Vulnerability Management: FAQ
08/29/2024 1 People found this article helpful 39,807 Views
Description
What is Vulnerability Management?
Vulnerability Management (VM) focuses on what makes the most impact on risk to business-critical assets. We deliver actionable risk insights and remediation solutions by continuously scanning your network and identifying exposures from exploitable vulnerabilities.
Who is CODA Intelligence?
CODA Intelligence is a global provider of cloud based cyber security solution that we have partnered with to provide VM services. CODA solutions are built specifically for the MSP. They are easy to deploy, easy to use and easy to maintain with current staff. The CODA platform is MSP ENABLED, empowering partners to provide their clients with a proactive solution to manage and mitigate risk. The MSP owns the relationship with their client and all MRR associated with cloud consumption, managed and professional services.
What are the benefits of using CODA through MSS?
This offering through MSS provides our partners the combined intelligence of the CODA platform and the MSS organization. We provide the product, monitoring and reporting at a reduced price point that is consumption based and month to month. MSS provides our highly praised support and training to make the partner as self-reliant as needed, however, knowing they have a direct contact when an issue arrives that they are not readily available to answer/address. By providing this service, we do not expect our partners to have to hire additional employees to manage a new product. We will prioritize what vulnerabilities should be addressed first to ensure the attack surface is shrinking for you and your customers.
What are the features of CODA?
- Footprint Vulnerability Scans: CODA allows us to deliver actionable risk insights by scanning the endpoints for known vulnerabilities as identified by the NIST CVE database. To ensure accuracy, CODA technology validates if a machines meets all requirements required for the vulnerability to be applicable.
- Machine Hardening: Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. CODA will run the multiple checks on Windows endpoints and report on compliance to these recommended settings.
- Fingerprint Edge Scans: The Network Edge Surface test is an active component that performs a few “non-malicious” web requests in order to assess the level of Network Level protection present in your network’s internet connection point.
Is a Proof of Concept (POC) available?
- Yes, we provide a 14 day Proof of Concept to test all supported CODA features.
- A POC is not required to take advantage of this offering.
Proof of Concept Flow
- 14 Day evaluation period
- A signed quote is required to start the PoC
- Up to 100 endpoints
- We are supporting agent based installs and agent-less for this offering
- Flow of PoC
- Day 1 - Kickoff call
- Ensure access to the console
- Walk-thru console
- Manual install agent on one endpoint
- Introduction to agent-less
- Day 2-6 Installs and scans
- Day 7 - Follow-up Call
- Associated CVE’s & STIG findings
- What in the STIG do we recommend? (failed high?)
- Fingerprint Edge Scans
- Remediation Report
- Day 14 - POC converts to live offering
- Remediation Reports biweekly on the 1st and 15th of the month.
Is there multi-tenancy?
Yes. Partners can choose from a single instance or multi-tenancy configuration.
- Single instance: All customers installed in the same instance and can be logically separated by tags & technical contexts. This will provide a single installation parameter and login/dashboard for partners to view insights into every customer.
- Multi-tenancy: Customers are separated by individual instances using a single login. When a partner logs into the CODA platform, they will be prompted to which instance they would like to initially log into. The partner can navigate to different instance by using a drop down menu on the UI switch between customers. This will provide granularity and separation of customers data and provide the option for customer login access.
Is there 2FA/MFA for the portal?
Currently 2FA/MFA is achieved by enabling Single Sign On (SSO) with your Microsoft 365 account.
Is this Agent based or Agentless
Our offering is both agent based for Windows and MacOS endpoints (Linux pending release) and agent-less via any TCP/IP capable device.
Will this patch the vulnerabilities for me?
No. This offering will identify, alert, and provide remediation recommendations.
What are the responsibilities of partner?
- Management of the implementation process
- Installation of agent
- Provisioning of Agentless Surface
- Address vulnerabilities identified in the Customer Remediation Report
- Providing Tier 1 support to direct end-user customers
- Contacting MSS for any Tier 2 or Tier 3 issues that the partner is unable to resolve
- Monitoring of environment health
- Removal of inactive devices or cloud scanners
What are the deliverables from MSS, Inc.?
- Cloud architecture provisioning
- Training and Support
- Provide training, support, and documentation as outlined per offering details.
- Bi-Weekly Customer Remediation Report provided
How do I contact support?
To contact MSS support, visit https://sgi.myportallogin.com and when asked to select a product, select Vulnerability Management, and then CODA Support.
- Target Analysis & Response Time - 4 Hours (Monday - Friday, 8:00am to 5:00pm EST)
- Target Resolutions Time - 2 Business Days (Monday - Friday, 8:00am to 5:00pm EST)
- After hours & Weekend Support – None
How is this licensed?
- Per installed agent/endpoint or asset.
How am I licensed/billed for this offering?
- This offering is consumption based and month to month.
- Licenses are based off of installed for that month.
- We will audit accounts on the last business day of the month.
- An invoice will be sent on the first business day of the month based on the audited numbers.
- Please email mssaccounting@sonicwall.com for all billing questions/concerns
References
- MSS & CODA Intelligence webinar
- CODA Intelligence Public Technical Knowledge Base
Related Articles
Categories