usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015 rapat ke-2 pt35-01 - 17 juni 2015

17
1 Usulan Keamanan Informasi dan Sistem Manajemen Layanan serta Kualitas Data Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM Anggota PT35-01 Teknologi Informasi Bogor 17 Juni 2015

Upload: sarwono-sutikno-drengcisacisspcism

Post on 04-Aug-2015

198 views

Category:

Education


4 download

TRANSCRIPT

Page 1: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

1

Usulan Keamanan InformasidanSistem Manajemen Layananserta Kualitas Data

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISMAnggota PT35-01 Teknologi Informasi

Bogor 17 Juni 2015

Page 2: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Current:• Cybersecurity Nexus Liaison, ISACA Indonesia Chapter• ISACA Academic Advocate at ITB• SME for Information Security Standard for ISO at ISACA HQ• Associate Professor at School of Electrical Engineering and Informatics, Institut Teknologi Bandung• Ketua WG Layanan dan Tata Kelola TI, anggota WG Keamanan Informasi serta Anggota Panitia Teknis 35-

01 Program Nasional Penetapan Standar bidang Teknologi Informasi, BSN – Kominfo. Past:• Ketua Kelompok Kerja Evaluasi TIK Nasional, Dewan TIK Nasional (2007-2008)• Plt Direktur Operasi Sistem PPATK (Indonesia Financial Transaction Reports and Analysis Center, INTRAC),

April 2009 – May 2011

Professional Certification:• Professional Engineering (PE), the Principles and Practice of Electrical Engineering, College of

Engineering, the University of Texas at Austin. 2000• IRCA Information Security Management System Lead Auditor Course, 2004• ISACA Certified Information System Auditor (CISA). CISA Number: 0540859, 2005• Brainbench Computer Forensic, 2006• (ISC)2 Certified Information Systems Security Professional (CISSP), No: 118113, 2007• ISACA Certified Information Security Manager (CISM). CISM Number: 0707414, 2007Award:• (ISC)2 Asia Pacific Information Security Leadership Achievements (ISLA) 2011 award in category

Senior Information Security Professional. http://isc2.org/ISLA2

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM

Page 3: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Kategori Kontrol berbasis Risiko

3Source: Transforming Cybersecurity: Using COBIT 5, ISACA, 2013

Page 4: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Kerangka dan Standar – tinjauan

SNI ISO 38500

COSOPP60/2008 COBIT

ITIL v2 ITIL v3SNI ISO 20000

SNI ISO 2700x

SNI ISO 900x

Common CriteriaSNI ISO15408

boar

d le

vel

man

agem

ent

tech

nica

l

SNI ISO 27013

Page 5: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

5

ISO/IEC JTC 1/SC 40 - IT Service Management and IT GovernanceISO/IEC 20000-1:2011SNI ISO/IEC 20000-1:2013 Teknologi Informasi - Manajemen Layanan - Bagian 1: Persyaratan

sistem manajemen layanan IEEE Std 20000-1-2013

ISO/IEC 20000-2:2012SNI ISO/IEC 20000-2:2013 Teknologi informasi - Manajemen layanan - Bagian 2: Pedoman

penerapan sistem manajemen layanan IEEE Std 20000-2-2013

ISO/IEC TR 20000-3:2012SNI ISO/IEC TR 20000-3:2013 Teknologi informasi - Manajemen layanan - Bagian 3: Pedoman

pendefinisian lingkup dan kesesuaian dari SNI ISO/IEC 20000-1

ISO/IEC TR 20000-4:2010SNI ISO/IEC TR 20000-4:2013 Teknologi informasi - Manajemen layanan - Bagian 4: Model referensi

proses

ISO/IEC TR 20000-5:2010 – replaced by ISO/IEC TR 20000-5:2013SNI ISO/IEC TR 20000-5:2013 Teknologi informasi - Manajemen layanan - Bagian 5: Contoh acuan

perencanaan implementasi SNI ISO/IEC 20000-1

ISO/IEC TR 20000-9:2015 Information technology -- Service management -- Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services

ISO/IEC TR 20000-10:2013 Information technology -- Service management -- Part 10: Concepts and terminology

ISO/IEC 30121:2015 Information technology -- Governance of digital forensic risk framework

ISO/IEC 38500:2015 Information technology -- Governance of IT for the organizationISO/IEC TS 38501:2015 Information technology -- Governance of IT -- Implementation guide

ISO/IEC TR 38502:2014 Information technology -- Governance of IT -- Framework and model

Page 6: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Customers (and other interested parties)

ServiceRequirements Services

Customers (and other interested parties)

5. Design and transition of new or changed services

8. Resolution processes 7. Relationship processes8.1 Incident and service requestmanagement8.2 Problem management

7.1 Business relationshipmanagement7.2 Supplier management

6. Service delivery processes

6.5 Capacity management

6.3 Service continuity &availability management

6.1 Service level management

6.2 Service reporting

6.6 Information securitymanagement6.4 Budgeting &accounting for services

4.1 Management responsibility 4.2 Governance of processesoperated by other parties

4.5 Establish the SMS 4.3 Documentation management

4.4 Resource management

4. Service Management System (SMS)

9. Control processes9.1 Configuration management9.2 Change management9.3 Release and deploymentmanagement

Page 7: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Usulan pengganti seri SNI ISO 15504 Information technology -- Process assessment

ISO/IEC 33001:2015 Information technology -- Process assessment -- Concepts and terminology 60.60 35.080

ISO/IEC 33002:2015 Information technology -- Process assessment -- Requirements for performing process assessment 60.60 35.080

ISO/IEC 33003:2015 Information technology -- Process assessment -- Requirements for process measurement frameworks 60.60 35.080

ISO/IEC 33004:2015 Information technology -- Process assessment -- Requirements for process reference, process assessment and maturity models 60.6035.080

ISO/IEC TR 33014:2013 Information technology -- Process assessment -- Guide for process improvement 60.60 35.080

ISO/IEC NP 33016 Information technology -- Process assessment -- Process assessment body of knowledge 10.99

ISO/IEC 33020:2015 Information technology -- Process assessment -- Process measurement framework for assessment of process capability 60.6035.080

ISO/IEC CD 33050-4 Information technology -- Process assessment -- Part 4: A process reference model for information security management 30.20 35.080

ISO/IEC FDIS 33063 Information technology -- Process assessment -- Process assessment model for software testing 50.00 35.080

ISO/IEC CD 33070-4 Information technology -- Process assessment -- Part 4: A process assessment model for information security management

7

Page 8: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

8

Page 9: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Month 200X Page 9

Process assessment Action plan• Assessment of the audited processes and Actions plan to reach level .• Extend assessment througth the overall organisation to be able to

compare same referential with same objectives and continuity of

processes

Lvl 5 : Value

Lvl 4 : Service

Lvl 3 : Proactiv

Lvl 2 : Reactiv

Lvl 1 : Chaos

Incident

ManagementChange

Management

Problem

Management

Service Level

Management

Service Desk

Problem Management Implementation

Knowledge Improvement

Communications Process RFC Process

OLAs Implementation

Catalogues of Services Improvement

Page 10: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Trying to Run Before Walking

Reactive

Proactive Analyze trends Set thresholds Predict problems Measure appli-

cation availability Automate Mature problem,

configuration, change, asset and performance mgt processes

Fight fires Inventory Desktop SW

distribution Initiate

problem mgt process

Alert and event mgt

Measure component availability (up/down)

IT as a service provider

Define services, classes, pricing

Understand costs Guarantee SLAs Measure & report

service availability Integrate processes Capacity mgt

Service

Value IT as strategic

business partner IT and business

metric linkage IT/business

collaboration improves business process

Real-time infrastructure

Business planning

Level 2

Level 3

Level 4

Chaotic Ad hoc Undocumented Unpredictable Multiple help

desks Minimal IT

operations User call

notification

Level 1

Tool Leverage

Manage IT as a Business

Service Delivery Process Engineering

Operational Process Engineering

Service and Account Management

Level 5

Page 11: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Usulan seri SNI ISO 27k Information technology – Security technique (1/2)ISO/IEC 27000:2014 Information technology -- Security techniques -- Information security

management systems -- Overview and vocabularyISO/IEC 27001:2013 Information technology -- Security techniques -- Information security

management systems -- Requirements 60.60 35.040ISO/IEC 27001:2013/Cor 1:2014 60.60 35.040ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for

information security controls 60.60 35.040ISO/IEC 27002:2013/Cor 1:2014 60.60 35.040ISO/IEC 27003:2010 Information technology -- Security techniques -- Information security

management system implementation guidance 90.92 35.040ISO/IEC 27004:2009 Information technology -- Security techniques -- Information security

management -- Measurement 90.92 35.040ISO/IEC 27005:2011 Information technology -- Security techniques -- Information security risk

management 90.92 35.040ISO/IEC 27006:2011 Information technology -- Security techniques -- Requirements for bodies

providing audit and certification of information security management systemsISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information

security management systems auditing 90.92 35.040ISO/IEC TR 27008:2011 Information technology -- Security techniques -- Guidelines for auditors

on information security controls 90.92 35.040ISO/IEC 27010:2012 Information technology -- Security techniques -- Information security

management for inter-sector and inter-organizational communications 90.92 35.040ISO/IEC 27011:2008 Information technology -- Security techniques -- Information security

management guidelines for telecommunications organizations based on ISO/IEC 27002ISO/IEC 27013:2012 Information technology -- Security techniques -- Guidance on the integrated

implementation of ISO/IEC 27001 and ISO/IEC 20000-1ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information

security 60.60 35.040ISO/IEC TR 27015:2012 Information technology -- Security techniques -- Information security

management guidelines for financial services 60.60 03.060 35.040ISO/IEC TR 27016:2014 Information technology -- Security techniques -- Information security

management -- Organizational economics 60.60 35.040

11

Page 12: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Usulan seri SNI ISO 27k Information technology – Security technique (2/2)

ISO/IEC 27018:2014 Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors 60.60 35.040

ISO/IEC TR 27019:2013 Information technology -- Security techniques -- Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

90.92 35.040 35.240.99ISO/IEC 27031:2011 Information technology -- Security techniques -- Guidelines for information and

communication technology readiness for business continuity 60.60 35.040ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cybersecurity 60.60

35.040ISO/IEC 27033-1:2009 Information technology -- Security techniques -- Network security -- Part 1: Overview and

concepts 90.92 35.040ISO/IEC 27033-2:2012 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for

the design and implementation of network security 60.60 35.040ISO/IEC 27033-3:2010 Information technology -- Security techniques -- Network security -- Part 3: Reference

networking scenarios -- Threats, design techniques and control issues90.93 35.040ISO/IEC 27033-4:2014 Information technology -- Security techniques -- Network security -- Part 4: Securing

communications between networks using security gateways60.60 35.040ISO/IEC 27033-5:2013 Information technology -- Security techniques -- Network security -- Part 5: Securing

communications across networks using Virtual Private Networks (VPNs) 60.60 35.040ISO/IEC 27034-1:2011 Information technology -- Security techniques -- Application security -- Part 1: Overview

and concepts 60.60 35.040ISO/IEC 27034-1:2011/Cor 1:2014 60.60 35.040ISO/IEC 27035:2011 Information technology -- Security techniques -- Information security incident managementISO/IEC 27036-1:2014 Information technology -- Security techniques -- Information security for supplier

relationships -- Part 1: Overview and concepts 60.60 35.040ISO/IEC 27036-2:2014 Information technology -- Security techniques -- Information security for supplier

relationships -- Part 2: Requirements 60.60 35.040ISO/IEC 27036-3:2013 Information technology -- Security techniques -- Information security for supplier

relationships -- Part 3: Guidelines for information and communication technology supply chain securityISO/IEC 27037:2012 Information technology -- Security techniques -- Guidelines for identification, collection,

acquisition and preservation of digital evidence 60.60 35.040ISO/IEC 27038:2014 Information technology -- Security techniques -- Specification for digital redactionISO/IEC 27039:2015 Information technology -- Security techniques -- Selection, deployment and operations of

intrusion detection systems (IDPS) 60.60 35.040ISO/IEC 27040:2015 Information technology -- Security techniques -- Storage security60.60 35.040ISO/IEC 27043:2015 Information technology -- Security techniques -- Incident investigation principles and

processes 60.60 35.040

12

Page 13: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Network is Compromised

Page 14: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

threat

Page 15: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Usulan dari ISO/TC 184/SC 4 - Industrial data

Page 15

1. ISO/TS 8000-1:2011, Data quality — Part 1: Overview2. ISO 8000-2:2012, Data quality — Part 2: Vocabulary3. ISO/TS 8000-100:2009, Data quality — Part 100: Master data: Exchange of

characteristic data: Overview4. ISO 8000-102:2009, Data quality — Part 102: Master data: Exchange of characteristic

data: Vocabulary5. ISO 8000-110:2009, Data quality — Part 110: Master data: Exchange of characteristic

data: Syntax, semantic encoding, and conformance to data specification6. ISO/TS 8000-120:2009, Data quality — Part 120: Master data: Exchange of

characteristic data: Provenance7. ISO/TS 8000-130:2009, Data quality — Part 130: Master data: Exchange of

characteristic data: Accuracy8. ISO/TS 8000-140:2009, Data quality — Part 140: Master data: Exchange of

characteristic data: Completeness9. ISO/TS 8000-150:2011, Data quality — Part 150: Master data: Quality management

framework

Page 16: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Seri ISO 8000 Data Quality

Page 16

ISO 8000 ontology

Part 1 : Scope , Justification and principles

Part 3 Taxonomy : ISO 8000 parts & other standards relationships

Part 8 Information and Data Quality Measuring

Part 9 Information data quality relationship with

other standards

Part 20 Data Quality: Provenance

Part 30 Data Quality Accuracy

Part 40 Data Quality Completeness

Part 50 Data Quality management framework

Part 60 Information & Data Quality Process

Assessment

Part 100 Master data: Exchange of characteristic

data: OverviewPart 10 Data Quality Syntax, semantic encoding,

and conformance to data specification

Part 120 Master data: Exchange of characteristic

data: Provenance

Part 130 Master data: Exchange of characteristic

data: Accuracy

Part 140 Master data: Exchange of characteristic

data: Completeness

Part 150 Master Data Quality management

framework

Part 311 Guidance for the application of PDQ-S

Part 2 Vocabulary

Characteristics or Data quality dimensions

RequirementsSyntax SemanticsPragmatics Measurements methods

Management methods

Introduction

Vocab. / Onto

General concepts & definitions

Specialized concepts & definitions

Management framework

Usage guides

Part 110 Master data: Exchange of characteristic

data: Overview

Page 17: Usulan untuk wg1 dan wg2 serta kualitas data pada pnps2015   rapat ke-2 pt35-01 - 17 juni 2015

Diskusi

17