Modern Security Operations Managed Security Service, powered by Sentinel: 3-month Implementation

NTT DATA Inc.

NTT DATA’s Implementation for Modern Security Operations Powered by Sentinel is designed to implement Microsoft Sentinel, enroll log sources and implement automation in the client’s Azure environment.

NTT DATA’s Implementation for Modern Security Operations Powered by Sentinel is designed to implement Microsoft Sentinel, enroll log sources and implement automation in the client’s Azure environment using agreed upon design criteria. Our implementation approach is split into four phases, some of which may be iterative based on the complexity and scope of the customer’s environment which may affect the duration and cost for the project.

Phase One: Sentinel Baseline Configuration

  • If not already active in the customer’s Azure environment, install and configure Microsoft Defender for Cloud
  • Built-in Microsoft connectors will be onboarded to provide rich data insights that will be surfaced with the Microsoft Sentinel console
  • Non-Microsoft data connectors (i.e. AWS via CloudTrail) will be enabled within Microsoft Sentinel
  • Associated Defender for Cloud metrics and controls discussed as critical priorities during the advisory workshops will also be enabled
  • Installation of one SysLog or CEF Agent on supported Linux virtual machine for event collection and forwarding to Sentinel
  • Connect up to two subscribed Threat Intelligence feeds supported by Sentinel. Note: Azure Active Directory Global Admin or Application Admin will be required.

Phase Two: Workbook and Policy Development

  • Up to five workbooks will be created to surface deeper insights on critical use cases the client wishes to assess at a more granular level, as determined during the advisory workshop engagement
  • Import existing Watchlists based on current threats and provide templates for development of additional watchlists

Phase Three: Workflow Automation Creation

  • Workflows can include all subscriptions or in-scope resources (at scale), or be scoped to specific environments, subscriptions or workloads
  • Develop agreed workflows for in-scope resources
  • Work with the client’s technical team to test the workflows to verify the remediation action aligns to the trigger

Phase Four: Enabling Controls

  • Enroll additional log sources to meet design criteria
  • Assess security patterns from the captured alerts received after Defender for Cloud and Sentinel implementation phases
  • Adjust automated governance activities and policies as indicated by the alert behaviors and patterns, with the client’s approval
  • Finalize documentation required for managed services and steady-state support

https://store-images.s-microsoft.com/image/apps.17309.6b240951-bc2d-49d6-a576-6da37d9b5e28.905f52f6-7c38-4e3b-b2e3-7477fab561d2.d01c26cd-3498-47cd-a32c-26453afb469f
https://store-images.s-microsoft.com/image/apps.17309.6b240951-bc2d-49d6-a576-6da37d9b5e28.905f52f6-7c38-4e3b-b2e3-7477fab561d2.d01c26cd-3498-47cd-a32c-26453afb469f