Security Operation Centre

A Prior Information Notice
by WEST YORKSHIRE COMBINED AUTHORITY

Source
Find a Tender
Type
Contract (Services)
Duration
not specified
Value
£0-£250K
Sector
TECHNOLOGY
Published
28 Apr 2023
Delivery
not specified
Deadline
n/a

Concepts

Location

Yorkshire and the Humber: Leeds

Geochart for 1 buyers and 0 suppliers

Description

West Yorkshire Combined Authority would like to procure an external party to implement Microsoft's Sentinel System Incident Event Monitoring (SIEM) tool into its Azure environment. The Combined Authority require security events, that are captured and correlated by the SIEM solution, to be monitored 24/7 using an externally hosted Security Operations Centre (SOC). The Combined Authority will leverage the security alerts provided by the SOC: • To understand where the Combined Authority needs to focus its resources to maximise its cybersecurity posture. • To detect and respond to threats, keeping the information held on systems and networks secure. • To increase resilience by learning about the changing threat landscape (both malicious and non-malicious, internal and external) • To identify and address negligent or criminal behaviours. To derive business intelligence about user behaviours to shape and prioritise the development of technologies.

Total Quantity or Scope

In January 2022, the Combined Authority received several recommendations from the Department Levelling Up, Housing and Communities (DLUHC). A number of these recommendations centred round a central logging solution and the ability to monitor events and act on alerts. Specifically, the following recommendations were stated: • Identify a suitable solution which is the best fit for the Combined Authority by carrying out an assessment of key log sources, required alerts and cost. • Upon implementation of a centralised logging solution ensure that log retention is documented and agreed. • Upon implementation of a centralised logging solution, automated log analysis and correlation functionality and a formal log incident triaging process should then be developed and documented. The SIEM solution must be able to provide a centralised logging solution which receives logs from all the Combined Authority’s endpoints, network devices and applications. The SIEM will primarily be for security event capture and alerting, not necessarily capturing non security technical events. The SOC must be able to monitor and respond to the SIEM alerts on a 24/7/365 basis. Alerts which are of sufficient interest must be reported to ICT Services as per the Combined Authority’s ICT incident response process and within agreed Service Level Agreement (SLA) time frames. The Combined Authority’s Target Operating Model has considered both threats and assets. Threat analysis has taken into account the higher level of public awareness the Combined Authority has gained since it has become a Mayoral Authority. The Threat Actor Sophistication has been assessed using the Stix v2.1 framework. The Combined Authority’s threat actor sophistication is expected to range from none to intermediate and potentially advanced, as per the framework. The Combined Authority faces several threats, typical of many government organisations. These threats range from data loss of sensitive Combined Authority data, ransomware, fraud via social engineering using attack vectors like phishing and smishing, to specific threats to a person of interest, such as politically or criminally motivated hacking attacks against the mayor and / or the Police & Crime Commissioner.

CPV Codes

  • 72000000 - IT services: consulting, software development, Internet and support

Other Information

** PREVIEW NOTICE, please check Find a Tender for full details. **

Reference

Domains