Graylog Security Cloud
Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Graylog to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Graylog Cloud Security as a service.
Features
- Graylog (aka Graylog) Cloud and Self Hosted options
- SIEM and Centralised Log Management
- Log Data Visualisation and Archiving
- Illuminate Dashboards (pre-configured vendor integrations)
- Threat Hunting and Incident Investigations
- UEBA / Anomaly Detection
- REST API + OOTB SOAR and Threat Intel Integrations
- Security Event Creation & Alerting and Sigma Rules Integration
- Cloud21 Monitoring, Managed Alerts Service and Health checks
- Integrate Logs from Firewalls, Active Directory, Authentication servers etc
Benefits
- Offload administrative costs associated with log management
- Easily adaptable to your environment
- Ingest any log source from anywhere
- Prebuilt open integrations into common security solutions and hardware
- Easy to learn parsing, enrichment and data normalisation schema
- Annual subscription with 3 year contracts available
- Scalable with lightning fast investigations shrinking investigations by weeks
- Ease of use Increases productivity
- Save on software, hardware and people
- Get alerts for what matters
Pricing
£281 to £1,850 a gigabyte a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 3 4 2 6 1 5 3 4 1 4 0 7 0
Contact
Cloud 21 Limited
Steve Gray
Telephone: 0845 838 8694
Email: bid-management@cloud21.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Log Forwarder hosted on customer sites/ datacentres.
Hosted on AWS in the UK by default, but can be configured for other regions, or hosted locally or in other clouds if the buyer wishes to customise - System requirements
-
- On-Premise hosted Log Forwarder (Linux OS)
- Internet access with appropriate bandwidth
- Modern Web Browser
- Agents installed on servers to be monitored
- Syslog and Log forwarding capabilities on all log sources
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 24 hours, 7 days a week
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Customers may submit tickets via support portal or email. Remote video support is available when appropriate. Graylog professional services may be engaged at additional cost for onsite support. Scope and cost for these services are determined prior to any work being done. Customers are assigned a Customer Support Manager to act as their advocate and resource for all things Graylog. Support is available 0200-1900 EST/0600-2300 UTC.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Graylog off an onboarding process. Cloud21 will support the process if Cloud21 service wraps are purchased.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users may export their log archives
- End-of-contract process
- Users may export their log archives
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- The service interface is a inclusive component of Graylog Cloud
- Accessibility standards
- None or don’t know
- Description of accessibility
- Not Applicable
- Accessibility testing
- None
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Each user is placed in their own tenant so as to ensure that other users of the platform do not impact your usage
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Graylog
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users may export their log archives.
- Data export formats
-
- CSV
- Other
- Other data export formats
- JSON
- Data import formats
- Other
- Other data import formats
- Not applicable
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The SLA guarantees 99.9% up-time. Refunds are usually handled with service credits, but are part of the final contract.
- Approach to resilience
- The service is hosted in different AWS availability zones, with fallover and resiliency in mind. More details available on request.
- Outage reporting
- Outages are reported via direct customer communication.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
- Other
- Other user authentication
- All authentication is performed by Okta
- Access restrictions in management interfaces and support channels
- All level of access is managed by customer and lives in Okta
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- We abide by an Information Security Policy and have rigorous induction and training methods which ensure policies are followed. We also follow a strict reporting structure ensuring that any areas of concern are highlighted as soon as possible. Violation, detected will reach our technical department immediately and escalated accordingly.
- Information security policies and processes
- Cyber Essentials Plus
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All configuration lives in configuration management (Terraform, Ansible) and can only be rolled out through a pull-request mechanism and review of at least one other person.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Workstations are monitored for vulnerabilities using Tenable IO and protected with Defender Endpoint Protection and additional EDR agents. Updates and patches are pushed regularly based upon the Microsoft or Apple patching cadence. Production services are patched using AWS tooling and terraform scripting to validate consistency across the production environment.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Graylog employ an out SOC that monitors the logs that we ship to them. They have an escalation protocol and response playbooks.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident management/response policies are tested as part of SOC-2 compliance process
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Wellbeing
Fighting climate change
Cloud21’s quality and compliance team have been extremely busy over the last 24 months and have recently become ISO14001 certified demonstrating our commitment to reducing its environmental impact.
Ambitions for 2024/25
For this service we will:
• Implement a reduce, reuse and recycle scheme (coffee pods, pens and batteries)
• Eliminate single use plastic bottles from our office headquarters
• Promote rail travel over air travel for practical journeys
• Promote the ‘green leaf hotel’ scheme where practical to do so
• Accurately measure commutable mileage
• Reduce paper use and printing at the our headquarters
• Reduce emissions by 7.14% (19.23 tCO2e) from baseline
We believe it is all about making small changes in order to make a big impact and promoting environmental sustainability.
Cloud21 has implemented a carbon reduction plan in line with the NHS’s carbon reduction roadmap.Wellbeing
We have a company-wide approach called VIBE (Valuing Inclusion, Belonging and Equity), which includes the provision of resources and support to improve physical, emotional and mental health and wellbeing which complements our company values.
Our VIBE team promote social inclusion and wellbeing by running events that supporting charities, such as Samaritans and MIND.
We understand stress can impact a person’s mental health, this can result in absences and even resignations, but more importantly, it can impact people's lives fundamentally. Making sure that work is a safe place to discuss wellbeing and mental health by creating an inclusive and supportive environment will provide employees with the tools needed to manage mental health.
We look to reduce the pressure and stress involved in modernising systems and technology leveraging our past experience and sharing this with all stakeholders involved.
Initiatives we are looking to run within the next 18 months:
• Run Health and wellbeing webinars and sharing resources to support our teams such as ‘NHS Every mind matters’ and the ‘6 ways to wellbeing’.
• Continue to raise mental health awareness through running company lead events such as ‘fun-runs’ or ‘Movember’ to promote mental health awareness.
• Offer mentoring support from trained mental health first aiders to support our staff.
• Ensuring we continue to develop our Wellbeing policy.
Pricing
- Price
- £281 to £1,850 a gigabyte a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Graylog Open is available to the public to understand/learn Graylog, but this has limited functionality which is included in the paid for Cloud and on-premise subscriptions
- Link to free trial
- https://graylog.org/products/source-available/