0% found this document useful (0 votes)
33 views

SOW Ransomware Protection Solution v1

The document is a scope of work (SOW) for procuring a ransomware protection solution for Sidra Medicine's data center. It outlines Sidra's current backup infrastructure and objectives to enhance protection against ransomware attacks through secure backup practices. Vendors can propose solutions based on three options - option 1 involves a single site architecture complementing the existing backup solution, option 2 is a two site architecture with production and recovery vault sites, and option 3 proposes a comprehensive managed backup service. The SOW specifies various technical requirements the solution must meet around performance, availability, scalability, and functional capabilities to detect and prevent ransomware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

SOW Ransomware Protection Solution v1

The document is a scope of work (SOW) for procuring a ransomware protection solution for Sidra Medicine's data center. It outlines Sidra's current backup infrastructure and objectives to enhance protection against ransomware attacks through secure backup practices. Vendors can propose solutions based on three options - option 1 involves a single site architecture complementing the existing backup solution, option 2 is a two site architecture with production and recovery vault sites, and option 3 proposes a comprehensive managed backup service. The SOW specifies various technical requirements the solution must meet around performance, availability, scalability, and functional capabilities to detect and prevent ransomware.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Ransomware Protection Solution Procurement at Sidra Data Center Scope of Work

(SOW)

Sidra Medicine

Department: IT - Infrastructure & Operations

Document Type: Scope of Work

Author: Mohammed Wahajuddin

Last Updated: 28th September 2023

Version: 1.0
Contents

1. INTRODUCTION/BACKGROUND...................................................................................................................3
2. OBJECTIVES..................................................................................................................................................3
3. SCOPE OF WORK..........................................................................................................................................3
3.1 Current Enterprise Data Backup Infrastructure:...................................................................................4
3.2 Technical Requirements.......................................................................................................................4
3.2.1 Ransomware Protection Solution Functional Requirements:.......................................................5
3.2.2 Solution Offerings Options:..........................................................................................................6
3.2.3 Ransomware Protection Solution Architecture:...........................................................................7
3.2.4 Data Backup Storage Requirements:............................................................................................8
3.2.5 Data Backup Retention Requirements:........................................................................................8
3.2.6 Ransomware Solution Deployment Scope Details:.......................................................................8
3.2.7 Deliverables:.................................................................................................................................9
3.3 Warranty..............................................................................................................................................9
3.4 Solution Knowledge Transfer & Training..............................................................................................9
3.5 Evaluation Criteria................................................................................................................................9
4. RESPONSE REQUIREMENTS......................................................................................................................9
4.1. Technical Response Requirements.......................................................................................................9

|
IT (I & O) Ransomware Protection Solution Procurement - SOW 2
|
IT (I & O) Ransomware Protection Solution Procurement - SOW 3
1. INTRODUCTION/BACKGROUND
Sidra Medicine (Sidra) is seeking to Procure Ransomware Protection Solution at Sidra Data Center
which will enhance the Current Backup Solution for more resiliency against ransomware protection
as stated in the Scope of Work (SOW). Ransomware attacks pose a significant threat to
organizations, leading to data loss, operational disruptions, and financial consequences. To mitigate
these risks, Sidra Medicine (Sidra) intends to implement a Ransomware Protection Solution that
utilizes backup software with features such as immutable backups and works on automated Air Gap
architecture. The solution will provide reliable data recovery capabilities while ensuring the
integrity and security of backed-up data.

Based on their expertise and capabilities of their Solution, the Vendors are invited to submit their
proposals based on (3) different Options meeting the functional requirements as described in the
SOW.

Sidra is seeking to purchase premium hardware, software and system supports for designated
equipment with an “aggressive” and committed pricing for selected systems as described in the
SOW.

2. OBJECTIVES
Sidra Medicine (Sidra) requires to Procure Ransomware Protection Solution for Sidra Data Center
with 4 Years of Support. The objective is to ensure robust protection against ransomware attacks
by leveraging secure backup practices.

Vendor is responsible for all acts, and services required providing Sidra with a fully functional
System in accordance with the Specifications as per the requirement mentioned in the section 3.

3. SCOPE OF WORK
This document details a Scope of Work (SOW) to Procure Ransomware Protection Solution which
will enhance the Current Backup Solution for more resiliency against ransomware protection.
Vendor shall provide the services necessary to accomplish all of the tasks and subtasks in this
Statement of Work (SOW) and to successfully Install, Configure, Test, and Implement all of the
solution components including, but not limited to, all associated software and/or firmware,
patches/fixes, and interfaces, post implementation support, technical and end‐user
training. Vendor is responsible for all acts, and services required providing Sidra with a fully
functional System in accordance with the Manufacturer’s Specifications.

|
IT (I & O) Ransomware Protection Solution Procurement - 3
SOW
3.1 Current Enterprise Data Backup Infrastructure:

Figure 1: Current Enterprise Data Backup Infrastructure (MV3 & MV2)

3.2 Technical Requirements

The following are Technical Requirements of the desired Ransomware Protection Solution:

 Performance – (Must be able to meet the current and future Ransomware Protection
needs)
 Availability – requirements to prevent loss of data content and loss of access to data
required to achieve “6-9’s“(99.9999%) availability. Capability to recover from
catastrophic disasters.
 Scalability – the solution must be easy to grow to address the increased demand of future
applications.

|
IT (I & O) Ransomware Protection Solution Procurement - 4
SOW
 Cost – the cost of ownership needs to be reduced, including the cost of maintaining and
managing the system.

3.2.1 Ransomware Protection Solution Functional Requirements:

The Ransomware Protection Solution must ensure robust protection against ransomware attacks
by leveraging secure backup practices with the assumptions mentioned in the compliance matrix
- Schedule 1 – Tab 1.

The solution should meet the following key objectives:

1) Immutable Backups: Implement mechanisms to make backup data immutable and


tamper-proof.
2) Air-Gap Architecture: Implement automated Air Gap architecture to create an isolated
backup environment that eliminate the risk of ransomware attacks.
3) Backup Encryption: Strong encryption for data both in transit and at rest.
4) Ransomware Detection: Real-time monitoring and detection of ransomware activities
in-order to identify data that have been tampered with by ransomware or other malicious
agents incorporating artificial intelligence (AI) and machine learning (ML) analytics
methods and provides to identify the last good backup that can be used for recovery.
5) Data Validation: Regular integrity checks to ensure backup data consistency.
6) Versioning and Retention: Support for multiple backup versions and extended retention
periods.
7) Granular Recovery: Ability to restore individual files, folders, and complete systems.
8) Automated Backup: Scheduled and automated backup processes with minimal human
intervention.
9) Role-Based Access Control: Restrict access to backup data based on user roles and
permissions.
10) Reporting and Alerting: Provide a centralized management system to monitor and
control data backups efficiently.

|
IT (I & O) Ransomware Protection Solution Procurement - 5
SOW
3.2.2 Solution Offerings Options:

The Vendors are allowed to propose their Solution based on (3) different Options based on their
expertise and capabilities of their Solution meeting the functional requirements.

Vendors are required to mention clearly the Options they are proposing as part of their Tender
response.

OPTION-1:

Vendors should propose a Backup Solution with a single-site architecture that complements our
existing backup solution. This option requires the establishment of a secure Vault site for data
storage and recovery which ensures that the proposed vault site seamlessly integrates with our
current backup infrastructure, as per the below Solution Architecture mentioned in Figure 2:

Software requirements:

Vendor specific software which meets the solution functional requirements.

Hardware requirements:

Vendor specific Hardware which meets the solution functional requirements.

OPTION-2:

Vendors proposing a comprehensive Backup Solution with a two-site architecture. This option is
for the vendors capable of designing a robust backup system across two separate physical locations
with Production site meeting the production backup requirements of Ransomware Solution and a
Recovery Vault Site to have resiliency against ransomware protection.

Software requirements:

Vendor specific software which meets the solution functional requirements.

Hardware requirements:

Vendor specific Hardware which meets the solution functional requirements.

|
IT (I & O) Ransomware Protection Solution Procurement - 6
SOW
OPTION-3:

Vendors proposing a comprehensive Backup Solution within a Single-site. This option is for the
vendors capable of designing a robust backup system with a (2-Tier) Backup architecture within a
single physical hardware having Backup copies residing at the (Tier-1) Backup layer and moving
the copies later to (Tier-2) Protection layer within a virtual air-gap feature to have resiliency
against ransomware protection.

Software requirements:

Vendor specific software which meets the solution functional requirements.

Software only Vendors:- Vendors proposing this Option needs to submit their proposals
recommending Backup Storage Hardware Vendor as part of their solution offerings; even if
the Vendor is only providing the software.

Hardware requirements:

Vendor specific (OEM) Hardware which meets the solution functional requirements.

Hardware only Vendors:- Vendors proposing this Option needs to submit their proposal
recommending Backup Software Vendor as part of their solution offerings; even if the
Vendor is only providing the Hardware.

3.2.3 Ransomware Protection Solution Architecture:

Figure 2: Expected Ransomware Architecture

|
IT (I & O) Ransomware Protection Solution Procurement - 7
SOW
3.2.4 Data Backup Storage Requirements:

Data to be protected is 200 TB (Front-end Capacity); this represents SIDRA’s Mission-


Critical data comprising of VMs, file system and, database backups.

Workloads classification:

SL.# Workload Type Number of Servers Protected Size (TB)


1 VM Image Backups 250 120
2 File System Backups 20 10
3 Oracle & SQL Database Backups 20 70
Total (TB) 200

3.2.5 Data Backup Retention Requirements:

Below is the backup retention requirements:

Daily Backup Retention

 Daily full backups will be retained for (1) Month.

Monthly Backup Retention

 Monthly full backups will be retained for (1) Year.

Yearly Backup Retention

 Yearly full backups will be retained for (3) Years.

3.2.6 Ransomware Solution Deployment Scope Details:

 Racking and stacking of Ransomware Solution hardware.


 All Copper/Fiber Cables to be provided by the Vendor for Hardware connectivity.
 Laying Copper/Fiber Cables in the Racks from Source to destination Hardware.
 Powering and cabling of all Ransomware Solution hardware
 Initialize and assign management IP.
 Update Solution to the latest supported firmware.
 Enable all software purchased on the Ransomware Solution.
 Create and Configure Critical Systems Data Protection Policies as per agreed
design.
 Perfom Critical systems Test Backups to Vault Site.
 Perform Critical systems Recovery from Vault Site

|
IT (I & O) Ransomware Protection Solution Procurement - 8
SOW
 Conduct thorough testing of the integrated solution and provide comprehensive
documentation for configuration and ongoing maintenance.
 Validate the Recovery Data.
 Setup & Configure Dial Home/Connect Home for the Ransomware Solution for
remote monitoring.
 Hardware Decommisioning:- Upon EOL of Hardware, Vendor to decommission the
Old Hardware from Data Center Rack, Un-plug the Copper/Fiber Cabling, and
perform Copper/Fiber clean-up from the Racks.

3.2.7 Deliverables:

The following deliverables are expected to be provided in connection to the services


outlined in the "Project Scope" section:

 Project Completion Form.


 Health-check Report, which may include the current status of the Ransomware
Solution after the successful implementation.
 Implementation & Configuration Guide, documenting the implementation
described in the "Project Scope" mentioned above.

3.3 Warranty
Sidra requires 48 months of premium (24x7) warranty/support.

3.4 Solution Knowledge Transfer & Training


Classroom (Instructor-Led) Training to Sidra’s Data Backup Team (3 Persons) must cover
the following:

 Rnsomware Protection Solution software.

3.5 Evaluation Criteria


Sidra’s Evaluation committee will evaluate the proposals and select the suppliers that have
the highest potential to satisfy Sidra’s requirements.

4. RESPONSE REQUIREMENTS
4.1. Technical Response Requirements
Points to be addressed in the response, which will be closely examined by the Evaluation
committee, are:

Response Item Description/Format


Free Text with supporting documents at bidder’s
1. Company Profile
discretion.
2. References (past clients and projects Minimum of three (3) references.
completed in Qatar)
3. Schedule 1 - Tab 1 (packages): PDF & Excel – confirmation on the items
|
IT (I & O) Ransomware Protection Solution Procurement - 9
SOW
Response Item Description/Format
Technical Requirements &
Compliance

|
IT (I & O) Ransomware Protection Solution Procurement - 10
SOW

You might also like