Do any MSP/MSSP mandate networking hardware minimum requirements?

Posted by Thick-Block-268@reddit | sysadmin | View on Reddit | 21 comments

We're an MSP who has recently started transitioning towards an MSSP posture. As we tighten our MSA and SOW, one thing that has come up is networking hardware. Since the goal is to target compliance-regulated industries, we want to implement a "Minimum Standard" that outlines what's in our stack and must be implemented with no exceptions. So far this has not been a point of contention by any clients or prospects.

The question is, should this expand to networking hardware?

What model is ideal for an MSSP:

  1. Model A: Client BYO, but must meet spec. They keep whatever firewalls/switches/APs they already own, as long as the gear is on a written list of approved manufacturers and tiers (e.g., Fortinet, Sophos, Meraki, Ubiquiti UniFi business line, and WatchGuard), and exclude consumer-grade hardware, such as the ISP-supplied combo box or TP-Link, Netgear, etc. hardware they picked up at Best Buy or Amazon.) The client is responsible for licensing, firmware, hardware refresh, and replacement at end-of-life. We manage the configuration but don't own the asset.
  2. Model B: We provide the hardware via HaaS or outright purchase (mandatory). Every client gets an approved firewall, switch stack, and AP through our HaaS/purchase program, configured to our standards and refreshed based on the EOL schedule. The client has no choice in the matter
  3. Model C: Hybrid with grandfathering. We define an approved-equipment list. New clients get provided HaaS gear by default. Existing-equipment clients are evaluated at onboarding: if their gear is on the approved list and within its supported lifecycle, they keep it; if not, they either replace it at their own expense before onboarding or take on a HaaS as a condition of the engagement. End-of-life or end-of-support equipment must be replaced regardless of who owns it.
  4. Model D: Let the client use whatever networking hardware they want, and we explicitly tell them we cannot be held responsible in the event of a breach if an audit/forensics finds the breach due to a bad configuration and/or using consumer-grade hardware.

I'm leaning towards Model A or C. I don't really care for Model D, and the idea of mandating they use our equipment as outlined in Model C seems so harsh with an "it's my way or the highway" kind of tone.

If none of these sound like good options, please tell me how you're approaching this. I'm genuinely curious to know how other MSP/MSSPs are approaching this aspect of their business.