CoreGov – SIEM as a Service
SIEM as a Service transforms machine data into real-time operational intelligence. It enables organisations to search, analyse, monitor, visualise and act on massive streams of data generated by websites, applications, networks, mobile and other devices. The platform includes IT Operations and Service Intelligence, Security and Compliance, and Big Data Analytics.
Features
- Analyse ‘big data’ internet traffic and machine data
- Monitor performance of network infrastructure against Service level Agreements
- Real-time network intelligence, avoid costly network escalations/downtime
- Detect and reduce internal and external cyber threats/abuse
- Provide effective security compliance and reduce costs
- Proactively monitor clients/users understand and anticipate their needs
- Increase security and network management assets productivity
- Consolidate capabilities, reduce platform and application specific tools
- Analyse machine data from systems with varying formats
Benefits
- Fraud and cyber threat detection analysis
- Real time analysis for operational intelligence and business reporting
- Big Data Analytics, machine data from internet/internal network
- Monitor and ensure compliance issues
- Monitor performance against Service Level Agreements
- Monitor non heterogeneous networks with unpredictable formats
- Monitor Logistics RFID and logistics databases machine data (HUMS)
- Monitor and manage internet of things including SCADA data
- Scientific research machine data analytics
Pricing
£250 a gigabyte a month
Service documents
Request an accessible format
Framework
G-Cloud 10
Service ID
6 0 2 0 9 4 1 8 2 2 3 4 5 6 4
Contact
Core
Paul Saer
Telephone: +44 (0) 207 626 0516
Email: webenquiry@core.co.uk
Service scope
- Service constraints
- No known constraints at this time.
- System requirements
- Dependent of client requirments.
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
Core have various options and pricing for support depending on product or service required and whether the support is UK Hours 9am - 5.30pm, Weekends or 24/7.
Response and Resolution Timeframe Severity 1
Incident
Response Time: 60 Mins
Resolution Time: Continuous effort until fixed - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See rate card. Depending on chosen products and services.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Core have various plans available for training. Some training is face to face for administrators but we have extensive user based online training for our SaaS offerings. User documentation is provided where required in electronic format.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Core provide a data extraction service for all of our customer data. 3rd party migration software will be used at an extra cost depending on where the data resides and the amount of data to offboard. Standard day rates apply for this service as per the SFIA rate card.
All data is encrypted while stored in Azure/Aurora and is securely deleted to all government standards for OFFICIAL level data upon termination of service. We can provide data extracts from any of the system run in Azure or we can off board the whole virtual machine upon request, however licensing is not transferable and the client is responsible for ensuring they are compliant with Microsoft and any 3rd party licensing for software that may be running on any system we provide as an extraction request. - End-of-contract process
-
The off-boarding high level process is as follow:
• An authorised client representative formally notifies Core to terminate the service.
• The date and time at which access to the service will be formally agreed.
o All access to servers will cease at this time.
o All networking components / VPN connections will be halted at this time.
• All data requested to be extracted from the servers will be taken out after the access have been cut off. Data extraction fees are on a time and materials basis from the SFIA rate card.
• Once all data extracts are complete all servers for the solution will be programmatically wiped from the IaaS backend including all backups, storage and recovery vaults. This process cannot be reversed once completed and data is permanently wiped and totally unrecoverable once removed.
• Billing for the service will be calculated up to the point at which all servers and services have been wiped from the system and a final bill with usage breakdown will be issued.
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- Yes
- Scaling type
- Manual
- Independence of resources
- Core monitor services for trending growth and add dynamic services as required. The nature of the design in Azure guarantees no impact to end users.
- Usage notifications
- Yes
- Usage reporting
-
- Other
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Other
- Other metrics
-
- Website availability
- Website loadtimes
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Microsoft, Quest, OneIdentity, Beezy, Nintex, K2, Splunk, Darktrace, Nessus
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
-
- Virtual Servers
- Data Drives
- DataBases
- End point devices where required
- Identity Information
- Online services data (Sharepoint, OneDrive, Exchange online)
- Logs
- Backup controls
- At the storage layer we keep 6 copies of the virtual machine disks available. 3 in the primary datacentre and 3 in the secondary datacentre. Replication of the disks is asynchronous so the RPO for replication is a maximum of 5 minutes for the data disks. Because we keep 6 copies live we take backups on a nightly basis which are stored in a recovery plan of 7 days, 4 weeks, 12 months, 1 year. Charging for storage based per TB.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.95%
Severity 1
Incident
Response Time: 60 Mins
Resolution Time: Continuous. 6% of the Daily Charges for the
Service Month in which the incident occurred
if Company does not respond to and resolve
100% of the Severity 1 Incidents within the
Resolution time within a Service Month
Severity 2
Incident
Response Time: 2 hours
Resolution Time: Continuous unless customer ops out 4% of the Daily Charges for the
Service Month in which the incident occurred
if Company does not respond to and resolve
100% of the Severity 2 Incidents within the
Resolution time within a Service Month
Severity 3
Incident
Response Time: 4 hours
Resolution Time: Continuous effort between hours of 9-5 2% of the Daily Charges for the
Service Month in which the incident occurred
if Company does not respond to and resolve
100% of the Severity 3 Incidents within the
Resolution time within a Service Month
Severity 4
Problem
Response Time: 8 hours
Resolution Time: Continuous effort between hours of 9-5 2% of the Daily Charges for the
Service Month in which the incident occurred
if Company does not respond to and resolve
100% of the Severity 4 Incidents within the
Resolution time within a Service Month - Approach to resilience
- Additional information on request but Core apply best practice Azure IaaS build specifications.
- Outage reporting
- Service outages in Azure are publicly available by default. Instance outages and failovers are reported during an outage of any kind. This will be further reported against during the service review meetings.
Identity and authentication
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google apps)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- All support access channels are controls via privileged account management (PAM) with auditing.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Devices users manage the service through
- Dedicated device on a segregated network (providers own provision)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International Limted
- ISO/IEC 27001 accreditation date
- 06/05/2016
- What the ISO/IEC 27001 doesn’t cover
- None
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
Core follow ISO27001 and ISACA COBIT 5 methodology for policy, process and framework. Other connected frameworks that make up our entire managed service and internal IT support service include ITIL, TOGAF and Prince2.
These policies and processes also closely map to the UK Governments Cloud Security Principles.
Our framework is managed directly through the CTO's office at Core where the role of DPO also resides for any GDPR compliancy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Core has a robust and controlled Change Management process. Requests for change (RFC) are evaluated for the intended (and unintended) outcomes. A risk assessment is performed to understand the risk and impact to both the end user and the client entity. The risk of and the impact of failure is calculated as high, medium or low. The RFC requires three signatories (Platform operations, Platform Security and Service Operations) for the change to be implemented. Services, components, and required changes are tracked through the Service catalogue and Change processes. The service lifetime is aligned to Microsofts product, technology and service lifecycle.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Core have Nessus Cloud and Microsoft System Centre Configuration Manager deployed across all servers and desktops. These products back each other up to provide up to date information on known vulnerabilities and patching requirements. We also use a variety of Microsoft licensed products (but this depends on our client purchasing and risk profiles. These include Cloud App Security, Advanced Threat Protection (Email and endpoint) and Azure Security Centre.
Patches are applied as soon as we receive an alert (so within 24 hours of information dissemination). - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Compromises are identified instantly through DLP and Information Protection Policies. Security Incident response is dependent on whether the client wants to purchase this from Core but typically as soon as an event is triggered or observed. This will then be followed up in accordance with contract SLAs or OLAs.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Core run an ITIL compliant helpdesk and incident management approach. All calls can be made directly to our 24/7 ServiceDesk function. Reports will be generated by the incident team and delivered to the client via the service delivery manager.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Third-party
- Third-party virtualisation provider
- Azure
- How shared infrastructure is kept separate
- Most Microsoft business cloud services are multitenant services, meaning that your data, deployments, and virtual machines may be stored on the same physical hardware as that of other customers. Microsoft uses logical isolation to segregate storage and processing for different customers through specialized technology engineered to help ensure that your customer data is not combined with anyone else’s.
Energy efficiency
- Energy-efficient datacentres
- Yes
Pricing
- Price
- £250 a gigabyte a month
- Discount for educational organisations
- No
- Free trial available
- No