Outsourcing network security

This is part two of the xSP Insider's focus on Managed Security Service Providers. This edition offers advice on how to effectively negotiate service level guarantees when outsourcing your network security services.

Outsourcing network security -- Negotiating service level guarantees

According to the 2001 Top Ten Technology list published by The American Institute of Certified Public Accountants (AICPA), information security and control ranks as the number one concern in the CPA profession. However, many companies simply cannot afford implementing and maintaining best-in-class network security solutions and 24x7 monitoring. As a result, many companies are turning to Security Service Providers (SSP) to help them assess security vulnerabilities, develop security policies, plan security initiatives, design firewall and VPN implementation, perform 24x7 monitoring, and take care of maintenance and upgrades.

With security being such a critical issue, many companies want providers to sign ironclad service level agreements (SLA) that will guarantee network integrity. However, according to Steve Munroe, chief operating officer for Interliant, a global provider of managed application hosting and professional consulting services, securing a network is a joint effort that depends as much on the company's ability to manage security as it does on the infrastructure.

"If network security policies are nonexistent or ignored, if a former employee's

    Requires Free Membership to View

password remains open, or if unauthorized personnel have access to backup tapes or servers, no amount of technology will protect the network from vandalism," Munroe said. "In addition, the very network architecture, itself, may make it more vulnerable to attack."

Munroe said companies can negotiate SSP service level agreements that will increase their level of protection. "Response time can be critical if your network is attacked by hackers or a virus. So, make sure your SLA requires your SSP to dive in and fix these problems immediately. Also document how quickly they will address system errors and ongoing administrative tasks such as making rules base changes."

Upgrades and patches are also vital for preserving network integrity. "If you purchase a virus scanning offering, find out how up-to-date their virus signature files are and what database they're using," Munroe said. "Get them to spell out in the SLA how quickly they will update tables when a new virus hits. Also negotiate time frames for installing security patches for operating systems, managed security devices, and application software."

Purchasing insurance to cover losses caused by security breaches is expensive, and many times impossible. "We don't see insurance companies offering policies unless the network is a certified infrastructure," Munroe said. "However, you can make sure your security service provider is certified. For example, if they've passed an AICPA SAS70 audit, you can be reasonably certain that they have practices, policies and standard operating procedures in place that will allow them to perform as expected."

About the author
Linda Christie is a contributing editor based out of Tulsa, Okla.

Related book

The complete guide to IT service level agreements: Matching service quality to business needs
By Andrew Hiles
Covering all aspects of service level agreements, this essential manual is a step-by-step guide to designing, negotiating and implementing SLAs into your organization. It reviews the disadvantages and advantages, gives clear guidance on what types are appropriate, how to set up SLAs and control them.

This was first published in July 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.