by Anton Chuvakin | January 30, 2015 | Comments Off on My “How to Work With an MSSP to Improve Security” Paper Publishes
My “How to Work With an MSSP to Improve Security” has just published. It took a lot of work, and – at 37 pages – it cannot be called “an MSSP user bible.” However, I think I hit many of the sore spots of client – MSSP relationship and provided guidance on preparing, onboarding and running with the managed service. The abstract states ““Managed security services are a popular, growing, yet somewhat failure-prone approach to information security. This guidance gives security practitioners a structure to shape the managed security service provider relationship and develop joint security processes and architecture for success.”
A few fun quotes follow below:
- “Using an MSSP is not the same as outsourcing security to somebody else. It is integrating with another organization’s security monitoring and system management processes, often using standardized processes at the provider.”
- “It seems that many organizations do not realize that getting maximum value from their MSS relationship requires work on their part — and that the MSSP delivery approach will only be successful if the organization does its share.”
- “Some Gartner clients report difficulties with deciding on the very basic model of monitoring: whether they should use a SIEM product in-house, look for a managed SIEM (where the tool is owned by the organization, but the personnel operating it comes from a third party) or engage with an MSSP.” (like so)
- “While it is seemingly too late to test the provider after the contract is signed, it is not really the case. A relationship with an MSSP calls for ongoing testing, especially during the onboarding phase.”
… Blog posts related to this research on MSSP usage:
- Should I Use “SIEM X” or “MSSP Y”?
- How To Exit an MSSP Relationship?
- MSSP Client Onboarding – A Critical Process!
- MSSP: Integrate, NOT Outsource!
- On MSSP Personnel
- On MSSP SLAs
- Acting on MSSP Alerts
- MSSP Client Responsibilities – What Are They?
- Find Security That Outsources Badly!
- Challenges with MSSPs?
- How To Work With An MSSP Effectively?
Others posts announcing document publication:
- My UPDATED “SIEM Technology Assessment and Select Vendor Profiles” Publishes
- My UPDATED “Security Information and Event Management Architecture and Operational Processes” Publishes
- Our “Selecting Security Monitoring Approaches by Using the Attack Chain Model” Publishes
- My Blueprint for Designing a SIEM Deployment Publishes
- My Evaluation Criteria for Security Information and Event Management Publishes
- My Threat Intelligence and Threat Assessment Research Papers Publish
- My Updated Vulnerability Management Practices Paper Publishes
- My Security Solution Paths Published: Threats and Vulnerabilities
- All My Research Published in 2013
Read Complimentary Relevant Research
Five Golden Rules for Creating Effective Security Policy
Policy writing is a risk communication exercise that is frequently performed by people who lack the skills needed to create good security...
View Relevant Webinars
Office 365 and Google Apps for Work: Security Comparison
Google Apps for Work is increasingly a viable option for many businesses as a replacement for Microsoft Office. As CISOs consider their...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.