Set Up Service Catalog
Service Catalog Overview
Section titled “Service Catalog Overview”Your service catalog is the foundation for LanternOps to map your offerings to compliance controls and identify revenue opportunities.
Accessing Service Catalog
Section titled “Accessing Service Catalog”- Navigate to Settings → Service Catalog
- Click Add Service
Define Services
Section titled “Define Services”Service Details
Section titled “Service Details”Basic Information:
- Service name
- Description
- Service category
- Pricing (MRR)
Example:
Service: Advanced Email SecurityCategory: Email ProtectionMRR: $18/user/monthDescription: Phishing protection, URL rewriting, attachment sandboxingCompliance Mappings
Section titled “Compliance Mappings”Map to Controls:
Select which compliance controls this service satisfies:
- HIPAA 164.312(e)(1) - Transmission Security
- CIS 7.1-7.7 - Email and Web Browser Protections
- NIST AC-17 - Remote Access
- SOC 2 CC6.1 - Logical Access Controls
Technical Requirements
Section titled “Technical Requirements”Assets Covered:
- User accounts
- Mailboxes
- Endpoints
- Servers
Integration Data:
- Source: Microsoft 365
- Evidence: Email security logs
- Refresh: Real-time
Service Categories
Section titled “Service Categories”Common Categories:
- Endpoint Protection
- Email Security
- Backup & Disaster Recovery
- Network Security
- Access Management
- Monitoring & Alerting
- Compliance Management
Pricing Models
Section titled “Pricing Models”Per-User:
- Email security
- Endpoint protection
- MFA services
Per-Device:
- RMM monitoring
- EDR protection
- Backup services
Flat-Rate:
- Network firewall
- SIEM/logging
- Compliance reporting
Tiered:
- Basic vs Advanced packages
- Bronze/Silver/Gold tiers
- Feature-based pricing
Service Bundles
Section titled “Service Bundles”Create Bundles:
- Essential Security Stack
- Compliance Starter Pack
- Complete Protection Suite
Bundle Benefits:
- Simplified pricing
- Better value proposition
- Easier upsells
Best Practices
Section titled “Best Practices”1. Be Specific
Section titled “1. Be Specific”Instead of:
- ❌ “Security Services”
- ❌ “Monitoring”
Use:
- ✅ “Advanced Email Security with Phishing Protection”
- ✅ “24/7 SIEM Monitoring with Automated Response”
2. Map Thoroughly
Section titled “2. Map Thoroughly”Link services to all applicable controls:
- EDR → 8-12 controls across frameworks
- Email Security → 6-10 controls
- Backup → 4-8 controls
3. Keep Updated
Section titled “3. Keep Updated”- Review quarterly
- Add new services
- Update pricing
- Refine mappings
4. Include Evidence
Section titled “4. Include Evidence”Specify data sources:
- Integration providing evidence
- Metrics to collect
- Validation criteria