Search
Close this search box.

Blog

It’s Breach O’Clock, Do You Know What Your M(S)SPs Are Doing?

Joe Sarkisian

ABOUT THE AUTHOR

Joe Sarkisian

Manager

Read Bio

AREAS OF EXPERTISE

Financial Services
Healthcare
Manufacturing
Distribution & Retail
Technology

Share

LinkedIn
Facebook
Threads
X
Reddit
Email

During penetration tests, it’s common to find multiple issues for things like weak protocols, poor message signing, IPv6 issues, missing patches, unsupported software, and more. Even if these issues are valid, it is always preferred that alerts/basic telemetry are available. Alerts like these help to stop activity along the attack path.

Frequently, these alerts don’t happen. Data logs don’t exist or they’re buried, which is almost as bad as not existing.

Our job is always to help find the root cause of client issues, and this is one that is particularly hard to solve.

In many instances, we’ve found that our clients are not fully aware of the details of what their managed service provider (MSP) or managed security service provider (MSSP) is doing for them. Specific scope, coverage, parameters, and thresholds for alerting are often unclear or misunderstood. This is not to say that the providers are at fault – most of the time, they’re doing exactly what they’re contracted to do. However, based on testing results, our clients often realize that what they purchased may not be adequate given their security environment and requirements.

Some of the frequent issues and questions we encounter include:

  • Who is responsible for patching?
  • How are assets like third-party software updates and versions maintained?
  • Where are agents installed for telemetry on malicious activity on endpoints?
  • Is malicious activity being monitored both in and out of the network as well as laterally?
  • How are they classifying risk per incident type? For example, a recent client’s MSSP classified password spraying attempts as a medium risk issue that did not warrant a phone call.

A lack of confidence in security posture keeps executives and CISOs up at night. Fortunately, there are things that can be done to help you and your senior leaders sleep better, such as:

  • Reviewing your contract/SLA for terminology outlining service responsibilities within your environment. Pay specific attention to the scope of what is covered, what is being managed, and what is your responsibility.
  • Assessing if the services provided are adequate for your current environment. Oftentimes, MSSPs are more than happy to work with you to update services based on your evolving needs. Consider questions like:
    • Do you have more assets now?
    • Have you changed policies/procedures internally since signing the contract?
    • Do you need a better endpoint protection solution?
    • Have you considered more agent coverage on endpoints for the managed Security Operations Center (SOC) that you’re paying for?
  • Having a meeting with your provider(s) to determine if they have the appropriate environment insight to perform their work. This could include things like the data needed to properly monitor the network for malicious activity, which is a commonly identified issue.
  • Ensure that provider reporting is adequate.
    • Can you read their patch report?
    • Do you know exactly what was patched, what wasn’t, and why?
    • Is your MSSP providing these reports or are you expected to trust them?
  • Confirming you have a person on staff who has the knowledge to work with your provider(s) and can assess if they are adequately performing the contracted services.

Let’s face it: you cannot do everything in-house, meaning the MSSP is a vital piece of the IT/security puzzle. You need to ensure that both you and your providers are working in unison to maintain the security posture of your organization.

CONTACT
Joe Sarkisian

Joe Sarkisian

Joe serves as a Manager on Wolf & Company’s Information Technology (IT) Assurance Team. Joe is responsible for coordinating and…

Read Bio

"*" indicates required fields

Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Connect with a Wolf Expert

"*" indicates required fields

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Newsletter (Insight & Case Study | Wolf Website

"*" indicates required fields

Get the insights that matter.

Stay informed with priority news and key industry updates by filling out the form to subscribe.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

Data Solutions | LinkedIn Ads Form

"*" indicates required fields

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Data Solutions | Page

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

Data Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Connect with a Wolf Expert

"*" indicates required fields

Wolf Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name(Required)

Fintech Inquiry Form

Fill out the form below and our team will reach out to you soon.

Get back to business with accounting support from Wolf & Company.

"*" indicates required fields

Outsourced Accounting Solutions Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

"*" indicates required fields

DenSecure Inquiry Form

Fill out the form below and our team will reach out to you soon.
Name*
This field is for validation purposes and should be left unchanged.

We’re here to help.

"*" indicates required fields

Fill out the form below and our team will reach out to you soon.
Name*
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.