Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

FORWARD

Shortlisting the right security solution out of the multitude of available options is a challenging journey.
In order to save decision makers’ time and efforts, we have compiled a definitive RFP template that
summarizes all key functionalities that a given solution must comply with to provide sound protection.

In this RFP we have put to action years of accumulated knowledge in regard to what is essential for sound
breach protection, and its purpose is to make it available to decision makers, enabling them to save
research time and speed.

The RFPs were crafted to address the needs of two different groups:

 Endpoint Detection & Response (EDR)– this template addresses the needs of those who seek this
specific product category. This group is also referred as EPP.

 Advanced Persistent Threat (APT) Protection - this template addresses the needs of those who
don’t necessarily constrain their search to a certain product category but seek to gain overall protection
from APTs.
There is a certain degree of overlap between these two groups, since in many cases the initial motivation
to an EDR project is seeking APT protection.
The RFP comprises five sections:

 Monitoring & Control – routine activities to gain visibility and proactively discover and reduce
attack surfaces.

 Prevention & Detection - mechanism to thwart the wide array of commodity and advanced attack
vectors.

 Investigation & Response – overall toolset for efficient reaction to a detected live attack.

 Infrastructure (EDR only) - architecture, deployment, data collection and communication.

 Operation – ongoing management of the solution.


These RFPs aim to map what can be regarded as essential security common denominators. It goes without
saying that each individual decision maker will make adjustments in respect to its organization’s specific
needs and existing products and practices.
How to use the RFP:

 Cut the RFP you need (EDR\EPP or APT Protection).


 Send the RFP you chose to the vendors you evaluate.
 Instruct the vendors to complete the ‘Solution’ column in each section with either ‘Yes,’ ‘No’ or
a verbal description.

The Definitive RFP Templates for EDR/EPP/APT Protection 1


ENDPOINT DETECTION & RESPONSE RFP
This RFP is for organizations that strictly seek EDR solution and divides EDR capabilities into two
groups:

 Basic EDR capabilities are marked in GREEN.

 Advanced EDR capabilities are marked in BLUE.

IMPLEMENTATION SOLUTION

EDR - PREVENTION &


DETECTION
ATTACK TYPE

The solution must identify malicious Signature-based malware protection


files and prevent them from
execution, including viruses, trojans, Machine Learning static analysis
ransomware, spyware, cryptominers Dynamix analysis (a.k.a real time
and any other malware type. Sandbox)
Threat intelligence (VT)
Threat intelligence (non-VT feeds)
The solution must identify malicious Memory access monitoring
behavior of executed files\running
processes\registry modifications\ Process behavioral analysis (heuristics)
memory access and terminate them High similarity (a.k.a. fuzzy hashing)
at runtime, or raise an alert (exploits,
fileless, Macros, Powershell, WMI Threat intelligence
etc.).
The solution must support the Blacklisting malicious IPs and domains
creation of rules to exclude specific
addressed/IP ranges.
The solution must identify and block Process monitoring
privilege escalation attacks.
The solution must identify and block Network traffic monitoring
reconnaissance attacks (scanning).
The solution must identify, and block Memory monitoring
credential theft attempts form either
memory (credential dump, brute User account monitoring (login
force) or network traffic (ARP attempts)
spoofing, DNS Responder).
Network traffic behavioral analysis

The Definitive RFP Templates for EDR/EPP/APT Protection 2


ATTACK TYPE IMPLEMENTATION SOLUTION

The solution must identify and Network traffic monitoring.


block/alert on lateral movement
(SMB relay, pass the hash). Deception via fake nodes.
Deception via fake user accounts.
Deception via fake network
connections.
The solution must identify user Configure user activity policies (policy
account malicious behavior, violation).
indicative of prior compromise.
Profiling user account baseline
(anomaly detection).
The solution must identify malicious Deception via decoy files.
interaction with data files.
The solution must identify data Network traffic monitoring.
exfiltration via legitimate protocols
(DNS tunneling, ICMP tunneling). File access monitoring.

The solution must identify and block Process monitoring.


usage of common attack tools
(Metasploit, Empire, Cobalt etc.).
The solution must have an internal Alert and block upon any tampering or
protection mechanism against access disabling attempt.
and manipulation of unauthorized
users.

The Definitive RFP Templates for EDR/EPP/APT Protection 3


IMPLEMENTATION SOLUTION

EDR – RESPONSE:
INVESTIGATION
& REMEDIATION
CAPABILITY

The solution must  File interaction - create, open, rename, delete,


continuously collect data on execute.
all the entities and their
activities within the  Process execution (including process tree display).
environment.  User login.
 Network traffic.
 Registry changes.
 Installed software.

The solution must support the Search-based on behavioral patterns in all fields of
display of entity and activity coverage (users, files, machines, and network
data. traffic).
Determination of the rules and/or the creation of
warning and/or the determination of the risk level,
based on a response to the search pattern and in
real-time.

Enabling number of users to carry out activities in


parallel, based on user permissions, and without
the need for disconnection of another user for
execution of the activity.

The solution must support Manually submit files to sandbox analysis.


dynamic analysis (a.k.a
sandbox).
The solution must support Search for the occurrence of
cross-organization queries. process/file/network/user activities across all
endpoints in the environment .
The solution must support the  Running process\file.
means to execute forensic
investigation.  Machine level.
 Memory activities.
 Obtain memory dump.

The Definitive RFP Templates for EDR/EPP/APT Protection 4


CAPABILITY IMPLEMENTATION SOLUTI
ON

The solution must support Capability of running a coordinated command


isolation and mitigation of (such as CMD interface).
malicious presence and
activity, locally on the Running script or a file from a network location or
endpoint. mapping a drive.
Shutting down an endpoint and/or a server.
Isolation of an endpoint/ server from the network.

Deletion of a file (including active run files).


Puta file into quarantine (including active run
files).
Kill a process.
Removal and/or deletion of a service/scheduled
task.
Locking a local user account or a domain user.
Zeroing user password.
Blocking telecommunications based on destination
(domain address or IP address).
Disconnection of network cards.
Change of IP address.
Capability of editing a HOST file.
Renewed operation of an end station and/or a
server.
The solution must support Active Directory: disable user, reset password
isolation and mitigation of Firewall/proxy: block IP, block domain, block
malicious presence and port.
activity globally across the
entire environment.
The solution must support Preset response playbooks that are shipped off-the-
response automation. shelf.
Customized response playbooks that are crafted by
the operator.

The Definitive RFP Templates for EDR/EPP/APT Protection 5


IMPLEMENTATION SOLUTION

EDR –
MONITORING
& CONTROL
CAPABILITIES

The solution must Enforce policy on fixed environments to alert on any file
support File Integrity change.
Monitoring (FIM).
The solution must Discover missing security updates within systems and
have built-in applications.
vulnerability
assessment .
The solution must Map and correlate all assets within the environment such
provide the means to as endpoints, servers, installed apps, user accounts and
conduct Inventory generated periodic reports.
Management.
The solution must Collect authentication and activity logs, and retain them
provide log collection for the period of time that is required by various
and retention. regulations.
The solution must Search for malicious presence by known IOC.
include threat hunting.
The solution must Search for risk susceptible files, processes, network
support the discovery connections and user accounts with unchanged passwords.
of unattended attack
surfaces.

The Definitive RFP Templates for EDR/EPP/APT Protection 6


IMPLEMENTATION SOLUTION

EDR -
INFRASTRUCTURE
CAPABILITIES

The solution must have flexible On-prem


server deployment options to
match various types of SaaS
environments. Hybrid
The solution must support rapid Require time for deployment across 5000
and seamless installation across endpoints.
all endpoints/servers in the
environment.
The solution must support Autonomously discover newly added machines
automated distribution on and have the agent installed on them without
endpoints/servers that were need of manual configuration.
joined to the environment
following the initial
installation.
The solution must have a light ~25 MB of system memory (RAM) consumed on
footprint for minimal impact on each endpoint/server.
the endpoint/server
performance. ~2-5% amount of system CPU processing
capacity consumed on each endpoint platform.
The solution must provide an
encrypted communication
between the management
server and the agents on the
endpoints/servers.
The solution must support all EOL systems: Windows XP\Vista, Server 2003
commonly used Operating Windows 7 and above
Systems.
Windows server 2008 R2 and above
Linux main distros: Fedora, Ubuntu, Debian,
Centos, Red Hat, Suse
MAC OSX Maverick and above
The solution must support Granular authentication to the UI.
connection to Active Directory. Deployment to various OU groups with AD.
The solution must co-exist with Seamless operation of the protected
all commodity and proprietary endpoint/server without bluescreens or process
software on the endpoints\ crashes.
servers.

The Definitive RFP Templates for EDR/EPP/APT Protection 7


The solution must provide full Threat protection mechanism that do not rely on
protection for endpoints and connectivity to the management server.
servers that are offline from the
organization’s network.
The solution must collect Eliminate the need of manual configuration of
endpoint, file, process, user rules or policies or reliance of additional devices.
activity and network traffic in a
fully self-sustained manner.

SOLUTION

EDR - OPERATION
CAPABILITIES

The solution must have the ability to specify a list of alert exclusion rules for the
selected objects.
The solution must support deployment on multiple sites that report into a single
management console.
The solution must have the ability to export the current configuration of the
program in order to later be imported to the same or another computer.
The solution must have the ability to enable/disable certain types of notifications.
The solution must have the ability to rate the severity of security alerts.
The solution must provide a central collection and processing of alerts in real-time.
The solution must have the ability to block access to the program settings for end
users.
The solution must provide a central distribution of updates without need of user
intervention and of restarting the endpoint/server.
The solution must have the ability to specify a schedule for downloading updates,
including the ability to disable automatic update.
The solution must assign a risk score to all objects within the protected
environment.
The solution must support the logging of events, alerts and updates.
The solution must support integration with email infrastructure to notify security
personnel in case of alerts.
The solution must support integration with common SIEM products.
The solution must support standardized and customizable reports.

The Definitive RFP Templates for EDR/EPP/APT Protection 8


APT PROTECTION RFP
This RFP is meant to assist those who seek protection from Advanced Persistent Threats without
confining to a single product category (EDR, Network Analytics, UEBA, etc.).

IMPLEMENTATION SOLUTION

APT PROTECTION -
PREVENTION &
DETECTION
ATTACK TYPE

The solution must identify malicious Signature-based malware protection.


files and prevent them from
execution, including viruses, trojans, Machine Learning static analysis.
ransomware, spyware, cryptominers Dynamix analysis (aka real time
and any other malware type. Sandbox).
Threat intelligence (VT).
Threat intelligence (non-VT feeds).
The solution must identify malicious Memory access monitoring.
behavior of executed files/running
processes/registry modifications/ Process behavioral analysis (heuristics).
memory access and terminate them High similarity (a.k.a. fuzzy hashing).
at runtime or raise an alert (exploits,
fileless, Macros, Powershell, WMI Threat intelligence.
etc.).
The solution must support the Blacklisting malicious IPs and
creation of rules to exclude specific domains.
addressed/IP ranges.
The solution must identify and block Process monitoring.
privilege escalation attacks.
The solution must identify and block Network traffic monitoring.
reconnaissance attacks (scanning).
The solution must identify and block Memory monitoring.
credential theft attempts form either
memory (credential dump, brute User account monitoring (login
force) or network traffic (ARP attempts).
spoofing, DNS Responder).
Network traffic behavioral analysis.

The Definitive RFP Templates for EDR/EPP/APT Protection 9


ATTACK TYPE IMPLEMENTATION SOLUTION

The solution must identify and Network traffic monitoring.


block/alert on lateral movement
(SMB relay, pass the hash). Deception via fake nodes.
Deception via fake user accounts.
Deception via fake network
connections.
The solution must identify user Configure user activity policies (policy
account malicious behavior, violation).
indicative of prior compromise.
Profiling user account baseline
(anomaly detection).
identify malicious interaction with Deception via decoy files.
data.
The solution must identify data Network traffic monitoring.
exfiltration via legitimate protocols
(DNS tunneling, ICMP tunneling). File access monitoring.

The solution must identify and block Process monitoring.


usage of common attack tools
(Metasploit, Empire, Cobalt etc.).
The solution must have internal Alert and block upon any tampering or
protection mechanism against access disabling attempt.
and manipulation of unauthorized
users.

The Definitive RFP Templates for EDR/EPP/APT Protection 10


IMPLEMENTATION SOLUTION

APT PROTECTION
– RESPONSE:
INVESTIGATION
& REMEDIATION
CAPABILITY

The solution must File interaction - create, open, rename, delete,


continuously collect data on execute.
all the entities and their Process execution (including process tree display).
activities within the
environment. User login.
Network traffic.
Registry changes.
Installed software.
The solution must support the Search based on behavioral patterns in all fields of
display of entity and activity coverage (users, files, machines, and network
data. traffic).

Determination of the rules and/or the creation of


warning and/or the determination of the risk level,
based on a response to the search pattern, and in
real-time.

Enabling number of users to carry out activities in


parallel, based on user permissions, and without
the need for disconnection of another user for
execution of the activity.

The solution must support Manually submit files to sandbox analysis.


dynamic analysis (aka
sandbox).
The solution must support Search for the occurrence of
cross-organization queries. process/file/network/user activities across all
endpoints in the environment.
The solution must support the Running process/file.
means to execute forensic Machine level.
investigation.
Memory activities.
Obtain memory dump.

The Definitive RFP Templates for EDR/EPP/APT Protection 11


CAPABILITY IMPLEMENTATION SOLUTION

The solution must support Capability of running a coordinated command


isolation and mitigation of (such as CMD interface).
malicious presence and
activity, locally on the Running script or a file from a network location or
endpoint. mapping a drive.
Shutting down an endpoint and/or a server.
Isolation of an endpoint/ server from the network.
Deletion of a file (including active run files).
Puta file into quarantine (including active run
files).
Kill a process.
Removal and/or deletion of a service/scheduled
task.
Locking a local user account or a domain user.
Zeroing user password.
Blocking telecommunications based on destination
(domain address or IP address).
Disconnection of network cards.
Change of IP address.
Capability of editing a HOST file.
Renewed operation of an end station and/or a
server.
The solution must support Active Directory: disable user, reset password.
isolation and mitigation of Firewall/proxy: block IP, block domain, block
malicious presence and port.
activity globally across the
entire environment.
The solution must support Preset response playbooks that are shipped off-the-
response automation. shelf.
Customized response playbooks that are crafted by
the operator.

IMPLEMENTATION SOLUTION

APT
PROTECTION –
MONITORING & The Definitive RFP Templates for EDR/EPP/APT Protection 12
CONTROL
CAPABILITIES

The solution must support Enforce policy on fixed environments to alert on any
File Integrity Monitoring file change.
(FIM).
The solution must have Discover missing security updates within systems and
built-in vulnerability applications.
assessment.
The solution must provide Map and correlate all assets within the environment
the means to conduct such as endpoints, servers, installed apps, user accounts
Inventory Management. and generated periodic reports.
The solution must provide Collect authentication and activity logs and retain them
log collection and for the period of time that is required by various
retention. regulations.
The solution must include Search for malicious presence by known IOC.
threat hunting.
The solution must support Search for risk susceptible files, processes, network
the discovery of connections and user accounts with unchanged
unattended attack passwords.
surfaces.

The Definitive RFP Templates for EDR/EPP/APT Protection 13


SOLUTION

APT PROTECTION - OPERATION


CAPABILITIES

The solution must have the ability to specify a list of alert exclusion rules for the
selected objects.
The solution must support deployment on multiple sites that report into a single
management console
The solution must have the ability to export the current configuration of the
program in order to later be imported to the same or another computer.
The solution must have the ability to enable/disable certain types of
notifications.
The solution must have the ability to rate the severity of security alerts.
The solution must provide a central collection and processing of alerts in real
time.
The solution must have the ability to block access to the program settings for
end users.
The solution must provide a central distribution of updates without need of user
intervention and of restarting the endpoint/server.
The solution must have the ability to specify a schedule for downloading
updates, including the ability to disable automatic update.
The solution must assign a risk score to all objects within the protected
environment.
The solution must support the logging of events, alerts and updates.
The solution must support integration with email infrastructure to notify security
personnel in case of alerts.
The solution must support integration with common SIEM products.
The solution must support standardized and customizable reports.

The Definitive RFP Templates for EDR/EPP/APT Protection 14

You might also like