How to Choose an MSSP: 15 Questions to Ask Before Signing

Home
/
Blog
/
How to Choose an MSSP: 15 Questions to Ask Before Signing

You’ve sat through three MSSP demos. All three providers said “24/7 monitoring,” “rapid incident response,” and “compliance-ready.” All three proposals look nearly identical. That’s not a coincidence. It’s what happens when evaluation questions are too broad to separate real capability from rehearsed positioning. 

How to choose an MSSP means applying a structured evaluation framework that goes beyond vendor claims and tests operational reality directly. The right approach organizes your questions into three categories: SOC capability, SLA structure, and pricing architecture. Each category uses targeted questions to expose a specific failure mode before you’re locked into a multi-year contract discovering it firsthand. 

This framework gives you 15 questions built to do exactly that.

See How a Real MSSP Engagement Answers These Questions

Schedule a 30-minute consultation with a Meriplex security specialist. You'll leave with a clear picture of what your environment needs, where your current security posture has gaps, and what a mature MSSP engagement actually looks like in practice.

Why Do Most MSSP Evaluations Fail?

Most MSSP evaluations fail because the standard questions — “Do you offer 24/7 monitoring?” “What’s your response time?” — don’t create enough pressure to separate genuine capability from polished marketing. A well-staffed SOC and an alert-forwarding service with an offshore help desk give identical answers when the questions are broad enough to invite them. The evaluation process needs to be redesigned around questions that force specificity. 

Providers have gotten very good at answering the questions buyers typically ask. 

“Do you offer 24/7 monitoring?” Yes, every provider says yes. “What’s your incident response time?” Four hours, every provider says four hours. The answers sound identical because the questions don’t force a difference. 

The evaluation fails not because buyers skip their homework, but because standard questions don’t create any pressure. They invite marketing responses. The questions below are designed to create pressure: to get past the prepared answers and into how the operation actually works. 

What Happens When You Ask the Wrong Questions During an MSSP Evaluation?

When buyers ask surface-level MSSP selection questions, they sign contracts that look strong on paper but fail operationally. The result is alert queues that go unreviewed overnight, SLA clocks that pause while the breach progresses, and overage invoices that arrive during incident response. These aren’t edge cases. They’re the predictable outcome of an evaluation process built around vendor-friendly questions. 

According to the 2024 Verizon Data Breach Investigations Report, the median time to detect a breach is measured in days, and in many incidents, the attacker had been present in the environment for weeks before any alert fired. That dwell time isn’t purely a technology problem. It reflects what happens when SIEM detection logic isn’t tuned to the client’s environment, analyst coverage thins overnight, and SLA definitions allow providers to satisfy their commitments without containing anything. 

The SOC capability gap shows up at 11 p.m. on a Saturday when an alert fires, one overnight analyst is handling 40 clients across a shared queue, and your incident spends three hours unreviewed. The SLA weakness shows up when you read your contract post-breach and discover that “four-hour response” meant an analyst sent a notification email. The pricing trap shows up when a ransomware attempt spikes your log ingestion volume past your contracted threshold and generates overage charges at the exact moment when your provider should be focused on the threat, not on a billing event. 

The failure modes that follow a weak MSSP evaluation aren't abstract. They're the predictable outcomes of signing a contract based on vendor-prepared answers to vendor-friendly questions.

None of these are edge cases. They’re what happens when the evaluation process isn’t designed to surface them. 

Category 1: SOC Capability Questions

These questions expose whether the SOC runs as a genuine 24/7 operation or functions as a sophisticated alert queue. 

1. What is your analyst-to-client ratio, and how does that ratio change during off-hours?

Most providers won’t expect this question phrased in those terms. Press for headcount on overnight and weekend shifts specifically, not coverage language like “we maintain full staffing.” A ratio that looks reasonable at 9 a.m. Tuesday can look very different at 2 a.m. Sunday, and that’s when the question actually matters. 

Red Flag: Any answer that describes coverage teams rather than specifying how many analysts are actively monitoring during off-hours windows.

2. When you onboard a new client, how long before you establish a behavioral baseline, and what does detection coverage look like until that baseline is complete?

Accurate anomaly detection in a UEBA (User and Entity Behavior Analytics) system requires a statistically meaningful observation period before it can distinguish unusual activity from normal variation. This baselining process commonly runs 30 to 90 days depending on environment complexity. Providers who claim full detection coverage begins on day one either aren’t running behavioral analytics or are defining “coverage” loosely. 

Ask explicitly what the provider can and cannot detect during the baselining window. The honest answer is more useful than a confidence claim

Good Answer: A defined baselining period with explicit communication about detection scope at each phase: pre-baseline, during baseline, and post-baseline.

3. What Is the Difference Between an MSSP and MDR?

An MSSP monitors, detects, and alerts, typically requiring client approval before taking containment actions. MDR (Managed Detection and Response) goes further: the provider holds pre-authorized authority to take direct action during an active incident, including isolating endpoints via EDR platforms like CrowdStrike or SentinelOne, blocking traffic at the firewall, or disabling compromised Active Directory credentials. Many mature MSSPs have evolved to include MDR capabilities, but this must be explicitly confirmed in the contract, not assumed from the sales conversation.   

What your provider is authorized to do during an active incident is one of the most consequential things to understand before signing. A notify-before-act model can cost you critical hours during a fast-moving intrusion. Make sure you understand exactly which model you’re buying, and that it’s written into the agreement, not just implied by the pitch. 

Red Flag: A provider who can’t draw that line without checking internally. The distinction should exist in the contract language, not just in the sales conversation. 

4. How do you handle correlation rule tuning in your SIEM, and who owns that logic when my environment changes?

Poorly tuned correlation rules in a SIEM platform (whether Microsoft Sentinel, Splunk, IBM QRadar, or a provider-managed stack) generate false positives at a rate that conditions analysts to discount alerts over time. A mature SOC maps its detection logic to the MITRE ATT&CK framework, which provides a structured taxonomy of adversary tactics and techniques that correlation rules can be tested against. Ask whether the provider maintains ATT&CK coverage mapping for your environment and how frequently that coverage is reviewed. 

According to IBM’s 2023 Cost of a Data Breach Report, organizations using AI and automation in security operations identified and contained breaches an average of 108 days faster than those that didn’t. That gap is partly a tooling gap, but it’s also a tuning gap. Find out who maintains your detection logic, how frequently it’s reviewed, and what triggers an update when you add a new application, cloud workload, or acquisition. 

Detection logic that isn't continuously tuned to your environment doesn't just generate noise. It trains analysts to ignore alerts, which is functionally the same as having no detection at all.

5. Describe the last time a client's environment was breached while under your monitoring. What happened?

Breaches occur even under strong monitoring. A provider who says otherwise is either very new or not being direct with you. What you’re evaluating is how they tell the story. A provider with genuine incident experience walks through the timeline using a structured post-incident review, identifies the specific detection gap (whether in their SIEM rules, UEBA thresholds, or analyst escalation workflow) and explains what changed in their process afterward. 

From the Field 

In a typical post-incident review, the first thing we examine is the delta between when the SIEM generated an initial low-severity alert and when an analyst escalated it to critical. In most cases where dwell time ran long, that delta wasn’t a detection failure. The alert fired. It was a triage failure: the alert sat in a queue, was auto-scored as low-priority by a correlation rule that hadn’t been updated in eight months, and nobody reviewed it until a second indicator surfaced three days later. That’s a tuning and workflow problem, not a technology problem. It’s also the kind of thing a provider will never volunteer, but will confirm if you ask specifically about their alert-to-escalation workflow. 

Category 2: SLA Weakness Questions

SLA language is where strong-sounding commitments become contractually meaningless. These questions decode what’s actually in the document.

6. When your SLA says "response within four hours," what specifically does that mean, and does the clock stop while you're waiting on a reply from my team?

“Response” is the most consistently undefined term in MSSP contracts. It might mean an analyst acknowledged the ticket. It might mean a notification email went out. Ask for the written definition, and then ask whether the clock pauses during client response time. Many contracts include this pause, which means your “four-hour response” has no real ceiling if your team is unreachable at 3 a.m. 

Look for SLA commitments built around Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR), the two standard SOC performance metrics that NIST SP 800-61 uses to frame incident response effectiveness. An SLA that references MTTD and MTTR separately is more measurable and more defensible than one that uses the generic term “response time.” 

Good Answer: Separate written definitions for response, containment, and remediation, each with its own timeline commitment, aligned with NIST SP 800-61 incident response phase definitions: Detection and Analysis, Containment, Eradication, and Recovery as discrete measurable stages. 

7. What are the actual remedies if you miss an SLA commitment?

Most SLA violation remedies offer service credits worth a fraction of one month’s subscription. Ask what that looks like in dollar terms for a missed containment commitment during an active breach. Then ask whether the remedy triggers automatically or requires you to document and submit a formal claim. How a provider answers this tells you how seriously they treat accountability when it costs them something. 

8. How is escalation authority defined? If your team identifies a critical threat at midnight, who can authorize containment without a client call?

An active incident should not require a conference call to approve protective action. Ask who specifically holds escalation authority for containment-level response, what the documented trigger conditions are, and how your team gets notified in real time. In environments operating under a Zero Trust architecture (where lateral movement is constrained by identity verification and microsegmentation) a provider who understands your access control model can act more precisely during containment. Multiple internal approval steps before any containment action compounds risk in proportion to how fast the threat is moving. 

9. What happens to your monitoring scope when my environment grows — say we add 200 endpoints or a new AWS or Azure workload?

The contract you sign covers your environment as described on signature day. Find out whether additional assets fall outside contracted scope and require a new statement of work, or whether the agreement includes defined growth thresholds. This is far easier to resolve before signing than during a renewal negotiation after you’ve already scaled. 

10. What does your offboarding process look like if we don't renew?

Offboarding gets skipped in nearly every evaluation, and the consequences surface after the relationship has deteriorated, which is the worst time to discover there’s no documented process. Ask how your data is returned, what happens to your SIEM log history, how long the transition period runs, and what monitoring coverage exists during that window. A provider who answers this clearly has managed client transitions before and built a repeatable process around it. 

Find Out What Your SLA Actually Commits To

Bring your current or prospective MSSP contract to a Meriplex security consultation. We'll walk through the language with you, flag the terms that create exposure, and show you what a contract built around real accountability looks like.

Category 3: Pricing Trap Questions

Pricing models don’t just determine cost. They reveal what a provider is operationally optimized to do. How a provider bills shapes the decisions they make when their interests and yours start to diverge. 

11. How is log ingestion priced, and what triggers an overage charge?

Log volume spikes during security incidents, precisely when you need your provider focused on the threat. Find out what your contracted ingestion threshold is (typically measured in GB per day or events per second in platforms like Splunk or Microsoft Sentinel), how overages are calculated, and whether you receive a proactive notification before crossing the threshold or an invoice afterward. A provider who is vague about thresholds is either not tracking them actively or expects you not to press the point. 

Red Flag: “We’ll address that if it comes up.” 

12. Is incident response work included in the monthly fee, or does extended response become a separate billable engagement?

Many providers include the Identification and initial Containment phases of an IR engagement in the subscription, then bill the Eradication, Recovery, and Lessons Learned phases (as defined in the PICERL framework) as professional services at hourly rates. Find out exactly where that line sits in your specific contract. “Incident response included” can mean two hours of analyst triage, or it can mean a full recovery engagement. Confirm which one before you sign. 

13. Can you show me a pricing model at 200, 500, and 1,000 endpoints?

A provider who produces a clear scaling model has built one and uses it. A provider who says pricing is “customized at each renewal” is telling you they hold more flexibility in that negotiation than you do. 

14. Is compliance reporting included, or does it carry additional fees?

Audit-ready compliance documentation means different things depending on your regulatory context. For HIPAA, it includes access logs, risk assessment documentation, and Business Associate Agreement review. For CMMC Level 2, it includes a System Security Plan and Plan of Action and Milestones evidence package. For PCI-DSS 4.0, it includes network segmentation testing results and customized approach documentation. For SOC 2 Type II, it means continuous control monitoring evidence across a defined audit period, not a point-in-time snapshot. For government contractors, FedRAMP authorization documentation adds another layer entirely. 

If compliance support is part of why you’re evaluating a managed security service provider in the first place, confirm that the specific deliverables your auditor will ask for are explicitly in scope, not just “compliance reporting” as a category. 

15. If your team deploys tools or agents in my environment, what happens to those licenses when we part ways?

Some providers run proprietary EDR agents or SIEM connectors tied to their platform license. When the contract ends, the tooling leaves with them, which means your visibility into your own environment disappears at the exact moment you’re transitioning to a new provider. Others deploy on vendor-neutral platforms like CrowdStrike Falcon or SentinelOne that you can retain independently. Ask specifically which tools the provider installs, who holds the license, and what the handoff process looks like. This directly affects both your transition risk and your total cost of ownership if the engagement doesn’t run its full term. 

How to Run This Evaluation

Don’t compress all 15 questions into one meeting. Distribute them across the process and pay close attention to how each one gets handled, not just what the answer is. 

Send questions 1 through 5 before your first technical call and request written responses. A provider who comes prepared with specific, detailed answers has faced this level of scrutiny before. One who says “great questions, let’s cover those live” is buying time to formulate answers they haven’t documented. 

Reserve questions 6 through 10 for a dedicated contract review session. Treat each one as a negotiating position, not just an evaluation criterion. Any commitment that can’t be defined clearly in that conversation won’t hold up clearly under pressure. 

Use questions 11 through 15 after you’ve narrowed to a shortlist, when you’re pressure-testing the commercial proposal. A provider who revises their answers based on pushback at this stage is demonstrating how they’ll handle disputes once you’re locked in. 

One final signal worth tracking across all 15: how readily a provider puts their answers in writing. A well-run MSSP has documented answers ready. Hesitation on that front isn’t a dealbreaker, but it’s information. 

What you're ultimately evaluating isn't just technical capability. It's whether this provider operates with the kind of transparency that holds up when something goes wrong, not just when everything is working.

Choose accordingly. 

Put Meriplex Through These Same 15 Questions

We work with mid-market organizations in healthcare, financial services, oil and gas, and government, and we welcome the hard questions. Schedule a security consultation and walk through this framework with our team. You'll leave with straight answers, a gap assessment for your environment, and a clear sense of whether we're the right fit.

Recent Posts

Essential Guides, Insights, and Case Studies for IT Solutions

You’ve sat through three MSSP demos. All three providers said “24/7 monitoring,”

IT leaders reviewing a 2026 budget plan for co-managed IT services, including forecasting, security planning, and IT cost optimization

Co-managed IT is a service model where an external managed service provider

Gastroenterologist reviewing patient data on a tablet with cybersecurity protection icons highlighting secure GI healthcare systems

Cybersecurity for gastroenterology practices refers to the set of controls, policies, and