| www.ManagedSecurityServices.org | |||
| Managed IT Services | Governance Risk Compliance (GRC), Audit | Account Planning | What, When, How, Who |
| Strategic Priorities | |||
| Stakeholder Management | Stakeholder Heatmap | ||
| RACI | |||
| Contractual Deliverable Management | SLA and KPI Management | ||
| Contractual Deliverables | |||
| Contract Change Management | |||
| Risk Management | Business Risk | ||
| Operational Risk | |||
| Compliance Management | Security Policy | ||
| Hardening Standards | |||
| Secure Software Development Framework (SSDF) | |||
| Compliance Gap assessment and Remediation | |||
| Reporting and Communication | Daily, Weekly, Monthly, Quarterly meeting | ||
| Periodic Reports | |||
| Ad hoc Reports & Meeting | |||
| Audit Management | Internal Review & Audit | ||
| External, Regulatory, Compliance Audit | |||
| Audit Gap and Remediation | |||
| Issue Management | Service Improvement Plan (SIP) | ||
| Back to Green Plan | |||
| Resiliency, Business Continuity Plan (BCP) | Annual DR Drill | ||
| Table Top Drill | |||
| Vendor Management | |||
| People Process Technology | Automation and Continous Improvement | ||
| People Management | Onboarding and Offboarding | ||
| Skill Gap assessment, Training, and Career Planning | |||
| Attrition and Knowledge Management | |||
| Work Shift Management, Team Building, Team Motivation | |||
| Agile Squad, Social Contract, Daily Standup | |||
| Process and Documentation | Standard Operating Procedures (SOP) | ||
| Architecture and Technical documents | |||
| Process Owner, Document Owner | |||
| Periodic Review and Sign Off | |||
| Artifacts/Documents Secure Storage & Management | |||
| Asset & Inventory Management | Hardware Assets | ||
| Software Assets | |||
| Third Party Vendor Products | |||
| Finance Mgmt. & Upsell | Revenue Management | Base Contract Revenue | |
| New Business & RFS Management | |||
| Fixed Baseline Revenue | |||
| Variable Revenue | |||
| Cost Management | Labor Cost | ||
| Hardware Cost | |||
| Software Cost | |||
| 3rd Party Vendor Cost | |||
| Rated Services Cost | |||
| Capex Spending | |||
| SLA Penalty | |||
| Forecasting, Manage Plan Vs Actual | |||
| Billing, Billing Dispute Management | |||
| Client Management | Client Relationship | Relationship Mapping | |
| Client Satisfaction | Objective Setting | ||
| Quantitative Feedback Survey | |||
| Medallia Net Promoter Score | |||
| Informal / Qualitative / Subjective feedback | |||
| Client Communication & Reporting | Communication Plan | ||
| Client Escalation & Compliant | Escalation Matrix | ||
| Contract Negotiation | |||
| Third Party Security | Third Party Security Assessment (TPSA) | ||
| Gap Analysis and Remediation | |||
| Physical Security | 24x7 Physical Security Monitoring | ||
| Physical Media Management | |||
| Physical Device Security | |||
| Perimeter Security | |||
| Access Control | |||
| Natural Disaster | |||
| Manmade Disaster | |||
| IOT, OT Security | |||
| Human Resource Security | Screening & Onboarding | ||
| Security Awareness & Training | |||
| Offboarding | |||
| Defense against Social Engineering | |||
| Application | Architecture (TOGAF) | ||
| Agile Application Development | DevSecOps | ||
| Design | |||
| Build | |||
| Test & Quality | |||
| Release Management | |||
| Application Maintenance | |||
| Application Lifecyle Management | |||
| Vendor Products & Services | |||
| 24x7 Operations | |||
| Dev, Test, Integration, Prod environment mgmt. | |||
| Cloud & Infrastructure, Network | Compute | ||
| Storage | |||
| Backup | Periodic Restoration Test | ||
| Network | Routers, Switches, Loadbalaner, Wifi | ||
| SDWAN, MPLS | |||
| 24x7 IT Operations | Incident Management | ||
| Major Incident Management | |||
| ITIL Management functions | RCA/Problem Management | ||
| Change Management | |||
| Capacity Management | |||
| On-prem Cloud Migration & Integration | |||
| Cyber Security | 24x7 Security Operations Center (SOC) - SIEM, XDR, SOAR | Detection & Analysis | |
| Incident Response & Recovery | |||
| Major Incident Management (MIM) | |||
| Cyber Threat Intelligence (CTI) | Open Source Intelligence (OSINT) | ||
| CTI Vendors | |||
| Internal Source | |||
| Indicators of Compromise (IoC) | |||
| Tactics Techniques and Procedures (TTP) | |||
| Advanced Persistent Threats (APT) | |||
| Offensive Cyber Defense | Red Teaming/Purple Teaming/Pentest/Ethical Hacking | ||
| Honeypots | |||
| Attack Vectors and Counter Measures | |||
| Vulnerability Management | Vulnerability Scanning | ||
| Vulnerability Assessment (CVE) | |||
| Risk based Prioritisation | |||
| Remediation Plan | |||
| Risk based Patching, Hotfix, Periodic system reboot | |||
| Rescan to validate, Ongoing Monitoring | |||
| Identity and Access Management (IAM) | Previlige Access Management | ||
| Password Policy and Enforcement | |||
| Quarterly Access Revalidation | |||
| BAU Security Operations | RCA/Problem Management | ||
| Change Management | |||
| Capacity Management | |||
| Release Management | |||
| EOS/EOL Management | |||
| Security Design, Build, Transition, Retire | Security Design & Building | ||
| Project Implementation | |||
| Security Service Onboarding | |||
| Secure Decommission & Disposal | |||
| Application Security | DevSecOps | ||
| Application Security Testing (Static, Dynamic, Automated, Manual) | |||
| API Security | |||
| DDoS Protection | |||
| Web Application Firewall (WAF) | |||
| Application Whitelisting | |||
| Network Security | Physical & Virtual Firewall | ||
| Intrusion Prevention System (IPS), Intrusion Detection System (IDS) | |||
| Routers, Switches, Loadbalancer Security | |||
| Wifi Intrusion Prevention System | |||
| Wireless, Bluetooth Security | |||
| Data Loss Prevention (DLP) | |||
| Zero Trust Network Access (ZTNA) | |||
| Micro-Segmentation | |||
| Cloud & Infrastructure Security | DMZ Architecture | ||
| Backup & Restoration | |||
| Cloud Security Controls | |||
| Cloud Access Security Broker (CASB) | |||
| Next-Generation Secure Web Gateway (NG SWG) | |||
| End Point Security | Email Security | ||
| Browser Isolation | |||
| Anti-virus | |||
| Remote Access, Virtual Private Network (VPN) | |||
| Bring Your Own Device (BYOD) | |||
| Mobile Device Security | |||
| Device Encryption | |||
| Security Log Management |