Standards of Service

Hardware Requirements:

 

  1. Network Infrastructure:

- Routers, switches, and firewalls capable of handling the network traffic and security requirements of the organization.

- Intrusion Detection and Prevention Systems (IDPS) appliances or software.

- Network equipment replacement cycle: Recommended 3-year cycle for upgrading or replacing firewall/security appliance. 5 year lifecycle on network switches and wireless infrastructure components to ensure optimal performance, security, and compatibility with evolving technologies.

 

  1. Servers:

- Sufficient server infrastructure to support the MSSP's security services and management systems.

- This may include dedicated servers for security monitoring, SIEM, vulnerability scanning, and other security-related tasks.

- Server replacement cycle: Recommended 5-year cycle for upgrading or replacing servers to maintain performance, reliability, and supportability.

 

  1. Storage:

- Sufficient storage capacity to retain security logs, event data, and backups.

- Redundant storage systems for data protection and fault tolerance.

 

  1. Security Appliances:

- Dedicated security appliances such as firewalls, intrusion prevention systems, and data loss prevention systems.

- Hardware-based encryption devices or modules for secure communications and data protection.

 

  1. Monitoring and Analysis Tools: (Installed and covered Under Mountaineer IT Agreement)

- Network monitoring tools, including packet capture devices or network taps.

- Security analytics platforms for analyzing security events and logs.

 

  1. Backup and Recovery Systems: (Installed and covered Under Mountaineer IT Agreement)

- Backup servers or appliances for storing backup data.

- Tape libraries or cloud-based backup services for offsite backups.

 

Software Requirements:

 

  1. Security Information and Event Management (SIEM) Software: (Installed and covered Under Mountaineer IT Agreement)

- A robust SIEM platform for collecting, analyzing, and correlating security events and logs from various sources.

- Log management and analysis software to identify potential security incidents.

 

  1. Threat Intelligence Platforms: (Installed and covered Under Mountaineer IT Agreement)

- Tools or services that provide real-time threat intelligence feeds, vulnerability data, and security advisories.

 

  1. Vulnerability Assessment and Management Software: (Installed and covered Under Mountaineer IT Agreement)

- Software for scanning and assessing systems and applications for vulnerabilities.

- Patch management tools for tracking and applying security patches.

 

  1. Antivirus and Anti-Malware Software: (Installed and covered Under Mountaineer IT Agreement)

- Endpoint protection software for workstations, servers, and mobile devices.

- Network-based antivirus and anti-malware solutions for email and web traffic.

 

  1. Firewall and Network Security Software:

- Firewall management software for configuring, monitoring, and managing firewall devices.

- Intrusion detection and prevention system (IDPS) software for detecting and preventing network intrusions.

 

  1. Encryption Software:

- Encryption software for securing sensitive data at rest and in transit.

- Full-disk encryption for laptops and mobile devices.

 

  1. Security Assessment Tools: (Installed and covered Under Mountaineer IT Agreement)

- Tools for conducting vulnerability assessments, penetration testing, and security audits.

- Web application security scanners for identifying vulnerabilities in web applications.

 

  1. Remote Access and Support Tools: (Installed and covered Under Mountaineer IT Agreement)

- Remote access software for providing support and troubleshooting to clients remotely.

- Secure remote control software for accessing client systems securely.

 

  1. Compliance and Reporting Tools: (Installed and covered Under Mountaineer IT Agreement)

- Tools for generating compliance reports and conducting security audits.

- Reporting software for providing clients with regular security status updates.

 

  1. Ticketing and Incident Management Systems: (Installed and covered Under Mountaineer IT Agreement)

- Ticketing systems for managing and tracking security incidents.

- Incident management platforms for coordinating incident response activities.

 

Other Requirements:

 

  1. Business-Grade Email Service:

- Expectation of business-grade email services such as G Suite or Office 365 for efficient and secure communication, email filtering, and archiving.

 

Equipment Replacement Cycles:

 

- Network equipment replacement cycle: Recommended 3-year cycle for upgrading or replacing firewall/security appliance. 5 year lifecycle on network switches and wireless infrastructure components to ensure optimal performance, security, and compatibility with evolving technologies.

 

- Workstation replacement cycle: Recommended 5-year cycle for upgrading or replacing workstations to maintain performance, reliability, and supportability.

 

- Server replacement cycle: Recommended 5-year cycle for upgrading or replacing servers to maintain performance, reliability, and supportability.

 

These replacement cycles help ensure that the hardware and software components remain up to date, minimize the risk of hardware failures, and provide adequate performance and security for the MSSP's operations and services.