Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California



Similar documents
Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

System Management. What are my options for deploying System Management on remote computers?

How To Write A Request For Information (Rfi)

GFI Product Manual. Deployment Guide

Cisco Application Networking Manager Version 2.0

TSM Studio Server User Guide

The syslog-ng Store Box 3 F2

Configuration Information

Request for Proposal. Contract Management Software

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Symantec Security Information Manager Administrator Guide

CALNET 3 Category 7 Network Based Management Security. Table of Contents

OpManager MSP Edition

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Configuration Information

Symantec Security Information Manager 4.8 Release Notes

SapphireIMS Business Service Monitoring Feature Specification

DiskPulse DISK CHANGE MONITOR

Enterprise Manager. Version 6.2. Administrator s Guide

Alliance Key Manager A Solution Brief for Technical Implementers

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

HP A-IMC Firewall Manager

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

McAfee Web Gateway 7.4.1

SapphireIMS 4.0 BSM Feature Specification

Log Management and SIEM Evaluation Checklist

Copyright 2013 Trend Micro Incorporated. All rights reserved.

City of Richmond Business and Financial Services Department. Contract 4595P. Security Information Event Management System

mbits Network Operations Centrec

Symantec Security Information Manager 4.5 Administrator's Guide

OnCommand Unified Manager

Information Technology Policy

GFI White Paper PCI-DSS compliance and GFI Software products

IBM Security QRadar Vulnerability Manager Version User Guide

GE Measurement & Control. Cyber Security for NEI 08-09

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

F-Secure Messaging Security Gateway. Deployment Guide

McAfee Content Security Reporter 2.0.0

Information Security Office. Logging Standard

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

McAfee Network Security Platform 8.2

Purchasing and Property Services AOC East Fowler Avenue Tampa, Florida (813)

Symantec Security Information Manager 4.6 Administrator's Guide

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Configuration Guide. Websense Web Security Solutions Version 7.8.1

Avatier Identity Management Suite

TOTAL VIEW ONE Technical FAQ

Teleran PCI Customer Case Study

echomountain Enterprise Monitoring, Notification & Reporting Services Protect your business

Guideline on Auditing and Log Management

Ovation Security Center Data Sheet

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

What s New in Centrify DirectAudit 2.0

Symantec NetBackup OpenStorage Solutions Guide for Disk

MySQL Security: Best Practices

CiscoWorks Resource Manager Essentials 4.1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Features - Microsoft Data Protection Manager

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

XpoLog Center Suite Data Sheet

Brown County Information Technology Aberdeen, SD. Request for Proposals For Document Management Solution. Proposals Deadline: Submit proposals to:

Extreme Networks Security Log Manager Administration Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

FISMA / NIST REVISION 3 COMPLIANCE

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Altiris Monitor Solution for Servers 7.1 SP1 and Event Console 7.1 MR1 from Symantec Release Notes

Symantec Security Information Manager Release Notes

SapphireIMS 4.0 Asset Management Feature Specification

Installation Guide for Pulse on Windows Server 2012

Statement of Work Security Information & Event Management (SIEM) December 20, 2012 Request for Proposal No

Cover. White Paper. (nchronos 4.1)

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

VMware vcenter Log Insight Getting Started Guide

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

SANS Top 20 Critical Controls for Effective Cyber Defense

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

OnCommand Performance Manager 1.1

The Bomgar Appliance in the Network

Pentaho Enterprise and Community Editions Feature Comparison

Secret Server Qualys Integration Guide

Clavister InSight TM. Protecting Values

HP IMC Firewall Manager

CiscoWorks Resource Manager Essentials 4.3

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1

Federal and Large Enterprise Solutions - FAQs

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

OnCommand Performance Manager 1.1

Sophos Enterprise Console Help

VMware vsphere Data Protection 6.0

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference

Configuring Celerra for Security Information Management with Network Intelligence s envision

Using SolarWinds Log and Event Manager (LEM) Filters and Alerts

Transcription:

5 Solicitation RFI-FTB-1415-SIEM SIEM Bid designation: Public 6/19/2014 10:56 AM p. 1 6

SIEM 5 Bid Number Bid Title RFI-FTB-1415-SIEM SIEM Bid Start Date Jun 19, 2014 9:56:09 AM PDT Bid End Date Jul 7, 2014 2:00:00 PM PDT Bid Contact Yvonne Olson Technology Acquisitions Supervisor 916-845-3394 yvonne.olson@ftb.ca.gov Standard Disclaimer The advises that prospective bidders periodically check the websites, including but not limited to Bidsync, and/or other state department links for modifications to bid documents. The is not responsible for a prospective bidder's misunderstanding of the bid solicitation or nonresponsive bid due to failure to check these websites for updates or amendments to bid documents, and/or other information regarding the bid solicitations. Failure to periodically check these websites will be at the bidder's sole risk. The information published and/or responded to on these websites is public information. Confidential questions/issues/concerns should be directed to the contact on the ad. Description FTB is surveying the marketplace for potential vendors that can provide a comprehensive SIEM solution. The solution must employ an alerting tool with the ability to accurately identify suspicious events by correlating log information from applications, firewalls, intrusion detection/prevention systems, servers, databases and other infrastructure devices. The solution must also provide a reporting tool for producing customizable reports on all collected events and correlated information. 6/19/2014 10:56 AM p. 2 6

chair John Chiang member Jerome E. Horton member Ana J. Matosantos June 19, 2014 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM). FTB is surveying the marketplace for potential vendors that can provide a comprehensive SIEM solution. The solution must employ an alerting tool with the ability to accurately identify suspicious events by correlating log information from applications, firewalls, intrusion detection/prevention systems, servers, databases and other infrastructure devices. The solution must also provide a reporting tool for producing customizable reports on all collected events and correlated information. This RFI contains our draft requirements for the desired solution. FTB has provided a list of technical and functional items for vendors to respond to regarding their SIEM solution. Please provide detailed explanations, product specifications, literature, or other documentation to demonstrate how your product/solution meets each requirement. Vendors may also provide alternatives to a requirement and provide further information to clarify response. If you intend to respond to this RFI, please send your contact information by June 26, 2014 so we may provide any supplemental information. IMPORTANT INFORMATION PLEASE READ BEFORE RESPONDING TO THIS RFI 1. FTB will not reimburse vendors for any costs associated with responding to this RFI. 2. FTB has no obligation to buy or issue a solicitation as a result of this RFI. 3. Information provided in response to this RFI will not be considered when evaluating bidders responding to any future procurement. 4. Responses to this RFI will become public record, upon completion of the RFI process. 5. Information provided in response to this RFI related to any costing should be estimated catalog pricing, only to be used by FTB for informational and planning purposes, and understood not to be represented as a bid from the vendor. 6. If a future procurement results from this RFI, vendors will have to agree to the State s terms and conditions (http://www.documents.dgs.ca.gov/pd/modellang/gpit060810.pdf). If you are interested in responding, please submit one soft copy of your response by 2:00PM PDT, July 7, 2014 via e-mail to: yvonne.olson@ftb.ca.gov We appreciate your time and consideration in reviewing and responding to this RFI. Any questions can be directed to me at (916) 845-3394. Yvonne Olson Technology Acquisition Supervisor Procurement Bureau 6/19/2014 10:56 AM Phone:916.845.339 Fax: 916.845.9419 yvonne.olson@ftb.ca.gov p. 3

06.19.14 Request for Information (RFI) FTB 1415-SIEM Page 2 1. Overview: FTB is surveying the marketplace for potential vendors that can provide a comprehensive SIEM solution to upgrade or replace its existing system. The existing system is composed of two different systems. One, developed in-house, is used for the collection and reporting of audit logs collected primarily from legacy applications. The other is a commercial off-the-shelf (COTS) SIEM product, primarily used for the collection and reporting of device and COTS application audit logs. The solution must provide secure collection of all log file types and formats, as well as storage, backup, retrieval, reporting, and event alert notification. In addition to a reporting tool, the SIEM solution must provide event correlation and integrate with existing security systems at FTB, as indicated in the requirements below. 2. Requirements and Response: Below is a list of technical and functional items for vendors to respond to regarding their SIEM solution. The information provided will assist FTB in making a determination on how best to move forward to replace our existing in-house system and to combine both systems into one viable and supportable COTS system. If the proposed solution does not provide the listed functionality, vendors are encouraged to propose alternative functionality the solution may provide. To assist you in responding, we are providing the following information: Number of active event sources: 2,550 Number of events collected daily: 500,000,000 Average events per second: 6,000 Amount of data collected daily: 250GB Amount of data currently stored: 151 TB (uncompressed) These numbers are expected to increase significantly over the next several years with the implementation of the various phases of the Enterprise Data to Revenue (EDR) project. Daily amounts are expected to increase from 5-10% per month over the next several years. As FTB reviews responses from this RFI, we may request a presentation to be held within 90 days after review of response, and possibly a 30-60 day proof of concept, to be conducted within 120 days after review of responses. FTB requests that vendors provide detailed explanations, product specifications, literature, or other documentation for each of the requirements listed below. Please provide estimated catalog pricing on product(s), estimated catalog pricing on maintenance and/or any additional or potential costs in order to meet the following requirements: A. Administration 1) Describe how your solution integrates with Active Directory (AD) and list the protocols used (e.g., Lightweight Directory Access Protocol (LDAP) or Kerberos). 2) Describe the Role-Based Access Control (RBAC) functionality and granularity within your solution. 3) Describe how users and administrators access your solution such as via a browser, management console, dashboard, or other graphical user interface (GUI). 4) How many concurrent user sessions are allowed? B. Technical Support/Troubleshooting 1) Describe the training and modules offered, and provide a current schedule of training available within the, including the Sacramento area. 2) Attach documentation or describe your 24x7 product support offerings including telephone support and issue escalation procedures. 3) Attach documentation or describe your hardware and/or software maintenance agreements (renewable annually) for upgrades, patches, and enhancements. 4) Will you provide resources (hardware, software, and services) for FTB to conduct a 30-60 day proof-of-concept of your solution at no cost to the State? 6/19/2014 10:56 AM p. 4

06.19.14 Request for Information (RFI) FTB 1415-SIEM Page 3 5) Should a solicitation be issued, will you allow for acceptance testing of your solution for up to 90 days prior to our acceptance of the product? 6) Does your solution include context-sensitive help functionality within the product to provide troubleshooting and system guidance? C. Technical 1) What operating system does your product run on and list all supported versions. 2) List other software requirements such as web browsers, Java, Adobe Flash, etc., and all supported versions. 3) If Windows based, explain your solution s capability to become part of an existing Windows domain, or if it is necessary to create a separate, trusted domain. 4) Is integration with a centralized network time server using Network Time Protocol (NTP) supported? 5) Provide hardware and/or software product life cycles with end-of-life/support dates for your current solution. 6) Indicate and describe whether your solution utilizes or supports SAN, NAS, or Big Data mass storage solution(s), and any specific requirements or recommendations. 7) Explain how your solution is designed to ensure high availability, including redundancies, and performing system and database maintenance without business interruptions. 8) Is your solution fully compatible (not interfering with normal functionality) with the following types of software? If not, please explain. a. Virus protection suites b. Automated patching software c. Asset management Software D. Reporting 1) How does your solution automate and schedule reports on a recurring basis without manual intervention? 2) Describe how your solution integrates with Microsoft Reporting Services. Include the steps required and supported versions. 3) How are the reports displayed on-line from within the application? 4) List the graphical formats your solution can utilize to display reports. 5) Explain how your solution restricts access to reports by role (e.g., detailed user reports that should not be available to all users). 6) Describe how your solution queries Active Directory for any attribute, and incorporates them as report values. 7) Describe how your solution provides links with or is able to query other databases such as MS SQL. 8) List the formats that can be used to export reports and database data. 9) Describe how your solution provides the capability to create custom reports. 10) Describe how your solution is able to combine data from different database tables into single or aggregated reports. 11) Explain how report column names can be customized with user provided names. 12) Describe how your solution filters report data (e.g., apply custom filters on the data and exclude specified data from the export process). 13) Describe how report columns displayed in reports can be limited (e.g., display specific columns in a report instead of all columns that may have been generated when the report was run). 14) Describe how your solution provides for report aggregation to improve overall system performance (e.g., combining output from multiple reports without having to re-run the reports). 15) Describe how your solution provides data visualization technology to identify such as top attack IPs with Geo locations, top bandwidth usage by users/ips etc. 16) Please list which Business Intelligent (BI) tools can integrate to your solution for data mining. 17) Describe how your system provides the ability to integrate query results with external applications (e.g., A.Net intranet application needs to display the results of a custom query.) 18) Explain how your solution restricts access to reports and logs by role (e.g., detailed user reports that should not be available to all users). 19) Explain how reports are run and what is done with any temp files that are created (are they available for any user to view). 6/19/2014 10:56 AM p. 5

06.19.14 Request for Information (RFI) FTB 1415-SIEM Page 4 E. Security 1) List the methods for providing automated alerts when logging has stopped on any given device, application, or specified alert thresholds are exceeded (e.g., SMTP, Text (SMS), SNMP v3.0). 2) When new vulnerabilities impacting your solution are discovered by your company or industry sources, how soon after the vulnerability is publicly announced, does your company provide patches, fixes, or other compensating controls? 3) If appliance based, list the hardening standards your solution complies with (e.g., National Institute of Standards and Technology (NIST)). 4) Explain how your solution provides secure collection of log file and event data utilizing open standard network protocols for encryption, utilizing at least 128 bit AES, SFTP, FTPS or HTTPS. 5) Describe how your solution provides for secure storage of collected audit data, including encryption algorithms, and how it prevents any modifications to the data. F. Collection 1) List the leading vendors your solution is able to import data from as listed in the Gartner Magic Quadrant for Security Information and Event Management, May 7, 2013. 2) Describe your solution s log collection methodologies, whether push/pull technologies are used, agents or agentless, SNMP, web services, etc., and how your solution maintains the integrity and confidentiality of the data collected during transit. 3) Provide a list of the specific event sources and log types your solution is able to securely collect and store log data from, including, but not limited to the list below. Attach appropriate product documentation if available. a. Operating systems b. Services (e.g.: DNS, DHCP) c. Databases d. Syslog e. Text Files f. VPN/Firewalls g. Proxy servers h. Badging systems i. Intrusion Detection/Prevention systems j. Mainframe SMF records k. Commercial off-the-shelf (COTS) products (provide listing of supported products) l. Custom applications m. Vulnerability scanning tools n. Unstructured data 4) Explain how your solution is able to integrate with or merge data from MS SQL databases. 5) What are the limitations regarding the number of event sources your solution can collect from? How does your solution prevent system performance degradation or loss of log data if too many event sources are trying to send log data to the solution at one time? 6) Describe your solution s capability to recover logs when transmission of data is abruptly terminated. 7) Is your solution capable of collecting log data from relay devices? 8) How does your solution securely collect audit log data from custom in-house applications? 9) Describe how your solution aggregates and normalizes variable log file formats and characteristics into central repository. 10) Describe how your solution collects log files 24/7 and provides scheduled log extracts and manual log extracts outside normal scheduling. 11) Describe how your solution identifies and provides automatic notifications when duplicate logs are received, and how it performs automated verification to ensure that log files and records being stored are not duplicative. 12) Describe how your solution collects and displays logs in near real-time. 13) How does your solution buffer logs locally when the event source is unavailable? 14) How does your solution balance collection of events between multiple collection points? 15) Does your solution have the capability of providing a single, load balanced collection point? If so, describe how this functionality works in your solution. 6/19/2014 10:56 AM p. 6

06.19.14 Request for Information (RFI) FTB 1415-SIEM Page 5 16) Explain how your solution is able to filter out or purge unnecessary or unwanted audited events (e.g., by specific Windows event IDs or subcategories). 17) Describe situations where events could be dropped by your solution. G. Database 1) Describe the database(s) and versions your solution utilizes for data storage, reporting, correlation, etc, 2) Describe how the database scales, and provides for future expansion. Describe clearly identifiable upgrade paths and provide associated costs. 3) List the tools that may be used to query the reporter database. Please include any programming language support such as Java or.net libraries. 4) Describe how the database supports RBAC using Active Directory for user and group access controls. 5) Describe the authorization and process for access to the data store. 6) Describe how your solution performs data file compression for maximum space utilization. 7) Describe the process for archiving or purging data after it reaches or exceeds specified data retention periods. 8) Explain retention and purge period criteria (e.g., type, source, date). List any other criteria available. 9) How does your solution retrieve archived data and provide access to archived and on-line data simultaneously? H. Functionality/Performance 1) Describe how your solution is able to resume data collection with the last captured event without loss of data upon system restart, or in the event that an event source loses communication with the data collector, resulting in complete, integrity-verified collected audit log data. 2) Describe the event correlation, mapping, and trend analysis capabilities of your solution, including retention and replay of correlated events. 3) Describe the high-performance metrics for your solution. 4) Describe techniques for improving performance including data indexing and the capability for the creation and application of user-defined indexes. 5) Describe how your solution provides user defined tables and fields, and the methods available for population. 6) Describe how your solution provides for parsing and normalization of custom log types. 7) Describe how your solution manages, categorized and queries unstructured data. 8) Describe the capability of your solution to create, store, and manage custom queries created to capture, categorize, and alert on specific activity. 9) Describe how pattern recognition is accomplished, and provide for automated alerts based on rule sets such as multiple concurrent user logons, concurrent local and remote user logons, and abnormal logon attempts. 10) How much data can your solution maintain online for queries and reporting purposes? FTB has a statutory requirement to maintain up to seven years of data, which could exceed 200TB (uncompressed). Explain how this amount of data can be made available for performing queries and producing reports. 11) Based on the data amount in the previous question, provide the expected response time to generate a query or report for one user (single userid). 12) Provide the expected response time to generate a query or report from collected Windows Server log files for one user (single userid) based on: a. 10,000,000 events b. 100,000,000 events c. 1,000,000,000 events 13) What is the maximum record length your solution can import and process, and how many fields can be contained within a single record? Are XML strings handled differently? Provide sample table layouts if possible. 14) Describe how the solution is able to interface with a custom application/system (including SQL,.Net, and web apps.). 6/19/2014 10:56 AM p. 7

Question and Answers for Bid #RFI-FTB-1415-SIEM - SIEM 5 OVERALL BID QUESTIONS There are no questions associated with this bid. If you would like to submit a question, please click on the "Create New Question" button below. 6/19/2014 10:56 AM p. 8 6