There is a lot of confusion around the term MSSP (Managed Services Security Provider). What are they? What do they do? What is their value? Can’t I just do that myself?
The term MSSP had its genesis in the internet service providers (ISPs) in the 1990s the ISP provided a firewall with the internet service, would manage that firewall for you for an additional fee. Over time MSSPs began to evolve, where in addition to managing your firewall they would start monitoring it. “Monitoring” meant they would collect firewall system messages then, utilizing their Security Operation Center, analyze any events that triggered based on Indicators of Compromise (IOC). This could include services such as up/down statistics and bandwidth monitoring however all monitoring was isolated at the customers perimeter firewall.
The MSSP evolved into what was mainly referred to as a Managed Security Information and Event Management (SIEM). SIEM continued to evolve as did the threats. Today most MSSPs are include threat hunting where instead of just monitoring logs, they are using threat intelligence to determine the adversary’s objective, then detect and potentially disrupt the adverse action. At a high level the threat hunters are correlating events, actively investigating abnormal network activity through packet captures, and analyzing data collected from endpoints. Advanced MSSPs such as Foresite utilize business rules to sift down the large amounts of data and weed out the false positives programmatically, so that the humans can refine their tactics, techniques, and procedures (TTPs) to be solely focused on disrupting the adversaries ‘action on objectives’. With MSSPs evolved to this level they have a new term – Managed Detection and Response (MDRs).
It makes complete sense that these services would evolve in this way. Log management and analysis naturally leads to uncovering incidents (threat hunting), and thereby incident response. One large part of the incident response is finding artifacts and evidence often contained in the logs. All these things fold together like different teeth of the same gear.
Can’t we do that ourselves?
If you have the resources and budget for the necessary tools and personnel it is possible to deploy a solution in house. This would require a dedicated team and a SOC providing the expertise to evaluate threats and expensive tools, such as a SIEM, to help correlate and triage events There are some common pitfalls that make the effort to deploy a SIEM difficult:
The benefit of outsourcing these controls to an MSSP such as Foresite is that we can help with each of these issues. Our Solutions Architects will help you plan and scope. Our experience helps us to know what we need to monitor to get context. During onboarding we will be asking the right questions to learn where the crown jewels are, what your drivers are (i.e. compliance, alerts, threat management, etc.). Our SOC and Solutions Architects are trained and certified. They have numerous opportunities within a pure play security and compliance company to keep them engaged and interested.
An additional value of this type of service is the storage of logs. These logs are often mandated by regulation to be stored, securely, for a time period, usually measured in years. Most MSSPs have certified storage and encryption and are adjustable based on your needs, for how long they can store the logs.
MSSP Utopia
So is that it? I just sign up with Foresite or another MSSP and I am good to go? As with any type of software or service there are steps you can take to make the relationship a success.
Getting There
It is an incredibly exciting time to be in Information Security. On the one hand, we see the threats and the breaches increasing day over day, month over month, year over year. However, we also have innovative and intelligent tools to prevent and detect the bad event. An MSSP could be another tool in your belt to assist your organization not to be the next victim of a security breach.