Sei sulla pagina 1di 13

Building Your Security Service

with Network Detective


by Win Pham, RapidFire Tools VP Development

Copyright© 2016 RapidFire Tools, Inc. All rights reserved.


v2016.1.a

1 Overview
Managed Service Providers (MSPs) can use Network Detective to build or grow a managed services
practice. Discover how thousands of MSPs are already using Network Detective to capture more
business.

2 One-time Assessments vs. Ongoing


Using Network Detective, MSPs can offer on-demand one-time assessments, as well as provide
ongoing, monthly services to capture recurring revenue.

One-time security assessments are typically used to audit security or support a larger compliance
initiative.

As opposed to one-time assessments, which are typically driven by customer demand, an ongoing
security offering is positioned to streghen the security position for your client by:

1. Creating and enforcing security policies


2. Identifying anomalous user activity
3. Assuring that changes in the environment are not harmful
4. Reducing risk associated with internal vulnerabilities
5. Eliminating threats caused by misconfigurations

In this sense, an ongoing offering provides more long-term benefit than an individual assessment
because vulnerabilities and threats are routinely neutralized before they can harm your client’s
environments.

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 2


v2016.1.a

3 One-time Assessments
For one-time assessments, we propose a 3-tiered approach. The tiers are named SILVER, GOLD, and
PLATINUM. Silver can be provided to a vast majority of the customer base and incurs the least cost
to the client and service provider, while the Platinum level consists of concierge-level services.

3.1 SILVER Level


The SILVER level is designed as a broad-based evaluation of the security of a customer’s network
with the least amount of manual work. The table below shows the tasks involved, as well as how
Network Detective helps complete them.

Task Network Detective Deliverable Purpose


Component
Evaluate inbound firewall Security Assessment External Vulnerability These reports will form the basis of
configuration and search Module – External Management Plan checking for vulnerabilities in the
for known external Vulnerability Scan firewall. If a managed firewall service
vulnerabilities External Vulnerability Scan is not in place, it justifies the need to
by Issue Report implement one. It also ensures that
changes made to the external
firewall—or exposure of outward-
facing applications—is minimized.
Evaluate out-bound firewall Security Assessment Outbound Security Report The SANS Institute best practices for
configuration Module – Outbound egress filtering points to the vital role
Security Report the blocking of unnecessary traffic
plays in eliminating the spread of
viruses, worms, and Trojans in the
environment.
Evaluate the effectiveness Network Assessment Detailed Report Looks for systems in which security
of the current patch Module patches have not been applied in a
management tool timely manner
Evaluate anti-virus and anti- Network Assessment Detailed Report Determine where anti-virus and anti-
spyware deployment Module spyware is not deployed or is out of
date.
Administrator review Network Assessment Detailed Report Validates, through interview with
Module business owner, the list of users with
administrative privileges
Share permission review Security Assessment Share Permission Reports Validates which users have access to
Module critical business data through
interview with the business owner
Physical security walk- InForm InForm Response Report Provides an in-person walk- through of
through the office and gathering of the results
using Network Detective InForm.

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 3


v2016.1.a

Tasks performed by MSP:

Day 1
1. Initiate External Vulnerability Scan (can be performed remotely)
2. Run the Network and Security Data Collector selecting the Network Scan option
(can be performed remotely)
3. Run the Local Push Data Collector selecting Network and Security
(can be performed remotely)

Day 2
4. In-person site visit and interview with CEO/CTO (after initial automated assessment):
a. Physical security walk-through
b. Administrator Review – present list of administrators and domain administrators of
the environment and assure the list is accurate and as minimal as possible.
c. Share Permission Review
5. Prepare deliverables for final review

Day 3
6. Final review with stakeholders

Labor Requirement:

 15-30 minutes to configure and launch the scan


 1 hour for an on-site walk-through and interviews
 1 hour for report preparation and review
 1 hour for final review with stakeholders

This plan level addresses the major weaknesses faced by small business:

1. Inadequate or no perimeter defense


2. Inadequate patching to prevent vulnerabilities
3. Lack of anti-virus/anti-spyware to combat malware
4. Improper administrative access
5. Improper access to sensitive information
6. Poor physical security practices, including handling of removable drives, data center security,
and inadequate access control

Pricing: $1,500 - $3,000 one-time charge

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 4


v2016.1.a

3.2 GOLD Level


The GOLD Level builds onto the items already in the SILVER level and is designed for businesses with
a higher level of risk. The GOLD Level includes everything in the SILVER level plus log-in analysis and
internal vulnerability scanning.
Task Network Detective Deliverable Purpose
Component
Evaluate inbound firewall Security Assessment External Vulnerability These reports will form the basis of checking for
configuration and search Module – External Management Plan vulnerabilities in the firewall. If a managed
for known external Vulnerability Scan firewall service is not in place, it justifies the
vulnerabilities External Vulnerability need to implement one. It also ensures that
Scan by Issue Report changes made to the external firewall or
exposure of outward- facing applications is
minimized.
Evaluate out-bound Security Assessment Outbound Security The SANS Institute best practices for egress
firewall configuration Module – Outbound Report filtering points to the vital role the blocking of
Security Report unnecessary traffic plays in eliminating the
spread of viruses, worms, and Trojans in the
environment.
Evaluate the effectiveness Network Assessment Detailed Report Looks for systems in which security patches
of the current patch Module have not been applied in a timely manner
management tool
Evaluate anti-virus and Network Assessment Detailed Report Determines where anti-virus and anti-spyware is
anti-spyware deployment Module not deployed or is out of date
Administrator review Network Assessment Detailed Report Validates, through interview with business
Module owner, the list of users with administrative
privileges
Share permission review Security Assessment Share Permission Validates which users have access to critical
Module Reports business data through interview with the
business owner
Physical security walk- InForm InForm Response Report Provides an in-person walk-through of the
through office and gathering of the results using
Network Detective InForm
Internal Vulnerability Scan Inspector Internal Vulnerability Scans for internal vulnerabilities within the
Management Plan client’s network to find security flaws that could
be exploited once an attacker makes it inside
Internal Vulnerability the network
Detail Reports
Anomalous login Inspector – Anomalous Anomalous Login Report Reviews security audit logs looking for
detection Login Scan suspicious logins
Login History Reports
Security Assessment
Module
Security Policy Security Assessment Security Policy Reviews default Group Policy and applicable
Assessment Module Assessment Local Security Policies for consistency and
alignment with best practices
IT Administrator Review Inspector – Layer 2/3 Scan Layer 2/3 Reports Reviews user, computers, and Layer 2/3 detail
with the in-house administrator to identify
Network Assessment Detailed Report possible defunct or rogue users and systems
Module

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 5


v2016.1.a

Tasks performed by MSP:

Day 1
1. Plug in and configure Inspector appliance on-site
2. Initiate External Vulnerability Scan, Network and Security Data Collectors, and the Internal
Vulnerability Scan from the Inspector
3. Run the Local Push Data Collector selecting Network and Security
4. Physical Security walk-through during data collection

Day 2
5. In-person site visit and interview with CEO/CTO and IT Administrator:
a. Administrator Review – present list of administrators and domain administrators of
the environment and assure the list is accurate and as minimal as possible.
b. Share Permission Review
c. IT Administrator Review
6. Prepare deliverables for final review

Day 3
7. Final review with stakeholders

Labor Requirement:

 30 minutes to configure the Inspector and launch the various scans


 2 hours for an on-site walk-through and interviews (CEO/CTO and IT Administrator)
 1 hour for report preparation and review
 1 hour for final review with stakeholders

This plan level addresses the major weaknesses faced by small and medium sized businesses:

1. Inadequate or no perimeter defense


2. Inadequate patching to prevent vulnerabilities
3. Lack of anti-virus/anti-spyware to combat malware
4. Improper administrative access
5. Improper access to sensitive information
6. Poor physical security practices, including handling of removable drives, data center security,
and inadequate access control
7. Internal vulnerabilities
8. Poorly set up Group Policies
9. Lack of consistency with application of Local Security Policies
10. Unusual or unauthorized log-in attempts by employees or attackers
11. Defunct or rogue users and computers

Pricing: $3,000 - $5,000 one-time charge

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 6


v2016.1.a

3.3 PLATINUM Level


The PLATINUM Level security offering builds even further on the GOLD-level by including compliance
audit level reviews of the client’s security position. It is performed through the use of either the PCI
or HIPAA assessment modules from Network Detective. Many of the elements in the SILVER and
GOLD level will be covered by performing the PCI DSS assessment.
Task Network Detective Deliverable Purpose
Component
Evaluate inbound firewall Security Assessment External Vulnerability These reports will form the basis of checking
configuration and search Module – External Management Plan for vulnerabilities in the firewall. If a managed
for known external Vulnerability Scan firewall service is not in place, it justifies the
vulnerabilities External Vulnerability Scan need to implement one. It also ensures that
by Issue Report changes made to the external firewall or
exposure of outward- facing applications is
minimized.
Evaluate out-bound Security Assessment Outbound Security Report The SANS Institute best practices for egress
firewall configuration Module – Outbound filtering points to the vital role the blocking
Security Report of unnecessary traffic plays in eliminating the
spread of viruses, worms, and Trojans in the
environment.
Evaluate the effectiveness Network Assessment Detailed Report Looks for systems in which security patches
of the current patch Module have not been applied in a timely manner
management tool
Evaluate anti-virus and Network Assessment Detailed Report Determines where anti-virus and anti-
anti-spyware deployment Module spyware is not deployed or is out of date
Administrator review Network Assessment Detailed Report Validates, through interview with business
Module owner, the list of users with administrative
privileges
Share permission review Security Assessment Share Permission Reports Validates which users have access to critical
Module business data through interview with the
business owner
Physical security walk- InForm InForm Response Report Provides an in-person walk-through of the
through office and gathering of the results using
Network Detective InForm
Internal vulnerability scan Inspector Internal Vulnerability Scans for internal vulnerabilities within the
Management Plan client’s network to find security flaws that
could be exploited once an attacker makes it
Internal Vulnerability Detail inside the network
Reports
Anomalous login Inspector – Anomalous Anomalous Login Report Reviews security audit logs looking for
detection Login Scan suspicious logins
Login History Reports
Security Assessment
Module
Security policy assessment Security Assessment Security Policy Assessment Reviews default Group Policy and applicable
Module Local Security Policies for consistency and
alignment with best practices
IT Administrator Review Inspector – Layer 2/3 Scan Layer 2/3 Reports Reviews user, computers, and Layer 2/3 detail
with the in-house administrator to identify
Network Assessment Detailed Report possible defunct or rogue users and systems
Module
Compliance-level auditing PCI or HIPAA Module PCI Evidence of Compliance For all companies, even if they are not
Report required to comply with a compliance
standard such as HIPAA or PCI, a compliance-
HIPAA Evidence of level audit is beneficial in finding security
Compliance Report related best practice violations.

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 7


v2016.1.a

Tasks performed by MSP:

Day 1
1. Plug in and configure Inspector appliance on-site
2. Initiate External Vulnerability Scan, Network and Security Data Collectors, as well the Internal
Vulnerability Scan from the Inspector
3. Run the Local Push Data Collector selecting Network and Security
4. Physical security walk-through during data collection using the PCI or HIPAA On-site Survey

Day 2-3
5. Complete various identification worksheets with stakeholders
6. Initiate secondary scans if needed

Day 4
7. In-person site visit and interview with CEO/CTO and IT Administrator:
a. Administrator Review – present list of administrators and domain administrators of
the environment and assure the list is accurate and as minimal as possible.
b. Share Permission Review
c. IT Administrator Review
8. Prepare deliverables for final review

Day 5
9. Final review with stakeholders

* Note that compliance assessments vary greatly with the size of the organization in terms of
complexity and the timeframes given.

Labor Requirement:

 30 minutes to configure the Inspector and launch the various scans


 4+ hours for an on-site walk-through and interviews
 2 hours for report preparation and review
 1 hour for final review with stakeholders

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 8


v2016.1.a

This plan level addresses the major weaknesses faced by larger entities and those with compliance
needs:

1. Inadequate or no perimeter defense


2. Inadequate patching to prevent vulnerabilities
3. Lack of anti-virus/anti-spyware to combat malware
4. Improper administrative access
5. Improper access to sensitive information
6. Poor physical security practices, including handling of removable drives, data center security,
and inadequate access control
7. Internal vulnerabilities
8. Poorly set up Group Policies
9. Lack of consistency with application of Local Security Policies
10. Unusual or unauthorized log-in attempts by employees or attackers
11. Defunct or rogue users and computers
12. Compliance-level auditing

Pricing: $7,000+ one-time charge

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 9


v2016.1.a

4 Ongoing Security Service


The Network Detective software modules, along with the Detector™ virtual appliance, can be the
ideal foundation for MSPs who want to provide a cost-effective and high-value security offering to
their customers. The model proposed consists of multiple tiers that wrap around both alert response
and additional reporting services performed throughout the year.

4.1 SILVER Level


The SILVER level is designed as a low cost entry point that will appeal to companies with less than 50
computers and offers a way for MSPs to both create incremental recurring revenue, as well as
provide an opportunity to engage the customers for new projects. The offering keeps security “top-
of-mind” by delivering value daily. It is built around the Detector appliance to provide the highest
degree of automation possible, reducing the internal cost of adding the service.

The SILVER level offering consists of:

 A Detector™ appliance placed at the customer site


 Initial configuration of the appliance and Smart Tags
 Alerts sent to your client’s stakeholder(s)

Through the DAILY alerts, your customer will be able equipped with the knowledge to:

 Ask you to investigate an issue and report back to them


 Notify you of false positives
 Ask you to address an issue

Your responsibilities and potential service model:

 Investigate and Report – As part of your NOC/SOC services, you will evaluate the threat level
and determine if the issue is valid and report back to the customer.
 False Positive – Either you will ignore the issue or add proper tagging to avoid the alert from
being sent in the future.
 Address Issue – At the SILVER level, remediation is not included but can be done as a Project
or Time and Materials arrangement.

Therefore, the customer incurs extra costs only if they want you to fix a legitimate issue found in
their environment.

Your cost:

 $69/month for Detector (+$40 if you want a hardware appliance)


 Cost of Basic NOC/SOC services to Investigate and Tag (minimal time required)

Proposed cost of offering to customer:

 $250-500/month (with Internal Vulnerability Scans turned off)

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 10


v2016.1.a

4.2 GOLD Level


The GOLD level offering builds on the SILVER, but additionally offers ongoing internal vulnerability
scans, SOC filtering of alerts, and verification services. It also includes a quarterly network and
security assessment review.

The GOLD level offering consists of:

 A Detector™ appliance placed at the customer site


 Initial configuration of the appliance and Smart Tags
 Alerts sent to the NOC/SOC and reviewed daily
 Manually reviewed items are sent to the stakeholders
 Additionally, internal vulnerability scans are included

Through the DAILY alerts, your customer will be able equipped with the knowledge to:

 Ask you to investigate an issue and report back to them


 Notify you of false positives
 Ask you to address an issue

Your responsibilities and potential service model:

 Investigate and Report – As part of your NOC/SOC services, you will evaluate the threat level
and determine if the issue is valid and report back to the customer.
 False Positive – Either you will ignore the issue or add proper tagging to avoid the alert from
being sent in the future.
 Address Issue – At the GOLD level, some level of remediation can be included, but additional
and out of scope issues can be done as a Project or Time and Materials arrangement.

Therefore, the customer incurs extra costs only if they want you to fix a legitimate issue found in
their environment.

Your cost:

 $69/month for Detector (+$40 if you want a hardware appliance)


 Cost of Basic NOC/SOC services to review Daily Alerts (once consolidated notification once
a day)
 Cost of Basic NOC/SOC services to Investigate and Tag (minimal time required)
 (optionally) 4 days of labor per year to review and report on the automatically scheduled
and generated network and security assessments reports created by the Detector once a
quarter.

Proposed cost of offering to customer:

 $500-1,000/month (can bundle some level of remediation services as well)

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 11


v2016.1.a

4.3 PLATINUM Level


The PLATINUM level offering builds on the GOLD level and adds investigative and remediation
services. It can also include an annual PLATINUM-level Risk Analysis. This would be designed for
organizations that have higher security needs or need to demonstrate ongoing compliance.

The PLATINUM-level offering consists of:

 A Detector™ appliance placed at the customer site


 Initial configuration of the appliance and Smart Tags
 Alerts sent to the NOC/SOC and reviewed daily
 Manually reviewed items are sent to the stakeholders
 Internal vulnerability scans are included
 Annual risk assessment (PCI/HIPAA or other)

Your responsibilities and potential service model:

 Investigate and Report – As part of your NOC/SOC services, you will evaluate the threat level
and determine if the issue is valid and report back to the customer.
 False Positive – Either you will ignore the issue or add proper tagging to avoid the alert from
being sent in the future.
 Address Issue – Most basic security-issue remediation can be included as part of the
agreement. More complex arrangements involving multi-day efforts could always be scoped
as additional projects.
 Perform an annual security risk assessment.

Your cost:

 $69/month for Detector (+$40 if you want a hardware appliance)


 Cost of Basic NOC/SOC services to review Daily Alerts (once consolidated notification once
a day)
 Cost of basic NOC/SOC services to Investigate and Tag (minimal time required)
 Cost of basic remediation services, such as Active Directory management (removing
users/computers, modifying permissions and Group Policies), and internal/external firewall
configuration (ties into a Managed Firewall offering).
 Cost to perform annual risk assessment

Proposed cost of offering to customer:

 $1,500+ /month

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 12


v2016.1.a

5 Variations and Combinations


The one-time and ongoing offerings are not mutually exclusive and some MSPs may wish to bundle
the one-time assessments as part of an ongoing offering as well. This provides a very powerful story,
especially for compliance purposes where annual risk assessments may be required but
demonstrating ongoing compliance is equally valuable.

6 Next Steps
This document is intended to be a guide to help you define your own Managed Security offering.
Combined with the ability to incorporate your own practices, conduct interviews using our InForm
technology, and receive low, fixed per-site pricing for Detector, the possibilities are endless for
forming a service offering at all levels, to a variety of customers, using trusted technology.

Additionally, the Detector alerting provides a systematic and methodical approach to security rather
than error-prone human review of logs and settings.

The next step is to contact your RapidFire Tools Account Manager and Solutions Engineer to help
formulate a model that works for you.

RapidFire Tools Sales

sales@rapidfiretools.com

678-323-1300, ext. 2

Copyright© 2016 RapidFire Tools, Inc. All rights reserved. 13

Potrebbero piacerti anche