Skip to main content

How to write an RFP for advanced MSS and MDR

Requirements, questions, and evaluation criteria specific to advanced MSS and MDR procurement

10 min read

Advanced Managed Security Services (MSS) and Managed Detection and Response (MDR) solutions require a rigorous RFP process due to the complexity of modern cyber threats and the critical need to delegate security operations effectively. A well-structured RFP ensures that the selected provider aligns with the organization's specific risk profile and operational requirements. This category demands a comprehensive evaluation of technical capabilities, threat intelligence integration, and incident response effectiveness.

What makes advanced MSS and MDR RFPs different

Procuring Advanced MSS and MDR differs significantly from standard software acquisitions due to the 24/7 nature of security operations and the high stakes involved in incident response. Unlike typical software deployments, MDR implementations require deep integration with the existing security stack and a thorough understanding of the organization's unique threat landscape.

The evaluation process must extend beyond feature comparisons to assess the vendor's ability to proactively hunt for threats, contain breaches, and provide actionable remediation guidance.nnFurthermore, the rapid evolution of the threat landscape, including the increasing use of AI by attackers, necessitates a provider that is continuously innovating and adapting its detection and response capabilities.

Regulatory compliance, data residency requirements, and the need for seamless integration with cloud and on-premise environments add further complexity to the RFP process.

Organizations must also consider the provider's talent pool, threat intelligence feeds, and their ability to act as an extension of the internal security team.nnFinally, the move toward outcome-driven security requires that the RFP clearly defines the desired security outcomes and establishes measurable KPIs for evaluating the provider's performance. This includes defining acceptable mean time to detect (MTTD), mean time to respond (MTTR), and mean time to resolve (MTTR) metrics.

  • Define clear security outcomes and measurable KPIs (MTTD, MTTR, MTTC)
  • Assess the vendor's threat intelligence capabilities and integration with global threat feeds
  • Evaluate the provider's ability to secure multi-cloud environments and SaaS applications
  • Verify the provider's compliance with relevant industry regulations (e.g., GDPR, HIPAA, DORA)

RFP vs RFI vs RFQ

Here's when to use each document type when procuring advanced MSS and MDR software.

RFI

Request for Information

Use early in your search to understand what vendors offer and narrow your list. Gather general capabilities, company background, and high-level pricing ranges.

RFP

Request for Proposal

Use when you know your requirements and want detailed vendor solutions and pricing. This is your main evaluation document for shortlisted vendors.

RFQ

Request for Quote

Use when requirements are fixed and you just need final pricing. Often used after RFP when you're ready to negotiate with finalists.

For Advanced MSS and MDR, a Request for Information (RFI) is useful for initial market research and understanding vendor service offerings. A Request for Proposal (RFP) is essential for detailed evaluation of technical capabilities, incident response processes, and compliance adherence, while a Request for Quotation (RFQ) is typically unsuitable due to the complexity and customization involved in these services.

Technical requirements checklist

Use this checklist when defining your RFP scope.

Detection and Response

  • 24/7/365 human-led monitoring and investigation
  • Behavioral detection and proactive threat hunting
  • Automated containment and active remote mitigation
  • Full remediation support and post-incident analysis

Threat Intelligence

  • Integration with global threat intelligence feeds
  • Customized threat intelligence based on industry vertical
  • Real-time updates on emerging tactics, techniques, and procedures (TTPs)
  • Vulnerability and exposure detection capabilities

Technology and Integration

  • Support for endpoint detection and response (EDR)
  • Network detection and response (NDR) capabilities
  • Security information and event management (SIEM) integration
  • Extended detection and response (XDR) capabilities

Compliance and Governance

  • SOC 2 Type II compliance
  • Data residency and GDPR compliance
  • Incident reporting and notification procedures
  • Service Level Agreements (SLAs) for response times

Identity Threat Detection and Response

  • Monitoring of identity providers (e.g., Okta, Azure AD)
  • Detection of compromised user behavior
  • Integration with identity and access management (IAM) systems
  • Response capabilities for identity-based threats

Questions to include in your RFP

Service Overview and Architecture

  • Describe your service architecture, including the technologies and platforms used for threat detection and response.
    Understanding the architecture ensures compatibility with existing infrastructure.
  • What is your approach to data collection and analysis, including the types of telemetry ingested and the methods used for correlation?
    This reveals the breadth and depth of their visibility into the threat landscape.
  • How do you ensure the scalability and reliability of your service to handle increasing data volumes and threat complexity?
    Scalability is crucial for long-term effectiveness.
  • Describe your global SOC architecture and how you ensure 24/7/365 coverage with human analysts.
    Ensures continuous monitoring and response capabilities.

Threat Intelligence and Detection

  • What threat intelligence feeds do you utilize, and how do you integrate them into your detection and response processes?
    High-quality threat intelligence is essential for proactive threat detection.
  • How do you identify and respond to novel, "zero-day" attacks that are not covered by traditional signature-based detection?
    Tests their ability to handle unknown threats.
  • Describe your approach to behavioral analytics and how you use it to detect anomalous activity and potential threats.
    Behavioral analytics is crucial for detecting advanced persistent threats (APTs).
  • How do you leverage data from your entire customer base to proactively protect our specific organization?
    Reveals the strength of their threat intelligence network.

Incident Response and Remediation

  • Describe your incident response process, including the roles and responsibilities of your analysts and the communication protocols used.
    A well-defined process ensures efficient and effective response.
  • What is your average time from detection to human-led containment, and how do you measure and improve this metric?
    MTTC is a critical indicator of response effectiveness.
  • What remediation actions are you authorized to take on our behalf, and how do you ensure that these actions are aligned with our internal policies and procedures?
    Clarifies the scope of their response authority.
  • How do you ensure that our environment is returned to a pre-incident state, including the removal of persistence mechanisms and malware artifacts?
    Full remediation is essential for preventing future attacks.

Integration and Deployment

  • What is your process for onboarding new customers, including the steps involved in deploying your technology and integrating it with our existing security stack?
    A smooth onboarding process minimizes disruption and ensures rapid time to value.
  • What integrations do you offer with common security tools and platforms, such as EDR, SIEM, and cloud security solutions?
    Integration capabilities are crucial for maximizing visibility and effectiveness.
  • Do you use a "Bring Your Own Tool" (BYOT) model, or do you require a proprietary stack?
    Impacts flexibility and integration costs.
  • How do you ensure that your service is compatible with our multi-cloud environment, including AWS, Azure, and SaaS applications?
    Cloud security is a critical requirement for most organizations.

Compliance and Legal

  • Are you SOC 2 compliant, and can you provide a copy of your latest audit report?
    SOC 2 compliance demonstrates a commitment to security and data protection.
  • How do you ensure compliance with relevant industry regulations, such as GDPR, HIPAA, and PCI DSS?
    Compliance is essential for organizations in regulated industries.
  • What data residency options do you offer, and how do you ensure that our data is stored and processed in compliance with applicable laws?
    Data residency requirements are becoming increasingly important.
  • Can you provide a sample Business Associate Agreement (BAA) if we are subject to HIPAA regulations?
    A BAA is required for handling protected health information (PHI).

Pricing and Support

  • Describe your pricing model, including all fees and charges for your services. Are there any usage-based fees or limitations on incident response hours?
    Transparency in pricing is essential for budgeting and cost control.
  • What support options do you offer, including service level agreements (SLAs) for response times and escalation procedures?
    SLAs ensure timely and effective support.
  • What is your process for tuning our environment to reduce false positives during the first 30 days?
    Reduces alert fatigue and improves the efficiency of the SOC.
  • Can you provide a detailed breakdown of the Total Cost of Ownership (TCO), including implementation services, training, and ongoing support?
    Helps assess the overall cost of the solution.

Agentic AI and Automation

  • Describe how you leverage Agentic AI to automate the investigation lifecycle and contain threats.
    Agentic AI can significantly reduce MTTR.
  • What percentage of threats are you able to automatically block without human intervention?
    Indicates the level of automation and efficiency.
  • How does your AI-driven system build attack timelines and verify threats across disparate systems?
    Ensures comprehensive threat validation.
  • Describe the process for providing a validated remediation plan to a human analyst for approval.
    Human oversight is still crucial for critical decisions.

Compliance and security requirements

Depending on your industry, you may need to require proof of these certifications and standards.

SOC 2 Type II

Required for all organizations handling sensitive customer data. If applicable, request the latest SOC 2 Type II audit report and ensure it covers all relevant service components.

HIPAA

Required for organizations handling protected health information (phi). If applicable, request a Business Associate Agreement (BAA) and documentation of HIPAA compliance measures.

PCI DSS

Required for organizations processing, storing, or transmitting payment card data. If applicable, request a copy of their PCI DSS Attestation of Compliance (AOC) and documentation of security controls.

GDPR

Required for organizations processing personal data of eu residents. If applicable, request documentation of GDPR compliance measures, including data residency policies and data subject rights.

DORA (Digital Operational Resilience Act)

Required for financial entities operating in the eu. If applicable, request documentation outlining their operational resilience framework and compliance with DORA requirements.

NIST Cybersecurity Framework

Required recommended best practice for organizations seeking to improve their cybersecurity posture. If applicable, inquire about their alignment with the NIST Cybersecurity Framework and request documentation of their implementation.

Evaluation criteria

Here is the suggested weighting for advanced MSS and MDR RFPs.

Detection Capabilities Effectiveness in detecting known and unknown threats, including the use of behavioral analytics and threat intelligence.
25%
Incident Response Effectiveness Speed and effectiveness of incident response, including containment, remediation, and post-incident analysis.
20%
Integration and Compatibility Seamless integration with existing security tools and infrastructure, including EDR, SIEM, and cloud platforms.
15%
Threat Intelligence Quality Quality and relevance of threat intelligence feeds, including customization for the organization's industry and threat landscape.
15%
Compliance and Governance Adherence to relevant industry regulations and compliance standards, such as SOC 2, HIPAA, and GDPR.
10%
Pricing and Total Cost of Ownership Overall cost of the solution, including licensing fees, implementation services, and ongoing support.
10%
Vendor Stability and Reputation Financial stability, market reputation, and customer references of the vendor.
5%

Some weights were adjusted based on your priorities.

  • Increase if the organization faces a high volume of sophisticated attacks.
  • Increase if rapid response is critical due to regulatory requirements or business impact.
  • Increase if the organization has a complex and heterogeneous IT environment.
  • Increase if the organization is a high-value target for specific threat actors.
  • Increase if the organization operates in a highly regulated industry.
  • Increase if budget constraints are a significant factor.
  • Increase if the organization is risk-averse and prefers established vendors.

Red flags to watch

  • Lack of 24/7 Human Monitoring

    Indicates a reliance on automated alerts without human analysis, potentially missing sophisticated attacks.

  • Detection-Only Focus

    Vendors who only notify of threats without taking action to contain them leave the organization vulnerable.

  • Refusal of Proof of Concept (POC)

    A vendor unwilling to demonstrate their capabilities in your environment may lack confidence in their solution.

  • Reliance on Coarse Logs

    Integration based only on logs rather than deep API or agent-based telemetry limits visibility and detection accuracy.

  • Opaque SOC Operations

    Vendors who cannot provide tours of their SOC or introduce their threat intelligence leads may be hiding operational weaknesses.

  • Vague or Unclear Pricing

    Lack of transparent pricing often indicates hidden costs or complex fee structures that can inflate the TCO.

Key metrics to request

Ask vendors to provide benchmarks from similar customers.

Mean Time to Detect (MTTD)

Indicates how quickly threats are identified, minimizing the window of opportunity for attackers.

Mean Time to Respond/Contain (MTTC)

Measures the speed of containment, reducing the impact of successful attacks.

Mean Time to Resolve (MTTR)

Indicates the duration from detection to full recovery, minimizing business disruption.

Reduction in Dwell Time

Demonstrates the effectiveness of proactive monitoring and threat hunting in reducing attacker dwell time.

Number of Threats Blocked Automatically

Quantifies the level of automation and efficiency in preventing attacks.

Customer Satisfaction Scores

Provides insight into the overall quality of the service and the vendor's responsiveness to customer needs.