respurces_bg.png

Blog

your MSSP security orchestration shopping list | Siemplify

Miguel CarreroMarch 19, 2018

To say that MSSPs have a security orchestration challenge is the understatement of the century. But not just any security orchestration platform can satisfy the multi-tenant requirements of MSSPs.

Businessman drawing business statistics on glass wall

Managed security services providers (MSSPs) can teach a master class on today's threat landscape. With dozens of client environments to monitor, MSSPs get a broad view of what it takes to detect, manage and respond to cyberthreats of all kinds. And don't get us started about all the false positives to be addressed day in and day out.

MSSPs are also in the unique position of needing to understand how to fully leverage the vast landscape of security tools. Whereas an enterprise security operations team (SOC) would need the capabilities to manage one SIEM, for example, an MSSP needs to be prepared to manage a variety of client-selected technologies. From SIEMs and web application firewalls (WAF) to intrusion detection systems (IDS) and anti-malware solutions, MSSPs must be ready to manage them all. 

Below is a quick look at what you should be looking for when exploring security orchestration solutions if you, or someone you love, is part of an MSSP.

Security orchestration table stakes
Security orchestration should provide a centralized security operations platform as the nucleus of its security management. A single console provides MSSPs with a centralized, detailed view of multiple customers. Within the scope of security orchestration are core features and functionality that should be considered table stakes for any organization.

Triage
Streamline alert management and the triage process by eliminating noise, grouping related alerts, and integrating multiple data sources to provide and enrich insight across grouped alerts.

Case Management
Manage the entire SOC through a complete view presented in a single pane of glass, which analysts can use as their primary workbench.

Playbook Library
Accelerate time to value with an out-of-the-box playbook knowledge base that drives the full range of playbook requirements and provides a balance between automation and analyst interaction.

Case Visualization
Visual representation of each case provides intuitive understanding of complex cases and threats in a fraction of the usual time required.

cyber-ontology

Reporting
One-click reporting of activity and KPI measurements to customers. Automation of reporting and distribution process.

Case Reduction & Clustering
Reduces case load via graph contextualization, clustering of contextually relevant cases, and automated case prioritization.

Automation
Automate cumbersome manual processes with machine-speed response. Typical processes ripe for security automation include data normalization, alert filtration and consolidation and case enrichment.

Playbook and Workflow Authoring
Playbook design capability to create and implement analyst-customized workflows (without scripting).

Business Intelligence
Dashboards equipped with the intelligence to measure performance, capacity and efficacy of security operations across multiple clients. These should be flexible and customizable to deliver insight and demonstrate MSSP security operations value.

Additional MSSP requirements
Be sure to look for solutions that go beyond core security orchestration functionality to include these capabilities, tailored to the needs of MSSPs:

  • Adapt workflows for similar use-cases to specific customers
  • Integrate SLA expectations with KPI performance measurement and reporting
  • Provide customer visibility through automated reporting and distributed dashboards
  • Collaboration between MSSP security professionals and customer resources
  • Health monitoring across MSSP customer base

Make sure the foundation is solid
When evaluating a security orchestration solution, MSSPs should also inquire about four key capabilities at the structural level.

Multi Tenancy
Multi-tenancy (at the environmental level, and in terms of data, permissions, dashboard, reporting, and unique customer playbooks) is crucial for any MSSP who wishes to reap the full value of security orchestration across its customer base and to give teams the proverbial single pane of glass access and vision.

MSSP multitenancy

Scalability
The platform must be able to grow with an MSSP’s customer base, requiring flexible and scalable design architecture.

Integration
Given the infinite possible configurations, a security orchestration solution must have the capability to integrate with any environment. Out-of-the-box integrations offer an important solution, as well as an architecture that supports easily expanded integrations with the endless data sets MSSPs will encounter. For example, multiple SIEMs and non-standard alert sources, including e-mails.

MSSP integrations

Flexibility to support various MSSP delivery models
Ability to be deployed locally (for a centralized SIEM environment), remotely (for distributed environments), or as a hybrid.

Let's go shopping
For a deeper look and a full security orchestration shopping list, download our MSSP buyer's guide for security orchestration and automation.

Topics: Security Operations, Security Automation, Security Orchestration

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Subscribe to Email Updates

Top Stories