Modern Security Operations Managed Security Service Workshop

NTT DATA Inc.

NTT DATA’s Workshop for Modern Security Operations Powered by Sentinel is designed to update clients about Microsoft Sentinel within their Azure environment.

NTT DATA’s WOrkshp for Modern Security Operations Powered by Sentinel is designed to share information of Microsoft Sentinel and its fit within the client’s Azure environment using agreed upon design criteria. Our workshop is split into four phases, some of which may be iterative based on the complexity and scope of the customer’s environment which may affect the duration and cost for the project.

Phase One: Sentinel Baseline Configuration

  • If not already active in the customer’s Azure environment, install and configure Microsoft Defender for Cloud
  • Built-in Microsoft connectors will be onboarded to provide rich data insights that will be surfaced with the Microsoft Sentinel console
  • Non-Microsoft data connectors (i.e. AWS via CloudTrail) will be enabled within Microsoft Sentinel
  • Associated Defender for Cloud metrics and controls discussed as critical priorities during the advisory workshops will also be enabled
  • Installation of one SysLog or CEF Agent on supported Linux virtual machine for event collection and forwarding to Sentinel
  • Connect up to two subscribed Threat Intelligence feeds supported by Sentinel. Note: Azure Active Directory Global Admin or Application Admin will be required.

Phase Two: Workbook and Policy Development

  • Up to five workbooks will be created to surface deeper insights on critical use cases the client wishes to assess at a more granular level, as determined during the advisory workshop engagement
  • Import existing Watchlists based on current threats and provide templates for development of additional watchlists

Phase Three: Workflow Automation Creation

  • Workflows can include all subscriptions or in-scope resources (at scale), or be scoped to specific environments, subscriptions or workloads
  • Develop agreed workflows for in-scope resources
  • Work with the client’s technical team to test the workflows to verify the remediation action aligns to the trigger

Phase Four: Enabling Controls

  • Enroll additional log sources to meet design criteria
  • Assess security patterns from the captured alerts received after Defender for Cloud and Sentinel implementation phases
  • Adjust automated governance activities and policies as indicated by the alert behaviors and patterns, with the client’s approval
  • Finalize documentation required for managed services and steady-state support

https://store-images.s-microsoft.com/image/apps.9106.b6fe69ad-f964-4a69-a2c2-62cd669f6029.d6a0317b-c06e-455a-b06e-9b0acf52f092.7b1aefc0-4b48-4f28-be35-0b822180d290
https://store-images.s-microsoft.com/image/apps.9106.b6fe69ad-f964-4a69-a2c2-62cd669f6029.d6a0317b-c06e-455a-b06e-9b0acf52f092.7b1aefc0-4b48-4f28-be35-0b822180d290