Soc Technical Proposal
Soc Technical Proposal
Document Control
Document Title
SOC Build and Enablement Services
Document Code
Document Classification
Confidential
Revision
01
Date
2022-8-21
Table of Content
Table of Content 3
1. Proposed Solution description 4
A. Service Description and Scope of Work 4
B. SOC Monitoring Solution Architecture provided to the customer 7
C. Data Consult Deployment Approach 9
1. SOC Implementation and Integration 9
2. SOC Operations 10
D. Project Deliverables 13
E. Roles and Responsibilities 14
F. Project Schedule and Timeline 16
G. Service Level Agreements and Responsibilities 17
H. Minimum Hardware Requirements for SOAR Solution 20
2. Project Management Principles 23
3. Client Engagement Process 25
A. Phase 1: Coordinate/Plan/Prepare 25
B. Phase 2: Kick-off Meeting 25
C. Phase 3: Project Delivery 26
D. Phase 4: Results 27
E. Phase 5: On-going Support 27
F. Managed SOC Services Period 27
G. Continuous Quality Assurance 27
H. Account Management 27
4. Bill of Quantities 29
5. Pricing 30
Payment Terms Error! Bookmark not defined.
Payment Plan Error! Bookmark not defined.
6. Document Approval 32
8x5 SOC Monitoring Services (Level 2 Operations) using SIEM, SOAR and
security technologies. We will carry out this service on an 8x5 basis remotely from
the Data Consult Security Operations Center, using SOAR solution as a primary
point for operations and going through customer network to reach SOC
infrastructure.
In addition to the existing tools, Data Consult team will be relying on the
EDR solution of the monitored environment(pre-requisite) and will
provide the installation of an on-premises SOAR solution to act as a central hub
for security investigations and case management.
For the SOC augmentation Data Consult is proposing the following resources:
2x Level 2 Cyber Defense Analyst - Full Time Employees (FTEs) from 8x5
1x Level 3 Lead Cyber Defense Analyst - Full Time Employee (FTE) from 8x5
Further augmentation can take place after having insights about the
environments covered during monitoring.
Location of Services
Data Consult will deliver services remotely from its Security Operations
Center facility in KSA.
Further details about the approach, assumptions and responsibilities can be found
in section “Data Consult Deployment Approach”.
Data Consult will be relying on a VPN and a hypervisor at the customer end to connect to
the Master SIEM, Master SOAR, Case Management, Ticketing System and EDR at
the Costumer end.
To enable the augmentation of Managed SOC services, the remote IR services, and the
SIEM use cases engineering and reporting the following connections, integrations
and controls are needed:
2. Audited Access:
Monitoring should be enforced on the tunnels established from Data Consult KSA to
designated monitored environment.
The Data Consult SOC program includes two distinct capabilities we will deliver:
During the SOC Implementation phase, Data Consult will carry out the following
tasks:
2. SOC Operations
During the SOC Operations phase, Data Consult will provide the
following capabilities and technical services to the customer:
8x5 Security Monitoring:
SOC Operations
Capabilities Data Consult Advanced Cyber Fusion Center
SOAR Automated Tier 1 Data Consult Team will leverage the SOAR with created playbooks and
automation to allow the SOC tier 1 activities to be completed in
an automated fashion by the SOAR, allowing the SOC analysts to focus
on more meaningful events and tasks.
Human based Tier 2 - Data Consult seeks the brightest outside of the box thinkers and
Triage Analysis analytics-focused security experts to work within the SOC across the
different cells. We ensure that their skill sets are updated and in use
with regular SANS training and certification. SOAR handles the
time- consuming and more mundane process and procedures with
our internally developed playbooks giving our senior SOC analysts
the needed resources and freedom to investigate enriched tickets and
gather enough evidence to identify true positive abnormalities detected
in the client’s environments.
SOC Management & Data Consult brought in recognized leaders into operational and
Reporting technical roles to establish a solid foundation from which security
operation is handed. These leaders understand the needs and have
real- world experience; this allows for enhanced client handling and
reporting by creating meaningful client customized reporting and
leadership engagements. Additionally, Data Consult produces
regular (weekly, monthly and quarterly) SOC scorecard reports
to demonstrate continuous improvement in the operation and to
highlight any area that needs to be addressed by the client or Data
Consult on an urgent basis. Detailed reporting scope is provided in
deliverables section.
Outputs Data Consult is creating meaningful client customized outputs, including
automatic reporting and delivery and on-demand reporting and
delivery. Data Consult works directly with client stakeholders to
understand the output needs and best address them in the most
effective approach.
Continuous Improvement
To deliver this successfully, Data Consult will allocate a Team Leader to the SOC
Operations team to look after the customer and provide a single point of interface
between Data Consult operations and the costumer. The Team Leader will have strong
management experience in the SOC and will support other teams such as
Consulting, Engineering, Product Development, Sales, and Presales teams. This role will
act as a Trusted Advisor to the customer security management team and will also act as
Data Consult’s Customer Services Manager. As we deliver the SOC Operations we will
identify on an on-going basis, areas for continuous improvement in the overall SOC
design, build and operation, including areas for automation, process optimization, use
case development, introduction of new services / solutions to the portfolio.
D. Project Deliverables
Responsibilities:
Data Consult will handle all the Security Events generated by the
customer’s security controls and sent to the SIEM solution.
Task ownership in scope of the Incident Response function is outlined below using a Model:
Escalation Guidelines
Notice the phases of the incident resolution process evolve from left to right and
from Level 1 to Level 2. When activities at one skill level have been exhausted on an
incident, the incident should be escalated to the next skill level for further action.
Escalation Matrix
We provide below the minimal requirements for the suggested SOC setup. The
setup below does not include physical or virtual high availability; If high
availability is required the equipment count should be duplicated as mentioned in
last slot of the below table.
Raid Controller:
Hardware Raid Controller
Licensing:
1x Splunk MSS License
(15 GB/Day to server customer SOC
only, for any further expansion 1
license requires upgrade)
Power Supply:
Raid Controller:
Hardware Raid Controller
Licensing:
1x Palo Alto XSOAR MSSP License
(multi-Tenant)
1x ESXI License (Matching CPU)
Power Supply:
Hot Plug Dual Power Supply
Licensing:
1x ESXi License
1x VCenter License
Power Supply:
Raid Controller:
Flexible
Our projects are always diligently scoped, but at times we uncover information that
suggests some shift in focus or emphasis will be most helpful to you. We will confer
with you and adjust our process accordingly.
Align
Communicate
It is practical; our consultants will meet with you at the end of every day. We want
to review preliminary findings and recommendations to ensure our findings
are accurate (this will be your opportunity to provide us with feedback and
corrections). We can give you an evolving view of our opinions and
recommendations; this way there are no surprises in the report. We also look
for key issues that impede progress and discuss these in particular; that way we
can break bottlenecks. Our objective is to communicate beyond report
writing. By ensuring solid communication, we can focus on remediation
effectiveness and focus on your current capabilities, obstacles to progress and
true needs.
Transfer
Knowledge transfer will help expedite progress. Although this part of our
methodology is optional, we encourage your team to shadow and work closely with
our consultants. We will share with your tools and techniques, how we interpret
results and other tips to help you realize ongoing value. In our experience, the
more you understand about security, the more improvements you will make
in your security efforts.
Support
After we deliver the final report, you are likely to have follow-up questions.
Problems may arise or new options may present themselves as you begin your
remediation. Please contact us. Our consultants can provide support for your
report-related questions even after the engagement is over and at no additional
cost to you.
A. Phase 1: Coordinate/Plan/Prepare
Data Consult consulting leadership will discuss the project at a high level with
your organization. We will review the contract and clarify requirements
and expectations. We will match a consultant or team of consultants to you,
based on qualifications, timing requirements and personality. We will
establish secure communication channels and provide contact information
and associated notification processes.
Data Consult security consultant or project lead will contact you before your
project commences. This ensures that we address any additional questions
or concerns you may have, determine if the schedule is still appropriate,
facilitate document or knowledge transfer, and confirm your project can
proceed as planned. At this time, key stakeholders are identified, and
appropriate meetings are tentatively scheduled, and any travel plans
confirmed.
B. Phase 2: Kick-off
Meeting
All consulting engagements begin with a project kick-off meeting. Key personnel
and teams are introduced. A primary focus of the meeting is to gain alignment and
agreement between both sides on the direction and goals of the engagement. This allows
Data Consult security consultants to discuss your expectations and inputs and
address any pre- engagement questions. During this meeting, we will address:
C. Phase 3: Project
Delivery
D. Phase 4: Results
We will review with you the scope and requirements, methods and activities,
and our findings and recommendations. This information will be
presented formally in a draft report, and upon concurrence and
resolution of any comments, we will prepare and distribute a final report.
E. Phase 5: On-going
Support
We view our relationship as on going and want to ensure you get the most out
of our engagement. We are available for advice on what actions to take,
questions about a particular product or vendor, or time with a security
professional. Please contact your Data Consult account representative for more
information and support options.
As a part of our commitment to delivering the highest level of service, Data Consult has
established formal processes for managing quality through survey metrics,
lessons learned, feedback and escalation processes, and deliverable reviews. This
provides us with a continual stream of feedback regarding our project management,
methodologies and customer handling procedures. In addition, all Data Consult
deliverables are reviewed for style, content and grammar before delivery.
Our consultants are evaluated on – and part of their compensation is tied to – customer
satisfaction. Customers have an opportunity to voice satisfaction and suggestions
through a survey sent at the completion of an engagement. We review every survey
and incorporate the feedback into our process to further improve our consulting efforts.
H. Account Management
single point of contact for billing, agreements or sales questions that may arise.
However, for any issues with service or delivery, we encourage you to use our
consulting feedback and escalation process.
Your Data Consult Account Manager will be in touch with you after the
engagement has been completed and all deliverables provided. He or she will
follow up with you to discuss any additional services we may be able to provide
you – either because of findings and recommendations, or just as a matter of
securing your organization.
The information we have learned about you is a vital part of determining the
scope of your environment for these future projects and allows us to tailor
future engagements better to you. In addition, any follow-up work is much more
cost effective since there is a far less steep learning curve in getting to know
your organization.
4. Bill of Quantities
5. Pricing
Payment Terms
Payment Plan
6. Document Approval
Version: 1.0
Date: 2022-8-21
The undersigned has reviewed and agreed the information contained in this action plan
document.
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date
Name Name
Title Title
Company Company
Signature Signature
Date Date