Simplico Co., Ltd. is a technology consulting and system integration company specializing in custom security, data, and automation solutions for enterprise and industrial environments.
We focus on designing and implementing practical, production-ready systems rather than generic or vendor-locked platforms. Our expertise covers security monitoring, SOC/MDR architecture, automation (SOAR), system integration, and long-term operational support.
We also have experience in developing mobile applications, e‑commerce platforms, large‑scale web applications, and factory automation systems.
More information about our company and services is available at: https://simplico.net/
This proposal is prepared for บริษัท ฟู้ดโปรเจ็ค (สยาม) จำกัด (FoodProject) and delivers advanced security detection use cases, continuously updated threat‑intelligence IOC detection, and VPN authentication anomaly monitoring using a modular, open, and extensible security architecture.
The solution avoids monolithic or vendor‑locked SOC platforms and instead uses best‑of‑breed components, each responsible for a specific role: detection, automation, investigation, and escalation.
Key Outcomes
This architecture is designed to directly support the detection, automation, investigation, and escalation use cases described in Section 3 by ensuring each security function is handled by a dedicated, purpose-built component.
| Layer | Technology | Purpose |
|---|---|---|
| Detection | Wazuh | Log analysis, correlation, alerting |
| Automation / SOAR | Shuffle | IOC matching, enrichment, response logic |
| Case Management | DFIRTrack | Incident tracking, evidence, investigation timeline |
| Escalation | PagerDuty | On‑call alerting & SLA enforcement |
Why This Architecture
flowchart LR
A["Firewall / DNS / IDS / VPN Logs"] --> B["Wazuh
Detection & Correlation"]
B --> C["Shuffle
Automation & SOAR"]
C --> D["DFIRTrack
Incident Tracking"]
C --> E["PagerDuty
On-call Escalation"]
C -->|"IOC Match / Enrichment"| D
C -->|"SEV-1 / SEV-2"| E
The scope of work is organized into three primary workstreams: (1) creation and tuning of detection rules tailored to the customer environment, (2) implementation of continuously updated threat‑intelligence IOC detection across network traffic, and (3) monitoring of VPN authentication anomalies based on geographic location. Together, these workstreams ensure comprehensive visibility, timely detection, and actionable response to security threats.
Activities
Output
Covered Use Cases
DNS Network Traffic
IDS / IPS Network Traffic
Technical Implementation
Outcome
Detection Logic
Enhancements
Response
Covered Use Cases
DN5S Network Traffic
IDS / IPS Network Traffic
Technical Implementation
Outcome
Detection Logic
Enhancements
Response
The implementation includes full integration with the automation and case management layers to ensure alerts are actionable and traceable:
The timeline below includes all activities required for full integration across detection, automation, case management, and escalation layers, including Shuffle and DFIRTrack.
| Phase | Duration |
|---|---|
| Log onboarding & review | 1 week |
| Rule creation & tuning | 1–2 weeks |
| IOC pipeline & detection | 1–2 weeks |
| VPN geo-anomaly use case | 3–5 days |
| Integration & end-to-end testing (Shuffle / DFIRTrack / PagerDuty) | 1 week |
Total estimated duration: 5–6 weeks
Payment Terms
Project completion and acceptance are defined by the successful implementation of the agreed detection use cases, verified end-to-end workflows, and delivery of documentation as outlined in the Scope of Work and Deliverables sections.
Project completion and acceptance are defined by the successful implementation of the agreed detection use cases, verified end-to-end workflows, and delivery of documentation as outlined in the Scope of Work and Deliverables sections.
| Item | Cost (THB) |
|---|---|
| Security use‑case implementation | 320,000 |
Note: The above price includes full integration with the automation, case management, and escalation layers (Shuffle, DFIRTrack, and PagerDuty), including workflow configuration, API integration, and end‑to‑end testing.
VAT Disclaimer: All prices stated in this proposal are exclusive of 7% Value Added Tax (VAT), which will be charged separately in accordance with Thai tax regulations. |
As part of this engagement, a short free tuning period is included after initial deployment to ensure detection rules and thresholds are well aligned with the production environment.
This tuning period helps stabilize the system and maximize detection quality without additional cost.
In addition to the implementation, a complimentary security consultation is included to support knowledge transfer and strategic alignment.
This consultation is advisory in nature and does not include additional implementation or configuration work.
| Service | Cost (THB / month) |
|---|---|
| IOC feed maintenance & updates | 20,000 – 40,000 |
| Rule tuning & false‑positive reduction | Included |
Assumptions
Exclusions
Out-of-Scope (Unless Quoted Separately)
The following items are not included in this proposal and will require a separate quotation if requested:
This implementation provides enterprise-grade detection and response capability using open, well-architected components—without vendor lock-in or unnecessary complexity.
The following use cases will be implemented and tuned as part of the initial project scope. Final severity and thresholds will be confirmed during log review and tuning.
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| DNS | Firewall/DNS logs | DNS Network Traffic – Communicate to Malicious Domain | Medium |
| DNS | Firewall/DNS logs | DNS Network Traffic – Malicious Domain IOCs Detection | Medium |
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| IPS | FortiGate | IPS&IDS Network Traffic – Allowed RDP from Public IPs | High |
| IPS | FortiGate | IPS&IDS Firewall Account – Admin Password Change | High |
| IPS | FortiGate | IPS&IDS Firewall Account – Create/Add Admin Account | High |
| IPS | FortiGate | IPS&IDS Firewall Configure – Disabled Email Notification | High |
| IPS | FortiGate | IPS&IDS Firewall Configure – Download Configure FW | Low |
| IPS | FortiGate | IPS&IDS IDS Alert – Multiple Critical/High | Medium |
| IPS | FortiGate | IPS&IDS Network Traffic – Port Scanning | Low |
| IPS | FortiGate | IPS&IDS Network Traffic – IOC Detection | Medium |
| IPS | FortiGate | IPS&IDS Network Traffic – Port Scanning from Private IP | Medium |
| IPS | FortiGate | IPS&IDS Network Traffic – Communicate to Malicious IP | Medium |
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| VPN | FortiGate | VPN – Authentication Success from Guest Account | High |
| VPN | FortiGate | VPN – Authentication Success from Multiple Country | High |
| VPN | FortiGate | VPN – Authentication Brute Force Success | High |
| VPN | FortiGate | VPN – Authentication Multiple Fail (Many Accounts from 1 Source) | Low |
| VPN | FortiGate | VPN – Authentication Success from Outside Thailand | High |
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Privileged Account | Medium |
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Service Account | Medium |
| Windows | Windows AD Logs | Windows AD – Enumeration with Malicious Tools | Medium |
| Windows | Windows Security Logs | Windows Authentication – Fail from Public IPs | Medium |
| Windows | Windows Security Logs | Windows File Share – Enumeration to Single Destination | Medium |
| Windows | Windows Security Logs | Windows Authentication – Success from Public IPs | High |
| Windows | Windows Security Logs | Windows Authentication – Privileged Account Impersonation | High |
| Windows | Windows Security Logs | Windows Authentication – Successful Pass the Hash RDP | High |
| Windows | Windows Security Logs | Windows Authentication – Success from Guest Account | High |
| Windows | Windows Security Logs | Windows Authentication – Interactive Logon Success by Service Account | High |
| Windows | Windows Security Logs | Windows Account – Added to Privileged Custom Group | High |
| Windows | Windows Security Logs | Windows Account – Added to Privileged Group | High |
| Windows | Windows Domain Configure | Windows Domain Configure – DSRM Password Reset | High |
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (1 Account from Many Sources) | Low |
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (Many Accounts from 1 Source) | Low |
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail from Guest Account | Low |
| Windows | Windows Security Logs | Windows Authentication – Multiple Fail (1 Account from 1 Source) | Low |
| Windows | Windows Security Logs | Windows Authentication – Multiple Interactive Logon Denied | Low |
| Windows | Windows Security Logs | Windows Authentication – Password Spray | Low |
| Windows | Windows Security Logs | Windows Authentication – Attempt from Disabled Account | Low |
| Windows | Windows Security Logs | Windows Domain Account – Created | Low |
| Windows | Windows Security Logs | Windows Local Account – Re-Enabled | Low |
| Windows | Windows Security Logs | Windows Local Account – Created | Low |
| Windows | Windows Security Logs | Windows Domain Account – Re-Enabled | Low |
The following use cases require additional log sources or integrations and are not included in the initial implementation scope. They can be implemented as an optional add-on or Phase 2 enhancement.
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| VMware | vCenter / ESXi | vCenter GUI – Login Failed 5 Times and Success 1 Time | High |
| VMware | vCenter / ESXi | ESXi – Enable SSH on Hosts | Medium |
| VMware | vCenter / ESXi | ESXi – SSH Failed 5 Times and Success 1 Time | High |
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| SIEM | LogMonitor | Log Monitor – Logs Loss Detection | Low |
| Category | Source | Use Case | Target Severity |
|---|---|---|---|
| Sysmon | Windows | Sysmon – LSASS Dumping | High |
| Sysmon | Windows | Sysmon – SQL Injection | High |
| Sysmon | Windows | Sysmon – Webshell | High |
| Sysmon | Windows | Sysmon – Uninstall | High |
| Sysmon | Windows | Sysmon – LSASS Dumping by Task Manager | High |
| Sysmon | Windows | Sysmon – CertUtil Download | Medium |
Notes
The following use cases are not included in the current project scope. They are provided to illustrate additional high-value security capabilities that can be implemented in future phases after the initial deployment is stabilized.
Description
Impossible Travel detects potential credential compromise by identifying authentication events where the same user account logs in from geographically distant locations within a time window that is physically impossible for normal human travel.
How It Works
Typical Scenarios
Risk & Value
Response Examples
**Implementation Notes
Example Use Cases
Value
Example Use Cases
Value
Example Use Cases
Value
Example Use Cases
Value
Example Use Cases
Value
Example Use Cases
Value