Counter Threat Unit™ Threat Intelligence Service Description and

advertisement

Counter Threat Unit™ Threat Intelligence

Service Description and Service Level Agreements

This Service Description and Service Level Agreement is provided for the Customer (“You” or “The

Customer”) and the Dell entity identified in the Customer’s Service Order for the purchase of this

Service (described below). This Service is provided in connection with the Customer’s separate signed master services agreement or security services schedule that explicitly authorizes the sale of managed security services. In the absence of either a master services agreement or security services schedule, this service is provided in connection with Dell’s Commercial Terms of Sale, available at http://Dell.com/CTS and incorporated by reference in its entirety herein.

I.

Definitions

The following definitions shall have the meanings as set forth below:

• Advisories – H igh-criticality threat write ups

• AttackerDB – A database of known malicious attackers determined by analyzing Dell

SecureWorks’ security device data

• Attack – Any malicious attempt to subvert, gain control, or otherwise cause damage to a

Customer network or network equipment

• Counter Threat Unit (“CTU”) research team – Dell SecureWorks’ staff who are dedicated to support the CTU Intelligence Service line.

• Malware – Software developed with a malicious intent, including, but not limited to, trojans, viruses, and rootkits

• Normal Business Hours – 8:30 a.m. 5:30 p.m. Eastern Standard Time

• Dell SecureWorks Customer Portal (“Portal”) – A secure, web-based method used to comonitor the enterprise, generate security reports, update escalation procedures, and make help desk requests

• Threat – Any technique or software used to exploit Vulnerabilities

• CTU IS Data – A ll data provided to Customers as part of the Dell SecureWorks CTU

Intelligence Service line. This includes Vulnerabilities, Advisories, and Threats.

• Truman – A Dell SecureWorks hosted resource for automated run-time analysis of malicious files. Truman can be used to obtain rapid initial assessments of several formats of files: o

Microsoft Windows Portable Executable (PE) Files (.exe) o

Microsoft Windows Dynamic Link Library (DLL) Files (.dll) o

Adobe Portable Document Format (PDF) Files (.pdf)

Truman works by executing sample files in a controlled environment, observing behavior, and characterizing observed behavior against the same countermeasures Dell SecureWorks develops and uses to protect Customer networks.

• Vulnerability – A software flaw that may be exploited to allow a malicious user or code to subvert the software or host operating system

Dell SecureWorks Confidential Page 1 of 13

II.

Service Offerings Component Descriptions

A.

Vulnerability Data Service Description/Deliverables

Dell SecureWorks’ Vulnerability Alerts provide Customers who have subscribed to Dell SecureWorks’

CTU Intelligence Service line with detailed descriptions and analysis of current Vulnerabilities.

Vulnerabilities are processed from a number of public and private data feeds, enriched by Dell

SecureWorks’ CTU researchers, and reported in the Customer Portal. Customers can customize the feed to their individual network via asset and application mapping.

• Comprehensive Vulnerability Data Alerts with expert analysis

• Threat-level evaluation of each Vulnerability

• Customized to the Customer’s network environment

Vulnerability Example

B.

Threat Data Service Description/Deliverables

Dell SecureWorks’ CTU research team will publish detailed decompositions of current Malware or

Threats twice monthly. Often a Threat is a representative sample of Malware code that is selected and decomposed in a detailed Malware report.

• Detailed technical analysis illustrates popular hacker attack vectors and techniques

• Threats are cross-referenced to pertinent Vulnerabilities

Dell SecureWorks Confidential Page 2 of 13

Threat Example

C.

Advisory Data Service Description/Deliverables

Advisory reports contain strategic security information regarding the current Threat landscape.

Typically, these reports are published once a month and include analysis of attack data across Dell

SecureWorks’ monitored security devices.

• Advisories are strategic security reports pertinent to the current security landscape.

• Example Topics: o

Threats we see targeting many of our Customers o

High profile threats (Clampi, Conficker, etc) o

High-criticality threats (Internet Explorer 0-day etc)

Dell SecureWorks Confidential Page 3 of 13

Advisory Example

D.

Microsoft Update Summary Service Description/Deliverables

Within one (1) business day following a Microsoft security patch release, Customers will receive a summary security report from the CTU research team outlining the contents of the Microsoft patch.

Typically, these patches occur once a month on Tuesdays.

• Provided within one (1) business day of a critical Microsoft operating system patch.

• Summarizes all Vulnerabilities including a level of criticality for the overall patch.

E.

Microsoft Update Analysis Service Description/Deliverables

Within one (1) business day following a Microsoft security patch release, Customers will receive a detailed security report from the CTU research team outlining the contents of the Microsoft patch.

Typically, these patches occur once a month on Tuesdays.

• Provided within one (1) business day of a critical Microsoft operating system patch.

• Details all Vulnerabilities including a level of criticality for the overall patch.

Dell SecureWorks Confidential Page 4 of 13

MS Update Analysis Example

F.

Monthly Security Intelligence Webinar Service

Description/Deliverables

On a monthly basis, the CTU Intelligence team will host a security briefing describing current security

Threats and Advisories. This call is open to all CTU Intelligence Services Customers.

• Threat webinar hosted by Dell SecureWorks CTU researchers

• Review of current security concerns and hacker activities

G.

CTU Support Service Description

CTU Intelligence Services Customers may contact a CTU analyst during Normal Business Hours in regards to Intelligence Data, emerging Threats, or other security concerns.

H.

Scaled CTU Support Service Description

CTU Intelligence Services Customers will have support during standard business hours from CTU for escalations related to threat intelligence information, custom malware analysis, and/or focused threat research.

I.

Attacker Database Data Feed Service Description/Deliverables

Dell SecureWorks correlates Attacks across thousands of monitored security devices on a daily basis.

These Attacks are processed into an Attacker Database. A data feed of the Attacker Database is provided to CTU Intelligence Services Customers. This data is updated on a daily basis.

Dell SecureWorks Confidential Page 5 of 13

• The AttackerDB contains lists of malicious IP addresses and domains identified by the Dell

SecureWorks’ MSS business and CTU research analysts.

J.

Malware Analysis Service Description/Deliverables

The Customer may request custom Malware analysis from the CTU research group. The Customer will provide a copy of the Malware to be analyzed along with any related context and/or questions to help focus analysis efforts toward timely and useful results. Dell SecureWorks will analyze the Malware to address Customer requirements and provide a response detailing the analysis results. The response will be delivered via a Customer Portal ticket or another mutually agreeable format.

K.

Targeted Threat Surveillance

Service Description/Deliverables:

Targeted Threat Surveillance proactively provides contextual, researched, actionable host and network threat indicators specific to a customer to inform customer protection and response processes. Targeted Threat Surveillance subscribers will use the Dell SecureWorks Customer Portal to provide a Threat Profile consisting of customer owned network identifiers. CTU researchers will vet the list to ensure customer ownership of identifier contents using such information as Domain and

Internet Number registrar databases as well as other open source resources.

Customer Input

Customer Threat Profile comprised of network identifiers owned by the customer, such as:

• Mission critical IP addresses and host names

• Domain names

• IP address ranges (e.g., CIDR blocks)

• Quantity of Threat Profile identifiers will be determined by contracted service level. (e.g. 10,

25, 50, 100)

Proactive Monitoring For Related Threat Indicators

Dell SecureWorks will proactively monitor multiple intelligence sources for network and host threat indicators related to Customer Threat Profiles, to include:

• Indicators from collected malware processed by our three-stage automation process designed to extract network and host indicators.

• Indicators from our APT research to include network and host indicators from known APT infrastructure and associated tradecraft

• Indicators from botnets monitored by the security experts in our Counter Threat Unit research team

• Indicators from underground threat actor chatter as monitored by Dell SecureWorks

• Indicators from public dump sites such as pastebin.com

During normal business hours, CTU researchers will perform threat research on any identified threat indicators and will deliver contextual Targeted Threat Surveillance to Customer via the Dell

SecureWorks Customer Portal that may include any or all of a) the identified threat indicator, b) related threat indicators identified via link analysis, c) contextual information about observed tools, tactics, and procedures, d) observed attack telemetry based on Dell SecureWorks visibility, and e)

CTU-determined confidence level in the contextual threat indicators.

Dell SecureWorks Confidential Page 6 of 13

L.

Emerging Threat Bulletins (CTU TIPS) Service Description/Deliverables

The CTU research team will provide real-time, emerging threat updates to CTU Intelligence Services

Customers. The Customer will typically receive five (5) updates per week via email. Updates include

CTU researchers’ comments on emerging Threats under investigation, opinions on cyber-attack news, and updates on security concerns currently being investigated by the CTU research team.

• Bulletin data is delivered via email and provides insight into current security topics under the

CTU research teams’ scrutiny. o

Topics are often unverified and may not result in a security Advisory or Vulnerability posting. o

Bulletins are designed to keep the Customer abreast of security issues in real time.

Emerging Threat Example

M.

Weekly Intelligence Summary Service Description/Deliverables

On a weekly basis, a PDF report outlining the last seven (7) days of Threats, Vulnerabilities, and

Advisories will be provided to CTU IS Customers via the Portal. This report also contains the daily CTU

Cyber Security Index across the entire week.

• Provided Monday of every week via email

• Summary reports contain a breakdown of Vulnerabilities identified over the last week and a review of emerging Threat bulletins.

• Alert summary data from more than 30,000 monitored security devices is included when pertinent.

Dell SecureWorks Confidential Page 7 of 13

Weekly Intelligence Summary Example

N.

Bi-Weekly Cyber Security Roundup Service Description/Deliverables

On a bi-monthly basis, a report highlighting the last two weeks of major issues and trends as determined by Dell SecureWorks’ CTU research analysts will be made available to CTU IS the

Customers via the Customer Portal.

• Such report will highlight stories from public news sources with a focus on issues impacting critical infrastructure sectors; and

• Shall be published within one (1) business day of 1st and 15th of each month.

Dell SecureWorks Confidential Page 8 of 13

Delivery Options

A.

Dell SecureWorks Customer Portal Access

All CTU IS Customers will have access to the Portal. The Portal provides reports, search criteria, and a help desk ticketing system.

• The Portal provides on demand access to all Advisories, Threats, and Vulnerabilities via searchable reports.

• Applications can be mapped to assets and assigned a criticality to drive risk reporting and customize CTU IS data.

• The Portal provides a help desk ticketing system that can be used to escalate issues to Dell

SecureWorks’ security operations centers

B.

XML Data Feed (Available to Enterprise CTU IS Offering Only) Service

Description/Deliverables

An XML data feed of Threats, Vulnerabilities, and Advisories is available in the Portal. The XML feed allows CTU IS Customers to export Intelligence data systematically into the Customer’s own ticketing systems.

• All Advisory, Threat, and Vulnerability data is available in XML format from the Portal.

• Typically, a Customer utilizing the XML feed will configure their ticketing system to pull CTU IS data every few hours.

Dell SecureWorks Confidential Page 9 of 13

III.

Service Level Agreements (SLAs)

The following service level agreements (SLAs) shall apply to the CTU Intelligence Services provided hereunder, subject to the terms, conditions and limitations contained herein:

A.

Vulnerability Data

Vulnerabilities have a maximum time to publication based on each Vulnerability’s severity. Time to publication is defined as the time period from when a Vulnerability is disclosed to when it is published in the Dell SecureWorks Customer Portal.

Service Level Commitment

Vulnerabilities will be published within three (3) business days.

• Typically vulnerabilities will be published within 1 business day.

B.

Threat Data

Service Level Commitment

A minimum of two (2) Threat analyses will be provided per month.

C.

Advisory Data

Service Level Commitment

Advisories will be published within one (1) business day for threats meeting the following criteria:

• Critical Severity

• Applies to the majority of Dell SecureWorks Customers

• Low to medium degree of countermeasure coverage by third party devices

• Need for the Customer to take action

D.

Microsoft Update Summary

Service Level Commitment

A Microsoft Update Summary report will be provided within one (1) business day of a critical Microsoft operating system patch.

E.

Microsoft Update Analysis

Service Level Commitment

A Microsoft Update Analysis report will be provided within one (1) business day of a critical Microsoft operating system patch.

F.

Monthly Security Intelligence Webinar

Service Level Commitment

At least one (1) security intelligence webinar will be delivered per month.

G.

CTU Support

The applicable SKU for this service line is: TI-ADDON-CTU

Dell SecureWorks Confidential Page 10 of 13

Service Level Commitment

• A CTU researcher will respond within one (1) business day to escalation by the Customer.

• Up to fifteen (15) escalations per month or six (6) hours of research and phone/email time is allowed.

H.

Scaled CTU Support

Applicable SKUs for this service line are: TI-CTU or TI-CTU-NON-MSS

Service Level Commitment

• Up to 40 hours per month of CTU Support to include CTU Support, Malware Analysis, and focused threat research.

• CTU researchers will respond within one (1) business day of Customer escalations via the

Customer Portal.

• CTU researchers will provide the Customer with access to TRUMAN for self-service automated malware analysis.

• CTU researchers will perform malware analysis at the Customer’s request. The Customer will provide samples for analysis via a Customer Portal ticket in password-protected .ZIP file along with related context / questions. A CTU researcher will provide initial assessment within one

(1) business day via the ticket created by the Customer. The Customer may request additional analysis and/or a formal report based on initial assessment. The CTU team will negotiate further delivery with the Customer based on complexity of issue.

• CTU researchers will optionally participate in a weekly teleconference with the Customer, at the Customer’s direction, to discuss intelligence issues, malware analysis results, and/or focused threat research based on the Customer’s security context.

• CTU researchers will perform focused threat research on request and provide the Customer with relevant intelligence findings, as discovered, which shall be made available to the

Customer via the Customer Portal, teleconferences, or reports, as determined by the parties.

The Customer may request threat research into specific issues of importance. Dell

SecureWorks reserves the right to decline specific threat research requests.

I.

AttackerDB Data Feed

The applicable SKU for this service line is: TI-ADDON-ADB

Service Level Commitment

AttackerDB data is accessible through the Dell SecureWorks Customer Portal in both CSV and XML format.

J.

Malware Analysis Service

The applicable SKU for this service line is: TI-ADDON-MALCODE

Service Level Commitment

• CTU researchers will perform malware analysis at the Customer’s request. The Customer will provide samples for analysis via a Customer Portal ticket in a password-protected .ZIP file along with related context / questions.

• A CTU researcher will provide initial assessment within one (1) business day via the ticket created by the Customer. The Customer may request additional analysis and/or a formal report based on initial assessment. The CTU team will negotiate further delivery with the

Customer based on complexity of issue.

Dell SecureWorks Confidential Page 11 of 13

• Malware analysis requests are limited to sixty (60) hours of total research per contract year.

K.

Targeted Threat Surveillance

Applicable SKUS for this service line are in the format:

SKU: TI-TARGET-#

Service Level Commitment:

• CTU will process Customer Threat Profile input (number of items determined by service level) for inclusion into Customer Threat Profile within one business day of submission by

Customer. Threat Profile items will be vetted by CTU researchers to ensure ownership by

Customer. Where ownership of provided identifiers is in question or analysis may result in information outside of customer specific quality threat indicators (i.e. competitive or unlawful information), the CTU reserves the right to question and/or refuse requested updates to the

Threat Profile.

• CTU will provide contextual, researched, actionable host and network threat indicators to

Customer via the Customer Portal as new threat indicators are identified and analyzed.

L.

Emerging Threat Bulletins

Service Level Commitment

• Bulletins are provided during normal business hours.

• A minimum of five bulletins will be provided each week.

M.

Weekly Intelligence Summary

Service Level Commitment

One summary to be provided weekly.

N.

Bi-Weekly Cyber Security Roundup

Service Level Commitment

Two (2) Cyber Security Roundup reports published per month.

In the event that a Service Level Agreement outlined in this Section IV is not met, the Customer shall be entitled to receive an SLA credit (subject to procedures outlined in the Additional Service Rules,

Regulations, and Conditions section below) equal to 1/30 th of the monthly Service Fee for the applicable Service for each business day that the Service Level Agreement is not met.

Dell SecureWorks Confidential Page 12 of 13

IV.

Additional Service Rules, Regulations, and

Conditions

a.

Initiation of Dell SecureWorks’ services in a Customer network does not achieve the impossible goal of risk elimination;, and therefore, Dell SecureWorks makes no guarantee that intrusions, compromises, or any other unauthorized activity will not occur on the Customer’s network. b.

Dell SecureWorks may schedule maintenance outages with 24-hours’ notice to designated

Customer contacts. c.

The Customer will receive credit for any failure to meet the SLAs outlined above within thirty

(30) days of notification of such failure. In order for the Customer to receive an SLA credit, the notification of the SLA failure must be submitted to Dell SecureWorks within thirty (30) days of the failure. Dell SecureWorks will research the request and respond to the Customer within thirty (30) days from the date of the request. The total amount credited to the Customer in connection with the above SLAs in any calendar month will not exceed the service fees paid by the Customer for such month. Except as otherwise expressly provided, the foregoing shall be the Customer’s exclusive remedy for failure to meet or exceed the foregoing SLAs. d.

Dell SecureWorks may use various methods and tools to probe network resources and publicly available sources for security-related information and to detect actual or potential security flaws and vulnerabilities. Dell SecureWorks expressly disclaims all warranties for its

Intelligence services of any kind, express or implied, to the fullest extent permitted by law, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.

Dell SecureWorks Confidential Page 13 of 13

Download