Soc Technical Proposal
Soc Technical Proposal
Document Control
Document Title
SOC Build and Enablement Services
Document Code
Document Classification
Confidential
Revision
01
Date
2022-8-21
Table of Content
Table of Content 3
1. Proposed Solution description 4
A. Service Description and Scope of Work 4
B. SOC Monitoring Solution Architecture provided to the customer 7
C. Data Consult Deployment Approach 9
1. SOC Implementation and Integration 9
2. SOC Operations 10
D. Project Deliverables 13
E. Roles and Responsibilities 14
F. Project Schedule and Timeline 16
G. Service Level Agreements and Responsibilities 17
H. Minimum Hardware Requirements for SOAR Solution 20
2. Project Management Principles 23
3. Client Engagement Process 25
A. Phase 1: Coordinate/Plan/Prepare 25
B. Phase 2: Kick-off Meeting 25
C. Phase 3: Project Delivery 26
D. Phase 4: Results 27
E. Phase 5: On-going Support 27
F. Managed SOC Services Period 27
G. Continuous Quality Assurance 27
H. Account Management 27
4. Bill of Quantities 29
5. Pricing 30
Payment Terms Error! Bookmark not defined.
Payment Plan Error! Bookmark not defined.
6. Document Approval 32
2. 8x5 SOC Monitoring Services (Level 2 Operations) using SIEM, SOAR and
security technologies. We will carry out this service on an 8x5 basis remotely from
the Data Consult Security Operations Center, using SOAR solution as a primary point
for operations and going through customer network to reach SOC infrastructure.
In addition to the existing tools, Data Consult team will be relying on the EDR
solution of the monitored environment(pre-requisite) and will provide the
installation of an on-premises SOAR solution to act as a central hub for security
investigations and case management.
For the SOC augmentation Data Consult is proposing the following resources:
2x Level 2 Cyber Defense Analyst - Full Time Employees (FTEs) from 8x5
1x Level 3 Lead Cyber Defense Analyst - Full Time Employee (FTE) from 8x5
Further augmentation can take place after having insights about the
environments covered during monitoring.
Location of Services
Data Consult will deliver services remotely from its Security Operations
Center facility in KSA.
Further details about the approach, assumptions and responsibilities can be found
in section “Data Consult Deployment Approach”.
Data Consult will be relying on a VPN and a hypervisor at the customer end to connect to
the Master SIEM, Master SOAR, Case Management, Ticketing System and EDR at the
Costumer end.
To enable the augmentation of Managed SOC services, the remote IR services, and the
SIEM use cases engineering and reporting the following connections, integrations and
controls are needed:
2. Audited Access:
Monitoring should be enforced on the tunnels established from Data Consult KSA to
designated monitored environment.
The Data Consult SOC program includes two distinct capabilities we will deliver:
During the SOC Implementation phase, Data Consult will carry out the following
tasks:
2. SOC Operations
During the SOC Operations phase, Data Consult will provide the
following capabilities and technical services to the customer:
SOC Operations
Capabilities Data Consult Advanced Cyber Fusion Center
SOAR Automated Tier 1Data Consult Team will leverage the SOAR with created playbooks and
automation to allow the SOC tier 1 activities to be completed in an
automated fashion by the SOAR, allowing the SOC analysts to focus on
more meaningful events and tasks.
Human based Tier 2 - Data Consult seeks the brightest outside of the box thinkers and
Triage Analysis analytics-focused security experts to work within the SOC across the
different cells. We ensure that their skill sets are updated and in use with
regular SANS training and certification. SOAR handles the time-
consuming and more mundane process and procedures with our
internally developed playbooks giving our senior SOC analysts the
needed resources and freedom to investigate enriched tickets and gather
enough evidence to identify true positive abnormalities detected in the
client’s environments.
SOC Management & Data Consult brought in recognized leaders into operational and
Reporting technical roles to establish a solid foundation from which security
operation is handed. These leaders understand the needs and have real-
world experience; this allows for enhanced client handling and reporting
by creating meaningful client customized reporting and leadership
engagements. Additionally, Data Consult produces regular (weekly,
monthly and quarterly) SOC scorecard reports to demonstrate
continuous improvement in the operation and to highlight any area that
needs to be addressed by the client or Data Consult on an urgent basis.
Detailed reporting scope is provided in deliverables section.
Outputs Data Consult is creating meaningful client customized outputs, including
automatic reporting and delivery and on-demand reporting and delivery.
Data Consult works directly with client stakeholders to understand the
output needs and best address them in the most effective approach.
This service allows the customer team to have a trusted partner on standby
supporting incident investigations, digital forensics, and malware analysis.
Additionally, the retainer allows the customer to proactively prepare for cyber
security incidents by conducting tabletop exercises or testing of the incident
response plan
Security Engineering and Use Case Management (2 use case per month)
Criteria Data Consult Advanced Cyber Fusion Center
Use Case Engineering Data Consult will provide Customer with SIEM Content Planning,
Development and Tuning. As such, the focus of this activity is on
the identification and implementation of use cases via the
development of rules based on Data Consult proprietary threat
intelligence and understanding of the customer environment.
Observe rule operation, once implemented and review/monitor
performance of the use case content;
Tune content, as needed, and with Customer approval, to
achieve a balance that will minimize “false positives” and
maximize the detection of security threats;
Continuous Improvement
To deliver this successfully, Data Consult will allocate a Team Leader to the SOC
Operations team to look after the customer and provide a single point of interface between
Data Consult operations and the costumer. The Team Leader will have strong management
experience in the SOC and will support other teams such as Consulting, Engineering,
Product Development, Sales, and Presales teams. This role will act as a Trusted Advisor
to the customer security management team and will also act as Data Consult’s Customer
Services Manager. As we deliver the SOC Operations we will identify on an on-going basis,
areas for continuous improvement in the overall SOC design, build and operation, including
areas for automation, process optimization, use case development, introduction of new
services / solutions to the portfolio.
D. Project Deliverables
Data Consult will configure the local SOAR solution within the
designated monitored infrastructure. The capabilities of SOAR
solution and operations will depend on the functionalities allow by
the integration with SIEM solution.
Data Consult will provide 8x5 Level 2 monitoring and security
incident management.
Data Consult will provide a well streamed and matured process and
procedures for SOC operations and incident management.
Data Consult will provide 8x5 Level 2 alerting and assistance for incident
management to the customer.
Data Consult will provide regular scheduled reports on security operations
postures related as per the explained scope in deliverables section.
Data Consult will create specific Business use cases and implement the same
in the SOC offered as per the SOW in this proposal.
Data Consult will provide Proactive and Reactive inputs to the customer for
ensuring the best Cyber Security spectrum.
The customer will prov ide Da ta Consult with the requ ired
adm in istra t ive interfaces for monitoring event streams and log
collection activities of all in-scope components of security technology
infrastructure, if required.
The customer team will be in charge of the solutions management,
patching, health checks, backups, and other related security,
performance and maintenance tasks on SOC solutions after
deployment.
The customer will provide necessary action, assistance and support in
the installation and configuration of necessary infrastructure,
network components and assets to guarantee achieving security,
availability, and accessibility for SOC Monitoring team access to the
designated monitored environment infrastructure to perform in-scope
services.
The customer will inform Data Consult within three calendar days (72
hours) of any change in Point of Contact (POC) information for this
service to perform SOC monitoring services in scope.
The customer agrees to work collaboratively with Data Consult in
defining the various user groups and roles and related incident
handling and response procedures.
The customer will inform Data Consult of any change within security
technology and/or IT environment that are relevant to the Service.
The customer will review the Monthly service reports and provide
Data Consult with any relevant feedback or questions pertaining to
the report.
The customer will configure data source instances (i.e., Firewalls,
IDS/IPS devices, etc.) to collect logs and send the data to the SIEM.
The customer will provide needed technical and human resources to
achieve the integrations desired and connectivity between the
existing SOC solutions and remote SOC when enabled
The customer will troubleshoot data sources that are not collecting
the desired events/fields within the logs that the data sources are
sending to SIEM. (For Example: If a firewall is not logging all desired
events, the customer is responsible for editing the logging
policy/configuration settings for that specific firewall).
The customer will identify and prioritize relevant data sources for the
use case development based on the important of the assets, business
associated risks, and operational impact of potential attacks
The customer will help Data Consult to coordinate with the appropriate data
source owners within Customer organization, as needed.
The customer will provide needed assistance and support means, where
required, to allow Data Consult to fulfill the service requirements as per the
SOW in this proposal.
Prerequisites
Responsibilities:
Data Consult will handle all the Security Events generated by the
customer’s security controls and sent to the SIEM solution.
Task ownership in scope of the Incident Response function is outlined below using a Model:
Escalation Guidelines
Notice the phases of the incident resolution process evolve from left to right and from
Level 1 to Level 2. When activities at one skill level have been exhausted on an
incident, the incident should be escalated to the next skill level for further action.
Escalation Matrix
We provide below the minimal requirements for the suggested SOC setup. The
setup below does not include physical or virtual high availability; If high availability
is required the equipment count should be duplicated as mentioned in last slot of
the below table.
Raid Controller:
Hardware Raid Controller
Licensing:
1x Splunk MSS License
(15 GB/Day to server customer SOC
only, for any further expansion
license requires upgrade) 1
Power Supply:
Raid Controller:
Hardware Raid Controller
Licensing:
1x Palo Alto XSOAR MSSP License
(multi-Tenant)
1x ESXI License (Matching CPU)
Power Supply:
Hot Plug Dual Power Supply
Licensing:
1x ESXi License
1x VCenter License
Power Supply:
Raid Controller:
Flexible
Our projects are always diligently scoped, but at times we uncover information that
suggests some shift in focus or emphasis will be most helpful to you. We will confer
with you and adjust our process accordingly.
Align
Communicate
It is practical; our consultants will meet with you at the end of every day. We want
to review preliminary findings and recommendations to ensure our findings are
accurate (this will be your opportunity to provide us with feedback and corrections).
We can give you an evolving view of our opinions and recommendations; this way
there are no surprises in the report. We also look for key issues that impede
progress and discuss these in particular; that way we can break bottlenecks. Our
objective is to communicate beyond report writing. By ensuring solid
communication, we can focus on remediation effectiveness and focus on your
current capabilities, obstacles to progress and true needs.
Transfer
Knowledge transfer will help expedite progress. Although this part of our
methodology is optional, we encourage your team to shadow and work closely with
our consultants. We will share with your tools and techniques, how we interpret
results and other tips to help you realize ongoing value. In our experience, the more
you understand about security, the more improvements you will make in your
security efforts.
Support
After we deliver the final report, you are likely to have follow-up questions. Problems
may arise or new options may present themselves as you begin your remediation.
Please contact us. Our consultants can provide support for your report-related
questions even after the engagement is over and at no additional cost to you.
A. Phase 1: Coordinate/Plan/Prepare
Data Consult consulting leadership will discuss the project at a high level with
your organization. We will review the contract and clarify requirements and
expectations. We will match a consultant or team of consultants to you, based on
qualifications, timing requirements and personality. We will establish secure
communication channels and provide contact information and associated
notification processes.
Data Consult security consultant or project lead will contact you before your
project commences. This ensures that we address any additional questions or
concerns you may have, determine if the schedule is still appropriate, facilitate
document or knowledge transfer, and confirm your project can proceed as
planned. At this time, key stakeholders are identified, and appropriate
meetings are tentatively scheduled, and any travel plans confirmed.
All consulting engagements begin with a project kick-off meeting. Key personnel and
teams are introduced. A primary focus of the meeting is to gain alignment and agreement
between both sides on the direction and goals of the engagement. This allows Data Consult
security consultants to discuss your expectations and inputs and address any pre-
engagement questions. During this meeting, we will address:
D. Phase 4: Results
We will review with you the scope and requirements, methods and activities,
and our findings and recommendations. This information will be presented
formally in a draft report, and upon concurrence and resolution of any
comments, we will prepare and distribute a final report.
We view our relationship as on going and want to ensure you get the most out
of our engagement. We are available for advice on what actions to take,
questions about a particular product or vendor, or time with a security
professional. Please contact your Data Consult account representative for more
information and support options.
After the implementation and commissioning of the required infrastructure for the
Managed SOC services, we provide high quality delivery of SOC monitoring, forensics
investigations and IR retainer, SIEM engineering and other services as defined in the
scope of work of the proposal.
As a part of our commitment to delivering the highest level of service, Data Consult has
established formal processes for managing quality through survey metrics, lessons
learned, feedback and escalation processes, and deliverable reviews. This provides us
with a continual stream of feedback regarding our project management, methodologies
and customer handling procedures. In addition, all Data Consult deliverables are
reviewed for style, content and grammar before delivery.
Our consultants are evaluated on – and part of their compensation is tied to – customer
satisfaction. Customers have an opportunity to voice satisfaction and suggestions
through a survey sent at the completion of an engagement. We review every survey and
incorporate the feedback into our process to further improve our consulting efforts.
Data Consult has a formal, documented process for feedback and escalation
before, during and after an engagement. Customers are encouraged to contact
us with comments, questions or concerns about process, timelines, deliverables,
scope or other topics.
H. Account Management
single point of contact for billing, agreements or sales questions that may arise.
However, for any issues with service or delivery, we encourage you to use our
consulting feedback and escalation process.
Your Data Consult Account Manager will be in touch with you after the engagement
has been completed and all deliverables provided. He or she will follow up with
you to discuss any additional services we may be able to provide you – either
because of findings and recommendations, or just as a matter of securing your
organization.
The information we have learned about you is a vital part of determining the scope
of your environment for these future projects and allows us to tailor future
engagements better to you. In addition, any follow-up work is much more cost
effective since there is a far less steep learning curve in getting to know your
organization.
4. Bill of Quantities
5. Pricing
Payment Terms
Payment Plan
6. Document Approval
Version: 1.0
Date: 2022-8-21
The undersigned has reviewed and agreed the information contained in this action plan
document.