How security monitoring-as-a-service helps cross the compliance chasm
Focus on your business. Let us help with security monitoring.
We’re huge fans of how many tools there are to make it easier than ever to start, run, scale a business. Cloud services like AWS, GCP, Azure prevent us from having to stand up servers and invest in infrastructure, IT staff. SaaS offerings like GSuite, BambooHR, Xero allow us to outsource components of IT, HR, finance before we need to hire full time staff. Coding tools and collaboration tools like Github, Slack, Zoom, allow team members to scale their impact across geography and timezones. Shared office services like WeWork, Impact Hub, Spaces avoid the need for long term leases when your team is in the early stages of ramping.
One of the ongoing and significant costs for achieving cyber security compliance in standards is the necessity of logging and monitoring. Normally, to build these capabilities in house requires a time intensive process involving hiring skilled staff, technology selection, acquisition, deployment, ongoing use case development and management. For a large organization these costs can run into seven figures, and for a mid-sized organization the capacity and budget to stand up the capability to effectively log and continuously monitor internally can be daunting.
Kobalt provides Cyber Security Monitoring-as-a-Service in order to address these requirements and lets your team focus on their business. Examples of compliance requirements that relate to these services include:
Standard | Description of requirement | Relevant Section |
Centre for Internet Security (CIS Top 20) | Maintenance, monitoring and analysis of audit logs | Section 6, Basic CIS Controls |
Account monitoring | Section 16, Foundational CIS Controls | |
Incident Response (recommendations from Kobalt) | Section 19, Organizational CIS Controls | |
ISACA Control Objectives for Information and Related Technologies (COBIT 5) | Detection, monitoring | Various subsections of DSS, APO, BAI, MEA requirements |
ISO 27001:2013 | Logging and monitoring capabilities | A.12.4 and subsections |
National Institute of Standards and Technology Cyber Security Framework (NIST CSF) | Detection capabilities of anomalies and events, continuous monitoring | Function DE.AE, DE.CM. Recommendation and or/assistance with Functions RS.RP, RS.AN, RS.MI, RS.IM, RC.RP, RC.IM. |
Payment Card Industry Data Security Standard (PCI DSS) | Track and monitor all access to network resources and card holder data | Requirement 10 (plus various detailed requirements in this section) |
There are a long list of other standards that have similar logging and monitoring requirements. In addition to helping to achieve compliance, the increased visibility and ability to address security risks and operational threats have numerous benefits organizations of all sizes. We’d love to hear from you and help you on the journey.