RWS XDR/MXDR Requirements Compliance Summary

Appendix B1 - Statement of Work Compliance Assessment

1594
Total Requirements
1527
Fully Compliant
18
Partial Compliance
51
Non-Compliant
Fully Compliant
Partial Compliance
Non-Compliant
RefRequirementComplianceNotes
1CONTEXT
21.1 “System” or “Solution” refers to Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR) with Extended Detection and Response (XDR) and Managed Extended Detection and Response (MXDR) services, as further detailed below.
31.2 The Supplier will provide and implement the System for the Company, as well as provide all licences, hardware, software, developments and/or deliverables operating in conjunction with each other in particular those described in this Appendix B1, and any computer programmes, databases, the tangible media on which they are recorded and their supporting documentation, including input and output format, programme listings, narrative descriptions, source code, object code, operating instructions and user manuals.
42. ADDITIONAL Definitions
52.1 "Services" means the Services which the Supplier is required to perform under the LOA, such Services to comply with the Company’s requirements, which includes but is not limited to installation, design, planning, upgrading Services, warranty, maintenance and/or the provision of materials required thereof.
62.2 “Goods” means all items including the hardware and software that the Supplier is required to supply under this LOA as listed in Appendix B2 including any optional items or accessories.
72.3 The Goods / Services shall conform in all respect to the Description of Goods/ Services as set out in Appendix B1.
82.4 The Supplier shall ensure that the Goods / Services and every part or unit thereof are new and manufactured in a good workmanlike manner with proper design and materials and that the Goods / Services shall be free from defects including defects arising out of faulty design, inferior materials, faulty and inferior workmanship.
92.5 The Supplier warrants the Goods to be fit for the purpose intended and in accordance with the provisions as set out in Appendix B1.
102.6 The Supplier shall provide the Goods/ Services with professional skill, care and diligence to a standard consistent with good practice as then current in the relevant area of the information technology industry.
112.7 In the event of any difference in the specifications, the more stringent requirements in favour of Company shall prevail.
122.8 The Supplier shall, at no additional charge, supply and deliver all documentation (including
132.9 documentation), in relation to the Goods/Services, in both hardcopy and softcopy form. All data, documentation, description, diagrams, books, catalogues, advisory services, instructions and correspondence shall be written in readily comprehensible English language.
142.10 The Supplier shall submit to Company such information and assistance as may be necessary to enable Company, whether by itself or to direct any third party, adequate time to prepare the Site for the installation of the Goods and to provide the necessary environmental and operational conditions for the efficient working and maintenance of the Goods.
153. UNAUTHORISED CODE
163.1 “Unauthorised Code” means any contaminant, virus, Trojan Horse, work, logic bomb or any other software routine or hardware components, including any codes or instructions designed to permit unauthorised access, to disable, modify, erase, damage, steal or usurp data or otherwise harm software, hardware or data, or to perform any such actions.
173.2 “Software” means all software that forms part of or is shipped together with the Goods including but not limited to any utility software and diagnostics software.
183.3 The Software, deliverables and any operating software supplied with the Goods will be free from all Unauthorised Code and nor will Supplier or any of its sub-vendors introduce any at any time. Further for this purpose, Supplier warrants that it has prior to the installation of the Software and operating software used the most comprehensive and up to date virus checker available.
193.4 If, during or after the delivery and installation of a part of a System is completed, that part is discovered to contain or be affected by any Unauthorised Code and it is shown that this was the result of any default of or negligent act/omission of the Supplier or its employees, the Company may reject any such part of the System and/ or Software and the Supplier shall, at its own expense, immediately remove and recover all rejected parts of the System and/ or Software and provide replacements which are free of Unauthorised Code.
203.5 The Supplier shall indemnify Company fully against all costs incurred by them in the course of or incidental to removing the Unauthorised Code and recovering any lost or damage data or software.
214. RELIANCE
224.1 The Supplier accepts that Company, inter alia, relies on the skill and judgement of the Supplier in the design, description, construction, quality, reliability and performance of the Goods to be provided and on the judgement and skill of the Supplier for any and all of the Services to be performed.
234.2 In the event of the Supplier obtaining part(s) of the Goods to be supplied from a third party, the Supplier shall inform the Company in writing of the source of origin of the said part(s) of the Goods and, for avoidance of doubt, it is expressly declared that the Supplier shall remain fully liable for the said part(s) of the Goods and the consequences arising from the use of the said part(s) as if they were manufactured by the Supplier.
245. Scope of Work (fixed-priced work)
255.1 Overview
265.1.1 This project (“Project”) is to implement a System or Solution to enhance its cybersecurity operational resilience and cybersecurity posture while maintaining strict adherence to regulatory standards. This project shall be implemented under a primary contract period of three (3) years, with an option to extend for up to two (2) additional years (3+1+1), subject to satisfactory performance and RWS approval.
275.1.2 To support this initiative, RWS invites qualified Suppliers to propose solutions for the following:
285.1.2.1 Deployment of Extended Detection and Response (XDR) Platform
29The Project shall include the deployment of an Extended Detection and Response (XDR) Platform with advanced threat-detection, investigation, response, and vulnerability-shielding/virtual-patching capabilities. Coverage shall include servers, endpoints, laptops. Workstations, virtual desktops/machines, and containerized workloads.
30For the avoidance of doubt, the overall XDR Platform solution shall comprise the following distinct components:
31a) License / Software / Subscriptions:
32Supply of the required XDR platform licenses, subscriptions, lightweight protection agents, data-collection connectors, integration modules, cloud-workload connectors, container security engines, vulnerability-management modules, and all supporting software necessary to provide full threat detection, investigation, response, and vulnerability shielding/virtual patching coverage across servers, endpoints, workstations, laptops, virtual desktop/machines, and containerized workloads. The solution shall support a cloud-native, unified telemetry architecture for seamless correlation and visibility across all workload types. Mandatory Protection Modules must cover the following
33· Core EPP/EDR/XDR: Servers, Laptops, Workstations and virtual desktop/machines.
34· Containers: Kubernetes, Azure Kubernetes Service (AKS), Alibaba Cloud Container Service for Kubernetes (ACK).
35· Core Cloud Workloads: Protection for public cloud workloads and services, including Azure, and Microsoft M365 with runtime protection, posture evaluation, cloud-native threat detection, cross-cloud correlation and etc.
36· Vulnerability Management: Vulnerability Assessment, Validation, Attack Simulation, Virtual Patching or Shielding.
37· AI for Security: Automated response, chatbots, intelligent search and recommendations, incident sense making and meaning making.
38· Integration with existing cybersecurity tools for automated and integrated threat defense for containment and eradication.
39b) Professional Services (Implementation, Deployment and Migration):
40One-time professional services for the design, planning, installation, configuration, testing, data migration, tuning, validation and commissioning of the complete XDR platform in accordance with Section 6 (Timeline, Documentation and Deliverables). The deployment approach shall minimize endpoint disruption and achieve rapid stabilization and operational readiness.
41c) Managed Services (MXDR Day-2 Operations):
42d) Ongoing 24 x 7 x 365 Managed Extended Detection and Response (MXDR) services, including continuous monitoring, automated and analyst guided investigation, real-time threat hunting, containment, eradication, AI-assisted incident analysis, storyline reconstruction, playbook execution and proactive security posture execution and improvements. The service shall leverage a cloud-first detection engine and unified event pipeline to ensure rapid triage and high-fidelity detections.
43e) Support & Maintenance:
44Warranty support and platform maintenance throughout the Contract Period of three (3) years, with up to two (2) additional one-year extensions (3+1+1). This includes platform enhancements, security updates, agent improvements, analytics/ML-model updates, content deployment, and continuous health monitoring of all components.
455.1.2.2 (Optional) - Protection Modules
46The following modules shall not be included in the base XDR proposal but shall be supported by the proposed solution architecture as optional add-on components that RWS may choose to activate at a later phase. Optional modules shall integrate natively with the XDR telemetry pipeline and console without requiring unnecessary duplication of agents.
475.1.2.2.1 Additional Cloud Workloads Protection:
48Protection for public cloud workloads and services, such as AliCloud, and other SaaS platforms with runtime protection, posture evaluation, cloud-native threat detection, and cross-cloud correlation.
495.1.2.2.2 Mobile Protection:
50Protection for enterprise mobile devices, including mobile threat defence, malware detection, application-risk inspection, unsafe network detection, and compliance enforcement.
515.1.2.2.3 IoT/OT/Robotics Protection:
52Threat detection and response for operational technology, industrial IoT, embedded devices, and robotics systems using specialized protocol awareness, asset discovery, anomaly detection, and behavioural analytics.
535.1.2.2.4 Email Protection:
54Comprehensive email threat detection and response including anti-phishing, anti-malware, URL/attachment detonation or sanitization, business email compromise (BEC) detection, impersonation analysis, and advanced email filtering.
555.1.2.2.5 Network Protection:
56Network detection and response (NDR) capabilities including deep packet inspection, network flow inspection, encrypted traffic analytics, lateral movement detection, device fingerprinting, and network behavioural analytics, all correlated into the XDR event pipeline.
575.1.2.2.6 Identity Protection:
58Identity Threat Detection and Response including monitoring for credential misuse, unauthorized privilege escalation, anomalous authentication behaviour, lateral movement, and identity-centric threats, with optional integration into IAM/IDP platforms for automated remediation.
595.1.2.2.7 AI and Gen AI Security (Security for AI):
60Security for AI applications including AI apps, GenAI models, CoPilot, ChatGPT, DeekSeek, and similar systems. Controls including monitoring of prompt input/output flows, AI-related data loss prevention, detection of malicious or unintended prompt manipulation, and governance of sensitive interactions with LLM-based services.
615.1.2.3 Below is a high level reference point of view of the requirements.
635.1.3 The required contract period shall be three (3) years, with an option to extend for up to two (2) additional years (3+1+1), subject to RWS approval.
64The subscription period for software licenses and platform entitlements shall commence upon approval by the RWS Architecture Board (ARB) or upon RWS's written authorization, whichever is later.
65The Managed Extended Detection and Response (MXDR) services shall commence upon successful platform Go-Live and formal acceptance by RWS IT.
665.1.4 Services for the design, implementation, support and displacement of existing system or platform.
675.1.5 The Supplier shall provide Managed Extended Detection and Response (MXDR) services to deliver continuous 24x7x365 cybersecurity surveillance, detection, and response operations, and to operate the maintain the proposed XDR platform. This scope covers Day-2 Managed XDR Operations, including continuous monitoring, investigation, containment support, threat hunting, and service reporting, specific to the new XDR platform implemented under this Project.
685.1.6 The proposed solutions must align with recognized industry best practices, support both regulatory and internal compliance requirements, and strengthen RWS’s capabilities in threat detection, security monitoring and incident response.
695.1.7 The Project will be carried out in Phases, as set out below:
705.1.7.1 Phase 1:
715.1.7.1.1 Architecture and Design
725.1.7.1.2 Platform Deployment
735.1.7.1.3 Integrations
745.1.7.2 Phase 2:
755.1.7.2.1 Rollout Planning
765.1.7.2.2 Migration and Onboarding (Including removal of old solution)
775.1.7.2.3 Use Case Development/ Configuration Fine Tuning
785.1.7.2.4 Dashboard or Report Building
795.1.7.3 Phase 3:
805.1.7.3.1 24x7x365 Managed Extended Detection and Response (MXDR) / Security Operations Centre
815.2 Project Initiation/Kick off & Project Management
825.2.1 The project will be initiated with a kick-off meeting along with the project stakeholders and key project members to align project scope, timeline, roles and responsibilities.
835.2.2 The Supplier will appoint a Project Manager based in Singapore as the single point of contact for the overall project. The Project Manager shall report to the Company’s appointed representative.
845.2.3 The Supplier’s Project Manager shall work with the Company’s appointed Project Manager and representative(s) to manage the Project, including but not limited to:
855.2.3.1 Identifying project resource stakeholders,
865.2.3.2 Developing the project charter,
875.2.3.3 Planning and conducting project kick off meeting
885.2.3.4 Planning and conducting periodic project meetings for steering committee and working committee
895.2.3.5 Developing detailed project plan which includes but is not limited to:
905.2.3.5.1 Project timeline & key milestones
915.2.3.5.2 Roles and responsibilities for all resources working on the project
925.2.3.5.3 List of project assumptions, risks and issues
935.2.3.5.4 List of project changes requests
945.2.3.5.5 Project deliverables
955.2.3.5.6 Deployment strategy and approach to minimise impact to business operations
965.2.3.5.7 Design and architecture review with the Company’s appointed representative(s).
975.2.3.5.8 Post implementation review
985.3 Project Personnel
995.3.1 The Supplier shall ensure that the personnel assigned to the Project are appropriately qualified, skilled, and experienced in the roles that have been allocated to them.
1005.3.2 The Supplier shall provide the Company with at least seven (7) days’ prior written notice of any planned leave of absence by key personnel exceeding five (5) consecutive working days. For unplanned or emergency leave, the Supplier shall notify the Company as soon as practicable. The Supplier shall ensure that suitable interim coverage is arranged to maintain service continuity, subject to the Company’s prior written approval under Section 5.3.6, if required.
1015.3.3 Except as provided in Section 5.3.4, the Supplier shall retain the assigned personnel for the duration of the Project, unless they have an extended illness or are no longer contracted or employed by the Supplier. The Supplier shall give the Company at least fourteen (14) days’ prior written notice before any of the personnel are removed from the Project.
1025.3.4 The Company may require the Supplier to remove any personnel engaged for the Services, including the Project Manager, who in the reasonable opinion of the Company:
1035.3.4.1 has engaged in any misconduct,
1045.3.4.2 is incompetent, negligent, or unsatisfactory in the performance of his duties,
1055.3.4.3 fails to conform with any provisions of this LOA, or
1065.3.4.4 acts in a manner prejudicial to safety, health, or the reputation of the Company.
1075.3.5 If any personnel are removed from the Project pursuant to Sections 5.3.3 or 5.3.4, the Supplier shall appoint a suitable replacement within fourteen (14) days from the date of the personnel’s removal from the Project.
1085.3.6 Before assigning any personnel to the Project, including replacements under Sections 5.3.3 or 5.3.4, the Supplier shall submit their qualifications, experience, and role responsibilities for the Company’s review. The Company reserves the right to interview and approve or reject any proposed personnel, regardless of technical qualifications. The Supplier shall not assign any personnel to the Project without the Company’s prior written approval, which shall not be unreasonably withheld.
1095.3.7 For any replacement under Sections 5.3.3 or 5.3.4, the Supplier shall ensure adequate knowledge transfer and training to minimize disruption to the Project.
1105.3.8 For the purposes of this LOA, ‘key personnel’ shall include, but not be limited to, the Project Manager, Lead Developer, and any other roles critical to the delivery of the Services as identified by the Company.
1115.4 Requirements
1125.4.1 The Supplier will conduct detailed requirement gathering workshops with the Company’s appointed representative(s) and/or third party, to:
1135.4.1.1 Produce solution and design services for implementation of the System in accordance with the requirements as set out in this LOA;
1145.4.1.2 Provide the requirement deliverables as set out in Section 6 of this Appendix B1; and
1155.4.1.3 Ensure the System meets the expectations and purpose of this Project.
1165.4.1.4 Ensure the System meets the functional requirements as set out in Appendix E
1175.4.2 Technical requirements of the System or Solution
1185.4.2.1 General Technical Requirements
1195.4.2.1.1 Agent & Management
1205.4.2.1.1.1 The solution shall provide a single lightweight endpoint agent and single user interface for management that delivers all prevention and protection functions or modules without requiring on-premises management servers.
1215.4.2.1.1.2 The solution shall support granular access control on role-based access control (RBAC) and user groups to limit features and access. It shall also support report generation for user access reviews and privileged activities reviews.
1225.4.2.1.1.3 The solution shall offer RESTful API for custom integration via authentication API.
1235.4.2.1.1.4 The solution shall support the creation and management of customized watchlists and Indicators of Compromise (IOCs) for proactive threat detection. This capability must allow administrators to define and monitor specific artifacts including:
124· Domains
125· IP addresses
126· SHA1/SHA2 file hashes
127· Registry keys
128· Filenames
1295.4.2.1.1.5 These custom rules must be fully configurable and integrated into the agent’s detection engine to enable real-time monitoring and alerting based on organization-specific threat intelligence.
1305.4.2.1.1.6 The solution shall support silent, unattended installation and automated removal through standard enterprise tools such as Intune, SCCM, or GPO.
1315.4.2.1.1.7 The solution agent shall be able to be installed, upgraded, or uninstalled from within the management platform interface.
1325.4.2.1.1.8 The solution agent shall be persistent to ensure the host is protected even if an attacker attempts to reboot the host.
1335.4.2.1.1.9 The solution shall provide runtime protection for all running application processes through use of unique and non-contiguous memory addressing space for each running application process. In addition, they shall detect and stop any attempt by any running application process to read beyond its allocated memory addressing space (i.e. in a buffer-overflow attack).
1345.4.2.1.1.10 The solution shall support in-place upgrades using a configurable staggered rollout ring strategy, enabling phased deployment across defined user or device groups. Each rollout ring must be customizable in terms of timing, scope, and criteria for progression to the next ring. Additionally, the solution must include:
135· Automatic rollback mechanisms in the event of upgrade failure, ensuring system stability and continuity.For certain critical, widespread issues caused by Windows updates, Microsoft can use the Windows Update infrastructure to activate a Known Issue Rollback (KIR) to disable the problematic change remotely and automatically on affected consumer devices. This is a Microsoft-driven process, not a client-side triggerable one for MDE-specific updates.
136· Agent self-healing capabilities to detect and repair corrupted or malfunctioning components autonomously.
137· Full execution of the upgrade, rollback, and healing processes without any manual intervention, ensuring a seamless and resilient upgrade experience.
1385.4.2.1.1.11 The solution shall support phased deployment strategy where updates or changes are released in waves or "rings" to different groups of users or systems. The solution shall support ring representation during rollout process:
139· Ring 0: Internal testers or Cybersecurity team (early adopters)
140· Ring 1: Power users or pilot groups
141· Ring 2: Broader user base
142· Ring 3: General availability (everyone)
1435.4.2.1.1.12 The rollout rings shall be customizable and support the following:
144· Who is in each ring
145· When each ring receives the update
146· What conditions must be met before progressing to the next ring
1475.4.2.1.1.13 The solution and agent must implement anti-tampering and self-healing capabilities that prevent attackers – even those with administrator privileges or remote shell access – from disabling or bypassing protection components. Any attempt to terminate, unload, modify, or uninstall security agent must be blocked, logged, and trigger an immediate high-severity alert.
1485.4.2.1.1.14 The solution agent shall operate in co-existence with other endpoint controls, such as other Endpoint Detection and Response (EDR) or Data Loss Prevention (DLP) solution and provide documented guidance for conflict management, exclusion or whitelisting.
1495.4.2.1.1.15 The solution shall be able to support all major Windows versions and major Linux versions.
1505.4.2.1.1.16 The solution shall not inject any code into running processes under any circumstances.
1515.4.2.1.1.17 The solution must be capable of providing full endpoint protection even when the device is disconnected from the Internet or the central management platform. Its core protection capabilities—including threat detection, prevention, and remediation—must remain functionally effective in offline scenarios, with no significant degradation in security performance or coverage.
1525.4.2.1.1.18 The solution shall provide real-time protection for all active application processes by enforcing the use of unique and non-contiguous memory address spaces for each process. This isolation must prevent unauthorized memory access between processes.
1535.4.2.1.1.19 Furthermore, the solution must be capable of detecting and blocking any attempt by a running application to access memory beyond its allocated boundaries, such as in buffer overflow attacks. These protections must operate continuously and autonomously, ensuring robust runtime security without manual intervention.
1545.4.2.1.1.20 The solution agent shall provide the capability to isolate an endpoint from the network, effectively containing potential threats while maintaining secure remote access for forensic investigation and analysis. This isolation must be enforceable remotely and allow authorized personnel to perform diagnostics and evidence collection without reintroducing risk to the broader environment.
1555.4.2.1.1.21 The solution shall support a comprehensive set of automated and remote remediation actions to effectively respond to detected threats. These actions must include:
156· Host isolation to contain compromised endpoints
157· Process termination for malicious or suspicious activities
158· User account disablement and re-enablement
159· Thread suspension to halt harmful execution paths
160· Remote command execution for investigative or corrective tasks
161· Remote data collection for forensic analysis
162· Removal of suspicious files, processes, and threads
163All remediation actions must be executable without manual intervention, ensuring rapid and secure threat response.
1645.4.2.2 Agent Deployment and Architecture Requirements
1655.4.2.2.1 The solution shall utilize a single agent to support all required endpoint, servers, workstations, virtual desktops, machines, and containers.
1665.4.2.2.2 The solution shall not depend on multiple agents, separate installers, or additional components to enable any required protection, detection or telemetry functions.
1675.4.2.2.3 A single universal installer must be provided and must be applicable across all supported operating systems and workload types.
1685.4.2.2.4 Full functionality must be delivered by the same agent on endpoints, servers, workstations, virtual desktops, machines, and containers, without requiring alternative builds or reduced-capability modes.
1695.4.2.2.5 The solution must support efficient, scalable deployment without dependency sequencing, multi-stage installations workflow, or installation of multiple agent components.
1705.4.2.3 Endpoint Protection Platform (EPP) Technical Requirements
1715.4.2.3.1 Policy & Administration
1725.4.2.3.1.1 The solution shall allow logical segmentation of devices using groups or tags for targeted policy application and enforcement.
1735.4.2.3.1.2 The solution shall provide policy versioning with cloning, comparison, rollback, and full change history audit trail.
1745.4.2.3.1.3 The solution shall support segregation-of-duties workflows to ensure operational and security responsibilities are clearly separated. For example:
175· IT staff shall be permitted to perform actions such as deployment and uninstallation of agents or components.
176· Security staff shall retain exclusive authority to approve quarantine restores and other sensitive security decisions.
1775.4.2.3.1.4 This role-based control must be enforceable through policy configuration and audit logging to maintain compliance and accountability. The solution shall provide a test or “monitor-only” or “detection” mode for new rules to validate policies before full enforcement.
1785.4.2.3.2 Threat Prevention & Control
1795.4.2.3.2.1 The solution shall deliver real-time malware prevention using signatures, machine learning, and behavioural models, with full functionality even when offline.
1805.4.2.3.2.2 The solution shall block ransomware behaviours such as rapid encryption, mass renaming, or deletion, and provide one-click restore integration where operating systems support snapshotting.
1815.4.2.3.2.3 The solution shall be capable of detecting and remediating advanced and evasive threats, including but not limited to:
182· Fileless attacks
183· Zero-day exploits
184· Rootkits
185· Keyloggers
186· Memory-based exploits
187· Ransomware
188· Suspicious behaviours and anomalies
189· Malicious macros
190· Process, DLL, and shellcode injection attempts
191· Cryptocurrency mining activities
192Detection must be real-time and behaviour-based, with automated remediation actions to neutralize threats and restore system integrity without manual intervention.
1935.4.2.3.2.4 The solution shall prevent memory-based exploits, including return-oriented programming, heap spray, and shellcode injection, without relying on signatures.
1945.4.2.3.2.5 The solution shall prevent abuse of macros and scripts (for example, Office macros or wscript/jscript) based on configurable policies.
1955.4.2.3.2.6 The solution shall detect and stop fileless techniques and the abuse of living-off-the-land binaries such as PowerShell, certutil, regsvr32, or mshta.
1965.4.2.3.2.7 The solution shall provide application control based on hash, certificate, path, publisher, or reputation, with an optional lockdown mode where only allow-listed binaries may execute.
1975.4.2.3.2.8 The solution shall enforce device control for USB, Bluetooth, and external storage, supporting block, read-only, shadow copy, and USB reputation or adaptive policies.
1985.4.2.3.2.9 The solution shall include browser and network protection, such as phishing defence, malicious URL blocking, DNS tunnelling detection, and command-and-control callback prevention.
1995.4.2.3.2.10 The solution shall utilize the agent-based firewall to enforce host-level network rules that are policy-driven, auditable, and accessible via API.
2005.4.2.3.2.11 The solution shall provide exploit shielding or virtual vulnerability patching capabilities at the endpoint level to protect against both known CVEs and zero-day vulnerabilities. This protection must be effective in scenarios where official patches are:
201· Not yet available
202· Cannot be applied immediately due to operational constraints
203The shielding mechanism must proactively block exploit attempts by simulating patch behaviour, ensuring continued endpoint security until permanent remediation is possible.
2045.4.2.3.3 Performance & Reliability
2055.4.2.3.3.1 The solution shall maintain minimal performance impact, with an average CPU usage of less than or equal to 5% and idle RAM consumption of no more than 250 MB on reference hardware.CPU limit is possible for scheduled scans. However, Memory usage is dynamic and depends on the complexity of files being scanned and the amount of system memory available.
2065.4.2.3.3.2 The solution shall adapt to unfavourable conditions such as low battery or poor network by deferring heavy tasks, while continuing to queue essential telemetry when offline.
2075.4.2.3.3.3 The solution shall support both persistent and non-persistent virtual desktop infrastructure (VDI) with consistent identity recognition and clone-safe identifiers, and support server workloads without loss of features.
2085.4.2.3.3.4 The solution shall enforce performance guardrails with hard CPU and RAM ceilings and provide an emergency safe mode to prevent business disruption if misconfigurations occur.CPU limit is possible for scheduled scans. However, Memory usage is dynamic and depends on the complexity of files being scanned and the amount of system memory available.
2095.4.2.3.4 Telemetry & Reporting
2105.4.2.3.4.1 The solution shall generate structured JSON prevention events that include file path, hash, signer, user, process, detection engine, and policy ID.
2115.4.2.3.4.2 The solution shall export event data through secure and standardized methods such as Syslog over TLS, CEF/LEEF, REST APIs, and webhooks, with automatic retries in case of transmission failure.
2125.4.2.3.4.3 The solution shall provide a published field dictionary for prevention events, along with SIEM mapping guides.
2135.4.2.3.4.4 The solution shall deliver dashboards that highlight endpoint posture, such as coverage gaps, outdated content, non-compliant hosts, and risky applications.
2145.4.2.3.4.5 The solution shall generate compliance reports aligned to frameworks such as ISO, PCI, and PDPA.
2155.4.2.3.4.6 The solution shall raise tamper alerts locally and centrally, surface endpoint risk scores for Zero-Trust integrations, and enrich block logs with threat intelligence context such as indicator age and confidence.
2165.4.2.3.5 Operational Tools
2175.4.2.3.5.1 The solution shall provide secure local quarantine with administrator-controlled restore and allow policy-based auto-isolation triggers for malicious behaviours.
2185.4.2.3.5.2 The solution shall include troubleshooting tools such as diagnostic log collection, agent repair workflows, and API-accessible diagnostics.
2195.4.2.3.5.3 The solution shall support the use of offline update packages and enable secure, signed air-gap workflows through removable media or internal repositories.
2205.4.2.3.5.4 The solution shall publish detailed release notes with every content or engine update, including fixes, new detections, and known limitations.
2215.4.2.3.5.5 The solution shall allow safe file or metadata submission for vendor analysis with privacy controls and support classification tuning for potentially unwanted applications.
2225.4.2.3.5.6 The solution shall enforce immutable audit logs of agent and administrative actions, retaining at least 90 days of change history.
2235.4.2.3.5.7 The solution shall support self-service on-demand scanning enabling users to manually initiate scans of specific files, folders or full drives including removable media (e.g., USB storage). Scans results must be reported both locally to users and centrally to the management console.
2245.4.2.4 Endpoint Detection and Response (EDR) Technical Requirements
2255.4.2.4.1 Telemetry Collection
2265.4.2.4.1.1 The solution agent shall be capable of acquiring a wide range of system artifacts from Windows endpoints to support forensic investigation, threat hunting, and incident response. These artifacts shall include, but not be limited to:
227· System Information (OS version, hostname, uptime)
228· File System Metadata and Access History
229· Drivers and Kernel Modules
230· Kernel Hook Detection
231· Persistence Mechanisms (autoruns, scheduled tasks, services)
232· Registry Keys and Values
233· Event Logs (System, Security, Application)
234· Running Processes and Threads
235· Browser Cache and History
236· Scheduled Tasks and Cron Jobs
237· Network Configuration, Connections, and Traffic Metadata
238· Active and Inactive Services
239· Agent-Generated Events and Logs
240· DLLs and Loaded Modules
241· User Accounts and Privileges
242· Clipboard Contents
243· PowerShell and Command Line Execution History
244· WMI Queries and Scripts
245· Prefetch Files
246· Shim Cache (AppCompat)
247· MFT and USN Journal
248· Memory Dumps and Pagefile Analysis
249· DNS Cache and Resolver History
250· ARP Table and Routing Information
251· SMB Sessions and Shares
252· Remote Desktop Session History
253· Installed Applications and Software Inventory
254· Cloud Integration Artifacts:
255ü Microsoft 365 activity logs (e.g., Outlook, OneDrive, Teams)
256ü Azure AD sign-in and audit logs
257ü Cloud sync status and metadata
258ü Token and credential usage history
259ü Cloud storage access patterns
2605.4.2.4.1.2 The solution agent shall be capable of acquiring system artifacts from Linux endpoints to support forensic analysis and threat detection. These artifacts shall include, but not be limited to:
261· System Information (Kernel version, distro, uptime, hostname)
262· File System Metadata and Access History
263· Running Processes and Threads
264· Scheduled Tasks (cron jobs, systemd timers)
265· Network Configuration, Connections, and Traffic Metadata
266· Active and Inactive Services (systemd, init.d)
267· User Accounts and Groups
268· Shell History and Execution Logs
269· Loaded Kernel Modules
270· System Logs (/var/log, journalctl)
271· SSH Configuration and Session History
272· Installed Packages and Software Inventory
273· Environment Variables
274· Open Ports and Listening Services
275· DNS Configuration and Resolver History
276· ARP Table and Routing Information
277· Memory Dumps and Swap Usage
278· Audit Logs (auditd)
279· SELinux/AppArmor Policies and Violations
280· Container Runtime Metadata (Docker, Podman, etc.)
281· Cloud Integration Artifacts:
282ü Cloud CLI usage history (e.g., AWS CLI, Azure CLI, GCP SDK)
283ü Cloud credential files and token metadata
284ü Cloud sync agents and configuration files
285ü Metadata from cloud-mounted file systems (e.g., S3, Azure Blob)
286ü Logs from cloud-based monitoring agents
2875.4.2.4.1.3 The solution shall collect detailed process telemetry, including start and stop events, command-line arguments, parent and child relationships, signer, hash, module loads, and integrity levels with precise timestamps.
2885.4.2.4.1.4 The solution shall collect file telemetry covering creation, modification, and deletion, including file path, hash, and initiating process, with support for alternate data streams where applicable.
2895.4.2.4.1.5 The solution shall collect persistence-related changes such as new or modified services, drivers, scheduled tasks, and registry or plist modifications, while retaining both before-and-after values.
2905.4.2.4.1.6 The solution shall collect network telemetry, including connection and listening events, along with associated process, protocol, ports, bytes transferred, and communication direction.
2915.4.2.4.1.7 The solution shall collect DNS telemetry, mapping query and response data to the originating process.
2925.4.2.4.1.8 The solution shall capture authentication events including local and remote logons, session creation, source, and result codes.
2935.4.2.4.1.9 The solution shall collect telemetry from interpreters and scripts (such as PowerShell, AMSI, wscript, or cscript) where supported by the operating system.
2945.4.2.4.1.10 The solution shall provide in-memory and injection indicators, such as reflective module loads and thread injection signatures, wherever the operating system allows.
2955.4.2.4.1.11 The solution shall locally buffer telemetry during network outages and ensure orderly data backfill once connectivity is restored.
2965.4.2.4.1.12 The solution shall retain telemetry in hot searchable storage for a minimum of 90 days.
2975.4.2.4.2 Detection and Analysis
2985.4.2.4.2.1 The solution shall leverage behavioural analytics, machine learning, and telemetry correlation to detect and respond to sophisticated APT techniques. Detection capabilities must include, but not be limited to:
2995.4.2.4.2.1.1 Living-off-the-Land (LOTL) Techniques
300· Abuse of legitimate tools (e.g., PowerShell, WMI, PsExec, CertUtil, Rundll32)
301· Fileless execution and script-based attacks
302· Use of native OS utilities for lateral movement, data staging, or exfiltration
3035.4.2.4.2.1.2 Multi-Stage Attack Chains
304· Detection of attack progression from initial access to persistence, privilege escalation, lateral movement, and exfiltration
305· Correlation of events across time and endpoints to identify stealthy campaigns
3065.4.2.4.2.1.3 Credential Access and Abuse
307· Credential dumping (e.g., LSASS memory access, Mimikatz)
308· Pass-the-Hash, Pass-the-Ticket, and Kerberoasting
309· Abuse of cached credentials or token theft
3105.4.2.4.2.1.4 Persistence Mechanisms
311· Registry and scheduled task manipulation
312· Service creation/modification
313· DLL sideloading and hijacking
314· WMI event subscriptions
3155.4.2.4.2.1.5 Privilege Escalation
316· Exploitation of vulnerable drivers or services
317· Bypassing User Account Control (UAC)
318· Token manipulation and impersonation
3195.4.2.4.2.1.6 Lateral Movement
320· Remote service creation
321· SMB/NTLM relay attacks
322· Remote desktop protocol (RDP) abuse
323· Remote WMI or PowerShell execution
3245.4.2.4.2.1.7 Defence Evasion
325· Obfuscated or encrypted payloads
326· Disabling security tools or logging
327· Use of signed binaries for malicious purposes
328· Time-based execution delays
3295.4.2.4.2.1.8 Command and Control (C2) Detection
330· Beaconing behaviour and periodic callbacks
331· Use of DNS tunnelling, HTTPS, or cloud services for C2
332· Detection of anomalous outbound traffic patterns
3335.4.2.4.2.1.9 Data Collection and Exfiltration
334· Staging of sensitive files
335· Compression and encryption of data
336· Use of cloud storage or covert channels for exfiltration
3375.4.2.4.2.1.10 Threat Simulation and Emulation Detection
338· Identification of red team tools (e.g., Cobalt Strike, Metasploit, Empire)
339· Detection of known TTPs mapped to MITRE ATT&CK framework
3405.4.2.4.2.2 Detection must be real-time, context-aware, and capable of correlating telemetry across endpoints to surface complex attack sequences that traditional signature-based methods may miss.
3415.4.2.4.2.3 The solution shall detect ransomware across all attack stages, including initial access, staging, shadow copy deletion, and encryption activity.
3425.4.2.4.2.4 The solution shall detect persistence and privilege-escalation techniques with reliable context.
3435.4.2.4.2.5 The solution shall support real-time and historical matching of indicators of compromise (IOC), indicators of attack (IOAs), and YARA rules.
3445.4.2.4.2.6 The solution shall support retrospective hunting by re-evaluating historical telemetry when new threat intelligence becomes available.
3455.4.2.4.2.7 The solution shall automatically map all detections to MITRE ATT&CK techniques and sub-techniques.
3465.4.2.4.2.8 The solution shall compute dynamic risk scores for hosts, users, and processes based on observed behaviours, prevalence, and asset criticality.
3475.4.2.4.3 Investigation & Hunting
3485.4.2.4.3.1 The solution shall provide visual process trees and timelines to reconstruct incidents from initiation to resolution.
3495.4.2.4.3.2 The solution shall allow investigation pivots across entities such as host, user, file hash, domain, and IP address within a single interface.
3505.4.2.4.3.3 The solution shall allow threat hunting to be saved and scheduled, and automatically generate alerts when matches are found.
3515.4.2.4.3.4 The solution shall include prebuilt hunting queries for common adversary behaviours such as beaconing, credential dumping, and persistence techniques.
3525.4.2.4.3.5 The solution shall provide case management features, including notes, tags, attachments, task assignments, SLA tracking, and linking of related cases.
3535.4.2.4.3.6 The solution shall support remote investigation capabilities, including the export of forensic bundles (files, logs, and memory snapshots) with chain-of-custody integrity.
3545.4.2.4.3.7 The solution shall support API-driven hunting and investigation workflows to enable automation and integration with third-party systems.
3555.4.2.4.4 Response & Containment
3565.4.2.4.4.1 The solution shall support remote network isolation of endpoints, with options for full isolation or egress-allowlists, and allow timed or manual release.
3575.4.2.4.4.2 The solution shall allow remote process termination and file quarantine or restore, maintaining full audit trails for all actions.
3585.4.2.4.4.3 The solution shall allow the enforcement of block lists based on file hash or signature, preventing future executions of known malicious binaries.
3595.4.2.4.4.4 The solution shall support scripted remediation tasks such as removing persistence mechanisms or restoring system configurations, with a dry-run mode for validation prior to enforcement.
3605.4.2.4.4.5 The solution shall provide ransomware rollback and file restoration capabilities where supported by operating system journaling or snapshots features.
3615.4.2.4.4.6 The solution shall provide ransomware rollback and file restoration capabilities, leveraging operating system journaling, snapshot features, or equivalent mechanisms where supported. This functionality must:
362· Automatically restore files encrypted or deleted by ransomware attacks
363· Utilize native OS features such as Windows Volume Shadow Copy, macOS Time Machine, or Linux LVM snapshots
364· Ensure rollback is secure, verifiable, and tamper-resistant
365· Operate with minimal disruption to the user or system
366· Be integrated with detection logic to trigger rollback only upon confirmed malicious activity
367· Retain rollback points for a configurable duration to support post-incident recovery
3685.4.2.4.4.7 The solution shall enable secure live response through a remote shell, controlled file and memory collection, and role-based access approvals.
3695.4.2.4.4.8 The solution shall immutably log all response actions, capturing the actor’s identity, timestamp, target, and the outcome of each action.
3705.4.2.4.4.9 The solution must support temporary isolation exceptions for clustered or mission-critical systems, with automatic reversion to standard settings.
3715.4.2.4.4.10 The solution shall apply server-aware containment strategies to avoid outages in clustered or high-availability environments.
3725.4.2.4.4.11 The solution must support read-only data collection from operational technology (OT) and industrial control systems (ICS) endpoints, without initiating any active response actions.
3735.4.2.4.5 Performance & Scalability
3745.4.2.4.5.1 The solution must be capable of scaling to support a minimum of 10,000 endpoints per tenant, while maintaining consistent performance as the number of endpoints increases.
3755.4.2.4.5.2 The solution shall achieve median ingest latency of less than 60 seconds from endpoint event to searchable record.Armor cannot guarantee Microsoft platform SLOs
3765.4.2.4.5.3 The solution must successfully execute 95% of isolation commands on online endpoints within 30 seconds.Armor cannot guarantee Microsoft platform SLOs
3775.4.2.4.5.4 The solution shall complete 95% of standard seven-day queries in under five seconds, based on the defined ingestion volume.Armor cannot guarantee Microsoft platform SLOs
3785.4.2.4.5.5 The solution shall maintain an API uptime of at least 99.9% and a data pipeline availability of 99.99%, with published Service Level Objectives (SLOs).Armor cannot guarantee Microsoft platform SLOs
3795.4.2.4.5.6 The solution shall maintain backward compatibility for endpoint agents for a minimum of 24 months, with a clearly documented deprecation policy.Microsoft doesn't provide a fixed period for Defender support (like 24-months), however, Microsoft will inform through various channels (in-product, emails, documentations and blogposts) about O/S that are reaching EOS. In such circumstances where Windows O/S are EOS, Defender XDR/MDE will still provide protection for those O/S, including product updates. For reference, Microsoft recently announced a new MDE deployment tool for Windows 7 SP1 and Windows Server 2008 R2 and Windows Server 2012 that continue to provide advanced protection for these O/S.
3805.4.2.4.6 Noise Reduction & Case Handling
3815.4.2.4.6.1 The solution must include workflows for reducing alert noise, such as suppression rules with configurable expiration and review options, and must provide precision and recall metrics to evaluate detection accuracy.
3825.4.2.4.6.2 The solution shall support legal hold and evidence retention policies that are configurable on a per-case basis.
3835.4.2.4.6.3 The solution shall ensure secure tenant data segregation and evidence handling in multi-tenant cloud environments.
3845.4.2.4.6.4 The solution shall publish a telemetry schema with field definitions, data types, units, and time zones, along with versioning and deprecation notices.
3855.4.2.4.6.5 The solution shall detect endpoint identity spoofing (such as hostname or user tampering) and flag telemetry anomalies.
3865.4.2.4.6.6 The solution shall baseline per-host process behaviours to aid anomaly scoring, without overlapping with UEBA features.
3875.4.2.4.6.7 The solution shall disclose query concurrency limits and rate limits and shall queue and estimate completion time for large hunts.
3885.4.2.4.6.8 The solution must enforce the use of signed remediation scripts, incorporate a code review process and track the origin and history of each script.
3895.4.2.4.6.9 The solution must support memory capture where technically feasible, ensuring encryption at the point of collection, integrity verification through hashing, and data segmentation via chunking.
3905.4.2.4.6.10 The solution shall allow registry or plist backup and restore before executing destructive remediation actions.
3915.4.2.4.6.11 The solution must support the use of hash-based cataloguing of evidence artifacts across cases to enhance storage efficiency and accelerate investigations.
3925.4.2.4.6.12 The solution must automatically associate related cases on shared indicators or stages in the kill chain and visually group them into clusters for streamlined analysis.
3935.4.2.4.6.13 The solution shall provide alert deduplication heuristics configurable per rule, using time windows and similarity thresholds.
3945.4.2.4.6.14 The solution shall surface behavioural anomalies unique to a host, such as rare service creation or unusual autorun entries.
3955.4.2.4.6.15 The solution shall automate endpoint tagging (e.g., “Compromised” or “Needs Patch”) based on detection outcomes with time-to-live expiry.
3965.4.2.4.6.16 The solution shall support content lifecycle management with development, test, and production spaces, allowing staged promotion and rollback of detection rules.
3975.4.2.4.6.17 The solution shall provide a vendor false-positive appeal process with SLAs for resolution and interim suppression measures.
3985.4.2.5 Extended Detection and Response (XDR) Technical Requirements
3995.4.2.5.1 Data Ingestion and Normalization
4005.4.2.5.1.1 The solution shall support ingestion of telemetry from multiple security-relevant domains, enabling unified visibility, correlation, and advanced analytics across diverse environments. Supported telemetry sources shall include, but not be limited to:
4015.4.2.5.1.1.1 Endpoint
402· Process, file, memory, and network activity
403· Behavioural indicators and threat detections
404· EDR and agent-generated events
4055.4.2.5.1.1.2 Firewall / IDS / NDR
406· Network traffic metadata and flow records
407· Intrusion detection/prevention alerts
408· Protocol anomalies and lateral movement indicators
4095.4.2.5.1.1.3 DNS and Proxy
410· DNS query and response logs
411· Proxy access logs and URL filtering events
412· Indicators of tunnelling, domain generation algorithms (DGA), and C2 activity
4135.4.2.5.1.1.4 Email Security
414· Email delivery and filtering logs
415· Phishing detection and sandbox results
416· Attachment and link analysis metadata
4175.4.2.5.1.1.5 Identity and IAM
418· Authentication and authorization events
419· Privilege escalation and role changes
420· Federation and SSO activity
421· MFA status and anomalies
4225.4.2.5.1.1.6 CASB and SaaS
423· Cloud application usage and access patterns
424· Data movement and sharing events
425· Policy violations and shadow IT detection
4265.4.2.5.1.1.7 Cloud Audit and Workload
427· Cloud provider audit logs (e.g., AWS CloudTrail, Azure Activity Logs)
428· VM/container activity and lifecycle events
429· API calls, resource provisioning, and configuration changes
4305.4.2.5.1.1.8 OT and IoT (where applicable)
431· Device telemetry and protocol-specific logs (e.g., Modbus, OPC-UA)
432· Asset inventory and firmware status
433· Behavioural anomalies and unauthorized access attempts
4345.4.2.5.1.2 The solution shall support push, pull, streaming (e.g., webhooks, Kafka), and batch ingestion methods.
4355.4.2.5.1.3 The XDR solution shall meet the following ingestion latency performance targets under normal operating conditions:
4365.4.2.5.1.3.1 Endpoint Telemetry
437· Ingestion latency shall not exceed 15 seconds from data generation to availability in the XDR platform for analysis and correlation.Armor cannot guarantee Microsoft platform SLOs
438· Applies to real-time endpoint events such as process creation, file access, and network connections.Armor cannot guarantee Microsoft platform SLOs
4395.4.2.5.1.3.2 Identity and Email Signals
440· Ingestion latency shall not exceed 60 seconds from event occurrence to availability in the XDR platform.Armor cannot guarantee Microsoft platform SLOs
441· Includes identity-related events (e.g., login attempts, MFA challenges) and email telemetry (e.g., phishing detection, message delivery status).
4425.4.2.5.1.3.3 Cloud Audit Logs
443· Ingestion latency shall not exceed 120 seconds from log generation to ingestion into the XDR platform.
444· Includes logs from cloud platforms (e.g., AWS CloudTrail, Azure Activity Logs, GCP Audit Logs).
4455.4.2.5.1.3.4 Measurement Criteria
446· Latency shall be measured from the timestamp of the original event/log to the time it becomes queryable and usable for detection, alerting, or investigation within the XDR console or API.Armor cannot guarantee Microsoft platform SLOs
447· Vendors shall provide documentation or benchmarks demonstrating compliance with these latency targets under typical workloads.
4485.4.2.5.1.3.5 Scalability and Load Conditions
449· The solution shall maintain ingestion latency targets under scalable conditions, with the ability to handle increased data volumes without degradation in performanceWhile Microsoft Defender XDR is designed to handle large volumes of data, we cannot guarantee latency targets
450· Vendors shall describe how latency is affected by scale and provide tuning or architectural recommendations.
4515.4.2.5.1.3.6 Monitoring and SLA
452· The solution shall include built-in telemetry or dashboards to monitor ingestion latency.
453· Vendors shall commit to latency SLAs or provide mechanisms to alert when thresholds are breached.Armor cannot guarantee Microsoft platform SLOs
4545.4.2.5.1.4 The solution shall allow source-level filtering, sampling, and field suppression to reduce noise and control cost.
4555.4.2.5.1.5 The solution shall normalize all ingested data to a consistent and documented schema (e.g., OCSF-like mapping) with clear versioning.
4565.4.2.5.1.6 The solution must keep original event details and source information to support auditing.
4575.4.2.5.2 Context Enrichment & Asset Intelligence
4585.4.2.5.2.1 The solution shall perform entity resolution across users, accounts, devices, IP addresses, and SaaS identities, providing confidence scores for linkage.
4595.4.2.5.2.2 The solution shall maintain an asset inventory enriched with ownership, business criticality, and data classification attributes.
4605.4.2.5.2.3 The solution shall enrich telemetry with context such as reputation data, CMDB tags, vulnerability and exposure information, and business metadata.
4615.4.2.5.3 Detection and Analytics
4625.4.2.5.3.1 The solution shall provide a correlation engine capable of analysing temporal sequences, sliding windows, and threshold logic.
4635.4.2.5.3.2 The solution shall support machine-learning based correlation that identifies cross-domain attack patterns.
4645.4.2.5.3.3 The solution shall stitch together attack paths into unified incidents that combine signals from multiple domains.
4655.4.2.5.3.4 The solution shall calculate risk scores at both entity and incident levels to support triage prioritization.
4665.4.2.5.3.5 The solution shall automatically map incidents to MITRE ATT&CK and provide coverage dashboards with gap analysis.
4675.4.2.5.3.6 The solution shall include UEBA baselining of peer groups to detect behavioural anomalies.
4685.4.2.5.3.7 The solution shall detect and respond to a wide range of new or current adversarial tactics, techniques, and procedures (TTPs) as defined by the MITRE ATT&CK framework. Detection must include, but is not limited to:
4695.4.2.5.3.7.1 Identity and Access anomalies such as impossible travel, unusual OAuth grants, token theft, MFA fatigue, and Golden SAML indicators.
4705.4.2.5.3.7.2 Credential abuse including credential dumping, pass-the-hash, pass-the-ticket, NTLM downgrade attacks, and Kerberoasting.
4715.4.2.5.3.7.3 Kerberos-based threats such as Golden Ticket, Silver Ticket, and abnormal service ticket usage.
4725.4.2.5.3.7.4 Protocol abuse and relay attacks involving SMB relay, DCE/RPC misuse, WMI exploitation, and lateral movement via remote services.
4735.4.2.5.3.7.5 Fileless and Living-off-the-Land (LOTL) techniques using PowerShell, WMI, Rundll32, MSHTA, and signed binaries.
4745.4.2.5.3.7.6 Insider threat behaviours including off-hours access, privileged misuse, shadow IT usage, and attempts to disable security controls.
4755.4.2.5.3.7.7 Data staging and exfiltration such as anomalous data aggregation, compression/encryption prior to transfer, and cloud storage abuse.
4765.4.2.5.3.7.8 Email and communication threats including business email compromise (BEC), phishing, and social engineering.
4775.4.2.5.3.7.9 Command and Control (C2) behaviours such as beacon periodicity, domain generation algorithms (DGA), DNS tunnelling, and fallback channels.
4785.4.2.5.3.7.10 Persistence and privilege escalation via registry keys, process injection, service creation, and exploitation of vulnerabilities.
4795.4.2.5.3.7.11 Defence evasion techniques including obfuscation, disabling security tools, timestamping, and indicator removal.
4805.4.2.5.3.7.12 Discovery and reconnaissance such as account enumeration, network scanning, and Active Directory group discovery.
4815.4.2.5.3.7.13 Execution techniques including script interpreters, exploitation for client execution, and native API abuse.
4825.4.2.5.3.7.14 Impact techniques such as ransomware encryption, service disruption, and system recovery inhibition.
4835.4.2.5.3.7.15 Cloud-specific threats including abuse of cloud credentials, cloud account brute force, and unauthorized access to cloud storage.
4845.4.2.5.3.7.16 Supply chain and third-party abuse involving compromised dependencies, software supply chain manipulation, and third-party account misuse.
4855.4.2.5.3.7.17 Container and virtualization threats such as container escape, image modification, and host compromise.
4865.4.2.5.3.7.18 Mobile and IoT threats including credential dumping, malicious app delivery, and radio interface exploitation.
4875.4.2.5.3.7.19 Advanced evasion and anti-forensics such as file deletion, hidden users, and stealthy persistence mechanisms.
4885.4.2.5.3.7.20 AI/ML-based threats including prompt injection, model evasion, and abuse of AI-powered automation.
4895.4.2.5.3.7.21 Pre-attack indicators such as external reconnaissance, credential stuffing, and dark web mentions of internal assets.
490Detection must leverage telemetry correlation, behavioural analytics, machine learning, and threat intelligence to identify known and unknown threats across endpoint, identity, network, cloud, and application layers.
4915.4.2.5.3.8 The solution shall incorporate Explainable AI (XAI) capabilities to ensure transparency and trust in automated threat detection. It shall:
492· Surface feature importance, highlighting the key data attributes or behavioural signals that contributed most to a detection decision (e.g., login location, process behaviour, token or privilege anomalies, lateral-movement indicators).
493· Provide decision rationale, including clear human-interpretable summaries of model outputs, scoring or confidence thresholds, behavioural correlations and the contributing telemetry sources used in the detection.
494· Support analyst feedback loops, enabling security analysts to:
495ü Confirm or reject detections.
496ü Provide contextual input to improve model accuracy and relevance.
497ü Tune the sensitivity or importance of specific detection rules, behaviours, or baselines to refine future detections.
498· Maintain a feedback audit trail to track analyst interactions, model adjustments, behaviour-baseline changes, and the evolution of detection logic over time.
499· Ensure that AI-driven detections are auditable, reproducible, and adjustable, providing consistent, transparent, and explainable outputs that meet operational, and compliance requirements.
5005.4.2.5.4 Incident Response and Orchestration
5015.4.2.5.4.1 The solution shall include a visual playbook editor with version control, test and simulation modes, error handling, and retry mechanisms.
5025.4.2.5.4.2 The solution shall orchestrate response actions across multiple domains, such as isolating endpoints, blocking firewall traffic, disabling IdP accounts, purging emails, revoking SaaS sessions, or rotating cloud keys.
5035.4.2.5.4.3 The XDR solution shall support automated and orchestrated response actions across multiple security domains, enabling rapid containment and mitigation of threats. The solution must be capable of executing the following actions:
5045.4.2.5.4.3.1 Endpoint Security
505· Isolate compromised endpoints from the network
506· Terminate malicious processes or sessions
507· Trigger endpoint scans or remediation scripts
5085.4.2.5.4.3.2 Network and Firewall
509· Block IP addresses, domains, or URLs at the firewall or proxy level
510· Modify firewall rules or access control lists (ACLs)
511· Quarantine affected network segments or VLANsCustom Automation needed
5125.4.2.5.4.3.3 Identity and Access Management (IdP)
513· Disable or suspend user accounts in identity providers (e.g., Microsoft Entra ID, Okta)
514· Revoke active sessions or tokens
515· Enforce password resets or MFA challenges
5165.4.2.5.4.3.4 Multi-Factor Authentication
517· Enforce step-up or adaptive MFA policies
518· Block or restrict access based on risk signals
519· Trigger MFA challenges or session terminations in real time
5205.4.2.5.4.3.5 Email and Collaboration (Microsoft 365)
521· Purge malicious or suspicious emails from Exchange Online mailboxes
522· Block sender domains or URLs in Microsoft Defender for Office 365
523· Quarantine or reclassify messages
524· Disable or restrict access to SharePoint Online, OneDrive, or Teams resources
5255.4.2.5.4.3.6 Cloud and SaaS Platforms
526· Revoke OAuth tokens or API keys
527· Rotate compromised cloud access keys or credentials
528· Disable or restrict access to affected cloud resources or SaaS apps (e.g., Microsoft 365, AWS, Google Workspace)
5295.4.2.5.4.3.7 Additional Requirements
530· Response actions must be automated, manual, or hybrid, with full audit logging.
531· The solution shall support role-based access control (RBAC) for response actions.
532· Orchestration must be policy-driven and integrated with playbooks.
533· Vendors shall provide a list of supported integrations and APIs, including Microsoft 365 security and compliance APIs.
5345.4.2.5.4.4 The solution shall enforce approval gates for high-impact steps and implement RACI models to define who can approve or execute actions.
5355.4.2.5.4.5 The solution shall integrate with ITSM systems to open, update, and close tickets, as well as with collaboration platforms for priority incidents.
5365.4.2.5.4.6 The solution shall provide prebuilt automated playbooks and detection logic for the following common threat scenarios, each with measurable time-to-detect and time-to-contain objectives.
5375.4.2.5.4.7 Playbooks must be customizable, support manual override, and integrate with external SOAR or ITSM platforms.
5385.4.2.5.4.8 Detection logic must be continuously updated by the vendor to reflect emerging threats.
5395.4.2.5.4.9 The solution shall provide audit logs, execution reports, and metrics dashboards for both detection and response workflows.
5405.4.2.5.4.10 Each scenario must include predefined detection rules, behavioural analytics, or machine learning models capable of identifying threats with high fidelity.
541Detection logic must support:
542· MITRE ATT&CK mapping
543· False positive reduction mechanisms
544· Custom rule creation and tuning
545Time-to-detect shall be:
546· ≤ 1 minute for endpoint-based threatsWhile Microsoft defender has near real time detections, there are no SLOs/SLAs that can be guaranteed for the product
547· ≤ 5 minutes for identity, email, or cloud-based threatsWhile Microsoft defender has near real time detections, there are no SLOs/SLAs that can be guaranteed for the product
5485.4.2.5.4.11 Automated Playbooks and Containment Objectives
5505.4.2.5.4.12 The solution shall provide a unified, cloud-native Incident Lifecycle Management Framework that seamlessly integrates detection, triage, investigation, containment, eradication, recovery, and closure within a single operational platform.
5515.4.2.5.4.13 The framework shall be natively integrated with telemetry, analytics, and orchestration capabilities, enabling automated detection-to-response workflows, dynamic SLA management, and evidence-grade auditability.
5525.4.2.5.4.14 The Solution shall align with industry standards such as NIST SP 800-61 r2, MITRE ATT&CK, and SANS Incident-Handling methodologies, and must facilitate continuous SOC maturity improvement through automation, analytics, and machine-learning insights.
5535.4.2.5.4.14.1 Lifecycle Tracking
554· The Solution shall maintain a single, persistent incident object across all lifecycle phases, automatically correlating alerts, detections, and analyst actions.
555· Each incident shall display clear and configurable status indicators (Open, In Progress, Contained, Resolved, Closed), updated in real time.
556· Automated workflow orchestration shall be supported, allowing incident transitions and task assignments to be triggered by detection rules, playbooks, or API integrations.
557· The Platform shall provide role-based workspace for analysts, responders, and auditors, offering contextual views of the same incident without data duplication.
558· Built-in secure collaboration (threaded comments, task tagging, attachments) shall ensure evidentiary continuity and reduce context-switching.
559· The Solution shall support bi-directional synchronisation with enterprise ITSM platforms to maintain consistent case tracking and SLA alignment.
560· The architecture shall enable cloud-scale multi-tenant management, allowing segmentation by business units, environment, or region while preserving central oversight.
5615.4.2.5.4.14.2 SLA Timers
562· The Solution shall provide real-time SLA telemetry across each incident phase, including time-to-detect, time-to-acknowledge, time-to-contain, time-to-remediate, and time-to-close.
563· SLA policies shall be fully configurable based on severity, asset classification, or detection source, and enforceable through automated escalation or reassignment.
564· The system shall automatically notify relevant stakeholders of potential SLA breaches through integrated channels
565· SLA performance data shall be continuously collected, visualized, and exportable, supporting metrics such as MTTD, MTTR, and containment efficiency.
566· The Solution shall employ machine-learning-driven trend analysis to identify performance bottlenecks and recommend optimization of response workflows.
567· SLA breaches and compliance records shall be retained as immutable audit data for governance and performance reporting.
5685.4.2.5.4.14.3 Evidentiary Bundles
569· The Solution shall automatically generate evidentiary bundles for every incident, including:
570ü Alert and detection metadata, correlated telemetry, and enriched threat intelligence.
571ü Analyst actions, investigation steps, and timeline commentary.
572ü Playbook execution logs and orchestration results.
573ü Containment, remediation, and verification actions.
574ü Chronological event timelines with timestamps.
575· All evidentiary data shall be cryptographically timestamped and hash-verified to ensure forensic integrity.
576· Bundles shall be retained in tamper-evident cloud storage with configurable retention and access control.
577· Evidentiary packages shall be exportable in open and structured format (e.g., PDF, JSON, STIX 2.0) for legal, regulatory, or forensic use.
578· The Solution shall support redaction, anonymization, and version control to enable secure sharing with third parties and compliance reviewers.
579· The system shall support direct evidence replay from stored telemetry for re-analysis or validation.
5805.4.2.5.4.14.4 Reporting and Audit
581· The Solution shall include dynamic dashboards and interactive reporting covering incident volume, classification, SLA adherence, and resolution metrics.
582· The reporting engine shall support drill-down visualization to link incident outcomes to threat categories, affected assets, and contributing controls.
583· The platform shall enable post-incident reviews and root-cause analysis (RCA) with built-in templates and automated data population.
584· Reports shall be mapped to regulatory and governance frameworks (e.g., NIST CSF, ISO 27035) to demonstrate compliance readiness.
585· Complete audit trails shall capture every user action, approval, data modification, and automation execution, retained per policy in immutable logs.
586· The Solution shall leverage AI-driven analytics to surface recurring threat vectors, analyst workload trends, and opportunities for automated response optimization.
5875.4.2.4.4.13.5 Continuous Improvement and Automation
588· The Solution shall incorporate a closed feedback loop between detection, response, and threat-hunting modules, enabling continuous enhancement of detection logic and response playbooks.
589· Incident learning, playbook outcomes, and containment results shall automatically feed into detection-rule tuning and future automation decisions.
590· The Solution shall expose open APIs and an automation framework for integrations with security, IT, and cloud ecosystems to orchestrate containment or remediation actions at scale.
591· The platform shall provide automation efficacy metrics (e.g., percentage of incidents automatically contained or remediated, false-positive suppression rate).
592· The Solution shall support low-code/no-code orchestration to allow authorized SOC engineers to create and modify playbooks without development effort.
5935.4.2.5.5 Dashboards, Reporting, and Compliance
5945.4.2.5.5.1 The solution shall provide role-based dashboards tailored for SOC analysts, leadership, and compliance officers, with configurable KPIs.
5955.4.2.5.5.2 The XDR solution shall provide visual dashboards and reporting capabilities to support operational visibility and performance tracking. Specifically, the solution must visualize:
5965.4.2.5.5.2.1 Incident and Threat Trends
597· Volume and types of incidents over time
598· Detection sources and affected domains
599· Recurring threat patterns and campaign indicators
6005.4.2.5.5.2.2 Operational Metrics
601· Mean Time to Detect (MTTD): Average time from threat occurrence to detection
602· Mean Time to Respond (MTTR): Average time from detection to containment or remediation
603· SLA compliance tracking for detection and response phases
6045.4.2.5.5.2.3 Risk-Based Insights
605· Riskiest users based on behavioural anomalies, access patterns, and incident involvement
606· Riskiest assets based on vulnerability exposure, threat activity, and criticality
607· Risk scoring models must be transparent and customizable
6085.4.2.5.5.2.4 Detection Coverage
609· Coverage across MITRE ATT&CK techniques and tactics
610· Visibility into detection gaps by data source or telemetry type
611· Mapping of detection rules to threat intelligence and known attack patterns
6125.4.2.5.5.3 The solution shall export reports in PDF, CSV, and JSON formats and provide a reporting API.
6135.4.2.5.5.4 The solution shall maintain immutable audit logs of all user and system actions with long-term retention.
6145.4.2.5.5.5 The solution shall offer PII minimization or pseudonymization in dashboards and reports, with workflows for authorized reveal.
6155.4.2.5.5.6 The solution shall provide compliance support by surfacing campaign clustering, Zero-Trust risk scoring, and audit-ready documentation.
6165.4.2.5.6 Scalability, Performance, and Availability
6175.4.2.5.6.1 The solution shall elastically scale to handle at least 200,000 events per second per tenant, with documented performance guidelines.
6185.4.2.5.6.2 The solution shall meet Service Level Objectives (SLOs) for ingestion latency, console availability, and action execution, and report on breaches of those SLOs.Armor cannot guarantee Microsoft platform SLOs
6195.4.2.5.6.3 The solution shall provide sandbox or test tenants with workflows for promoting content to production.
6205.4.2.5.6.4 The solution shall provide data flow documentation, and support for subsidiaries through cross-tenant federation while maintaining privacy boundaries.
6215.4.2.5.6.5 The solution shall support RWS-managed encryption keys and enforce key rotation policies, if applicable.
6225.4.2.5.6.6 The solution shall provide data tiering (hot, warm, cold) and policy-driven retention by source.
6235.4.2.5.6.7 The solution shall expose usage analytics for ingestion volumes, storage tiers, query costs, and top-talker sources.
6245.4.2.5.7 Threat Intelligence and Hunting
6255.4.2.5.7.1 The XDR solution shall support integration with external threat intelligence platforms and standards, enabling automated enrichment, correlation, and response. Specifically:
6265.4.2.5.7.1.1 Standards and Protocols
627Must support ingestion and sharing of threat intelligence using:
628· STIX 2.x (Structured Threat Information Expression)
629· TAXII 2.x (Trusted Automated Exchange of Intelligence Information)
630· MISP (Malware Information Sharing Platform)
631· OpenCTI (Open Cyber Threat Intelligence Platform) via its GraphQL API or connector framework
6325.4.2.5.7.1.2 Functional Requirements
633The solution shall:
634· Parse and normalize threat indicators (IOCs) from STIX/TAXII, MISP, and OpenCTI feeds.
635· Support scoring of threat indicators based on source reputation, confidence level, and contextual relevance.
636· Perform deduplication of overlapping or repeated indicators across multiple feeds.
637· Implement expiry management to automatically retire outdated or invalid indicators based on TTL, confidence decay, or source metadata.
6385.4.2.5.7.1.3 Operational Requirements
639Threat intelligence must be usable in:
640· Detection rules and correlation logic
641· Automated playbooks and response workflows
642· Dashboards and investigation views
6435.4.2.5.7.2 The solution shall re-evaluate historical data automatically against new intelligence within a defined window and open new cases where matches are found.
6445.4.2.5.7.3 The solution shall integrate sandbox detonation verdicts and correlate observed behaviours with endpoint, email, and identity events.
6455.4.2.5.7.4 The solution shall enrich incidents with adversary or actor intelligence, including known TTPs, infrastructure, and targets, along with confidence scoring.
6465.4.2.5.7.5 The solution shall provide hooks for attack simulation frameworks to validate detections and playbooks on demand in a non-production scope.
6475.4.2.5.7.6 The solution shall support retro-hunts based on new intelligence and deduplicate positive matches.
6485.4.2.5.7.7 The solution shall support YARA-based or IOC pack ingestion pipelines with deduplication, expiry, and tagging of matches to active cases.
6495.4.2.5.8 Integration and Extensibility
6505.4.2.5.8.1 The solution shall expose near-parity public APIs for all console functions, accompanied by SDKs and sample code.Most console functions have public API
6515.4.2.5.8.2 The solution shall provide connector SDKs and documentation for custom integrations.
6525.4.2.5.8.3 The solution shall integrate with downstream enforcement points and external knowledge bases through open formats such as JSON-LD.
6535.4.2.5.8.4 The solution shall integrate cloud provider logs (AWS, Azure Defender, GCP Audit/SCC), Kubernetes audit, and container runtime telemetry.
6545.4.2.5.8.5 The solution shall support ingestion of SaaS audit logs (e.g., M365/Graph) including OAuth scopes and consent events, and detect risks such as OAuth consent abuse, app-only tokens, suspicious mailbox rules, and unauthorized delegated access.
6555.4.2.5.9 Data Storage and Retention
6565.4.2.5.9.1 The Solution must support multi-tiered storage options – such as hot/active tier, warm/infrequent tier, cold/archive tier – to optimize performance and cost efficiency.
6585.4.2.5.10 Search and Query Capabilities
6595.4.2.5.10.1 The solution shall provide a pipeline or pipe-chaining query language with rich functions to filter, parse, transform, aggregate, join, and visualize data.
6605.4.2.5.10.2 The solution shall include function packs for common operations such as regex, conditional logic, and parsing helpers, with documented examples and best practices.
6615.4.2.5.10.3 The solution shall allow schema-on-read flattening for formats such as JSON, syslog, and CSV, while supporting field transforms including parse-json, URL decode, base64 decode, IP/CIDR operations, and type casting.
6625.4.2.5.10.4 The solution shall support index-free search so that new events are immediately searchable without requiring pre-indexing, enabling rapid scans of fresh data at scale.
6635.4.2.5.10.5 The XDR solution shall ensure that hot-tier search queries (i.e., searches over recently ingested and indexed data) meet the following latency performance targets:
6645.4.2.5.10.6 Search Latency Requirements
665· Indexed lookups within the past 24 hours: Search results shall be returned in ≤ 3 seconds.Armor cannot guarantee Microsoft platform SLOs
666· Searches over the past 7 days: Search results shall be returned in ≤ 7 seconds.
667· Searches over the past 30 days: Search results shall be returned in ≤ 15 seconds.
6685.4.2.5.10.7 Latency shall be measured from the time the query is submitted to the time the first complete result set is returned to the user interface or API.
6695.4.2.5.10.8 The solution shall support:
670· Index optimization for high-speed retrieval.
671· Query parallelization or distributed search where applicable.
672· Search performance monitoring and alerting for SLA breaches.
6735.4.2.5.10.9 The solution shall display performance metrics for each query to ensure transparency and provide concurrency controls to support at least fifty (50) simultaneous analyst queries with fair scheduling and priority for P1 investigations.
6745.4.2.5.10.10 The solution shall enable result caching and materialized views with configurable time-to-live (TTL) values for expansive queries and dashboards.
6755.4.2.5.10.11 The solution shall support live and streaming queries that update in real time and can be converted into historical windows or dashboards without requiring query rewrites.
6765.4.2.5.10.12 The solution shall provide a unified query surface across all domains including endpoint, identity, network, email, SaaS, and cloud audit data, with schema-on-read capabilities and a field or schema browser.
6775.4.2.5.10.13 The solution shall support graph and path queries across a unified entity graph linking users, devices, IPs, and applications, including sequence matching for multi-stage attack detection.
6785.4.2.5.11 Analyst Experience and Enrichment
6795.4.2.5.11.1 The solution shall provide autocomplete; inline documentation, examples, and grammar help within the query editor to reduce analyst time-to-query.
6805.4.2.5.11.2 The solution shall support joins and lookups across datasets and uploaded tables such as CSV or STIX, allowing ad-hoc enrichment without ETL (Extract, Transform, Load).
6815.4.2.5.11.3 The solution shall allow the ad-hoc upload of enrichment sets such as threat intelligence lists or asset tags, with TTL and RBAC, and expose lookup tables or key-value stores callable directly from queries.
6825.4.2.5.11.4 The solution shall provide a no-code query builder that generates valid DSL or SQL for less-experienced analysts while allowing export to the advanced editor.
6835.4.2.5.12 Threat Hunting and Detection
6845.4.2.5.12.1 The solution shall provide query packs and an interface for threat-hunting queries, including title, description, and keywords, along with search and tagging within a hunt library.
6855.4.2.5.12.2 The solution shall support retro-hunts and IoC sweeps that automatically re-evaluate recent history (e.g., 30–90 days) when new intelligence arrives and open cases when matches are found.
6865.4.2.5.12.3 The solution shall allow promotion of a query to a persistent detection rule with associated response actions such as kill, isolate, or notify, subject to approval gates.
6875.4.2.5.12.4 The solution shall provide attack storyline context as a queryable object, enabling hunts to pivot on process, script, file, or network chains rather than individual events.
6885.4.2.5.12.5 The solution shall maintain a curated query library mapped to MITRE ATT&CK, with versioning, ownership, peer reviews, and quality scores, and include sample content suitable for SIEM and SOAR workflows.
6895.4.2.5.13 Data Lake and Visualization
6905.4.2.5.13.1 The solution shall include a security data lake that normalizes telemetry from multiple sources into a common schema (e.g., OCSF) for search and analytics.
6915.4.2.5.13.2 The solution shall support dashboarding directly from queries, including tables, time-series, heatmaps, and graph views, with shareable RBAC-scoped links for collaboration.
6925.4.2.5.13.3 The solution shall provide dataset health signals such as freshness, lag, and drop rate, and optionally block queries on stale feeds to prevent misleading results.
6935.4.2.5.14 Governance, APIs, and Performance Guarantees
6945.4.2.5.14.1 The solution shall provide row- and field-level RBAC with PII masking and just-in-time reveal workflows that are fully audited.
6955.4.2.5.14.2 The solution shall expose query APIs through REST or SDKs, supporting both synchronous and asynchronous execution, pagination, streaming results, and export to formats such as CSV, JSON, Parquet, or object storage.
6965.4.2.5.14.3 The solution shall provide budget and cost guardrails, including maximum bytes, time, and concurrency limits, along with a kill-switch for runaway queries and per-user or per-team cost analytics.
6975.4.2.5.14.4 The solution shall support suppression of alerts derived from query results, allowing benign patterns to be excluded with expiration and review cycles to prevent long-term blind spots.
6985.4.2.5.14.5 The solution shall expose public API coverage for all search functions at near-parity with the UI and provide SDKs and example code.Core search APIs exist (hunting, incidents). Full feature parity with the UI is not documented or guaranteed.
6995.4.2.5.14.6 The solution shall deliver proof-of-concept acceptance by executing a mutually agreed search pack (including adversary sequences, UEBA anomalies, and threat intelligence matches), meeting defined latency and scale SLOs, and producing correct and reproducible results.
7005.4.2.6 Managed Extended Detection and Response Service (MXDR)
7015.4.2.6.1 Service Operations
7025.4.2.6.1.1 The service shall operate on a 24×7×365 basis, providing continuous monitoring, triage, investigation, and response.
7035.4.2.6.1.2 The service shall run fully within the RWS tenant using named accounts, MFA, and least-privilege roles, with no uncontrolled data export.
7045.4.2.6.1.3 The service shall use secure connectivity and auditable access methods such as privileged access management (PAM) or just-in-time (JIT) access, and enforce IP allow-listing.
7055.4.2.6.1.4 The service shall integrate MXDR workflows with RWS’s SIEM, XDR, and ITSM platforms for end-to-end case handling.
7065.4.2.6.1.5 The service shall define and agree escalation matrices (contacts, channels, working hours, languages) with RWS before go-live.
7075.4.2.6.1.6 The service shall continuously monitor the health of all data sources and generate alerts for gaps or stale feeds.
7085.4.2.6.1.7 The service shall require Singapore-based L2/L3 support engineers for escalation within 2 hours.
7095.4.2.6.2 Threat Intelligence & Triage
7105.4.2.6.2.1 The service shall perform intelligence-led triage using both commercial and community threat intelligence relevant to RWS’s industry.
7115.4.2.6.2.2 The service shall correlate context such as asset criticality, exposure, and business owner information during triage to ensure severity levels are set accurately.
7125.4.2.6.2.3 The service shall execute containment actions for pre-approved priority-one scenarios without waiting for RWS confirmation.
7135.4.2.6.2.4 The service shall conduct full investigations for confirmed threats and produce detailed root cause analyses.
7145.4.2.6.3 Threat Hunting and Detection Engineering
7155.4.2.6.3.1 The service shall perform scheduled threat hunts daily across all available telemetry.
7165.4.2.6.3.2 The service shall execute retro-hunts within 24 hours of receiving new indicators or actor TTPs.
7175.4.2.6.3.3 The service shall maintain a backlog for detection engineering, building and tuning rules with measurable precision and recall.
7185.4.2.6.3.4 The service shall maintain a coverage map and ATT&CK heatmap and regularly report detection gaps and remediation plans.
7195.4.2.6.3.5 The service shall manage and test response playbooks at least quarterly (including ransomware, business email compromise, insider threats, and cloud key theft) and report on time-to-contain.
7205.4.2.6.3.6 The service shall define hunt success KPIs, convert recurring hunts into detections, and provide actor-centric hunt packages aligned to current campaigns.
7215.4.2.6.3.7 The service shall operate a dedicated managed hunting function that searches daily for weak signals and campaign activity on priority assets, and daily across all data sources.
7225.4.2.6.3.8 The service shall publish time-to-hunt SLAs for new high-priority intelligence and show evidence of completion.
7235.4.2.6.4 Forensics, Investigations, and Containment
7245.4.2.6.4.1 The service shall provide remote forensic collection of host triage data, memory, and key artifacts with full chain-of-custody where permitted.
7255.4.2.6.4.2 The service shall provide remote containment and optional managed containment across endpoints, identity, email, and firewall, where pre-approved.
7265.4.2.6.4.3 The service shall coordinate change windows with RWS IT Security for high-impact response actions such as mass isolations and align those windows with RWS to avoid collateral impact.
7275.4.2.6.4.4 The service shall maintain immutable logs of all analyst actions, approvals, and rationale.
7285.4.2.6.4.5 The service shall maintain chain-of-custody discipline for all artifacts, including hash values, timestamps, and storage locations.
7295.4.2.6.5 Incident Management and Reporting
7305.4.2.6.5.1 The service shall deliver hourly updates on P1 incidents until containment is achieved, and daily updates until closure.
7315.4.2.6.5.2 The service shall provide daily critical summaries, weekly operational reports, and monthly KPI and SLA reports.
7325.4.2.6.5.3 The service shall deliver quarterly executive reviews covering threat trends, risks, and recommendations.
7335.4.2.6.5.4 The service shall track, and report mean time to detect (MTTD), mean time to respond (MTTR), and agreed action items from post-incident reviews.
7345.4.2.6.5.5 The service shall provide post-incident heightened monitoring and tuned anomaly thresholds to ensure that recurrence is prevented.
7355.4.2.6.5.6 The service shall provide debriefs and hardening guidance following every high-severity incident.
7365.4.2.6.6 Compliance, Audit, and Governance
7375.4.2.6.6.1 The service shall safeguard personally identifiable information (PII) and regulated data, adhering to RWS’s policies.
7385.4.2.6.6.2 The service shall provide compliance evidence packs on demand, including timelines, artifacts, and approvals.
7395.4.2.6.6.3 The service shall enforce data classification and retention requirements for artifacts and evidence, including secure deletion timelines.
7405.4.2.6.6.4 The service shall deliver standardized evidence packs suitable for audit and regulatory needs.
7415.4.2.6.6.5 All certification requirements applicable to the MXDR Provider shall be as specified under Functional Requirements, Section 9: Certification Requirements
7425.4.2.6.6.6 The service shall publish and maintain a threat intelligence curation policy covering sources, scoring, de-confliction, and false-intel handling, with defined refresh cadences.
7435.4.2.6.7 Collaboration and Engagement
7445.4.2.6.7.1 The service shall provide named escalation contacts and deputies for leadership communication.
7455.4.2.6.7.2 The service shall document a RACI matrix for all containment and remediation actions.
7465.4.2.6.7.3 The service shall support a co-managed model, allowing RWS analysts to participate in investigations.
7475.4.2.6.7.4 The service shall participate in tabletop exercises at least semi-annually.
7485.4.2.6.7.5 The service shall run quarterly workshops with RWS to support knowledge transfer and capability uplift.
7495.4.2.6.7.6 The service shall provide knowledge bases and runbooks with version control, ensuring content is always current.
7505.4.2.6.7.7 The service shall maintain sector-specific threat briefs, update watchlists and use cases accordingly, and provide visible change logs.
7515.4.2.6.8 Service Quality, Availability, and Improvement
7525.4.2.6.8.1 The service shall own the tuning process post go-live, targeting at least a 40% reduction in noise while preserving true positives.
7535.4.2.6.8.2 The service shall maintain service availability of 99.99% or higher for monitoring and case tooling.
7545.4.2.6.8.3 The service shall provide a service portal with live visibility into queues, SLAs, cases, and artifacts.
7555.4.2.6.8.4 The service shall provide surge capacity during outbreak events with defined ramp-up times, supported by surge routing to reprioritize analyst capacity automatically.
7565.4.2.6.8.5 The service shall demonstrate ongoing improvements through a documented development roadmap that includes assigned owners and target completion dates, along with the register of planned enhancements reviewed on a quarterly basis.
7575.4.2.6.8.6 The service shall deliver a signed onboarding runbook before go-live, covering connectivity, access, data sources, playbook inventory, and RACI.
7585.4.2.6.8.7 The service shall provide service transparency dashboards that display live SLAs, case volumes, actions taken, containment counts, and hunt KPIs.
7595.4.2.6.8.8 The service shall include continuous vulnerability intelligence review and contextual correlation across RWS-monitored assets to proactively identify exploitable weaknesses and provide actionable remediation guidance.
7605.4.2.6.8.9 The service shall collect and analyse vulnerability information from, but not limited to:
7615.4.2.6.8.9.1 Global repositories (CVE, NVD, CISA KEV, MITRE ATT&CK, vendor advisories).
7625.4.2.6.8.9.2 RWS-supplied scan results, asset inventories, and configuration baselines.
7635.4.2.6.8.9.3 Telemetry from XDR, EPP/EDR, network, identity, and cloud connectors and
7645.4.2.6.8.9.4 External or proprietary threat-intelligence feeds.
7655.4.2.6.8.10 The service shall include correlation of collected vulnerability data with RWS telemetry to determine actual exposure and exploitation likelihood. Each identified vulnerability shall be assigned a risk rating based on severity, exploitability, asset criticality, and business impact. A dynamic vulnerability-to-asset mapping shall be maintained and updated at least weekly.
7665.4.2.6.8.11 The service shall notify RWS of any critical or actively exploited vulnerability within twenty-four (24) hours of public disclosure or first observation. A Weekly Vulnerability Correlation Report shall be delivered every Monday of each week and shall include the following:
7675.4.2.6.8.11.1 Newly identified critical vulnerabilities (CVE ID, CVSS score and description)
7685.4.2.6.8.11.2 Confirmation whether the vulnerability has been observed or is potentially present in RWS telemetry.
7695.4.2.6.8.11.3 List of affected assets and corresponding risk ratings.
7705.4.2.6.8.11.4 Recommended mitigation or patch actions.
7715.4.2.6.8.11.5 Cross-reference to any related incidents or detections in the XDR platform.
7725.4.2.6.8.12 The service shall retain records of vulnerability sources, correlation logic, and notifications for a minimum of twelve (12) months.
7735.4.2.6.8.13 The service shall include continuous enhancement to its vulnerability correlation capabilities, including leveraging AI/ML models for prioritization and false-positive reduction. All AI-assisted outputs must remain explainable and auditable by RWS.
7745.4.2.6.9 Personnel and Expertise
7755.4.2.6.9.1 The service shall be physically located in Singapore, with all SOC operations handled exclusively by full-time, in-house personnel. Outsourcing of any SOC function shall be prohibited.
7765.4.2.6.9.2 The service shall perform background checks, security clearances, non-disclosure agreements, and annual ethics training for all in-house analysts.
7775.4.2.6.9.3 The service shall maintain skill matrices and certifications across disciplines including incident response, forensics, cloud security, and detection engineering.
7785.4.2.6.9.4 The service shall maintain a backup SOC in a separate geographic region to ensure operational continuity in case of local disruption.
7795.4.2.6.10 L1 Security Analyst
7805.4.2.6.10.1 The primary responsibility of the L1 Security Analyst is to handle day-to-day security incidents.
7815.4.2.6.10.2 Ensure all required or missing information related to a security incident is accurately filled in, including but not limited to hostname, user/owner of the host, domain, and physical/logical location of the host or user.
7825.4.2.6.10.3 Gather and attach relevance evidence to support the incident, such as logs, screenshots, or any other supporting documentation.
7835.4.2.6.10.4 Promptly escalate all security-related incidents (e.g., breaches, etc) to the SOC Manager. All email communications, including response and updates, shall be managed by the SOC Manager.
7845.4.2.6.10.5 Following the incident, the analyst must document a manual report detailing the workflow and methodology used. This report should serve as a reference for standardizing future response to similar incidents and must include all required fields, observations, and evidence.
7855.4.2.6.10.6 While monitoring dashboards, if any suspicious activity or anomaly is detected that requires further investigation, the analyst must create a manual incident report, populate all necessary fields, and escalate the case to Level 2 for further analysis.
7865.4.2.6.10.7 The analyst must possess a minimum of Blue Team Level 1 certification or an equivalent qualification (e.g., GCIA, CEH, ECSA, Security+, CPSA).
7875.4.2.6.11 L2 Security Analyst
7885.4.2.6.11.1 The Level 2 Analyst is responsible for reviewing and analysing incidents escalated by Level 1 Analysts, identifying correlations between the incident and the collected evidence.
7895.4.2.6.11.2 All relevant evidence, analyst notes, and references links must be attached to the corresponding security incident record.
7905.4.2.6.11.3 The analyst must assess and categorize the incident based on the following classifications:
7915.4.2.6.11.4 True Positive: An alert triggered correctly due to a legitimate threat, as defined by detection rules.
7925.4.2.6.11.5 True Negative: No alert triggered, and no threat present – systems behaving as expected.
7935.4.2.6.11.6 False Positive: An alert triggered without an actual threat, such as during approved penetration testing or benign activity.
7945.4.2.6.11.7 False Negative: A threat occurred, but no alert was triggered when it should have been.
7955.4.2.6.11.8 Based on the classification and severity of the incident, the Level 2 Analyst must determine whether escalation to the SOC Manager is warranted,
7965.4.2.6.11.9 The analyst must hold a minimum of Blue Team Level 2 certification or an equivalent qualification (e.g., GCIH)
7975.4.2.6.12 L3 (Technical Lead)
7985.4.2.6.12.1 Conducts in-depth reviews of asset discovery and vulnerability assessment data to identify potential security gaps and areas for improvement.
7995.4.2.6.12.2 Leads proactive threat hunting activities by leveraging the latest threat intelligence, tactics, techniques and procedures (TTPs) to uncover stealthy or advanced threats within RWS networks. Finding must be documented in a detailed report with recommendations for remediation.
8005.4.2.6.12.3 Performs controlled activities on production systems to validate system resiliency and uncover weaknesses that require remediation.
8015.4.2.6.12.4 Provides expert recommendations to optimize and fine-tune security monitoring tools and detection ules based on insights gained from threat hunting and incident analysis.
8025.4.2.6.12.5 Must possess a minimum of Blue Team Level 3 certification or an equivalent qualification (e.g., GCFA, GCFE)
8035.4.2.6.13 Technical Success Manager
8045.4.2.6.13.1 Act as the primary technical liaison for clients utilizing the managed security and platform services. Gain a deep understanding of client goals and business strategies to ensure service delivery aligns effectively.
8055.4.2.6.13.2 Manage the implementation and integration of security and platform solutions within client environments, ensuring configuration and customization follow industry best practices.
8065.4.2.6.13.3 Continuously assess service performance against client expectations and SLAs. Proactively identify and resolve issues to enhance service quality.
8075.4.2.6.13.4 Deliver comprehensive reports and updates to clients covering service status, compliance posture, security incidents, and performance indicators.
8085.4.2.6.13.5 Lead technical resolution efforts for service-related issues. Collaborate with internal teams to ensure swift problem-solving and minimal impact on client operations.
8095.4.2.6.13.6 Suggest improvements to security and platform services based on client input and emerging technologies. Contribute to product development initiatives to represent client interests.
8105.4.2.6.13.7 Provide training and expert guidance to clients on new functionalities and best practices for managing security and platform services.
8115.4.2.6.13.8 Ensure all service implementations adhere to applicable legal, regulatory, and security standards. Support clients in understanding and complying with these requirements.
8125.4.2.6.14 Advanced Capabilities
8135.4.2.6.14.1 The service shall provide vulnerability and asset context ingestion (e.g., from VM tools or asset criticality data) to improve triage without taking ownership of patching.
8145.4.2.6.14.2 The service shall provide malware analysis support, including rapid triage, static and dynamic analysis, and IOC extraction, with defined turnaround targets feeding into detections and playbooks.
8155.4.2.6.14.3 The service shall provide dark web monitoring in addition to surface web monitoring for at least 50 keywords or phrases, including but not limited to RWS domains and key third-party vendors.
8165.4.2.6.14.4 The service shall conduct continuous monitoring of the dark web for potential threats and exposures related to RWS and promptly address identified risks.
8175.4.2.6.14.5 The service shall support the onboarding of RWS-subscribed threat intelligence feeds into its operational workflows.
8185.5 Item 1: Provision of Endpoint Protection Platform (EPP), Endpoint Detection & Response (EDR), and Extended Detection & Response (XDR), including Migration from Existing Platform.
8195.5.1 The Supplier shall design, implement, and configure an integrated EPP/EDR/XDR solution platform in accordance with industry best practices, applicable legal and regulatory standards, and RWS’s internal requirements.
8205.5.2 The proposed design must incorporate resiliencies for all tiers (agents/sensors, control plane, ingestion/correlation, case store), including high availability, validated backup/restore, and automated failover/failback to prevent loss of prevention policies, telemetry, detection events, investigations, or incident data.
8215.5.3 The platform shall enforce role-based security for protected data and actions, including but not limited to:
8225.5.3.1 Role-based access controls (RBAC) and segregation of duties for deployment, policy/detector authoring, exception approvals, live response, and playbook execution.
8235.5.3.2 Full auditability of administrative, investigative, and response actions with immutable logs and retention aligned to policy.
8245.5.3.3 Assurances of data integrity for configurations, indicators, content/engines, telemetry, and evidence (e.g., signing, checksums, provenance and chain-of-custody).
8255.5.4 The solution shall integrate with the RWS’s enterprise systems, including but not limited to:
8265.5.4.1 Authentication and authorization (SSO, MFA, JIT, IP allow-listing).
8275.5.4.2 Communication, alerting, and collaboration tools (e.g., Microsoft Teams, Microsoft Outlook or equivalents) for notifications.
8285.5.4.3 IT Service Management (ITSM) platforms for ticket creation, approvals (e.g., quarantine restore), state synchronization, and SLA tracking.
8295.5.4.4 SIEM/CLM and/or data lake services for downstream analytics, compliance archiving, and reporting where applicable.
8305.5.5 The platform shall segregate data, policies, dashboards, and administration between Production and Non-Production environments, across different application systems, and by data classification, ensuring distinct handling and visibility where required.
8315.5.6 The solution shall be integrated with or include a native Security Orchestration, Automation and Response (SOAR) capability to support automated, auditable response workflows for EPP/EDR/XDR actions with approval gates and rollback.
8325.5.7 The platform shall automatically route, replicate, or divert prevention, telemetry, and incident data to designated destinations (e.g., SIEM/XDR, object storage, data lake) using secure transport with retry, and delivery confirmation.
8335.5.8 The solution shall prioritize security-relevant events for monitoring and detection including, at minimum, malware/exploit/ASR blocks, tamper attempts, quarantine and restore actions, credential theft indicators, persistence creation, lateral movement, identity anomalies, and anomalous egress.
8345.5.9 The Supplier shall provide a comprehensive onboarding document and categorized playbooks by domain and source type, covering endpoint (Windows, macOS, Linux, VDI persistent/non-persistent; servers), identity/IdP and PAM/IGA, email gateways, DNS/proxy, firewalls/NDR, cloud audit (AWS/Azure/GCP and other approved clouds), SaaS suites (e.g., Microsoft 365, CASB, CNAPP), vulnerability/context feeds, custom applications, and IoT/OT telemetry where available.
8355.5.10 Onboarding documentation must include detailed configuration procedures, schema/field mappings, validation steps, troubleshooting guidelines, and rollback instructions for agents/sensors, connectors, detections/playbooks, and dashboards.
8365.5.11 The Supplier shall implement intelligent tiered storage across EPP/EDR/XDR datasets (hot/warm/cold) to optimize cost and performance while complying with the retention requirements defined in Section 5.4.2.4
8375.5.12 The Supplier shall assess, plan, and execute the migration of endpoints from the existing endpoint security tools to the new EPP/EDR platform, accommodating agent-based and coexistence configurations during transition and ensuring policy parity and safe rollback.
8385.5.13 The Supplier shall assess, plan, and execute the migration of connectors and data sources to the new XDR platform for agentless/API-based integrations (identity/IdP, email, DNS/proxy, firewalls/NDR, cloud audit, SaaS, vulnerability/context).
8395.5.14 The Supplier shall onboard all existing and newly identified sources into the platform. Source categories include, but are not limited to:
8405.5.14.1 Endpoint/EPP/EDR telemetry for client and server OS, including VDI.
8415.5.14.2 Identity and access systems (e.g., Azure AD/IdP), PAM and IGA.
8425.5.14.3 Security controls (e.g., antimalware, EDR, XDR, NDR, DLP, IDS/IPS, vulnerability management).
8435.5.14.4 Network devices (firewalls, routers, switches), DNS and secure web gateways.
8445.5.14.5 Cloud platforms (AWS, Azure, GCP and any RWS-approved clouds) and container/orchestrator audit logs.
8455.5.14.6 SaaS suites and security services (e.g., Microsoft 365, CASB, CNAPP), applications/middleware, and database activity telemetry.
8465.5.14.7 Custom-built applications and IoT/OT telemetry sources, where feasible.
8475.5.15 Where agent/sensor deployment is required, the Supplier shall plan, install, configure, test, validate, load/performance-test, and operationally hand over packaging and deployment (MSI/MSIX/PKG/DEB/RPM; signing/notarization; Intune/SCCM/GPO).
8485.5.16 The Supplier must ensure that migration, agent/sensor installation, connector cutover, and data forwarding occur without disruption to business applications or operations; performance guardrails (CPU/RAM/battery/network awareness) and server-safe response guardrails (e.g., never isolate domain controllers without approval) shall be enforced.
8495.5.17 The Supplier shall review and migrate EPP configurations; where incompatible, the Supplier shall implement functionally equivalent controls aligned to best practices and RWS requirements, subject to RWS validation. Examples include policy sets, attack-surface reduction, device/app control, exclusions, update rings, user notification policies, dashboards, and reports.
8505.5.18 The Supplier shall review and migrate EDR configurations, implementing equivalent logic where direct translation is not feasible. Examples include telemetry scope and collection policies, suppression/allow lists, scheduled hunts, live-response prerequisites, dashboards/reports, case templates, and chain-of-custody settings.
8515.5.19 The Supplier must review existing EPP/EDR/XDR configurations and migrate them as needed, ensuring equivalent functionality. This includes items such as schema mappings, entity resolution, correlation rules, machine learning models, thresholds, detection logic, schedules, filters, UEBA settings, dashboards, reports, and SOAR playbooks
8525.5.20 All migrated configurations shall be validated by RWS to ensure functional equivalence and operational effectiveness, with evidence captured in acceptance artifacts.
8535.5.21 The solution must offer EDR investigation and response features, including process tree and timeline views, pivoting across host, user, hash, domain, and IP, secure live response (e.g., remote shell, file and memory triage) with role-based access control and approvals, and response actions such as network isolation, process termination, file quarantine or restore, and hash blocking—all with immutable audit logs
8545.5.22 The solution shall provide an expressive hunting and query capability (regex, joins/subqueries, time windows and sequence operators, schema browser/autocomplete), with saved and scheduled hunts, curated hunt libraries, and automatic retro-hunts when new intelligence arrives.
8555.5.23 The solution must support ransomware recovery where supported by the operating system, including rollback and restore using snapshots, with success tracking and reporting.
8565.5.24 The XDR layer shall provide ingestion Service Level Objectives (SLOs) and monitoring dashboards: median ingestion for endpoint < 15 seconds, identity/email < 60 seconds, and cloud audit < 120 seconds (under agreed volumes), with health alerts on connector lag, drop rate, or schema errors.We do not guarantee platform SLOs
8575.5.25 The EDR layer shall achieve new event searchability ≤ 60 seconds median and isolation command ≤ 30 seconds for online endpoints (under agreed conditions) with published latency dashboards.We do not guarantee platform SLOs
8585.5.26 The XDR layer shall include UEBA to baseline peer/seasonal behavior and detect anomalies (e.g., impossible travel, rare parent-child pairs, unusual OAuth grants, anomalous egress) and shall compute risk scores at entity and incident levels for routing and prioritization.
8595.5.27 The platform shall normalize all ingested data to a documented schema with versioning, preserve raw source fields, deduplicate events while recording provenance, and enrich with CMDB ownership, asset criticality, and vulnerability/context data.
8605.5.28 The platform shall support correlation of temporal sequences across domains and stitch multi-signal incidents mapped to MITRE ATT&CK, with campaign clustering, incident lifecycle management, SLA timers, and evidentiary bundles.
8615.5.29 The platform shall provide a visual playbook editor with versioning, test/simulation mode, retries/error handling, approval gates, rollback, and orchestration of cross-domain actions (endpoint isolation, firewall block, IdP disable, email purge, SaaS session revoke, cloud key rotation).
8625.5.30 The solution shall expose REST APIs/SDKs for search/queries, incidents/cases, response actions, and export of results (CSV/JSON/Parquet) to object storage, and shall integrate with collaboration and ITSM systems for ticket lifecycle.
8635.5.31 The solution shall implement budget/volume guardrails (quotas, throttles, priority queues) with alerts and kill-switches to prevent runaway workloads while preserving priority sources and P1 response.
8645.5.32 The platform shall provide dashboards and reports generated directly from queries, including ingestion latency by source, searchable-data latency, incident stitching accuracy, ATT&CK coverage, MTTD/MTTR, playbook time-to-contain, UEBA alert quality, and ingest/cost by source.
8655.5.33 The Supplier shall deliver all documentation, scripts, templates, and training materials, and conduct role-based training and workshops (administrators, SOC analysts, service desk) covering operations, investigations, hunts, playbook authoring, and change governance.
8665.5.34 The Supplier shall provide Go-Live support to meet all RWS requirements, including completion of required artifacts, issue-log tracking, acceptance and integration testing, security hardening and vulnerability remediation, governance approvals, security validations, knowledge transfer, final documentation, and operational readiness sign-off.
8675.5.35 The Supplier must ensure all activities above comply with the RWS’s security and privacy requirements, including encryption in transit and at rest, optional RWS-managed keys, field-level masking and just-in-time reveal with audit, and immutable logging of all administrative and response actions.
8685.5.36 The Supplier shall execute all migrations and cutovers with no disruption to business operations, shall maintain performance guardrails for endpoints and servers, and shall provide rollback plans approved by the RWS’s change governance.
8695.6 The supplier shall ensure the following critical milestones and timeline are met.
870System Commissioning: On or before 1st June 2026
871MXDR Services Start: Immediately once any asset is onboarded
872Full Onboarding & Operational: By 31st December 2026
8735.7 Item 2: Managed Extended Detection and Response (MXDR) to provide security monitoring services, operate and maintain the solution platform.
8745.7.1 The Supplier shall provide continuous 24×7×365 monitoring and maintenance of RWS’s EPP, EDR, and XDR platforms. The Managed Extended Detection and Response Service (MXDR) must ensure optimal operational performance, reliable platform and connector functionality, and swift incident response through proactive threat prevention, detection, analysis, and coordinated mitigation across endpoints and cross-domain telemetry. Core capabilities must include:
8755.7.1.1 Continuous monitoring and analysis of EPP prevention events (malware/exploit/ASR blocks, tamper attempts, quarantine/restore, device & application control violations), EDR detections/telemetry (process/file/registry/plist, network/DNS, authentication, script/AMSI, memory/injection where available), and XDR multi-source incidents.
8765.7.1.2 Establishment of baseline profiles for routine endpoint, user, device, application, and connector activity (Production and Non-Production) to support anomaly detection, including spikes in prevention events, policy drift, rare parent-child process pairs, impossible travel, unusual OAuth grants, and anomalous egress.
8775.7.1.3 Correlation of multiple events across hosts, users, identities, network, cloud, SaaS, and email telemetry with entity resolution to reconstruct attack storylines/kill chains and distinguish false positives from true threats.
8785.7.1.4 Application of user and entity behaviour analytics (UEBA) and behaviour heuristics to enhance detection of credential abuse, insider risk, persistence, and lateral movement while reducing false positives.
8795.7.1.5 Monitoring of privileged activities and admin tool usage across domains (e.g., endpoint tamper, LSASS access attempts, service creation, role/privilege changes, key rotations, mailbox rule creation) to identify suspicious or anomalous behaviour.
8805.7.1.6 Cyber surveillance and incident response capabilities, including endpoint isolation, process termination, file quarantine/restore, hash blocklists, identity disablement, firewall blocks, email purge, SaaS session revocation, and cloud key rotation, executed via governed SOAR playbooks with approvals and rollback.
8815.7.1.7 Threat detection enrichment through integration of cyber threat intelligence (IOC/STIX/TAXII) with TTL, scoring, de-duplication, and retro-evaluation/retro-hunts of recent history upon receipt of new indicators.
8825.7.1.8 Timely escalation, response, and reporting of security incidents per SLA, including P1 activation, leadership updates, and evidentiary timelines with chain-of-custody.
8835.7.1.9 Recommendation of action plans to mitigate reported threats (policy hardening, tuned suppressions with expiry/review, playbook improvements, response guardrails), with measurable follow-ups and closure evidence.
8845.7.2 The MXDR provider must demonstrate a clear understanding of, and strict adherence to, industry-recognized standards, regulatory requirements, and compliance frameworks relevant to RWS’s operational environment and threat landscape.
8855.7.3 The MXDR Provider’s certification obligations shall follow the Certification Requirements under Functional Requirements, Section 9, which governs all Day1, Day2 and platform-level certification requirements.
8865.7.4 The MXDR provider shall offer multiple communication channels for incident notifications and discussions (telephone, email, and portal/ticketing) to ensure RWS can promptly reach SOC personnel within three attempts or fifteen (15) minutes, whichever is sooner.
8875.7.5 The MXDR provider must maintain a robust Business Continuity and Disaster Recovery (BC/DR) program for SOC operations and for XDR connectors/ingest pipelines, ensuring uninterrupted service delivery during disruptions or outages.
8885.7.6 The MXDR provider shall deliver a case management system that supports the creation, updating, and closure of incident tickets and integrates with RWS’s EPP/EDR/XDR and ITSM to enable automatic ticket generation and status synchronization based on detections, playbook outcomes, and governed approvals.
8895.7.7 The MXDR provider shall assign a single point of contact to coordinate and manage onboarding, content promotion, connector health governance, and steady-state operations.
8905.7.8 The MXDR provider must have an in-house team dedicated to EPP policy management, EDR detection engineering and hunting, and XDR correlation/UEBA/playbook development, without reliance on external vendors; all content and policy changes are subject to RWS approval prior to production.
8915.7.9 The MXDR provider shall be responsible for continuous fine-tuning of EPP policies/exclusions and device/app control, EDR rules/hunts/suppressions, and XDR detections, UEBA thresholds, correlation rules, and SOAR playbooks throughout the contract, with precision/recall and noise-reduction metrics tracked.
8925.7.10 The MXDR provider shall deploy all applicable content from vendor libraries (prevention policies, detections, hunts, queries, correlation rules, UEBA models, and playbooks) based on the onboarded sources and endpoint/server types, without limitation on the number implemented.
8935.7.11 The MXDR provider must ensure rapid response for critical EPP/EDR/XDR events. Notifications shall be issued as per SLA upon initial alerts from pre-defined use cases, accompanied by actionable guidance and recommended remediation steps, including containment decisions and business impact summaries.
8945.8 Item 3: Platform Maintenance and Management (Platform Maintenance, Log/Sensor & Connector Onboarding and Management, Use Case/Content Development and Tuning, Dashboard and Reporting Customization, Data Retention and Archiving Management)
8955.8.1 The MXDR shall provide continuous monitoring of the System or Solution platform’s health, performance, and availability across EPP, EDR, and XDR and the MXDR service. This includes, but is not limited to, monitoring endpoint agent/sensor status and version compliance, connector/service status, resource utilization (CPU, memory, storage), endpoint coverage, log and telemetry ingestion rates, backlog/lag, and pipeline/service status to ensure uninterrupted and efficient operations.
8965.8.2 The MXDR shall ensure timely implementation of security patches, hotfixes, and major version upgrades for the System or Solution platform and all associated components (e.g., EPP/EDR agents and content, XDR connectors, SOAR apps/integrations, operating systems, parsers) including remediation of any known vulnerabilities. All updates shall follow RWS’s change management processes with pre-checks and rollback plans, ensuring that no component (including endpoint agents/sensors, playbooks, or connectors) remains operational beyond its End of Support Life (EOSL).
8975.8.3 The MXDR shall conduct continuous reviews and enhancements of System or Solution configurations spanning EPP policies, EDR detections/hunts, and XDR correlation/UEBA/playbooks. Activities include, but are not limited to, onboarding of log sources and endpoint sensors, development/refinement of parsing and normalization rules, correlation and detection logic, UEBA thresholds, dashboard customization, log/telemetry storage management, rule and offence tuning, system and agent patching, and SOAR workflow refinements. These activities shall maintain optimal performance, accuracy, and relevance of the System or Solution platform.
8985.8.4 The MXDR shall continuously optimize the System or Solution platform to ensure efficient data collection (agents/sensors/connectors), processing, storage, and retrieval. Optimization shall adapt to changes in endpoint count, telemetry/log volume, use-case load, and evolving organizational requirements, ensuring scalability and sustained performance (including hot/warm/cold tiering, index-free/search tier parameters where applicable, and cost guardrails).
8995.8.5 The MXDR shall continuously develop, refine, and tune use cases and content across EPP/EDR/XDR to detect emerging threats and minimize false positives. This includes prevention policy tuning (EPP), behaviour detections and hunts (EDR), correlation rules and UEBA models (XDR), de-duplication/suppression hygiene, and SOAR playbook enhancements.
9005.8.6 The MXDR shall customize and develop dashboards, reports, and alerting mechanisms to meet RWS’s operational and reporting requirements for endpoint coverage/health, detection/response KPIs (e.g., MTTD/MTTR, time-to-isolate, playbook time-to-contain), ingestion/connector health, ATT&CK coverage heatmaps, and executive summaries, ensuring relevance and usability for SOC, IT operations, compliance, and leadership stakeholders.
9015.8.7 The MXDR shall manage data retention policies and archiving strategies across EPP prevention logs, EDR telemetry and case artifacts, and XDR normalized/correlated data, in strict accordance with RWS’s internal requirements and applicable regulatory obligations. Management shall include integrity checks, legal hold, immutable evidence retention for incidents, and verifiable purge on expiry.
9025.8.8 The MXDR shall deliver regular, in-depth reporting that covers security incidents, threat intelligence updates, platform performance and optimization efforts, backlog and data ingestion health, tuning results (including precision, recall, and noise reduction), and overall service delivery metrics. A well-defined communication and escalation framework must be maintained to ensure prompt and effective responses to incidents and service disruptions, including clear thresholds for P1/P2 events and leadership notification protocols.
9035.8.9 Security Operations Centre (SOC) Operations – Continuous Threat Monitoring
9045.8.9.1 The MXDR shall conduct proactive and continuous monitoring of security events and alerts generated by the System or Solution platform and other integrated security technologies, including EPP prevention events, EDR detections and telemetry, and XDR cross-domain incidents, to identify potential threats in real-time.
9055.8.10 Incident Detection, Response, Triage and Analysis
9065.8.10.1 The MXDR shall perform efficient triage, validation, and detailed analysis of security alerts to distinguish genuine threats from false positives. Responsibilities include:
9075.8.10.1.1 Timely detection of security incidents such as malware/exploit activity, tamper events, credential abuse, persistence and lateral movement, unauthorized access attempts, data exfiltration, cloud/SaaS misuse, and anomalous network activity observed via EPP/EDR/XDR.
9085.8.10.1.2 Immediate notification to RWS’s designated contacts based on predefined severity levels and escalation protocols, with activation of collaboration channels.
9095.8.10.1.3 Execution of predefined incident response playbooks orchestrating endpoint isolation, process termination, file quarantine/restore, identity disablement, firewall blocks, email purge, SaaS session revocation, and cloud key rotation with approvals and rollback.
9105.8.10.1.4 Coordination of forensic support and live response where permitted (remote shell, file/memory triage), ensuring chain-of-custody for all collected artifacts and preservation of evidence for potential legal/regulatory matters.
9115.8.10.1.5 Participation in post-incident reviews to identify root causes, document lessons learned, and recommend corrective and preventive actions, tracking of actions to closure.
9125.8.10.1.6 Delivery of comprehensive incident report per case, including timeline, indicators, affected asset/users, containment/remediation actions, residual risk, and business impact summary.
9135.8.11 Threat Intelligence and Threat Hunting
9145.8.11.1 The MXDR shall integrate and utilize reputable threat intelligence feeds at no cost to RWS, within the System or Solution platform to enhance detection capabilities and situational awareness, with indicator TTL, scoring, and de-duplication.
9155.8.11.2 The MXDR shall conduct proactive and iterative threat hunting across RWS’s environment using EDR telemetry and XDR multi-source data to uncover hidden threats, APT activity, and sophisticated attack vectors that may bypass automated detection, and shall promote validated hunts into persistent detections/rules.
9165.8.11.3 The MXDR shall provide actionable intelligence on emerging campaigns, vulnerabilities, and threat actor tactics relevant to RWS’s landscape, including Indicators of Compromise (IOCs), technique notes, and strategic advisories with prioritized mitigation steps mapped to ATT&CK.
9175.8.11.4 The threat intelligence provided must be tailored to RWS’s diverse business sectors, including but not limited to
9185.8.11.4.1 Gaming (Casino)
9195.8.11.4.2 Attractions
9205.8.11.4.3 Hotels
9215.8.11.4.4 Food & Beverage
9225.8.11.4.5 Meeting, Incentives, Conferences and Exhibitions (MICE)
9235.8.11.4.6 Tourism and Hospitality
9245.8.11.4.7 Retail
9255.8.12 Security Orchestration, Automation, and Response (SOAR)
9265.8.12.1 The MXDR shall design, implement, and maintain automation playbooks within the SIEM/SOAR/XDR environment to streamline repetitive tasks, accelerate incident response, and enhance operational efficiency; playbooks shall include error handling, retries, approvals, and rollback.
9275.8.12.2 The MXDR shall ensure seamless integration of the System or Solution platform with RWS’s existing security tools (e.g., EPP/EDR, firewalls/NDR, vulnerability scanners, identity platforms, email gateways, SaaS and cloud providers) to enable automated data exchange, enrichment, and coordinated response actions.
9285.8.12.3 Security workflows and processes shall be orchestrated end-to-end to ensure consistent, timely, and efficient handling of security incidents across the environment, with SLA timers, de-duplication windows, and ticket automation.
9295.8.13 Regular Review
9305.8.13.1 The MXDR shall perform scheduled, recurring reviews of user roles and access privileges across EPP/EDR/XDR, SOAR, and integrated tools. Any discrepancies or policy violations identified shall be reported to RWS with recommended corrective actions and due dates.
9315.8.13.2 The MXDR shall conduct periodic, comprehensive assessments of RWS’s overall security posture across endpoint and cross-domain controls, evaluating rule/configuration efficacy, telemetry completeness, response guardrails, and vulnerabilities, and shall provide actionable recommendations prioritized by risk and business impact.
9325.8.13.3 The MXDR shall provide support during internal and external security audits, including generation of required reports and evidence, demonstration of compliance with policies/regulations, and explanation of relevant security processes, content governance, and controls.
9335.8.13.4 The MXDR shall conduct periodic, comprehensive baseline and configuration adherence reviews across EPP/EDR/XDR and MXDR operations, including endpoint agent/sensor posture, connector health, schema/field mapping integrity, UEBA model drift, and playbook efficacy, and shall provide actionable recommendations with tracked remediation to improve security posture and operational resilience.
9345.8.14 Reporting
9355.8.15 The MXDR shall conduct regular reporting to RWS, including but not limited to monthly and quarterly security monitoring reports. These reports must provide comprehensive insights and cover the following elements:
936a) Executive Summary
937· Overview of the reporting period
938· Key metrics (e.g., number of incidents, severity levels, resolution rates)
939· Strategic highlights (e.g., improvements, emerging risks, compliance status)
940· Summary of recommendations and next steps
941b) Major Security Events and Activities
942· Event Summary Table:
943o Event type, date, severity, affected assets
944· Narrative Overview:
945o Description of major activities (e.g., threat hunting, forensic investigations)
946o Notable changes in threat landscape or attack vectors
947· Security Operations Metrics:
948o Number of alerts processed
949o Mean time to detect (MTTD) and mean time to respond (MTTR)
950o Patch management and vulnerability remediation stats
951c) Security Incident Details
952· Incident Inventory:
953o Classification (e.g., malware, phishing, insider threat)
954o Description, timestamp, detection method
955o Affected systems/users
956· Incident Lifecycle Analysis:
957o Timeline of detection, escalation, containment, and resolution
958o Root cause and contributing factors
959· Impact Assessment:
960o Business impact (e.g., downtime, data exposure)
961o Regulatory or reputational implications
962d) Resolution Status and Action Plans
963· Status Dashboard:
964o Resolved, in-progress, escalated, false positives
965· Actions Taken:
966o Technical remediation steps
967o Policy or process changes
968· Recommendations:
969o Preventive measures
970o Training or awareness initiatives
971o Technology upgrades
972e) Optimization and Improvement Opportunities
973· Security Posture Review:
974o Gaps identified in detection, response, or governance
975· Process Improvement Suggestions:
976o Automation opportunities
977o Incident response playbook enhancements
978o Use case reviews
979· Technology Recommendations:
980o Tool tuning, integrations, or replacements
981· Lessons Learned:
982o Case studies from incidents
983o Best practices for future prevention
984f) Threat Intelligence Contextualized to RWS
985· Threat Landscape Overview:
986o Global and regional trends
987o Industry-specific risks
988· Contextual Intelligence:
989o Threats targeting hospitality, entertainment, or infrastructure
990o Actor profiles and tactics, techniques, and procedures (TTPs)
991· Indicators of Compromise (IOCs):
992o Relevant IOCs observed in RWS’s environment
993· Forecasting & Early Warning:
994o Anticipated threats based on intelligence feeds and analytics
995g) Compliance and Governance
996· Regulatory Alignment:
997o Status against frameworks (e.g., PDPA, ISO 27001)
998· Audit Findings and Remediation:
999o Summary of internal/external audits
1000o Remediation progress
1001· Policy Updates:
1002o Changes to security policies or procedures
1003h) Appendices
1004· Charts, graphs, and dashboards
1005· Glossary of terms
1006· Supporting documentation (e.g., logs, screenshots, reports)
10075.8.15.1 The MXDR shall provide the following reports to RWS on a scheduled or event-driven basis, as applicable:
10085.8.15.1.1 Incident Reports: Detailed documentation for each security incident, including timeline, impact analysis, response actions, and resolution status.
10095.8.15.1.2 Threat Hunting Reports: Findings and insights from proactive threat hunting activities conducted across RWS’s environment.
10105.8.15.1.3 Role and Access Review Reports: Periodic reports detailing user roles, access privileges, anomalies, and policy violations.
10115.8.15.1.4 Security Landscape Review Reports: Comprehensive assessment of RWS’s security posture, including control effectiveness and improvement recommendations.
10125.8.15.1.5 System or Solution Platform Health and Performance Reports: Metrics and analysis related to system performance, resource utilization, and operational status.
10135.8.15.1.6 Customized Dashboards and Alert Definitions: Tailored visualizations and alert configurations aligned with RWS’s operational needs.
10145.8.15.1.7 Incident Response Playbooks and Runbooks: Updated documentation outlining procedures for responding to various types of security incidents.
10155.8.15.1.8 Recommendation for Security Posture Improvement: Actionable guidance based on monitoring, analysis, and review activities to enhance RWS’s overall security maturity.
10165.8.15.2 All standard reports shall be submitted to RWS within five (5) working days from the start of each calendar month.
10175.8.15.3 Management and Executive-level reports shall be delivered on a quarterly basis, providing strategic insights and summaries tailored for senior stakeholders.
10185.8.16 Managed MXDR Support Services
10195.8.16.1 The MXDR Supplier shall allocate up to one hundred twenty (120) hours annually to support service requests, utilizing suitably qualified and experienced personnel. Any unused hours within a contract year may roll over to the next contract year, up to a maximum cumulative cap of two hundred forty (240) hours at any given time. Unused hours exceeding this cap shall automatically lapse unless otherwise approved in writing by RWS IT. These hours shall be dedicated to additional operational-management activities within the Managed MXDR service scope, which may include but are not limited to:
1020• Architectural modifications and system modifications
1021• Onboarding of custom log sources
1022• Security consultancy
1023• Firmware or software upgrades
1024• Development of complex or customized use cases
1025• Other related enhancements as required by RWS IT
10265.8.16.2 The MXDR service shall incorporate EPP, EDR, and XDR capabilities to deliver unified detection, investigation, and response coverage across all log sources and endpoints specified in this tender.
10275.8.16.3 The Tenderer shall ensure uninterrupted monitoring and full operational readiness throughout the transition period and shall submit a Transition Plan detailing milestones, onboarding activities, and risk-mitigation measures for RWS’s approval prior to commencement.
10285.9 Software and Licenses
10295.9.1 The subscription shall include EPP/EDR endpoint licensing for seven thousand five hundred (7,500) endpoints (Windows / macOS / Linux workstations and servers, including persistent and non-persistent VDI instances and containerized workloads, with the ability to co-term and true-up / true-down seats in accordance with RWS’s asset changes and growth License true-up or true-down shall be conducted quarterly. The subscription shall remain valid for the Contract Period of three (3) years, and an option to extend for up to two (2) additional one-year terms (3+1+1), subject to RWS’s written approval and performance review.The licenses (includes online services) shall be fulfilled through RWS’s existing Microsoft Volume Licensing contracts below: EA – For online services and licenses for end-user. Enrollment number : 50008390 Enrollment period : 1 Jan 2025 – 31 Dec 2027 Midterm True-up can happen any time within the enrollment period. True-down can only happen at the enrollment anniversary. SCE/MACC – For online services fulfilled through Azure. Enrollment number : 65672117 Enrollment period : 1-Aug-2025 – 31-Jul-2028 Validity of pricing is aligned to the enrollment period. The delivery shall be governed by the Microsoft Volume Licensing program rules, includes contracts signed between RWS and MSFT.
10305.9.2 The platform shall include a minimum of 90 days of online, hot searchable data for EPP prevention events (e.g., blocks, quarantine, tamper), EDR telemetry and detections (e.g., process/file/registry, network/DNS, auth, script/AMSI, memory injection where supported), and XDR normalized incidents and events; search shall be available via UI and API without per-search throttling at stated volumes.Microsoft Defender XDR APIs have specific throttling limits, with the Advanced Hunting API limiting searches to 45 calls per minute.
10315.9.3 The supplier shall provide annual education credits that enable 10 RWS personnel to participate in training courses at no cost to RWS. These courses shall cover EPP administration, EDR investigations and threat hunting, XDR correlation, UEBA, query language usage, and SOAR/playbook developments. The entitlement shall also include opportunities for participants to earn professional certifications as part of their yearly learning benefits.
10325.9.4 All license fees payable by RWS (including EPP/EDR/XDR software, connectors, and MXDR service subscriptions) shall only become chargeable and enforceable after completion of the Functional and/or Design Specification and subsequent formal sign-off, subject to prior written authorization from RWS.
10335.9.5 The Supplier shall provide tiered pricing for incremental storage and retention (size and duration) and for incremental ingest (EPS/GB-per-day) and endpoint counts. Tiers shall include unit pricing for hot/warm/cold retention, archival retrieval, connector add-ons (if any), and committed use or multi-year discounts. Pricing must clearly state any overage rates and the conditions for burst headroom.Prices are fixed in accordance with the concession price given by Microsoft.
10345.9.6 The subscription shall grant access to content and use-case entitlements without restrictions on the number of prevention policies (EPP), detection rules and hunts (EDR), and correlation rules/UEBA models, and SOAR playbooks (XDR), subject to platform capabilities and RWS approved workflow. The supplier is required to provide a catalogue and a change log for all deployed content.
10355.10 Hardware
10365.10.1 All solution components shall comply with RWS standards for system compatibility, platform interoperability, and integration with existing RWS monitoring and management tools. No new physical hardware procurement is required under this tender.
10375.11 System Integration
1038As set out in Section 20 of this Appendix B1.
10395.12 Acceptance Tests
1040As set out in Section 11 of this Appendix B1
10415.13 System Training and Knowledge Transfer
1042As set out in Section 14 of this Appendix B1.
10435.14 Project Documentation and Deliverables
1044As set out in Sections 6.2 and 6.3 of this Appendix B1.
10455.15 Performance Guarantee Period, Warranty, and Maintenance Services
1046As set out in Sections 13, 15, and 16 of this Appendix B1.
10476. Timeline, DOCUMENTATION and deliverables
10486.1 Timeline
10496.1.1 The Supplier shall deliver the System according to the following key milestones, and these key milestones may be amended or further expanded in detail in a mutually agreed Project Plan :
10516.1.2 The Supplier shall be wholly responsible for the timely delivery of the System.
10526.2 Documentation
10536.2.1 The Supplier shall provide sufficient documentation and training manuals (the “Documentation”) as part of the deliverables stipulated in Section 6.3 below at no additional cost to the Company.
10546.2.2 The Supplier shall provide all Documentation in English and expressed in clear, consistent, readily understandable language and defined terms.
10556.2.3 The Supplier shall provide one (1) set (soft copy) of the approved version of Documentation to the Company.
10566.2.4 The Company reserves the right to reproduce any Documentation supplied for its own internal use.
10576.2.5 The Supplier shall provide the latest version of all Documentation, or where requested, the version specified by the Company.
10586.2.6 The Supplier shall establish a proper document change procedure to keep track of the changes made to the Documentation, the reasons for the change, the date of the Documentation was last updated and the name of the personnel who made the last update. Proper records of the different versions of the Documentation have to be maintained.
10596.2.7 The Supplier shall provide draft versions of the Documentation for the Company’s review before delivering the final version of the Documentation to the Company for approval. The Supplier shall cater for at least one (1) week for each review.
10606.2.8 The Company shall accept the final version of the Documentation, after all the corrections have been made and after all amendments required by the Company have been incorporated into the Documentation by the Supplier.
10616.3 Deliverables
1062The Supplier shall provide complete detailed and adequate documentation in alignment with RWS IT Project Delivery Framework (where required and/or applicable, for each batch of Acceptance Tests), but shall not limited to, the sign-off of the following deliverables :
10636.3.1 Project Management deliverables:
10646.3.1.1 Project Plan
10656.3.1.2 Project Deliverables & Schedule
10666.3.1.3 Statement of Work (Project Scope)
10676.3.1.4 Project Risk, Issue and Change Logs
10686.3.1.5 Deployment Plan
10696.3.2 Requirement deliverables:
10706.3.2.1 Functional Requirements Specifications
10716.3.2.2 Non Functional Requirements Specifications
10726.3.2.3 Integration Requirements Specifications
10736.3.3 Analysis and Design deliverables:
10746.3.3.1 Architecture & Technical Specifications & Diagram
10756.3.3.2 Application, UI & Report Design Specifications
10766.3.3.3 Tuning Report
10776.3.3.4 Logical Database Model
10786.3.3.5 Data Conversion and Migration Design
10796.3.4 Installation & Configuration deliverables:
10806.3.4.1 Environment Configuration Baseline
10816.3.4.2 Deployment Guide
10826.3.4.3 Operations Guide
10836.3.4.4 Backup, Failover & Recovery Guide
10846.3.4.5 Housekeeping Configuration Baseline (logs, files & data)
10856.3.4.6 Source code
10866.3.5 Testing deliverables:
10876.3.5.1 SIT Test Strategy and Plan, Test Scenarios and Test Cases, Requirement Traceability Matrix (RTM), Defect/Issue Logs and Fixes and Test Summary & Report
10886.3.5.2 UAT Test Strategy and Plan, Test Scenarios and Test Cases, Requirement Traceability Matrix (RTM), Defect/Issue Logs and fixes , Test Summary & Report
10896.3.5.3 Performance Test Strategy and Plan, Test Scenarios and Test Cases, Defect/Issue Logs and Fixes, Test Summary & Report
10906.3.5.4 High Availability (HA) Test Plans, Test Scenarios and Test Cases, Defect/Issue Logs and Fixes Test Summary & Report
10916.3.5.5 Disaster Recovery (DR) Test Plans, Test Scenarios and Test Cases, Defect/Issue Logs, Test Summary & Report
10926.3.5.6 ORT Test Plans, Test Scenarios and Test Cases, Defect/Issue Logs and Fixes, Test Summary & Report
10936.3.6 Training deliverables:
10946.3.6.1 Training Slides
10956.3.6.2 Training Hand-outs
10966.3.6.3 Quick Start Guides (How-To)
10976.3.6.4 Frequently Asked Questions (FAQ)
10986.3.7 Miscellaneous deliverables
10996.3.7.1 Function to Role Mapping Document
11006.3.7.2 List of Admin/Super User Accounts Document
11016.3.7.3 Performance Certification Document
11026.3.7.4 User Guides
11036.3.7.5 Administrator Guides
11046.3.7.6 Data Provider Change Guide
11056.3.8 Miscellaneous documents (E.g. Release Notes, APIs documents, etc.)
11066.3.9 Support
11076.3.9.1 Technical Support, Escalation Matrix & Contact Information
11086.3.10 Managed Security Services
11096.3.10.1 Monthly and Quarterly Security Monitoring Reports
11106.3.10.2 Incident Reports (per incident)
11116.3.10.3 Threat Hunting Reports (as conducted)
11126.3.10.4 Role and Access Review Reports (periodically)
11136.3.10.5 Use Case Review and Improvement Recommendations (periodically)
11146.3.10.6 Configuration Baseline Review and Recommendations Report (periodically)
11156.3.10.7 Security Landscape Review Reports (periodically)
11166.3.10.8 System or Solution Platform Health and Performance Reports
11176.3.10.9 Customized Dashboards and Alert Definitions
11186.3.10.10 Incident Response Playbooks and Runbooks (as updated)
11196.3.10.11 Recommendations for Security Posture Improvement
11207. General dependencies and assumptions
11217.1 The System shall be scalable for future requests from the Company to support the expansion of coverage of security monitoring use cases, log sources and telemetry ingestion to the System.
11228. DELAY IN SUPPLY, PURCHASE FROM OTHER SOURCES AND LIQUIDATED DAMAGES
11238.1 Time shall be of the essence in this LOA. The Supplier undertakes to install, implement and commission the System no later than the stipulated Commissioning Date (as defined at Section 12.1 of Appendix B1) specified in Section 6.1.1 or the Project Plan as accepted by Company.
11248.2 In the event the Supplier fails to supply any item of the Goods and/or Services by the date and to the location specified in the LOA and/or Purchase Order; or the System fails to meet the stipulated Commissioning Date, the Company shall, in addition to any other remedies which it may have under the LOA or otherwise have the right to:
11258.2.1 Cancel all or any such items of the Goods / Services without being liable for damages and obtain the same Goods/ Services from other sources. In the event additional costs are incurred by virtue of this Section 8.2.1, all such costs incurred shall be deducted from any monies due to or may become due to the Supplier under the LOA, or shall be recoverable as damages;
11268.2.2 Require the Supplier to pay or to deduct from the total price payable for all of the delayed Goods / Services, as liquidated damages (and not as a penalty), a sum to be calculated at the rate of 1% of the total contract value, per calendar day (including Public Holidays) from the date of default to the actual day where the delayed Goods and/or Services are delivered to Company, subject to a maximum amount equal to 10% of the of the total contract value (“Maximum LD for Delay”). For the avoidance of doubt, the Maximum LD for Delay applies to each event of delay committed by the Supplier; or
11278.2.3 Terminate the LOA in accordance with Clause 27 of Appendix A1.
11288.3 If the Supplier is unable to carry out Services in accordance with this LOA or fails to perform and observe any of its obligations within a specified timescale or agreed critical date (either of which are referred to in this Section as the "Relevant Failure”) then, without reducing or affecting any other right or remedy which Company may have under this LOA or otherwise, Company shall be entitled to any or all of the following:
11298.3.1 Receive the SLA Compensation in the manner, quantum and on the conditions stipulated in this Appendix, to be computed on a monthly basis;
11308.3.2 Suspend payment of any amounts then due and any which may subsequently become due to Supplier under this LOA until such time as Supplier remedies the Relevant Failure;
11318.3.3 Terminate forthwith the provision of Services provided by the Supplier which are affected by the Relevant Failure (in which case notice shall only be valid if made in writing signed by an authorised representative of Company);
11328.3.4 Obtain the Services from a third party service provider and the Supplier is to render full support in respect thereof including but not limited to the provision of assistance in transitioning any obligations or services to the third party service provider at no additional cost to Company; and/or
11338.3.5 Terminate the LOA with immediate effect by written notice without prejudice to the Company’s other rights and remedies.
11348.4 If the Company chooses to exercise its rights under Section 8.3.3 or 8.3.4 or 8.3.5 above, the Supplier shall refund to Company on a pro rata basis any monies paid by Company in advance for the Services beyond the date of termination.
11359. REMOVAL AND REPLACEMENT OF REJECTED GOODS
11369.1 The Supplier shall, when so required by the Company, remove and replace within seven (7) days and at his own expense, any Goods / Services which are found on delivery to be damaged, defective or in any way inferior to approved samples or not in accordance with the Company’s requirements, failing which the Company shall have the right to purchase replacements elsewhere or to make good any damage in any manner it deems fit and all costs thereby incurred shall be deducted from any monies due or to become due to the Supplier under the LOA or shall be recoverable as damages.
113710. DELIVERY
113810.1 The Goods shall be free from any liens and encumbrances. The title in the Goods and any part thereof shall pass to the Company upon delivery.
113910.2 The Supplier shall confirm the actual delivery date and time in writing with the Company no less than seven (7) days before the actual delivery date.
114010.3 Any incomplete delivery by the Supplier shall be regarded as non-delivery of the Goods unless accepted by the Company in writing.
114110.4 The Company shall for the purposes of the LOA, procure access to the Site or afford access to the Site to the authorized personnel of the Supplier during normal business hours.
114210.4 The Company shall for the purposes of the LOA, procure access to the Site or afford access to the Site to the authorized personnel of the Supplier during normal business hours.
114311.1 “Acceptance Tests” means all tests as listed in this section, or otherwise as agreed to in writing between the parties to be conducted on the System in accordance with this section.
114411.2 The Acceptance Tests are carried out to verify and demonstrate that the System meets the requirements as set out in this LOA. The Supplier shall not commence work on any Acceptance Test(s) without first obtaining the Company’s prior written approval to do so. For each of and every individual Acceptance Test, the Supplier shall submit a comprehensive test plan, acceptance criteria and procedure to the Company for its prior review and approval. Submission must be made at least one (1) week prior to the actual conduct of each test.
114511.3 After installation of the Goods or part thereof, the Supplier shall conduct Acceptance Tests on all the Goods to verify and demonstrate that the Goods meet the requirements of this LOA.
114611.4 The Supplier shall provide at its own costs, all tools and testing equipment for the purposes of the Acceptance Tests.
114711.5 Upon completion of any Acceptance Test, the Supplier shall give written notice of such completion to the Company. If the Company is satisfied that the Acceptance Test has been successfully completed, the Company shall certify accordingly by signing off on the relevant reports (“Sign-Off”). If the Company is not satisfied that the Acceptance Test has been successfully completed, the Company shall, within a period of thirty (30) days of receipt of the notice, issue a report of defects to the Supplier.
114811.6 For the purposes of Acceptance Tests, definition of the defects severity level are set out below:
1149Defects
115011.7 If any part of the System fails to pass the Acceptance Test (or any repeat Acceptance Tests, if any) or does not operate in compliance with this LOA, and/or the documentation does not fully and accurately describe in reasonable detail the operation, features and functionality of the System (a “Failure”), of which the Company shall be the sole judge, then the Company may, by written notice to the Supplier elect one (1) of the following options at its sole discretion:
115111.7.1 To have the Supplier provide a solution (including the replacement of any Goods if necessary without charge to Company) and to fix (without prejudice to the Company’s other rights and remedies) a new date for carrying out further tests on the System on the same terms and conditions, save that all costs which the Company may incur as a result of carrying out such tests shall be reimbursed by the Supplier. Unless otherwise agreed in writing between the Parties, all such further tests shall not be construed as any grant of extension of time by the Company and the Supplier remains liable for any delay in complying with its obligations under the LOA; or
115211.7.2 To conditionally accept the System or any part thereof at the Company’s absolute discretion. The conditions of acceptance shall be as the Company may reasonably determine. If so agreed by the parties in writing, conditional acceptance shall constitute acceptance of the System or the relevant part thereof provided that all the relevant conditions have been met within the period specified by the Company. If all the relevant conditions have not been met within the period specified by the Company, then the Company shall be entitled to proceed under Section 11.7.3 below; or
115311.7.3 To treat the Supplier as being in breach of the LOA and to reject the System as not being in conformity with the LOA, in which event the Company shall be entitled to terminate this LOA (without prejudice to the Company’s other rights and remedies) in accordance with Clause 28 of Appendix A1 to this LOA.
115411.8 Installation Test
115511.8.1 At the conclusion of the System installation, a preliminary walk-through with the Company must be performed to check for installation quality, accurate performance of the work and to verify workflow diagrams if there is any. Any modifications to the documentation or the installation that may be required must be accomplished within one (1) week from the identification of the problem.
115611.8.2 When the System has successfully passed the installation tests, the Supplier shall so certify to the Company in writing that the System is operating in accordance with the LOA. The date of such certification shall be the Installation Date. The issuance of such certificate shall be without prejudice to the Company’s right to reject the System pursuant to Clause 28 of Appendix A1 to this LOA.
115711.9 System Integration Test
115811.9.1 The System Integration Test (“SIT”) must commence only after the System has been completely installed with all the components and successfully completed customization in development environment by the Supplier.
115911.9.2 The objective of the SIT is to test and ensure that all components of the System are working end-to-end as intended before the User Acceptance Test. This includes all customization, hardware integration, integration with other systems and data loading.
116011.9.3 The Supplier must supply all test plans, test script, requirement traceability matrix (RTM), test data, equipment, connections and skilled labour required for the test results without additional charge to the Company.
116111.9.4 With advice and assistance of the Supplier, the Company shall operate the System for a specified period, such period to be agreed in accordance with Section 6.1.1 above to:
116211.9.4.1 perform the Company’s routine transactions;
116311.9.4.2 carry out System functions test to determine whether the System meets the requirements in this LOA; and
116411.9.4.3 carry out integration testing to determine whether interface between system to system meet all deliverables in this LOA.
116511.9.5 The exit criteria for SIT are:
116611.9.5.1 All SIT test scenarios have been executed successfully;
116711.9.5.2 No outstanding Medium Defects and High Defects; and
116811.9.5.3 Resolution and workaround agreed for other outstanding defects.
116911.10 User Acceptance Test
117011.10.1 The User Acceptance Test (“UAT”) must commence only after:
117111.10.1.1 the System has been completely installed with all the components and successfully completed the SIT by the Supplier; and
117211.10.1.2 the SIT has met the exit criteria set out in Section 11.9.5 above.
117311.10.2 The objective of the UAT is for the Company’s business users to verify that all components of the System are working end-to-end as intended to facilitate sign off of acceptance of the System. This includes all customisation, hardware integration, integration with other systems and data loading.
117411.10.3 The UAT should be performed on the System completely installed with all the components supplied by the Supplier under this LOA, and in the UAT environment of the System.
117511.10.4 The Supplier must supply all test plans, scenarios, test script, requirement traceability matrix (RTM), test data, equipment, connections and skilled labour required for the test results without additional charge to the Company.
117611.10.5 With the advice and assistance of the Supplier, the Company shall operate the System for a specified period, such period to be agreed in accordance with Section 6.1.1 above, to:
117711.10.5.1 Perform the Company’s routine transactions;
117811.10.5.2 Perform the transactions performed during any benchmark tests or other Supplier demonstrations included, referenced, or incorporated in this LOA;
117911.10.5.3 Carry out System functions test to determine whether the System meets the specifications, performs the functions and meets the criteria for System Availability, System Performance, Response Time;
118011.10.5.4 Determine whether the documentation for the System meets the requirements of this Project; and
118111.10.5.5 Perform such other transactions as may be necessary to test the System Performance.
118211.10.6 The exit criteria for UAT are:
118311.10.6.1 All UAT Test Scenarios have been executed successfully;
118411.10.6.2 No outstanding Medium Defects and High Defects; and
118511.10.6.3 Resolution and workaround agreed for other outstanding defects.
118611.11 Operational Readiness Test
118711.11.1 The Operation Readiness Test (“ORT”) must commence only after:
118811.11.1.1 The System has been completely installed with all the components supplied by the Supplier under this LOA; and
118911.11.1.2 The UAT has met the exit criteria set out in Section 11.10.6 above.
119011.11.2 The ORT shall be performed in the production system environment set up at the Company’s resort premises.
119111.11.3 The Supplier must supply all the test plans, scenarios, test script, test data, equipment, connections and skilled labour required for the provision and submission of test results without additional charge to the Company.
119211.11.4 With the advice and assistance of the Supplier, the Company shall operate the System for a specified period, such period to be agreed in accordance with Section 6.1.1 above, to:
119311.11.4.1 Perform Company’s routine transactions;
119411.11.4.2 Perform the transactions performed during any benchmark tests or other Supplier demonstrations included, referenced, or incorporated in this LOA;
119511.11.4.3 Carry out System functions test to determine whether the System meets the specifications, performs the functions and meets the criteria for Systems Availability, System Performance, System Response Time;
119611.11.4.4 Determine whether the documentation for the System meets the requirements of this Project; and
119711.11.4.5 Perform such other transactions as may be necessary to test the System Performance as specified in this LOA.
119811.11.5 The exit criteria for ORT are:
119911.11.5.1 All acceptance criteria are met;
120011.11.5.2 No outstanding Medium Defects and High Defects; and
120111.11.5.3 Resolution and workaround agreed for other outstanding defects.
120211.12 Performance Test
120311.12.1 The purpose of the performance test is to demonstrate conformance to requirements for the performance of the System as specified in Section 17.10 below.
120411.12.2 Performance tests shall be performed under normal and full load. The Supplier shall propose how to generate the transaction loads accordingly in order to test the System as though operating under live conditions, including the provision of all necessary performance testing and load generation tools.
120511.12.3 The Supplier shall also propose the test coverage, the type of testing services and the amount of load to be generated on the System and application, which are subject to the prior approval of the Company, and will need to be according to the business requirements of Company, the size of the Company user base, the number of concurrent users, the application architecture, the system configuration and related attributes including latency and round trip timings.
120611.12.4 The performance test shall be performed for the System after UAT prior to the commissioning of the System. However, performance test shall be allowed to start earlier if the need arises (subject to the Company’s prior approval).
120711.12.5 The performance test shall be performed using the production and UAT server hardware, system software, application software and all other components required by the System, and production clients at the Company’s premises. In the event that it is not possible to utilize the production server for such tests, the Supplier shall propose how the performance test can be conducted.
120811.12.6 The Supplier must be able to show that the performance test has been carried out and the System is ready for the Company’s review.
120911.12.7 The Company shall confirm if the System meets the performance requirements as defined in Section 17.10 below. If the System does not meet the performance requirements, the Supplier shall propose corrective actions that will be undertaken to meet performance requirements.
121011.13 Failover Test
121111.13.1 Supplier shall advise on how the Failover Test (“FO”) will be conducted.
121211.13.2 The FO must commence only after the System has been completely installed with all the components proposed in production environment by the Supplier.
121311.13.3 The FO shall be performed in the production system environment set up with its clients at the Company’s resort premises.
121411.13.4 The Supplier must supply all the test plans, scenarios, test script, test data, equipment, connections and skilled labour required for the provision and submission of test results without additional charge to the Company.
121511.13.5 With the advice and assistance of the Supplier, the Company shall operate the System for a specified period, such period to be agreed in accordance with Section 6.1.1 above, to perform failover and failback according to the procedure with minimum interruption.
121611.14 High Availability and Disaster Recovery Tests
121711.14.1 Supplier shall advise on how High Availability and Disaster Recovery Tests (“HA and DR Tests”) will be conducted.
121811.14.2 The HA and DR Tests must commence after the System has been completely installed with all the components proposed in production and DR environment by the Supplier.
121911.14.3 The HA and DR Tests shall be performed in the production system environment set up with its clients at the Company’s resort premises.
122011.14.4 The Supplier must supply all the test plans, scenarios, test script, test data, equipment, connections and skilled labour required for the provision and submission of test results without additional charge to the Company.
122111.14.5 With the advice and assistance of the Supplier, the Company shall operate the System for a specified period, such period to be agreed in accordance with Section 6.1.1 above, to perform failover and failback according to the procedure with minimum interruption.
122211.15 Penetration Test
122311.15.1 The Supplier shall support RWS-initiated security validation or assurance activities (e.g., configuration review, log analysis, or security-control verification) prior to the Commissioning Date, as requested by RWS IT. No independent penetration testing is required under this tender.
122412. Commissioning date
122512.1 "Commissioning Date” means the date when the System has successfully been put to productive use after having successfully passed all Acceptance Tests for each Phase as set out in Section 5.1.2 (including the last Acceptance Test), and after the Company has signed off on all relevant documentation.
122612.2 The Company shall issue a Commissioning Certificate in writing specifying the actual Commissioning Date after the following conditions are met:
122712.2.1 The System has passed all Acceptance Tests and is fully integrated with the Company’s other systems, operational and stable;
122812.2.2 Supplier has submitted to the Company all certification and test results as stated in this LOA;
122912.2.3 No outstanding High and Medium Defects; and
123012.2.4 The System has commenced business operations.
123112.3 Notwithstanding the signing or issuance by the Company of any certificate or document or any payment in relation to the Goods and/or Services, the Supplier shall remain liable to Company under the terms and conditions of this LOA.
123213. Performance guarantee period
123313.1 The Performance Guarantee Period (“PGP”) shall commence on the Commissioning Date and shall continue for a period of three (3) months or until the System Acceptance Date (as defined at Section 13.5 below), whichever the later.SWO to confirm
123413.2 During the PGP, the Supplier shall:
123513.2.1 Be entirely responsible for the functioning of the System in accordance with the requirements in this LOA, and for the compliance of any additional requirements as may be necessary and only when mutually agreed upon between the Company and the Supplier at no additional cost to the Company; andSWO to confirm
123613.2.2 Provide maintenance services during Support Hours (as defined in Section 16.4.2.2 below).
123713.3 The System is deemed to have successfully completed the PGP if the System meets the following PGP completion criteria:
123813.3.1 Comply with System Availability, System Reliability and System Performance for each calendar month or part thereof during the PGP (the Supplier shall maintain daily records for this purpose);
123913.3.2 No outstanding High and Medium Defects;
124013.3.3 Completion of Training and Knowledge Transfer as set out in Section 14 below; and
124113.3.4 Completion of Documentation in accordance with the requirements as set out in Section 6.2 above.
124213.4 Where the PGP completion criteria as set out in Section 13.3 are not met, Company reserves the right to extend the PGP on a monthly basis up to a maximum of six (6) months (inclusive of the initial three (3) months in Section 13.1) from the Commissioning Date.
124313.5 Upon successful completion of the PGP completion criteria, the Company shall issue a written notice to the Supplier to accept the System. The date of the notice or the date when such notice should be issued as determined from the records kept (if different from the date of the notice) shall be the “System Acceptance Date”.
124414. Training and knowledge transfer
124514.1 General
124614.1.1 The Supplier shall provide suitable and adequate customized training for Company’s appointed personnel to enable them to use and carry out competent operation and management of the System:
124814.1.2 The Company reserves the right to revise the number of training sessions and number of users attending the training sessions to meet the Company’s operation requirements, and select, omit or alter at any time the whole or part of the training scope based on the cost submitted.
124914.2 Training Environment
125014.2.1 The Supplier shall use one of the environments as the training environment of the System and be responsible for setting up the training environment, which shall simulate the live production System. The setting up of the training environment shall include the setting up and configuring of all the training workstations, where applicable.
125114.2.2 The Supplier shall conduct training courses at the location(s) to be specified by the Company.
125214.3 Training Materials
125314.3.1 The Supplier shall prepare all the training materials (including but not limited to the instructor’s guide, presentation slides, trainee’s booklet, and user guides). Such materials shall be submitted to the Company for approval at least one (1) week before the commencement of the training. Such materials shall form part of the Documentation.
125414.3.2 The Supplier shall update the training materials in accordance with changes to the System.
125515. WARRANTY
125615.1 As part of the Goods/Services rendered under this LOA, the Supplier shall provide the Company with a Warranty for the Goods/Services and the results of the Goods/Services supplied.SWO to confirm
125715.2 “Warranty” means the obligation of the Supplier to rectify any defects, errors and/or faults in the manner detailed in this section.SWO to confirm
125815.3 The Warranty shall commence on the System Acceptance Date and last for nine (9) calendar months (“Warranty Period”). Warranty shall be provided to the Company at no additional cost.SWO to confirm
125915.4 During the Warranty Period, the Supplier shall:
126015.4.1 Adhere to the Service Level Agreement as specified in Section 17 below;SWO to confirm
126115.4.2 Be entirely responsible for the satisfactory operation of the System at no additional cost to the Company;SWO to confirm
126215.4.3 Render replacements (if supplied by the Supplier or otherwise attributable to the Supplier), investigations, services and any other works required to make good all defects at no cost to the Company;SWO to confirm
126315.4.4 Perform corrective maintenance, troubleshooting and isolating defects, including but not limited to diagnosis and correction of all latent errors in the System due to configuration and customisation made by the Supplier. In the event of software defects, the Supplier shall work with the Company to provide possible workarounds to the Company; andSWO to confirm
126415.4.5 Update all documents for changes to the System made by the Supplier.SWO to confirm
126515.5 In the event that any stoppage of any function or facility occurs as a consequence of any fault or defect in the System occurring before or on the expiry of the Warranty Period, the Company reserves the right to overcome such faults by temporary patching if, at the Company’s sole discretion, such patching is necessary:SWO to confirm
126615.5.1 Normal patches within five (5) working days;SWO to confirm
126715.5.2 Critical patches within twenty four (24) hours.SWO to confirm
1268Where necessary, the necessary details of the patches shall be submitted to the Supplier for verification and approval for patching thereafter.SWO to confirm
126915.6 The Supplier verify the patches and submit a verification report to the Company as to whether patches provided to the Company are satisfactory within five (5) working days for normal patches; and within twenty four (24) hours for critical patches. In the event the patches are not satisfactory, the Supplier shall immediately rectify the faults and defects in the System causing the stoppage of functions or facilities. All such assessment, verification and rectification works done by the Supplier for this cause shall be performed without additional cost to Company.SWO to confirm
127015.7 The Supplier shall ensure that the Services and results of the Services shall comply with or attain the Service Level Agreement as set out in Section 17 below during the term of the Warranty Period, failing which; compensation shall be given to the Company in accordance with Section 17.8 below.SWO to confirm
127116. Maintenance
127216.1 “Maintenance” means the preventive and/or corrective support services to be performed by the Supplier as set forth in this Section, and includes platform software maintenance, configuration updates, and managed-service sustainment activities. For clarity, no hardware maintenance is included under this Contract.
127316.2 The Company shall have the option to engage the Supplier to provide Maintenance services for the duration of the Contract Period, comprising an initial three (3)-year term with two (2) optional one -year term extensions (3+1+1). Maintenance shall be performed in successive twelve (12)-month cycles aligned with each Contract year.
1274For the avoidance of doubt, the Maintenance Services shall be co-termed and aligned with the Software License and Subscription Periods defined under 5.1.3.
127516.3 Upon expiry of each Contract Year, any unused support hour or service credits may be carried forward to the next Contract Year, subject to mutual agreement during the annual service review.
127616.4 The Supplier undertakes and warrants that:
127716.4.1 Maintenance shall be provided in accordance with the Service Level Agreement;
127816.4.2 The Supplier shall always maintain the necessary number of properly skilled, trained, qualified and experienced staff to enable the timely and efficient provision of Maintenance;
127916.4.3 Throughout the Maintenance Period, the Supplier shall ensure that the System meets the System Availability and System Performance requirements.
128016.4.4 Any Goods and/or Services provided during Maintenance:
128116.4.4.1 Are and shall be fit for the purposes set out in this LOA.
128216.4.4.2 Comply with the specifications and/or provisions in this LOA; and
128316.4.4.3 Comply with any applicable regulations, statutes and laws of any competent authority; and
128416.4.5 If the Company can demonstrate that performance of the System has been impaired by an act or omission of the Supplier or any agent of the Supplier, the Supplier shall, at its own expense, immediately take remedial action to restore such standard of performance as set out in this LOA.
128516.5 Throughout the Maintenance Period, the Supplier shall provide the following types of Maintenance services to the Company :
128616.5.1 Management of Incidents and Problems
128716.5.1.1 The Supplier shall manage all incidents, problem, escalation and service resumption requirements in accordance with Section 17.4 below.
128816.5.2 Support Model, Infrastructure and Support Hours
128916.5.2.1 The Supplier shall describe and provide the support model and infrastructure in place locally or overseas to deliver Maintenance services to the Company.
129016.5.2.2 “Support Hours” shall be defined as 0830 to 1800, Monday to Friday (excluding weekends and Public Holidays).
129116.5.2.3 The Supplier shall provide uninterrupted Maintenance Services throughout the Support Hours. For any incidents/problems that are classified as P2 or higher, the Supplier shall provide support after the Support Hours in the event that the incident occurs out of the Support Hours.
129216.5.3 System Maintenance
129316.5.3.1 The Supplier shall provide support and assistance during the Company’s disaster recovery exercise to ensure that the System can be restored to operation. In the event the Company is unable to bring up the environment in the disaster recovery exercise, the Supplier will provide immediate assistance by diagnosing the problem and providing key steps to restart the application servers and servers.
129416.5.3.2 The Company will raise the following types of Maintenance service requests to the Supplier which will include but is not limited to:
129516.5.3.2.1 Support on ad-hoc data recovery
129616.5.3.2.2 Request to build simple query for data extraction
129716.5.3.2.3 Support on interface testing due to changes in sub-systems
129816.5.3.2.4 Request for yearly evaluation on System performance & health check (Supplier to provide health checklist)B2B support with MS? Or SoftwareOne to front?
129916.5.3.2.5 Request for Supplier to provide impact analysis on Microsoft security and System patches
130016.5.3.2.6 Request for housekeeping scripts and steps to up keep System performance
130116.5.3.2.7 Request for database re-index scripts to reduce database defragmentation and maintain overall System performance
130216.5.3.3 The Supplier shall promptly deliver to the Company all necessary software update materials and documentation whenever new releases of the software are made available.
130316.5.4 Hardware Maintenance
130416.5.4.1 No hardware components or hardware maintenance form part of this Contract. All maintenance obligations apply to the XDR platform, software, and MXDR service.
130517. Service Level Agreement
130617.1 “Service Level Agreement” or “SLA” means the indicators and targets as set out in this section to govern the response and resolution time for Incidents and Problems logged by the Company.
130717.2 “Problem” refers to the root cause of one or more Incident(s).
130817.3 “Incident” refers to an unplanned interruption to the System, or reduction in the performance of the System.
130917.4 Service Level Objectives (SLOs) are measurable performance targets that support the Service Level Agreement (SLAs) for the Solution. SLOs define the key technical baselines – such as availability, detection speed, and automated response – used to verify SLA compliance. Failure to meet any SLOs shall be considered an SLA breach and will be subject to the same compensation terms defined under Section 17.8 (SLA Compensation)ORT/Commissioning and PGP completion will be based on functional correctness, defect exit criteria, documentation, and SLA process readiness. Performance observations will be reported but not guaranteed as SLO commitments
131117.5 Incident and Problem Management
131217.5.1 The Supplier shall analyse the root causes of Incident/Problem reported, troubleshoot and isolate the Incident/Problem, including the diagnosis and correction of all latent errors in the System due to configurations and customisations.
131317.5.2 The Supplier shall be responsible for end-to-end Incident and Problem management from the point when Incident/Problem is raised to closure, to:
131417.5.2.1 Determine the type of Incident/Problem.
131517.5.2.2 Determine the priority in consultation with the Company,
131617.5.2.3 Liaise with the Company’s IT resources and external parties (e.g. Microsoft Support) when necessary.
131717.5.2.4 Resolve and update the Incident with proper root cause analysis and resolution before closure.
131817.5.2.5 Fix the Problem to permanently rectify the issue with proper documentation and testing, (or where the Problem is traced to the Software) work with the Company’s licensor to obtain the fix and test the same before releasing the fix to production; and
131917.5.2.6 Update the Problem with proper root cause analysis and resolution before closure.
132017.5.3 The Supplier shall investigate and fix application related defects in the System as reported by the Company within the Response Time and Resolution Time set out in Section 17.6.3 below. This includes any temporary corrections and bypass of defects until such time as standard corrections and/or updates of the System are available. The Supplier shall remove such temporary fixes after full resolution of the defect, at no additional cost to the Company.
132117.5.4 The Supplier shall support the Company in recovering lost data, restoration and repair of damaged data and the correction of erroneous data to the extent commercially possible due to defects in the System.
132217.5.5 Supplier shall update Documentation with changes made to the System during defect fixes.
132317.5.6 For any new problem sequences and enhancements that are identified, Supplier shall:
132417.5.6.1 Prepare, plan, conduct and deploy test scenarios, conditions and data for SIT; and
132517.5.6.2 Prepare, plan, conduct and support deployment of test scenarios, conditions and data for UAT; and
132617.5.6.3 Plan, conduct and support deployment of approved defect fixes to production.
132717.5.7 All Incidents and Problems shall be classified in accordance with the following severity levels :
132917.6 Performance Indicators for SLA compliance
133017.6.1 The SLA compliance consists of:
133117.6.1.1 Cybersecurity Incident Response time for each Severity Level.
133217.6.1.2 Incidents and Problem Resolution time for each Severity Level.
133317.6.1.3 System Availability
133417.6.2 The Cybersecurity Incident Response Plan for each Severity Level is indicated as below:
133517.6.3 The Response Time and Resolution Time for each Severity Level is indicated below :
133717.6.4 The Resolution Time for replacement of hardware (if applicable) shall be within four (4) hours from the time the Company informs the Supplier of the faulty hardware.There is no hardware to be supplied as part of the scope
133817.6.5 Regardless of whether the Supplier responds to Incident(s) on-site, the “Incident Resolution Time” shall begin upon acknowledgment of Incident(s) logged by Company via the telephone number/email/portal provided and shall end when the Incident (s) are resolved with a mutually agreeable workaround or the System is restored to a satisfactory working condition.
133917.6.6 Regardless of whether the Supplier responds to Problem(s) on-site, the “Problem Resolution Time” shall begin upon acknowledgment of Problem(s) logged by Company via the telephone number/email/portal provided and shall end when the Problem(s) are resolved permanently.The resolution time and response time will only be calculated for hours spent on actions to be taken by Armor
134017.7 Threat Hunting SLA Requirements
134117.7.1 The Supplier shall commit to defined Service Level Agreements (SLAs) for all threat hunting activities to ensure timely and effective response to evolving threats. These SLAs cover ad-hoc requests from RWS, proactive intelligence-led hunts, and reporting obligations.
134217.7.2 Acknowledgements of Requests
134317.7.2.1 Supplier must acknowledge any ad-hoc threat hunting requests submitted by RWS within four (4) hours.
134417.7.2.2 Acknowledgement must include assigned owner, expected timelines, and scope confirmation.
134517.7.3 Indicator-Based Hunting (IoC Sweeps)
134617.7.3.1 Supplier must complete indicator-of-compromise (IoC) sweeps across all relevant telemetry (endpoint, network, identity, SaaS, OT where applicable) according to the following tiered schedule: Critical IoCs must be completed within four (4) hours, and Standard IoCs must be completed within twenty-four (24) hours, as detailed in the Section 17.7 (Threat Hunting SLA Requirements).
134717.7.3.2 IoCs include but not limited to hashes, domains, IPs, filenames, and registry keys.
134817.7.4 Complex Hypothesis-Driven Hunting
134917.7.4.1 Supplier shall complete hypothesis-driven hunting (e.g., suspected lateral movement, credential abuse, rare parent-child process anomalies, anomalous OAuth activity) within seventy-two (72) hours.
135017.7.4.2 Supplier must document methods, datasets queried, and reasoning.
135117.7.5 Proactive Intelligence-Led Hunting
135217.7.5.1 Supplier shall automatically initiate hunts within twenty-four (24) hours of ingesting new threat intelligence (commercial, community, or RWS-specific).
135317.7.5.2 Hunts must retroactively sweep at least the last 30-90 days of telemetry depending on data availability.
135417.7.6 Hunting Reporting
135517.7.6.1 Supplier shall deliver a hunt report within twenty-four (24) hours of hunt completion.
135617.7.6.2 Reports must include scope, query details, dataset sources, hunt findings. Identified risks, and recommended follow-up actions.
135717.7.7 Threat Hunting SLA Requirements
135917.8 SLA Compensation
136217.8.1 Incident, Problem and System Availability affected by the following scenarios will be excluded for the monthly SLA target measurement:
136317.8.1.1 Scheduled downtime for maintenance, patching etc.
136417.8.1.2 Company approved emergency maintenance
136517.9 Failure to Meet SLA
136617.9.1 Where the Supplier fails to meet the SLA, the Supplier will provide the SLA Compensation as set out in Section 17.8 above.
136717.9.2 For any non-compliance to the SLA Indicator, the Supplier shall submit a report to the Company, stating reasons for missing the SLA and an action plan with mitigation steps to ensure the SLA is met in the following months. The plan is subject to mutual agreement between the Company and Supplier.Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed as SLO commitments. We can only commit to service SLAs
136817.10 System Availability
136917.10.1 The “System Availability” is defined as:
137117.10.2 The System shall cater for redundancies to achieve high availability and reliability utilising technologies such as failover clustering and load balancing.
137217.10.3 The System shall leverage on two (2) data centres (a primary data centre and a secondary data centre) at different sites available within Company’s premises, to provide data centre failover mechanism in order to achieve high resiliency between the two (2) data centres in addition to the onsite high availability architecture.
137317.10.4 The System shall achieve 99.9% availability per calendar month, excluding the scheduled downtime.
137417.10.5 The System shall be available for seven (7) days a week, twenty-four (24) hours a day.
137517.10.6 The System shall be available to users with no or minimum loss of System performance when the System is being backed-up, performing housekeeping or running any routine tasks.
137617.11 System Reliability
137717.11.1 The System shall be fully tested and quality assured before going live, so as to ensure maximum reliability (“System Reliability”).
137817.11.2 The System shall be able to detect any forms of data integrity such as absence of data or corrupted / incorrect data during the sending or receiving of data.
137917.11.3 The System shall be able to recover all data stored up to the last successfully completed transaction before a particular Incident occurs.
138017.12 System Performance
138117.12.1 The System response time during peak level operations shall be three (3) seconds or less for 80% and within five (5) seconds for 90% of the business transactions. Maximum response time shall not exceed fifteen (15) seconds except for agreed exclusions (“System Performance”).Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed
138217.12.2 Response time is defined as the time elapsed after depressing an ENTER key (or clicking on a button that submits the screen for processing) until a response is received back on the same screen.Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed
138317.12.3 The System shall be able to generate Static Standard report within fifteen (15) seconds or less from all the user locations within a local network 90% of the time.Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed
138417.12.4 The System shall return a Parameter-based report within 30 seconds or less.Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed
138517.13 Standard Operating Environment
138617.13.1 The Supplier shall adhere to the following standard operating environment :
138717.13.1.1 Platform
138817.13.1.2 Operating System
138917.13.1.3 Database
139017.13.1.4 Browser
139117.13.1.5 Common Services
139217.13.1.6 Network Services
139317.13.1.7 End User Device Platform
139417.13.1.8 Others
139517.14 Any ambiguity between technical SLOs and contractual SLAs shall be resolved in favour of the stricter obligations.Armor cannot guarantee Microsoft platform SLOs - Performance observations will be reported but not guaranteed
139618. Security Requirements
139718.1 The Supplier shall ensure that the System complies with the relevant laws, policies and directives set forth by the regulatory authorities.
139818.2 Company’s Policies and Standards
139918.2.1 The Supplier shall ensure that the System complies with the “IT Security Policy” and other relevant IT security policies and standards of the Company.
140018.2.2 All of the Supplier’s personnel who need to access to the Company’s IT systems are required to read and acknowledge the “RWS IT End User Policy (For External Parties)”. The Supplier must adhere strictly to the policy. Any violation that wilfully degrades or violates the security of the Company’s IT infrastructure will be subject to financial penalties.
140118.2.3 All of the Supplier’s personnel who require access to the Company’s casino properties, including systems and premises, shall obtain the relevant license as required by the regulatory authorities.
140218.3 Information Handling
140318.3.1 The Supplier shall be held accountable for the protection of all data and information under their due care to ensure that it is not used for other purposes unless the use has been authorised by the Company. The Supplier shall provide any information requested by the Company for the assessment of third party outsourcing.
140418.3.2 The Supplier shall perform necessary security clearance, at a minimum a background check, for each of its personnel deployed for the Company. The Supplier shall sign non-disclosure agreement (“NDA”) with the Company. The NDA shall be applicable to all of Supplier’s personnel and sub-contractors’ personnel engaged by the Supplier to perform any task in the course of this LOA.
140518.3.3 The Supplier shall have a system of control measures to protect confidential information against accidental or unlawful loss, as well as unauthorised access, disclosure, copying, use, or modification. The System shall include administrative, technical, physical and personnel control measures. The Supplier shall protect the data regardless of the format in which they are held.
140618.3.4 The Supplier shall have the necessary processes and tools in place to ensure that deleted data or sensitive software is properly deleted and cannot be recovered by unauthorised personnel. Secure erasure of data and disposal of media shall meet industry media sanitisation standards such as National Institute of Standards and Technology (NIST) Special Publication 800-88 ‘Guidelines for Media Sanitisation’.
140718.3.5 The Supplier shall provide a copy of Statement on Standards for Attestation Engagements (“SSAE”) 16 - Service Organization Control (“SOC”) 1 report to the Company on an annual basis.
140818.4 Application System Security
140918.4.1 If there are any code development or customisation to the System, the Supplier shall propose a software security framework to be used to formulate and implement a strategy for software security that is tailored to the specific risk that the Company faces.
141018.4.2 The Supplier shall provide a detailed description of the proposed framework and activities involved, and how these will be implemented for the System. The framework should follow and meet industry recognisable framework such as Open Web Application Security Project (“OWASP”) Software Assurance Maturity Model (“SAMM”).
141118.4.3 The Supplier shall scan the System for vulnerabilities and rectify them before deployment to the Company’s environment.
141218.4.4 The System shall use fixed TCP/UDP ports.
141318.4.5 Secure protocols such as SSH, SFTP shall be used.
141418.4.6 The System shall store all account credentials as hashed or encrypted.
141518.4.7 The Supplier shall not allow remote access or any other access to the System that circumvents the intended controls (e.g. via covert channel, backdoor, default support account) by its personnel unless the access is made known, properly justified and approved by the Company in advance.
141618.4.8 Remote support of the System should not be allowed. If required, the Supplier shall indicate to the Company how remote support of the System is implemented and the measures taken for the protection of security and privacy of these sessions.
141718.4.9 The System shall not perform, and shall not be able to be used to perform, any function that may change the security configuration, security file, or security program of the operating environment or platform in which the System runs.
141818.4.10 Detailed system and network architecture and dataflow diagrams for the System shall be submitted for approval by the Company prior to implementation.
141918.4.11 The Supplier must comply with the Company‘s change control process to ensure that all intended changes are properly reviewed, tested, and authorised before implementation.
142018.4.12 The Supplier shall have sufficient control measures to ensure that no malicious codes such as virus, worm, Trojan-horse, or backdoor is introduced to the environment.
142118.4.13 The UAT, production, and DR environment shall be hardened according to the Company’s IT hardening standards prior to UAT and commissioning of the System. These include, but are not limited to:
142218.4.13.1 Changing of the default passwords and privilege IDs,
142318.4.13.2 Removal of unused IDs,
142418.4.13.3 Patching the System with the latest security updates, and
142518.4.13.4 Reviewing all System default configurations for adequacy of security protection.
142618.4.14 The System shall be implemented and deployed with sufficient security controls to protect it from unauthorised access and attack which may compromise the confidentiality, integrity and availability of data and information hosted by the System.
142718.5 Application User Access Management
142818.5.1 This is only applicable to the Company’s User (IT and business unit (“BU”)) Accounts
142918.5.2 Authorisation and Access control shall be implemented at the:
143018.5.2.1 Operating system level; and
143118.5.2.2 Application level
143218.5.3 The System shall support authentication via Microsoft Active Directory (“AD”) server for user identification (i.e. user will be prompted for login to the System).
143318.5.4 The System shall be able to support automated user accounts provisioning by synchronising with the user accounts in the existing AD server.
143418.5.5 Access to the System shall be designed based on the least privileged and segregation of duties principle.
143518.5.6 Segregation of roles shall be clearly defined and documented for Privileged Users. Privileged Users refer to users such as ID Administrator, System Administrator of operating system, Security Administrator.
143618.5.7 The System shall be able to support role-based user account configuration. Role assignment and role definition functions shall be segregated.
143718.5.8 The user account management function shall allow user account creation, modification, disabling, deletion, and searching and displaying user account details. The role assignment function shall allow role creation, modification, deletion, searching and displaying role details. The role definition function shall allow adding and deleting functions to a role, and searching and displaying role details.
143818.5.9 The System shall have the capability of interfacing with the Company’s Access Right Management System via a designated middleware in order to manage user administration, and access rights management, without any manual intervention; i.e. through interface(s).
143918.5.10 The System shall have interface(s) which shall comply with the Company’s Interface Requirements, and shall have functionalities that include but are not limited to the following:
144018.5.10.1 Retrieving a list of active users and their assigned role(s);
144118.5.10.2 Adding a new user;
144218.5.10.3 Updating an existing user (e.g. adding / removing role membership, or modifying user information);
144318.5.10.4 Deleting a user;
144418.5.10.5 Retrieving a list of roles including functions used by each role;
144518.5.10.6 Retrieving a list of functions;
144618.5.10.7 Retrieving access rights administration; and
144718.5.10.8 Retrieving a list of transactions performed by privilege accounts.
144818.5.11 The System shall be able to restrict security administration role to functions essential to perform security settings to the System.
144918.5.12 The menu facility in the application showing the various functions shall be customisable by the user’s security profile. The options to which the users do not have access rights shall not be displayed.
145018.5.13 Access to the application system via administrative accounts shall be secured by multi-factor authentication.
145118.5.14 The Supplier shall provide a base set of role and functional matrix, for the Company to further tailor to its business needs.
145218.5.15 The Supplier shall have a proper approval process and tracking mechanism for all access to the System and information to ensure proper usage and accountability.
145318.5.16 The Supplier shall indicate if the System utilises a web based or client based architecture. Communication between the user and the System shall be secured during authentication and communication phases.
145418.5.17 For web based architecture, the System design shall consider access control of URLs for different roles and business units.
145518.5.18 The System shall be able to support inactive session auto logout.
145618.6 Audit Trails and Report
145718.6.1 This is only applicable to the Company’s User (IT and BU).
145818.6.2 The System shall provide audit trails and reports for at least the following user activities:
145918.6.2.1 User login/logout activities in the System;
146018.6.2.2 Activities performed by privileged user and administrator accounts;
146118.6.2.3 Failed user login;
146218.6.2.4 Data updates activities (Data creation/modification/deletion);
146318.6.2.5 Maintenance of confidential or sensitive master data;
146418.6.2.6 Exceptional transactions such as repeated failed login attempts;
146518.6.2.7 Account creation and deletion, role assignment and role(s) changes; and
146618.6.2.8 Access or attempts to access the audit log file.
146718.6.3 The System shall ensure that the audit trails are protected from unauthorised modification and deletion.
146818.7 Database Security
146918.7.1 The Supplier shall indicate how reports and data are protected at rest and in motion within the System and when interacting with other applications.
147018.7.2 The System shall allow for encryption of confidential/sensitive fields in the database when required.
147118.7.3 Data validation shall be performed by the data entry/maintenance programs.
147218.7.4 The System shall be able to provide effective control reports for reconciling the System’s files and transactions. There should be adequate control mechanisms built in to validate acceptable interfaces and to flag interface problems. Examples include but are not limited to control reports, control totals and exception reporting.
147318.7.5 All new interfaces created by the Supplier shall come complete with effective control mechanisms for reconciling the System’s files and transactions, validation of incoming data and to flag interface problems. Examples of control mechanisms include, but are not limited to, control reports, control totals and exception reporting.
147418.7.6 The Supplier shall implement security measures to prevent system administrators or other privileged users from having direct access to the stored data. Stored data shall only be accessed via user interface.
147518.8 Security Standard
147618.8.1 The Supplier shall employ a reasonably strong industry cryptographic standard for required data and/or transmission encryption, such as Advanced Encryption Standard (AES) with key sizes of at least 256 bits, RSA Public Key Encryption with key sizes of at least 2048 bits, Secure Hash Algorithm (SHA-256).
147718.8.2 The Supplier shall use reasonably strong industry cryptographic protocol in conjunction with the relevant cryptography standards, such as:
147818.8.2.1 Transport Layer Security (TLS) version 1.2;
147918.8.2.2 Use AES with GCM or CCM whenever possible;
148018.8.2.3 Secure Shell (SSH) version 2; and
148118.8.2.4 Password must not be stored in clear text.
148218.8.3 Wireless devices and networks shall use WPA2 with AES for authentication and data encryption.
148318.8.4 The Supplier shall avoid the use of unknown proprietary encryption algorithms.
148418.8.5 The Supplier shall ensure that digital certificates that are deployed for the System shall conform to X.509 version 3.
148518.8.6 The Supplier shall implement control measures that are needed to protect sensitive data, which includes but is not limited to system configuration, network architecture, system design, and any related data. The Supplier shall provide detailed description of the control measures.
148618.9 Penetration Test (Post Commissioning Date)
148718.9.1 RWS may perform validation or assurance testing (e.g., configuration review, control verification). No third-party penetration test is included within this Tender Scope.
148819. Access Control and Audit Trail
148919.1 The System shall support rights management capabilities to prevent unauthorised transactions and protect the System database from being tampered with.
149019.2 The System shall support role-based access control and function to role mappings.
149119.3 The System shall have audit logs which capture the actions of each user activity.
149219.4 The System shall include history of all user interactions, edits and audit trail. These should minimally capture the action, date and time and the user that performed the change.
149320. Integration Requirements
149420.1 Active Directory
149520.1.1 Supplier will conduct all integration works required for cross-system functionality, including setup with the Company’s AD single log in. This includes a mapping of the AD user schema to the System and access to enable AD log-in.
149620.1.2 Supplier’s scope of work includes architecting and development of new authentication APIs to support AD log-in. Reconciliation of security standards, especially with oAuth, may be required and will be included as part of scope of work.
149720.1.3 Supplier will also conduct testing with simulated users, along with basic penetration tests.
149820.2 ID Administration System (“IDAS”)
149920.2.1 The System shall integrate to IDAS through the standard web services interfaces in real time or via batch file for the purpose of:
150020.2.1.1 User Profile creation / maintenance
150120.2.1.2 User to Role list generation
150220.2.1.3 Role to Function list generation
150320.2.1.4 Active user list generation
150420.2.1.5 Privilege account list generation
150520.3 The System shall allow enough flexibility to integrate with more existing/new 3rd party system used by the Company.
150621. DATA MIGRATION
150721.1 The Supplier shall be responsible for migrating all existing configurations to the new System or Solution. This includes but is not limited to, rules, settings, dashboards, integrations with other tools and applications, alerts, and thresholds.
150821.2 In the event the Supplier is unable to onboard all log sources within the stipulated timeframe defined in the project timeline, the Supplier shall redirect alerts from the existing system to the new System or Solution platform and ensure continuous security monitoring of the remaining log sources – at no additional cost to RWS.
1509Such data migration shall be provided to the Company at no additional cost.
151022. TECHNOLOGY stackS AND LIFECYCLE COMPLIANCE
151122.1 Platform Requirements
151222.1.1 The Supplier shall ensure that all components of the System are deployed on platforms that:
151322.1.1.1 are supported by the Company’s IT department;
151422.1.1.2 align with the Company’s current technology stacks in Section 22.6 of this Appendix B1; and
151522.1.1.3 are explicitly approved in writing by the Company prior to deployment.
151622.2 Operating System and Database RequirementsSWO to confirm
151722.2.1 The operating system and database used for the System must:SWO to confirm
151822.2.1.1 remain within the Supplier’s mainstream support lifecycle for at least two (2) years from the Commissioning Date; andSWO to confirm
151922.2.1.2 not be within two (2) years of their published EOS Date at the time of commissioning.SWO to confirm
152022.2.2 For the purposes of this LOA, “EOS Date” means the date published by the original software manufacturer after which the product will no longer receive security updates or vendor support.SWO to confirm
152122.3 Software Support Lifecycle Compliance
152222.3.1 The Supplier shall ensure that all software developed, provided, or incorporated into the System — including, without limitation, all third-party and open-source components, remain within the active support lifecycle of the original manufacturer or maintainer for the duration of its use within the System. No component shall be deployed if the EOS Date has already elapsed by the Commissioning Date or will elapse shortly after the Commissioning Date.SWO to confirm
152322.4 Ongoing Compliance Warranty
152422.4.1 The Supplier expressly warrants that all platforms, operating systems, databases, and software components used in the System will remain compliant with Sections 22.1 to 22.3 for the Term of this LOA.SWO to confirm
152522.4.2 If any component approaches or reaches EOS Date during the Term of this LOA, the Supplier shall, at its sole cost and without delay or service disruption, upgrade, replace, or reconfigure the affected component to restore compliance.SWO to confirm
152622.5 Deviation from StandardsSWO to confirm
152722.5.1 Any deviation from the requirements set out in Sections 22.1 to 22.4 requires prior written consent from the Company, obtained through the Company’s formal architecture change control process.SWO to confirm
152822.6 Technology Stacks
152922.6.1 Standard Technology Stack
153122.6.2 Network Technology stacks (applicable for infrastructure network related project only)
153322.6.3 Application Technology stacks (applicable for custom-build applications)
153523. MANPOWER DEPLOYED
153623.1 The Supplier shall undertake that they will not employ any illegal foreign workers for the purpose of completing the LOA in contravention of the Immigration Act (Cap. 133) (and/or any modifications and amendments after the date of execution of the LOA) or any other relevant law.
153723.2 In the event the Services to be performed requires entry into the RWS Casino, the Supplier shall undertake that all assigned or onsite staff meet the following requirements:
153823.2.1 Be of the age of 21 years and above;
153923.2.2 Shall not be on the casino’s exclusion list;
154023.2.3 Shall not have past history of criminal offence; and
154123.2.4 Follow the rules and regulations of the Company.
154223.3 In addition, the Supplier shall procure that any assigned or onsite staff entering the RWS Casino without payment of entry levy:
154323.3.1 Shall not take part in any gaming activities inside the casino;
154423.3.2 Shall not loiter around or visit the casino floor without the Company’s approval;
154523.3.3 Display their passes prominently without demand at all times; and
154623.3.4 Be dressed and behave in a professional manner.
154723.4 The Supplier shall be liable for and shall indemnify the Company against any damage, expense, liability, losses, claims and/or proceedings whatsoever arising out of the Supplier’s default in complying with the above undertakings. For purpose of this section, the Supplier shall provide a written undertakings in connection with the above within two (2) weeks of signing of this LOA.
154824. FULFILMENT PARTNER
154924.1 The Supplier wishes to appoint the following fulfilment partners for the Services (“Fulfilment Partners”):
155024.1.1 Armor Defense Asia Pte. Ltd. (Business Registration Number: 202222526H
155124.1.2 <INSERT NAME OF COMPANY> (Business Registration Number: XXXXXXXXXX)
155224.1.3 <INSERT NAME OF COMPANY> (Business Registration Number: XXXXXXXXXX)
155324.2 The Supplier shall procure that the Fulfilment Partners complies with all the terms and conditions of the LOA.
155424.3 The Supplier shall procure that the Fulfilment Partners will not vary the prices or scope of the Services throughout the term of the LOA.
155524.4 The Supplier agrees that the Fulfilment Partners shall be deemed an agent of the Supplier and the Supplier shall be liable for all acts and/or omissions of the Fulfilment Partners.
155624.5 The Supplier agrees to indemnify and save harmless Company from and against all losses which the Company may suffer in connection with the acts and/or omissions of the Fulfilment Partners including any penalties imposed by the Casino Regulatory Authority for the Fulfilment Partners’ infringement of any rules and regulations.
155724.6 If required by the Company, the Supplier shall procure that the Fulfilment Partners assist the Company with any investigation, inquiry and/or discussions in relation to the Services without any additional cost to the Company.
155825. Change Management
155925.1 Throughout the term of this LOA, the Supplier shall provide enhancements/changes to the System as and when required by the Company. The Company shall be entitled to raise Change Request (“CR”) for such services from time to time.
1560Change Request and CR Proposals
156125.2 The Supplier shall submit the CR Proposal(s) to the Company within the following timelines:
156325.3 Supplier will create/add the CR to the log entry, make an assessment of the CR, then subsequently submit a detailed CR proposal (“CR Proposal”) to the Company with the following information:
156425.3.1 Summary Description
1565A high level summary of requested change.
156625.3.2 Scope of work
156725.3.2.1 Detailed write up on the scope for this proposed solution which includes but is not limited to the following areas:
156825.3.2.1.1 Project Management
156925.3.2.1.2 Requirement Gathering
157025.3.2.1.3 Functional Design
157125.3.2.1.4 Technical Design
157225.3.2.1.5 Development
157325.3.2.1.6 SIT
157425.3.2.1.7 UAT
157525.3.2.1.8 Deployment
157625.3.2.2 Detailed write up on how all the proposed changes to the System will be processed/applied to the modules of software, hardware and the Documentation;
157725.3.2.3 Impact analysis, handling of changes to the proposed System (including rollback procedures); and
157825.3.2.4 Tests and acceptance of the changes to the System.
157925.3.3 Schedule
1580Project schedule for proposed solution.
158125.3.4 Effort & Cost
1582Estimation of the effort required, and cost
158325.3.5 Documentation and Updates Required
1584Summary of existing artifacts that require updates.
158525.3.6 Impact to current Maintenance Services
1586Details of changes to current maintenance services.
158725.3.7 Risks & Mitigation
1588Details of potential risks and mitigation.
158925.3.8 Assumption
1590Details of assumption made for proposed solution.
159125.4 For the avoidance of doubt, the Supplier shall bear all costs related to the preparation and submission of the CR Proposal(s) and Work Order(s) to the Company.
159225.5 At the Company’s request, and at no additional cost, the Supplier will present the CR Proposal to the Company for clearance. Subsequently, the Company will inform the Supplier on the status of approval of the CR Proposal.
159325.6 For CR Proposal(s) approved by the Company in writing, the Supplier will prepare and submit a Work Order to the Company which reflects:
159425.6.1 The detailed scope of work, and effort estimated in the approved CR Proposal; and
159525.6.2 Cost shall be in accordance with the rates and payment schedule set out in Appendix B2.
159625.7 After the Work Order has been mutually agreed to in writing by the Company and the Supplier, the Supplier shall carry out the Work Order accordingly.
1597Additional terms for Work Order
159825.8 Company shall control the prioritisation of approved Work Order(s). For any unforeseen or urgent circumstances, the Company reserves the right to re-prioritise the Work Order(s).
159925.9 The implementation of a Work Order may be carried out on a one-time basis or in phases, to be specified in the Work Order, or otherwise approved by the Company in writing. The approval required from the Company shall include the agreed number of man-days effort for each Work Order.
160025.10 All Work Order(s) shall be subjected to UAT in the UAT environment, unless otherwise agreed by the Company. The implementation of a Work Order cannot be carried out before the UAT is completed, unless UAT is waived by the Company.
160125.11 The Supplier’s scope of work in relation to each Work Order shall include but is not limited to the following:
160225.11.1 Design, develop, test and implement the changes to the System according to the requirements in the Work Order.
160325.11.2 Design a series of test cases to verify the proper functioning of all functions according to the specified requirements, including System integration.
160425.11.3 Submit a comprehensive UAT plan including the actual scope of testing, the acceptance criteria and schedule of testing within a mutually agreed schedule prior to the actual conduct of the test.
160525.11.4 Set up of UAT test data, if required by the Company.
160625.11.5 Provide, prepare and/or update relevant documentation to reflect changes made to the System.
160725.11.6 Ensure that the Work Order is completed and implemented within the timeline as stated in the Work Order.
160825.12 The Supplier shall ensure that each Work Order is successfully implemented according to agreed schedule and man-days. If the Supplier cannot meet the pre-agreed schedule/man-efforts, any additional costs incurred shall be borne by the Supplier.
1609The Work Order is considered completed after the modified System has been accepted, cutover to live environment and all relevant updated Documentation submitted and approved by Company.
161026. Payment Schedule
1611Supplier will invoice the Company in accordance with the following payment schedule:
161326.1 Licenses, subscriptions, and any related cloud-service entitlements shall be activated only upon written authorization from RWS, following ARB approval and readiness confirmation. No billing shall commence prior to such authorization.
161426.2 Subscriptions fees (Component A of Detailed Price Breakdown (XDR) shall be payable on an annual basis, upon written authorization and activation from RWS.
161526.3 Managed MXDR services (Component D of Detailed Price Breakdown (XDR) shall be invoiced on recurring basis annually.
161626.4 All payments shall be made to the Supplier within thirty (30) days from the date of a valid and undisputed invoice, in accordance with RWS’s standard payment procedures.
161726.5 The Supplier shall provide a detailed Schedule of Rates covering add-on components such as additional software licenses, optional modules, professional services, and related items for potential future procurement during the contract duration.
161826.6 The rates shall remain valid throughout the Contract Period, including the optional extension years, unless otherwise mutually revised and approved by RWS.
1619APPENDIX B3
1620KEY PERFORMANCE INDICATORS
1621I. Platform Health & Detection Effectiveness
1622(Linked to Appendix B1 – Technical Requirements)
1624II. SOC Operations & Response Performance
1625(Linked to Appendix B1 – Managed XDR / SOC Requirements)
1627III. MXDR Service Delivery & Continuous Improvement
1628(Linked to Appendix B2 – Services and Schedule)
1632Functional Requirements: Endpoint Protection Platform (EPP)
16331. CORE ANTIVIRUS & ANTI-MALWARE
16341.1. The system must perform static and dynamic machine learning analysis on files and processes to detect and block known and unknown malware, including trojans, ransomware, spyware, and viruses.
16351.2. The system must not rely solely on traditional signature-based detection as its primary method.
16361.3. The system must provide real-time, on-access scanning of files upon execution, creation, and modification.
16371.4. The system must provide on-demand scanning capabilities, allowing administrators to initiate full or quick scans on single or groups of endpoints.
16381.5. Upon detection, the system must automatically quarantine malicious files, moving them to a secure, encrypted holding area and terminating associated processes.
16391.6. The system must provide a clear audit log for every detection, including file path, hash, associated process, action taken, and timestamp.
16402. Exploit Prevention
16412.1. The system must include a dedicated module to prevent the exploitation of memory corruption vulnerabilities (e.g., buffer overflows, use-after-free errors).
16422.2. The system must protect widely deployed applications, including but not limited to:
16432.2.1. Microsoft Office Suite
16442.2.2. Web browsers
16452.2.3. PDF readers
16462.2.4. Media players and Java runtimes
16472.3. The system must detect and block common shellcode injection techniques such as process hollowing, atom bombing, and dynamic link library (DLL) sideloading.
16483. Behavioural-Based Prevention (Indicators of Attack – IoAs)
16493.1. The system must analyse process behaviour in real-time to identify and block malicious sequences of activity, regardless of file reputation.
16503.2. The system must be capable of detecting and preventing the following techniques through behavioural analysis:
16513.2.1. Fileless attacks using legitimate tools like PowerShell, Windows Management Instrumentation (WMI), and Windows Script Host (WSH).
16523.2.2. Ransomware encryption behaviour by monitoring for rapid, sequential file modifications with specific extensions.
16533.2.3. Credential access and dumping techniques, including LSASS memory access and security descriptor modification.
16543.2.4. Lateral movement attempts using tools like WMIexec, PsExec, or Remote Desktop Protocol (RDP).
16553.2.5. Persistence mechanisms, such as registry run key modifications, service creation, and scheduled task registration.
16563.3. The system must allow administrators to create custom IOA rules to block environment-specific malicious behaviours.
16574. Device Control
16584.1. The system must provide granular policy management for removable media and peripheral devices.
16594.2. Policies must allow for control based on device class, vendor ID, product ID, or serial number.
16604.3. Control options must include:
16614.3.1. Read-only access
16624.3.2. Write-only access
16634.3.3. Block-all access
16644.3.4. Full read/write access
16654.4. The system must provide logging of all device access attempts, including the device used, the host computer, the user, and the action taken.
16665. Host-Based Firewall Management
16675.1. The system must provide a host-based firewall for Windows and macOS endpoints.
16685.2. The firewall must be centrally managed through the administration console, allowing for the creation and enforcement of firewall rules across endpoint groups.
16695.3. Rule creation must be based on criteria such as:
16705.3.1. Application path and hash
16715.3.2. Direction of traffic (inbound/outbound)
16725.3.3. IP address, port, and protocol
16735.4. The system must include pre-configured rule sets for common operating system services and applications.
16746. Centralized Management and Reporting
16756.1. All prevention policies must be managed from a single, web-based console.
16766.2. The console must allow for the creation of different policy sets for different groups of endpoints (e.g., servers, workstations, kiosks).
16776.3. The system must provide real-time and historical reporting on:
16786.3.1. Prevention events (blocks, quarantines)
16796.3.2. Agent health and status
16806.3.3. Overall endpoints security posture
16816.4. The system must provide pre-built compliance reports for frameworks such as NIST and CIS Critical Security Controls.
16827. Performance and System Impact
16837.1. The agent must demonstrate a minimal and predictable impact on endpoint performance during independent testing.
16847.2. The maximum acceptable CPU utilization during an on-access scan must not exceed 5% on a standard corporate endpoint.
16857.3. The agent's memory footprint must not exceed 250 MB under normal operating conditions.
16867.4. The agent must not cause a noticeable increase in system boot time or logon duration.
16877.5. The system must provide administrators with granular controls to schedule resource-intensive activities (such as full scans) during off-peak hours.
16887.6. The agent must enter a low-power state when an endpoint is running on battery power to conserve energy, unless overridden by policy.
16898. Agent Deployment, Architecture & Operational Efficiency
16908.1. The solution shall use a single agent for all supported endpoints, servers, workstations, virtual desktops or machines, and containers.
16918.2. The solution shall provide a single installer package that supports all required operating systems and workload types.
16928.3. The solution shall support streamlined, large-scale deployment without dependency sequencing.
16938.4. The same agent shall provide full capability on endpoints, servers, workstations, virtual desktop or machines, and containers without requiring different versions or reduced functionality modes.
16949. Resilience and Tamper Protection
16959.1. The endpoint agent shall operate as a fully self-protecting security control with built-in anti-tampering that prevents unauthorized termination, suspension, unloading, or modification of its processes, drivers, services, and protection capabilities – even if an attacker obtains local administrator privileges or executes remote commands (e.g., via reverse shell, C2 payloads, or elevated scripting.
16969.2. Any attempt to disable, uninstall, reconfigure, or stop protection must require explicit authorization through secure, auditable centralized administrative controls. Tampering shall not be possible through operating systems tools, registry edits, Group Policy changes, Powershell, service control commands, or command-line execution.
16979.3. The solution must implement kernel-level protection and a hardened architecture that is not dependent on traditional OS user-mode services and cannot be neutralized by privilege escalation, service-kill attempts, Safe-Mode execution, or driver removal.
16989.4. The agent shall support autonomous self-healing, automatically restoring any service, driver, binary, or component that is stopped, corrupted, modified, or replaced – without requiring manual intervention and regardless of network connectivity state.
16999.5. Security controls, prevention policies, and telemetry collection must remain continuously active and enforceable even when the endpoint is:
17009.5.1. Offline or disconnected from the network
17019.5.2. Operating in Windows Safe Mode
17029.5.3. Operating under an attacker-controlled session or credential context
17039.6. The solution shall enforce cryptographic integrity for all agent components. Execution must be blocked if binaries are tampered, rolled back, injected, side-loaded, or replaced by unsigned or untrusted versions.
17049.7. The agent must generate real-time, high-severity alerts on any attempts to modify, suspend, remove, bypass, or disable protections – including via reverse shell or automated programs.
17059.8. The Supplier shall demonstrate or provide attestation that the solution:
17069.8.1. Cannot be disabled via service termination or local administrative access
17079.8.2. Maintains enforcement even under remote shell execution
17089.8.3. Remains operational in Safe Mode
17099.8.4. Recovers automatically when tampered with
17109.8.5. Meets enterprise red-team and adversarial test standards
171110. Policy Management and Configuration
171210.1. The administration console must provide a role-based access control (RBAC) system to delegate administrative permissions.
171310.2. The system must allow for policies to be applied dynamically based on endpoint tags, such as operating system, location, or network zone.
171410.3. The console must provide a preview mode to simulate the impact of a policy before enforcement.
171510.4. The system must maintain a version history of all policy changes, including who made the change and when.
171610.5. The system must allow for the graceful rollback of a policy to a previous version if necessary.
171711. Reporting and Forensics
171811.1. The system must provide a dedicated dashboard for real-time visualization of prevention events across the environment.
171911.2. Administrators must be able to create custom reports and schedule them for automatic generation and distribution.
172011.3. For every blocked event, the system must provide a detailed forensic timeline, showing the process tree and file activities that led to the prevention action.
172111.4. All report data must be exportable to common formats (PDF, CSV) for further analysis or archival purposes.
172211.5. The system must provide API access to all report data for integration with external SIEM or analytics platforms.
1723Functional Requirements: Endpoint Detection and Response (EDR)
17241. Data Collection and Telemetry
17251.1. The agent must continuously record a high-fidelity, chronological timeline of endpoint activity without relying on traditional logging systems (e.g., Windows Event Logs).
17261.2. The recorded telemetry must, at a minimum, include the following data points for each event:
17271.2.1. Process execution data, including process name, path, hash, command-line arguments, parent/child process relationships, user context, and integrity level.
17281.2.2. File system activity, including file creation, read, write, move, deletion, and attribute changes, with full file paths and hashes.
17291.2.3. Network connection data, including source and destination IP addresses, port numbers, protocol, domain names, and the process initiating the connection.
17301.2.4. Registry modifications for both keys and values, including creation, deletion, and value changes.
17311.2.5. Module (DLL) loading activity, including the source process and load address.
17321.2.6. User logon and authentication events, including logon type and source IP address.
17331.3. The system must retain this detailed telemetry data in a hot, searchable state for a minimum of 90 days for all endpoints.
17341.4. The agent must cache telemetry data locally and resiliently transmit it to the cloud console upon re-establishing connectivity, ensuring no data loss during network outages.
17352. Threat Detection and Alerting
17362.1. The detection engine must correlate low-level telemetry events into high-fidelity security alerts based on behavioural patterns and Indicators of Attack (IOAs).
17372.2. Every alert must be automatically mapped to the specific MITRE ATT&CK Framework tactic, technique (ID), and sub-technique (ID).
17382.3. The system must assign a dynamic severity score (e.g., Critical, High, Medium, Low) to each alert based on the confidence level and the potential impact on RWS.
17392.4. The system must provide a library of pre-tuned, out-of-the-box detection rules for common adversary TTPs, which are continuously updated by the vendor's threat intelligence team.
17402.5. The system must allow security analysts to create custom detection rules using a powerful query language to detect environment-specific threats.
17413. Threat Hunting and Investigation
17423.1. The system must provide an advanced query language (e.g., based on SQL, KQL) that allows analysts to search interactively across all collected telemetry data from all endpoints.
17433.2. Analysts must be able to save, schedule, and share their queries for continuous monitoring and operationalization into custom detections.
17443.3. The system must provide a graphical investigation tool that visually maps the complete attack chain, automatically displaying the relationships between processes, files, network connections, and users involved in an incident.
17453.4. Analysts must be able to pivot seamlessly from any alert, event, or entity within the console directly into the raw, detailed telemetry data for deeper context and analysis.
17463.5. The investigation interface must provide a timeline view of all related activity, allowing analysts to step through the sequence of events before, during, and after an alert.
17474. Response and Remediation
17484.1. The system must provide remote response capabilities directly from the management console, allowing analysts to take immediate action on any endpoint without requiring a secondary remote access tool.
17494.2. Response capabilities must include, at a minimum:
17504.2.1. Remote shell access for live investigation and command execution.
17514.2.2. The ability to kill running processes and terminate malicious activity.
17524.2.3. The ability to delete or quarantine malicious files identified during an investigation.
17534.2.4. The ability to isolate an endpoint from the network (either fully or selectively) while maintaining management connectivity to the agent.
17544.2.5. The ability to upload and execute custom scripts or tools across a group of endpoints for large-scale remediation.
17554.3. All response actions must be logged in an immutable audit trail, detailing who took the action, when, on which endpoint, and the outcome.
17565. Integration and Automation
17575.1. The system must provide a fully documented RESTful API that allows for bidirectional integration with external systems like SIEM, SOAR, and IT Service Management (ITSM) platforms.
17585.2. The API must allow for the programmatic retrieval of alerts, endpoints, and investigation data.
17595.3. The API must allow external systems to initiate response actions (e.g., isolate device, run scan) within the EDR platform.
17605.4. The system must support the ingestion of external threat intelligence (e.g., IOCs in STIX/TAXII format) to automatically tag malicious activity and enhance detection.
1761Functional Requirements: Extended Detection and Response (XDR)
17621. Core Data Integration and Normalization
17631.1. The platform must natively integrate with and ingest data from a wide range of security and IT products beyond the endpoint, without requiring custom parsing or complex configuration
17641.2. The system shall provide pre-built and fully supported integrations for a broad range of data sources. These integrations must enable seamless ingestion and normalization of security-relevant data across the following categories:
17651.2.1. Cloud Platform
17661.2.2. Identity and Access Management
17671.2.3. Email Solution
17681.2.4. Network Infrastructure
17691.2.5. Endpoint Detection and Response Tools
17701.3. The platform shall normalize all ingested data into a unified, queryable schema, irrespective of the original format or source. This normalization must enable consistent search, correlation.
17712. Cross-Domain Correlation and Analytics
17722.1. The correlation engine must automatically analyse events across all integrated data sources (endpoint, cloud, identity, email, network) to identify multi-stage attacks that would be invisible to siloed tools.
17732.2. The system must automatically stitch together related events from different domains to create a unified incident that tells the complete story of an attack.
17742.3. The platform must use machine learning and behavioural analytics to establish a baseline of normal activity for users and systems and flag significant deviations that indicate potential compromise.
17752.4. All correlated incidents must be automatically mapped to the MITRE ATT&CK framework, providing a clear understanding of the adversary's tactics and techniques across the entire kill chain.
17763. Unified Incident Management and Investigation
17773.1. The console must provide a single, unified view for incidents, regardless of which data sources were involved in the detection.
17783.2. The investigation interface must provide a unified timeline that merges events from all domains (e.g., a timeline showing: malicious email received -> user credentials phished -> anomalous cloud logon -> malicious process execution on endpoint).
17793.3. Analysts must be able to search and hunt across all normalized data using a single, powerful query language, without needing to learn source-specific syntax.
17803.4. The system must allow an investigator to pivot from an identity alert directly to the affected endpoint data and cloud activity from that user, all within the same console.
17814. Automated Response and Orchestration
17824.1. The platform must provide pre-built, automated response playbooks that can act across different domains. For example:
17834.1.1. Upon detecting a compromised identity, automatically force a user logoff and require a password reset.
17844.1.2. Upon detecting a malicious cloud activity, automatically revoke a specific user's cloud session or permissions.
17854.1.3. Upon detecting a network-based attack, automatically push a block rule to the firewall.
17864.1.4. The system must include a built-in orchestration engine to execute these cross-domain response actions without requiring a separate SOAR product for basic use cases.
17874.2. All automated actions must be logged in a central audit trail with details on the triggering event, the action taken, and the result.
17885. Open API and Ecosystem
17895.1. The platform must provide access to all core functions such as data ingestion, alert retrieval, incident management, and response actions via a well-documented RESTful API.
17905.2. The API must use modern authentication and authorization standards (e.g., OAuth 2.0).
17915.3. The API must support standardized data formats like JSON and must be capable of sending and receiving alerts in common schemas (e.g., CEF, OCSF).
17925.4. The vendor must provide and maintain a library of pre-built API integrations for popular SIEM, SOAR, and IT Service Management platforms.
1793Functional Requirements: Managed Extended Detection and Response (MXDR)
17941. Service Foundation
17951.1. The MXDR must deliver a 24/7/365 managed service, where the MXDR’s Security Operations Centre (SOC) assumes primary responsibility for monitoring, detection, validation, and initial response.
17961.2. The MXDR must furnish a detailed RACI matrix (Responsible, Accountable, Consulted, Informed) that explicitly defines the division of responsibilities between the MXDR and RWS for all phases of security operations (Preparation, Detection, Analysis, Containment, Eradication, Recovery, Post-Incident Review).
17971.3. Personnel and Expertise
17981.3.1. All SOC analysts must hold advanced industry certifications (e.g., GCIH, GCFA, GNFA, GCFE, OSCP, CISSP) or equivalent qualifications for their role, with proof available for audit.
17991.3.2. The MXDR must implement a mandatory continuous training program for all analysts, with a minimum of 40 hours annually dedicated to training on emerging threats, new attack techniques, and new platform features.
18001.3.3. The MXDR must maintain dedicated teams for Tier 1 (Triage), Tier 2 (Analysis/Hunting), and Tier 3 (Incident Response/Threat Intelligence) functions, with clear escalation paths.
18011.3.4. A dedicated Technical Account Manager (TAM) must be assigned, possessing a deep understanding of RWS’s environment, industry-specific threats, and business objectives. The TAM must be available for scheduled strategic reviews and urgent escalations.
18022. Platform and Data Integration
18032.1. Native Sensor Integration
18042.1.1. The MXDR’s platform must include native, multi-tenant sensors/agents for endpoints (EDR), cloud workloads (CWPP), and identity providers, providing deep visibility and response capabilities without third-party dependencies.
18052.1.2. The platform must support ingestion and normalization of data from a broad range of third-party sources, including but not limited to:
18062.1.2.1. Network Infrastructure: Logs from firewalls, proxies, network flow data, DNS activity, and network detection and response systems.
18072.1.2.2. Cloud Environments: Audit and activity logs, configuration monitoring data, and security posture information from major cloud service providers.
18082.1.2.3. Email Security Systems: Threat detection and filtering logs from enterprise email protection platforms
18092.1.2.4. Identity and Access Management System: Authentication events, audit logs, and directory service activity.
18102.1.2.5. Application Sources: Logs from web servers, databases, and commonly used software-as-a-service(SaaS) applications.
18112.2. Data Management and Analytics
18122.2.1. The platform must perform real-time correlation across all integrated data sources to link related, low-fidelity events into high-fidelity incidents.
18132.2.2. All data used for detection and investigation must be retained for a minimum of 90 days, with 365 days of hot storage available as an option.
18142.2.3. The platform must automatically map detected activities to the MITRE ATT&CK framework (including Technique and Sub-Technique IDs) for consistent context and reporting.
18153. Threat Detection and Analysis
18163.1. Monitor and Triage
18173.1.1. The MXDR must monitor and perform initial triage on 100% of alerts generated from all integrated data sources.
18183.1.2. The MXDR must utilize a combination of proprietary and open-source threat intelligence feeds, updated in real-time, to enrich and contextualize all investigated alerts.
18193.2. Proactive Threat Hunting
18203.2.1. The MXDR must conduct continuous, hypothesis-driven threat hunting across RWS’s normalized data, not solely in response to alerts.
18213.2.2. Hunting must be based on three pillars:
18223.2.2.1. Intel-Driven: Hunting for IOCs and TTPs associated with current threat actors targeting the customer's industry.
18233.2.2.2. Analytics-Driven: Searching for statistical anomalies and deviations from established baselines.
18243.2.2.3. Suspicion-Driven: Investigating vague or weak signals that may indicate a sophisticated attacker.
18253.2.3. All hunting activities, regardless of findings, must be documented and made available to RWS upon request.
18263.3. Incident Analysis and Validation
18273.3.1. Every validated incident must include a full kill-chain analysis, meticulously mapped to the MITRE ATT&CK framework.
18283.3.2. The MXDR’s analysis must determine the scope of compromise, including all impacted endpoints, user accounts, cloud assets, and data sets.
18293.3.3. The MXDR must deliver a confidence level (e.g., Critical, High, Medium, Low) for each incident, justifying the assessment with evidence.
18304. Response and Remediation
18314.1. Pre-Approved Playbook
18324.1.1. The MXDR must work with RWS during onboarding to develop and document a detailed, multi-layered response playbook.
18334.1.2. The playbook must define specific, pre-approved actions for common scenarios (e.g., ransomware, credential compromise, data exfiltration).
18344.1.3. Actions must be granular, specifying exact commands, tools, and sequences to be used for containment.
18354.2. Response Execution
18364.2.1. For actions within the pre-approved playbook, the MXDR must execute containment measures immediately upon incident validation without requiring additional RWS sign-off.
18374.2.2. The MXDR must maintain a 24/7 hotline and dedicated secure messaging channel (e.g., Teams) for immediate communication regarding any actions outside the playbook or for major incident declaration.
18384.3. Post-Incident Activities
18394.3.1. For every validated incident, the MXDR must deliver a comprehensive Incident Report within 24 hours of containment.
18404.3.2. The MXDR must facilitate a post-incident review meeting for all high-severity incidents to discuss lessons learned and recommend control enhancements.
18414.3.3. The MXDR must supply all relevant Indicators of Compromise (IOCs) and custom detection rules (YARA, SIGMA, etc.) derived from the incident.
18425. Security, Compliance and Reporting
18435.1. Security of the Service
18445.1.1. Certification requirements for the Partner / System Integrator (Day1) and the MXDR Provider (Day2) shall be as defined in the Certification Requirements under Section 9.
18455.1.2. All analyst access to RWS data and systems must be role-based, time-bound, logged, and monitored. Full audit trails of analyst actions must be immutable.
18465.2. Reporting and Performance Management
18475.2.1. The MXDR must deliver a real-time dashboard accessible to RWS showing key service metrics: MTTD, MTTR, incidents by severity, and SLA compliance.
18485.2.2. A monthly executive report must detail threat trends, security posture score, top incidents, hunter findings, and recommendations.
18495.2.3. Quarterly Business Reviews (QBRs) must be conducted with the RWS’s IT Security Team to review strategic alignment and service performance.
18506. Onboarding, Offboarding, & Knowledge Transfer
18516.1. Structured Onboarding Process
18526.1.1. The MXDR must deliver a documented, phased onboarding plan with clear milestones, timelines, and designated resources from both parties.
18536.1.2. The plan must include "Day 0 – Day 2" coverage commitment for the first critical data sources (e.g., endpoints, identity) while other sources are integrated.
18546.1.3. The MXDR must assist in the deployment and configuration of any required sensors/agents, ensuring optimal performance and coverage.
18556.2. Knowledge Transfer and Training
18566.2.1. The MXDR must conduct formal training sessions for RWS’s IT Security Team on how to use the RWS-facing portal, interpret reports, and respond to MXDR communications.
18576.2.2. The MXDR must deliver complete documentation of all deployed technologies, integration methods, and standard operating procedures (SOPs) used by the SOC for the RWS’s environment.
18586.3. Secure Offboarding & Data Handling
18596.3.1. Upon contract termination, the MXDR must permanently purge or return all RWS-specific data in accordance with a pre-defined data destruction policy.
18606.3.2. The MXDR must assist in the orderly transition of services, including providing final reports and exporting any RWS-owned data (e.g., custom detection rules, historical incident data) in an open, non-proprietary format.
18617. Technology & Platform Flexibility
18627.1. Open Integration & API Access
18637.1.1. The MXDR must offer full, well-documented API access to all platform functionalities, including alert ingestion, incident retrieval, and response actions, to enable integration with RWS’s existing SOAR or ticketing systems.
18647.1.2. The platform must support common open standards (e.g., Open Cybersecurity Schema Framework (OCSF)) for data normalization to reduce integration complexity and cost.
18657.1.3. Customization & Tuning
18667.1.3.1. The MXDR must allow for the creation and tuning of custom detection rules to address RWS-specific applications, unique IT assets, or novel attack patterns observed in the environment.
18677.1.3.2. The MXDR must work with RWS to establish RWS-specific baselines and allow-lists (e.g., for software, network traffic) to reduce false positives and focus on relevant threats.
18687.1.4. Vendor Agnosticism and Flexibility
18697.1.4.1. The service should be delivered effectively even if the customer chooses to retain but not limited to its existing endpoint (EDR) or network (NDR) security vendors, without being forced to "rip and replace" to use the MXDR’s proprietary tools.
18707.1.4.2. The MXDR must demonstrate robust integrations with at least two leading vendors in each security control category
18718. Strategic & Proactive Services
18728.1. Vulnerability and Exposure Management
18738.1.1. The service must include contextual vulnerability prioritization, correlating known software vulnerabilities (CVEs) with active threat intelligence and RWS specific exposure to highlight which vulnerabilities pose an immediate threat and must be patched first.
18748.1.2. · The MXDR must identify and alert on security misconfigurations across endpoints, cloud environments, and identity providers that create material risk.
18758.1.3. Threat Intelligence Program
18768.1.3.1. Beyond incident response, the MXDR must deliver periodic security posture assessments that grade RWS’s security maturity across key domains (e.g., identity security, endpoint hardening, cloud configuration).
18778.1.3.2. The assessment must include a prioritized list of actionable recommendations, tools, and policies to improve the security posture and reduce the overall attack surface.
18789. Certification Requirements
18799.1. Partner / System Integrator (Day-1)
1880The appointed Partner / System Integrator responsible for solution deployment, onboarding, configuration, and implementation activities must hold a valid ISO/IEC 27001 Information Security Management System (ISMS) certification.
1881The certification shall be current, valid, and supported by full audit documentation.
18829.2. MXDR Provider (Day-2)
1883The appointed MXDR Provider responsible for 24x7x365 managed detection and response services must meet the following requirements:
1884· Hold a valid SOC 2 Type II certification or ISO/IEC 27001 certification and
1885· Hold a valid Cybersecurity Service Provider Registration and Operations (CSRO) license
1886All certifications must remain valid and enforceable throughout the contract duration, including any extension periods.
18879.3. Technology and Solution Platform
1888The XDR technology platform used to deliver detection, telemetry, ingestion, analytics, correlation, investigation, and response services – regardless of hosting models (SaaS, cloud, multi-tenant) – shall maintain:
1889· SOC 2 Type II certification
1890· ISO/IEC 27001 certification
1891Where the MXDR services are delivered partially or wholly through Technology Provider platform, the Technology Provider must additionally hold a valid and appropriate CSRO license.
18929.4. Certification Evidence Requirements
1893All parties covered under these certification requirements (Day-1 - Partner/SI, Day-2 - MXDR Provider and Technology Provider) shall:
1894· Provide complete and valid certification documents, including most recent audit reports.
1895· Furnish such documents to RWS upon request for verification.
1896· Maintain valid certifications for the entire contract period, including all renewals and extensions.
1897· Immediately notify RWS in writing of any suspension, expiry, revocation, or lapse in certification status.