Security Engineering-Data Population Proposal
Security Engineering-Data Population Proposal
Security Engineering-Data Population Proposal
CONTENTS
EXECUTIVE SUMMERY ...................................................................................................... 3
DOCUMENT OBJECTIVE..................................................................................................... 4
DOCUMENT CONTROL ....................................................................................................... 4
OVERVIEW .......................................................................................................................... 4
Why choose us .................................................................................................................. 5
Meet the change makers ................................................................................................... 5
EXECUTION METHODOLOGY ............................................................................................ 6
Agreement and Scope Finalization .................................................................................... 6
Resource Allocation........................................................................................................... 6
Identification of Log Sources ............................................................................................. 6
Generation of Data: ........................................................................................................... 6
Project Completion ............................................................................................................ 6
COMMERCIALS ................................................................................................................... 7
Fee Breakdown ................................................................................................................. 7
Payment Schedule ............................................................................................................ 7
Payment Term ................................................................................................................... 7
TERMS AND CONDITIONS.................................................................................................. 8
3
EXECUTIVE SUMMERY
BLACKPERL DFIR wants to set up a Data Pool for validating detection rules created from Sigma
Rules, which will be converted to Splunk Query Language (SPL). The program will be conducted
by BlackPerl DFIR team of experienced cyber security professionals who have years of hands-on
experience in the field. While we propose program we focus on below high-level objectives, which
we:
1. Ingest benign data to Splunk from various feasible resources like- application servers,
operating systems, databases, email servers, web servers, miscellaneous files, non-log
files etc.
2. Ingest malicious data to Splunk from various feasible resources like- EDR, VM Tools.
3. Research on popular Malware and Attack Feeds and simulate the IOCs to perform the
attacks on endpoint and send the logs to Splunk via various logging- Sysmon, Windows
Event logs.
4. Leverage opensource attack library to frame the attacks like- ATP Simulator, Atomic Red
Team, Infection Monkey, Caldera etc.
7. Populate index wise separation to each different types of logs being ingested.
8. Record and prepare document the data being populated with below specifics:
DOCUMENT OBJECTIVE
This document has been prepared by BlackPerl DFIR to formalize the proposal for
creating Data Pool for SystemTwoSecurity.
DOCUMENT CONTROL
OVERVIEW
We believe in equal learning opportunities, growth and solving Security Problems around the
world on InfoSec Domain. Our instructors design courses that are easily accessible to everyone
and MOST Budget friendly. Our Security Engineers work towards building successful Security
products, Research & Development and provide services for Security Operations, Detection
Engineering, VAPT and many more. You can download a handful of resources during each
course for better learning. We are dedicated to bringing more courses so you can have a larger
variety of courses to choose from. Our focus is to provide you BEST KNOWLEDGE yet in Cost
effective way!
BLACKPERL DFIR Academy team is much more than just course builders. We aim to facilitate
everyone, so they achieve their learning goals. We want you to become the change makers of
tomorrow so that you can inspire others around you.
More About us:
• Official Website- https://blackperldfir.com/
• LinkedIn- https://www.linkedin.com/company/blackperl/
5
We have our Service Line Vertical where we take care of below services for our clients:
1. Cloud Security Assessment
2. Cloud Security Posture Management
3. Security Operations- MSP Offerings
4. Detection Engineering as Service
5. Security QA as Service
6. Incident Response and Digital Forensics as Service
Why choose us
It’s our attention to the small stuff and making a big impact. You want results, we have found that
the best way to deliver them is to train through live hands-on best in class curriculum, which we
promise to deliver on each of our workshops and training programs. When we take up any
engagement projects for our clients, we work towards building Relations. Our prices are way too
fair. We don't believe in just making money; we believe in providing you with the best knowledge,
service and to help you grow.
All of our significant Training and Engagement program which also leads toward the scope of this
document is creating Labs and Simulations for our students, which is our flagship model
developed to teach professionals how to work on Detection Engineering pipeline and build out
Solid Detection Capability with ability to do sound Incident Response, Forensics and Threat
Hunt. We have been working closely with Global innovation partners around this space.
We make sure you as a learner have enough leads and skills to go into the jungle and hunt for
your own need!
EXECUTION METHODOLOGY
Agreement and Scope Finalization
• In this phase we will finalize the work agreement and the scope of the.
• Necessary permissions and documentation (NDA, Contract) will be done.
• We will also get required access to perform this project.
Resource Allocation
• BlackPerl DFIR will allocate below resources to complete this project within timeline:
o Principal Security Engineer: 1
o Lead Security Engineer: 1
o Junior Security Engineer: 2
Generation of Data:
• In this phase, BlackPerl DFIR will start working towards sending the logs to Splunk to
the identifiable indexes.
• BlackPerl DFIR will start documenting the work to display what kind of data is being
populated.
Project Completion
• Upon completion of the full set of rules, BlackPerl DFIR will provide a completion
report with all specifications of data being populated. A project completion can be
identified with below statistics:
o Approx of 500MB of data being ingested.
o Coverage of top 5-6 Attack group data being ingested which will consist of
different TTPs.
o Benign data being ingested from at least 3 different log sources.
o Malicious data being ingested from at least 3 different log sources.
o Coverage of different TTPs from ATT&CK framework relevant or in scope.
o Coverage of data being ingested against the TI reports given by client.
7
• Considering the approximate volume of work, the project will take 4 weeks to
complete. A tentative check-in date will be on 07/08/2024 (7th August 2024)
COMMERCIALS
We are committed to using our resources responsibly to assist you in obtaining maximum benefit
from this initiative. Our commitment to you is total client service for a fee that we believe is fair
and reasonable for the services provided. Our firm’s people and resources will be available to
you, when required, to work in a co-operative and interactive environment with the objective of
providing the maximum benefit to your organization.
We have carefully considered the approach required for the current project, and due to our strong
interest in developing an ongoing relationship with your organization, we have prepared the below
quote.
Fee Breakdown
The following table depicts the fee breakdown by engagement phases.
• The above amounts are net payable to BlackPerl DFIR excluding any taxes, Octroi and transfer
fees.
• There will be a flat 18% IGST rate applicable on the cost.
Payment Schedule
Invoices shall be submitted and payable as follows:
• 50% of the program cost at the time of Contract and Agreement Sign-Off
Payment Term
• 5 business days from the date of invoice
8
2. EMPLOYEE ASSIGNMENTS/SUBCONTRACTORS
BlackPerl DFIR reserves the right to determine the assignment of its employees in the
performance of the Statement of Work. BlackPerl DFIR reserves sole discretion to
subcontract any service or portion of service that it deems necessary.
3. TAXES
All GST, sales, use, or similar taxes imposed on the services or materials supplied if
applicable, shall be added to the charges stated herein and shall be paid by the
customer.
4. REMITTANCE
BlackPerl DFIR reserves the right to withhold services hereunder if Customer’s account
is past due. Customer shall pay all costs involved in collecting its overdue accounts
including reasonable attorney’s fees.
5. INCIDENTAL AND BLACKPERL DFIR QUENTIAL DAMAGES
BlackPerl DFIR shall not be liable for interruption of Customer’s business or operation,
for loss of profit by the Customer, for incidental or consequential damages or for claims
by third parties against Customer. BlackPerl DFIR’ total liability hereunder, including but
not limited to, any alleged negligence of BlackPerl DFIR shall not exceed the amount
paid for professional services by Customer to BlackPerl DFIR hereunder. BlackPerl
DFIR MAKES NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE WITH RESPECT TO THE MATTER HEREOF, SERVICES
9
8. NON-SOLICITATION OF STAFF
Customer and BlackPerl DFIR, shall not, directly or indirectly, on behalf of themselves or
for others, solicit each other’s employees or sub-contractors working on the project
defined by this SOW, during this or any subsequent service engagement for a period of
two year following completion of the most recent service engagement including Change
Orders.
9. CONFIDENTIALITY
Both parties agree to maintain in confidence and not to disclose to any third party or
organization, without prior written consent from the other, knowledge or data relating to
product, processes or operations of the other.
10. INDEMNIFICATION
Both parties shall indemnify each other and hold any of their affiliate companies,
officers, directors, agents and employees, free and harmless from and against all claims,
costs, liabilities, judgments, damages and expenses arising out of or related to:
• A party’s breach of any warranties or representations made in this Agreement;
• Any claimed infringement or violation of intellectual property rights to any third party;
• A party’s failure to comply in a material respect with any law, statue or regulation
unless the claim arises out of or is a result of its breach of the Agreement.