finding the person responsible for fixing it is where remediation programs often break down. See how Tenable Hexa AI uses MCP to connect your exposure data to your identity provider — automating the hunt for asset owners in seconds.
In our first use case blog, we showed how Tenable Hexa AI can identify assets impacted by a supply chain attack like the Axios npm compromise. In our second post, we walked through how custom Tenable Hexa AI agents can automate patching at machine speed using Tenable Patch Management.
But there’s a step hiding between “we found the vulnerability” and “we deployed the fix” that quietly consumes more analyst hours than either of those activities: figuring out who actually owns the vulnerable asset. This post explains how to close that gap and accelerate vulnerability remediation using Tenable Hexa AI.
Picture the scenario every security team knows by heart. It’s 4:45 p.m. on a Friday. A critical CVE drops. Your Tenable scan lights up 47 affected hosts across three business units. The IPs are real, the findings are accurate, the severity is clear — and nobody knows who owns half of these impacted assets.
The next two hours look the same as they always do: a flurry of Slack messages to #infra, #platform, #cloud-ops. “Is prod-api-17 yours?” “Who owns the subnet in us-east-1b?” “I think that was Maria’s team before the reorg.” By the time someone confirms ownership on the last host, half the team has logged off for the weekend, and the exploit window is still wide open.
This is the accountability gap: scanners see technical assets, identity providers see people, and configuration management databases (CMDBs) try to bridge the two, but the entries are usually months old — frozen at the moment the asset was provisioned, and most likely not updated when the owner changed teams, left the company, or handed off the service. The result is a security team forced to do detective work instead of remediation.
It’s not a niche problem, either. The Center for Internet Security’s CIS Critical Security Control 01 — the very first control on the list — calls out accurate inventory and ownership as the foundation every other control builds on. You can’t protect what you can’t attribute.
Tenable Hexa AI closes this gap by acting as the connective tissue between your exposure data and your identity source of truth. Tenable Hexa AI uses the Model Context Protocol (MCP) to orchestrate tasks between, for example, the Tenable One Exposure Management Platform on one side, and identity providers – such as Okta and Entra ID – and CMDBs like ServiceNow on the other.
This is the important distinction: Hexa AI isn’t just reading a static tag you populated six months ago. It’s issuing a live query against the identity provider at the moment you need the answer. Who currently owns this service account? Who provisioned this EC2 instance? Who is the on-call stakeholder for this application in PagerDuty? The answer you get from Tenable Hexa AI reflects today’s org chart, not last quarter’s.
By treating identity as a real-time data source rather than a point-in-time field on an asset, you skip the CMDB-rot problem entirely.
Let’s walk through what this looks like end-to-end. The prompt is plain English; the orchestration happens underneath.
The workflow begins in Claude with a prompt like:
“Find the most critical VPR finding on each of the 5 most critical assets. query Okta to identify the most likely owner based on service-owner group membership, app admin assignment, and recent login activity. Route a ticket to that asset owner in the Test Jira project.”

The prompt triggers the Tenable Hexa AI agent to query Tenable for unassigned critical findings, filtered by Vulnerability Priority Rating (VPR), so you’re only resolving ownership for the findings that actually matter. For each affected asset, Hexa AI then calls the Okta MCP server to resolve ownership — looking at who holds admin-level access, who recently authenticated against the host, and who belongs to the owning group or application assignment.
This is the step that wrecks your Friday afternoon. Tenable Hexa AI does it in seconds, at scale, across every unassigned finding in the environment.

Once the owner is identified, a ticket is opened in your system of record, such as Jira or ServiceNow, pre-filled with the finding detail, the VPR score, the affected host, and the person who can actually fix it.
To make sure this is trusted execution rather than blind automation, Hexa AI relies on Tenable’s Exposure Data Fabric — the unified layer that maps the relationships between vulnerabilities, identities, and assets across your environment. That context is what lets the agent distinguish between “the person who logged in once” and “the person who actually runs this service.” And as always, you can place human-in-the-loop (HITL) checkpoints wherever your change-management policy requires them — for example, requiring analyst sign-off before a ticket routes to a VP, or before ownership is rewritten on a tier-0 asset.

The NIST Cybersecurity Framework 2.0 (ID.AM-03) explicitly calls for organizations to prioritize resources based on business value and owner accountability. This workflow is how you meet that requirement operationally, not just on paper.
What does this actually buy you?
The speed at which the right information reaches the right person is one of the strongest predictors of organizational stability and recovery performance. Automating ownership is how you raise that signal speed for your security program.
The accountability gap isn’t a people problem — it’s an integration problem. Security teams have always known that asset ownership matters; now they have a clean, real-time way to resolve it at the speed modern threats demand. Tenable Hexa AI, together with MCP-based identity connectors, turns that resolution into a background function of the platform.
When every critical finding arrives pre-attributed to the right person, vulnerability management stops being a ticket-routing exercise and becomes what it was always supposed to be: a remediation function.
Tenable Hexa AI is currently in private preview for select Tenable One customers. Contact your Tenable account team to join the private preview program.
Want to learn more? Download the Tenable Hexa AI data sheet to get the full technical breakdown of Tenable agentic AI capabilities, including the growing catalog of MCP integrations across identity, ticketing, and patching tools.
Sean Jennings is a Principal Security Engineer at Tenable with over 15 years of experience in cybersecurity. He specializes in helping the world's largest enterprises reduce risk through exposure management, risk-based prioritization, and security strategy. A frequent speaker and industry contributor, Sean has presented at Black Hat and regularly shares practical insights through webinars and thought leadership on the challenges facing today's security leaders.