Managed Security Services (MSS)
The Center for Internet Security® (CIS®), in partnership with Accenture, provides Managed Security Services (MSS) to help U.S. State, Local, Tribal, and Territorial (SLTT) organizations improve their cybersecurity. These services monitor SLTT devices for signs of malicious or anomalous activity, eliminate false positives, and escalate only actionable items as an alert.
MSS alleviates alert and log fatigue by filtering out all of the false positives and only “alerts” on what is impactful. The elimination of false positives saves an organization time and effort in reviewing potential threats. As a result, organizations spend more time focused on their core mission and less time worrying about cybersecurity.
Learn how to get started with Managed Security Services (MSS).
How does MSS work?
CIS offers MSS for devices including, but not limited to, IDS/IPS, firewalls, switches & routers, servers, endpoints, and web proxies.
- A Log Collection Platform is established
- Accenture receives all logs and provides an initial, automated review
- CIS then receives the logs using a secure transmission, and they are analyzed by expert analysts using cyber threat intelligence specifically focused on SLTTs
- Events are analyzed and verified as legitimate or false positives
- If an event requires escalation, an alert is sent to the organization in accordance with pre-established escalation procedures if necessary
- Monthly reporting provided of all activity
The CIS Security Operations Center (SOC)
The Key to Growing Your SLTT’s Cyber Maturity
How does MSS work?
CIS offers MSS for devices including, but not limited to, IDS/IPS, firewalls, switches & routers, servers, endpoints, and web proxies.
- A Log Collection Platform is established
- Accenture receives all logs and provides an initial, automated review
- CIS then receives the logs using a secure transmission, and they are analyzed by expert analysts using cyber threat intelligence specifically focused on SLTTs
- Events are analyzed and verified as legitimate or false positives
- If an event requires escalation, an alert is sent to the organization in accordance with pre-established escalation procedures if necessary
- Monthly reporting provided of all activity
The CIS Security Operations Center (SOC)
The Key to Growing Your SLTT’s Cyber Maturity