Sei sulla pagina 1di 2

Being an MSSP, you can provide the following set of services:

1. Vulnerability Assessment and Management Service


a. Vulnerability Scanning
b. Remediation, Patching and Fixes
c. Continuous Vulnerability Management
2. Penetration Testing / Red Teaming Service
a. Network Pentesting
b. Web Application Pentesting
c. Mobile App Pentesting (Android, IOS)
3. Brand Protection / Breach Awareness Service
a. Continuous watch over Client’s PII, Emails, Keywords and Social Media presence
b. Continuous scrapping the black markets and forums in the clear web
c. Continuous scrapping the black markets and forums in the dark web
d. Dorks (Google hacking) watch & String matching
e. Web shell hunting from outside the server
f. Domain Reputation watch
g. Twitter feeds watch
h. Continuous searching into Zone-h like websites for scrapping hacking evidence
i. Continuous searching into Pastebin like websites for hacking dumps
j. Manual / On-demand lookups
4. Continuous Security Monitoring / Blue Teaming / 24/7 SOC Operation Service
a. Netflow / Live Traffic Analysis
b. Security Solutions and Appliances Monitoring (IDS/IPS, SIEM, HIDS)
c. Deep Packet Inspection
d. Active Defense & Deception Tactics
e. Cyber Threat Intelligence Integration
f. Production of Cyber Threat Intelligence local to the environment
g. Security Threat Assessment
h. Malware Analysis and Reversing
5. Incident Response to Cyber Intrusions Detection Service
a. Log Analysis for Hunting Security Threats
b. Netflow / Live Traffic Analysis
c. Security Threat Assessment
d. Digital Forensic Investigations
e. Intrusion and Anomaly Detection
f. IOC (Indicators of Compromise) Hunting
6. Digital Forensic Investigations
a. Operating System Forensics (Windows, Linux only)
b. Servers Specific Forensics (Windows, Linux)
c. Mobile Forensics (Android only)
d. Cloud Forensics (AWS, Azure, Google Cloud only)
e. Email Forensics
f. Database Forensics
7. Compromise Assessment / Breach Detection
a. Live Traffic Analysis
b. Log Analysis for Hunting Security Threats
c. Cyber Threat Hunting / IOC Hunting
8. Security Architecting Service
a. Network Topology / Architect Examination
b. Evaluation of Security Vendors and Products
c. Overhauling the complete security Architecture
d. Security Hardening
9. Security Assessment and Gap Analysis Service
a. Network Topology / Architect Examination
b. Secure Configuration Auditing
c. Log Analysis for Hunting Security Threats
d. Live Traffic Analysis for Hunting Threats Lurking in the Network
e. Security Policies and Practices Review
10. Incident Readiness Evaluation Service
a. Security Gap Analysis
b. OS and Application Hardening
c. Security Architecting
d. Vulnerability Assessment and Management
11. Managed IT services
a. Managed Firewall
b. Managed IDS/IPS
c. Managed anything IT
12. Security Standards Compliance Implementation
13. Security Standards Compliance Assessment and Auditing
14. Compiling IT Security Policies

Potrebbero piacerti anche