usulan utk pt35-01 teknologi informasi dan kualitas data 19 okt2016

19
1 Usulan Keamanan Informasi dan Sistem Manajemen Layanan serta Kualitas Data Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM Anggota PT35-01 Teknologi Informasi Gedung Sapta Pesona – SDPPI Kominfo, Jakarta 18 Oktober 2016

Upload: sarwono-sutikno-drengcisacisspcismcsx-f

Post on 08-Jan-2017

63 views

Category:

Education


6 download

TRANSCRIPT

Page 1: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

1

Usulan Keamanan InformasidanSistem Manajemen Layananserta Kualitas Data

Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISMAnggota PT35-01 Teknologi Informasi

Gedung Sapta Pesona – SDPPI Kominfo, Jakarta 18 Oktober 2016

Page 2: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Presentation: KamInfo.ID2

2

KEAMANAN INFORMASI VERSI ISACA

Information security is a business enabler that is strictly bound to stakeholder trust, either by addressing business risk or by creating value for an enterprise, such as competitive advantage. At a time when the significance of information and related technologies is increasing in every aspect of business and public life, the need to mitigate information risk, which includes protecting information and related IT assets from ever-changing threats, is constantly intensifying.

ISACA defines information security as something that:Ensures that information is readily available (availability), when required, and protected against disclosure to unauthorised users (confidentiality) and improper modification (integrity).

Page 3: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Presentation: KamInfo.ID3

3

KEAMANAN INFORMASI

......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........

Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat

Page 4: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Presentation: KamInfo.ID4

4

KEAMANAN NASIONAL

......... pemerintah negara Indonesia yang melindungi segenap bangsa Indonesia dan seluruh tumpah darah Indonesia dan untuk memajukan kesejahteraan umum, mencerdaskan kehidupan bangsa, dan ikut melaksanakan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi dan keadilan sosial........

Pemanfaatan INFORMASI sebagai darah nadi kehidupan bangsa dalam perspektif Pertumbuhan Ekonomi untuk Kesejahteraan Rakyat

Page 5: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

5

Page 6: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Kategori Kontrol berbasis Risiko

6Source: Transforming Cybersecurity: Using COBIT 5, ISACA, 2013

Page 7: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Kerangka dan Standar – tinjauan

SNI ISO 38500

COSOPP60/2008 COBIT

ITIL v2 ITIL v3SNI ISO 20000

SNI ISO 2700x

SNI ISO 900x

Common CriteriaSNI ISO15408

boar

d le

vel

man

agem

ent

tech

nica

l

SNI ISO 27013

Page 8: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

8

ISO/IEC JTC 1/SC 40 - IT Service Management and IT GovernanceISO/IEC 20000-1:2011SNI ISO/IEC 20000-1:2013 Teknologi Informasi - Manajemen Layanan - Bagian 1: Persyaratan sistem manajemen layanan

IEEE Std 20000-1-2013

ISO/IEC 20000-2:2012SNI ISO/IEC 20000-2:2013 Teknologi informasi - Manajemen layanan - Bagian 2: Pedoman penerapan sistem manajemen

layanan IEEE Std 20000-2-2013

ISO/IEC TR 20000-3:2012SNI ISO/IEC TR 20000-3:2013 Teknologi informasi - Manajemen layanan - Bagian 3: Pedoman pendefinisian lingkup dan

kesesuaian dari SNI ISO/IEC 20000-1

ISO/IEC TR 20000-4:2010SNI ISO/IEC TR 20000-4:2013 Teknologi informasi - Manajemen layanan - Bagian 4: Model referensi proses

ISO/IEC TR 20000-5:2010 – replaced by ISO/IEC TR 20000-5:2013SNI ISO/IEC TR 20000-5:2013 Teknologi informasi - Manajemen layanan - Bagian 5: Contoh acuan perencanaan

implementasi SNI ISO/IEC 20000-1

ISO/IEC FDIS 20000-6Information technology -- Service management -- Part 6: Requirements for bodies providing audit and certification of service management systems

ISO/IEC TR 20000-9:2015 Information technology -- Service management -- Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services

ISO/IEC TR 20000-10:2013 Information technology -- Service management -- Part 10: Concepts and terminology

ISO/IEC TR 20000-12:2016Information technology -- Service management -- Part 12: Guidance on the relationship between ISO/IEC 20000-1:2011 and service management frameworks: CMMI-SVC

ISO/IEC 30121:2015 Information technology -- Governance of digital forensic risk frameworkISO/IEC 38500:2015 Information technology -- Governance of IT for the organizationISO/IEC TS 38501:2015 Information technology -- Governance of IT -- Implementation guideISO/IEC TR 38502:2014 Information technology -- Governance of IT -- Framework and modelISO/IEC TR 38504:2016

Governance of information technology -- Guidance for principles-based standards in the governance of information technology

Page 9: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Customers (and other interested parties)

ServiceRequirements Services

Customers (and other interested parties)

5. Design and transition of new or changed services

8. Resolution processes 7. Relationship processes8.1 Incident and service requestmanagement8.2 Problem management

7.1 Business relationshipmanagement7.2 Supplier management

6. Service delivery processes

6.5 Capacity management

6.3 Service continuity &availability management

6.1 Service level management

6.2 Service reporting

6.6 Information securitymanagement6.4 Budgeting &accounting for services

4.1 Management responsibility 4.2 Governance of processesoperated by other parties

4.5 Establish the SMS 4.3 Documentation management

4.4 Resource management

4. Service Management System (SMS)

9. Control processes9.1 Configuration management9.2 Change management9.3 Release and deploymentmanagement

Page 10: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

ISO/IEC JTC 1/SC 7 - Software and systems engineering

ISO/IEC 33001:2015Information technology -- Process assessment -- Concepts and terminology60.60 35.080

ISO/IEC 33002:2015Information technology -- Process assessment -- Requirements for performing process assessment

ISO/IEC 33003:2015Information technology -- Process assessment -- Requirements for process measurement frameworks60.60 35.080

ISO/IEC 33004:2015Information technology -- Process assessment -- Requirements for process reference, process assessment and maturity models60.60 35.080

ISO/IEC TR 33014:2013Information technology -- Process assessment -- Guide for process improvement

ISO/IEC 33020:2015Information technology -- Process assessment -- Process measurement framework for assessment of process capability

ISO/IEC TS 33052:2016Information technology -- Process reference model (PRM) for information security management

ISO/IEC 33063:2015Information technology -- Process assessment -- Process assessment model for software testing60.60 35.080

ISO/IEC TS 33072:2016Information technology -- Process assessment -- Process capability assessment model for information security management

ISO/IEC NP 33016 Information technology -- Process assessment -- Process assessment body of knowledge 10.99

Page 11: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Trying to Run Before Walking

Reactive

Proactive Analyze trends Set thresholds Predict problems Measure appli-

cation availability Automate Mature problem,

configuration, change, asset and performance mgt processes

Fight fires Inventory Desktop SW

distribution Initiate

problem mgt process

Alert and event mgt

Measure component availability (up/down)

IT as a service provider

Define services, classes, pricing

Understand costs Guarantee SLAs Measure & report

service availability Integrate processes Capacity mgt

Service

Value IT as strategic

business partner IT and business

metric linkage IT/business

collaboration improves business process

Real-time infrastructure

Business planning

Level 2

Level 3

Level 4

Chaotic Ad hoc Undocumented Unpredictable Multiple help

desks Minimal IT

operations User call

notification

Level 1

Tool Leverage

Manage IT as a Business

Service Delivery Process Engineering

Operational Process Engineering

Service and Account Management

Level 5

Page 12: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

ISO/IEC JTC 1/SC 27 - IT Security techniques (1/2)ISO/IEC 27000:2016 Information technology -- Security techniques -- Information security management systems -- Overview and

vocabularyISO/IEC 27001:2013 Information technology -- Security techniques -- Information security management systems – RequirementsISO/IEC 27001:2013/Cor 1:2014 60.60 35.040ISO/IEC 27001:2013/Cor 2:2015 60.60 35.040ISO/IEC 27002:2013 Information technology -- Security techniques -- Code of practice for information security controlsISO/IEC 27002:2013/Cor 1:2014 60.60 35.040ISO/IEC 27002:2013/Cor 2:2015 60.60 35.040ISO/IEC DIS 27003.2 Information technology -- Security techniques -- Information security management system -- Guidance 4ISO/IEC 27003:2010 Information technology -- Security techniques -- Information security management system implementation guidance

90.92 35.040ISO/IEC 27004:2009 Information technology -- Security techniques -- Information security management – MeasurementISO/IEC 27004 Information technology -- Security techniques -- Information security management -- Monitoring, measurement, analysis

and evaluation 60.00ISO/IEC 27005:2011 Information technology -- Security techniques -- Information security risk management 60.60 35.040ISO/IEC 27006:2015 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of

information security management systems 60.60 35.040ISO/IEC CD 27007 Information technology -- Security techniques -- Guidelines for information security management systems auditingISO/IEC 27007:2011 Information technology -- Security techniques -- Guidelines for information security management systems auditingISO/IEC PDTS 27008 Information technology -- Security techniques -- Guidelines for the assessment of information security controlsISO/IEC TR 27008:2011 Information technology -- Security techniques -- Guidelines for auditors on information security controlsISO/IEC 27009:2016 Information technology -- Security techniques -- Sector-specific application of ISO/IEC 27001 – RequirementsISO/IEC 27010:2015 Information technology -- Security techniques -- Information security management for inter-sector and inter-

organizational communications 60.60 35.040ISO/IEC FDIS 27011 Information technology -- Security techniques -- Code of practice for Information security controls based on ISO/IEC

27002 for telecommunications organizations 50.60 35.040ISO/IEC 27011:2008 Information technology -- Security techniques -- Information security management guidelines for

telecommunications organizations based on ISO/IEC 27002 90.92 35.040ISO/IEC 27013:2015 Information technology -- Security techniques -- Guidance on the integrated implementation of ISO/IEC 27001 and

ISO/IEC 20000-1 60.60 03.080.99

ISO/IEC 27014:2013 Information technology -- Security techniques -- Governance of information security 60.60 35.040ISO/IEC TR 27015:2012 Information technology -- Security techniques -- Information security management guidelines for financial

servicesISO/IEC TR 27016:2014 Information technology -- Security techniques -- Information security management -- Organizational economics

60.60ISO/IEC 27017:2015 Information technology -- Security techniques -- Code of practice for information security controls based on ISO/IEC

27002 for cloud services 60.60 35.040ISO/IEC 27018:2014 Information technology -- Security techniques -- Code of practice for protection of personally identifiable information

(PII) in public clouds acting as PII processors 60.60 35.040ISO/IEC TR 27019:2013 Information technology -- Security techniques -- Information security management guidelines based on ISO/IEC

27002 for process control systems specific to the energy utility industry

12

Page 13: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

ISO/IEC JTC 1/SC 27 - IT Security techniques (2/2)

ISO/IEC TR 27023:2015 Information technology -- Security techniques -- Mapping the revised editions of ISO/IEC 27001 and ISO/IEC 27002ISO/IEC 27031:2011 Information technology -- Security techniques -- Guidelines for information and communication technology readiness for business

continuity90.60 35.040ISO/IEC 27032:2012 Information technology -- Security techniques -- Guidelines for cybersecurity 60.60 35.040ISO/IEC 27033-1:2015 Information technology -- Security techniques -- Network security -- Part 1: Overview and concepts 60.60 35.040ISO/IEC 27033-2:2012 Information technology -- Security techniques -- Network security -- Part 2: Guidelines for the design and implementation of network

security 60.60 35.040ISO/IEC 27033-3:2010 Information technology -- Security techniques -- Network security -- Part 3: Reference networking scenarios -- Threats, design techniques

and control issuesISO/IEC 27033-4:2014 Information technology -- Security techniques -- Network security -- Part 4: Securing communications between networks using security

gateways 60.60 35.040ISO/IEC 27033-5:2013 Information technology -- Security techniques -- Network security -- Part 5: Securing communications across networks using Virtual

Private Networks (VPNs) 60.60 35.040ISO/IEC 27033-6:2016 Information technology -- Security techniques -- Network security -- Part 6: Securing wireless IP network access 60.60 35.040ISO/IEC 27034-1:2011 Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts 90.20 35.040ISO/IEC 27034-1:2011/Cor 1:2014 60.60 35.040ISO/IEC 27034-2:2015 Information technology -- Security techniques -- Application security -- Part 2: Organization normative framework 60.60ISO/IEC CD 27034-3 Information technology -- Security techniques -- Application security -- Part 3: Application security management process 30.60ISO/IEC DIS 27034-5 Information technology -- Security techniques -- Application security -- Part 5: Protocols and application security controls data structure

40.60ISO/IEC 27034-6:2016 Information technology -- Security techniques -- Application security -- Part 6: Case studies 60.60 35.040ISO/IEC DIS 27034-7 Information technology -- Security techniques -- Application security -- Part 7: Application security assurance prediction modelISO/IEC PDTS 27034-5-1 Information technology -- Security techniques -- Application security -- Part 5-1: Protocols and application security controls data

structure -- XML schemas 30.60 35.040ISO/IEC 27035:2011Information technology -- Security techniques -- Information security incident management 90.92 35.040ISO/IEC 27035-1 Information technology -- Security techniques -- Information security incident management -- Part 1: Principles of incident managementISO/IEC 27035-2 Information technology -- Security techniques -- Information security incident management -- Part 2: Guidelines to plan and prepare for

incident responseISO/IEC 27036-1:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 1: Overview and conceptsISO/IEC 27036-2:2014 Information technology -- Security techniques -- Information security for supplier relationships -- Part 2: Requirements 60.60ISO/IEC 27036-3:2013 Information technology -- Security techniques -- Information security for supplier relationships -- Part 3: Guidelines for information and

communication technology supply chain security 60.60 35.040ISO/IEC 27036-4:2016 Information technology -- Security techniques -- Information security for supplier relationships -- Part 4: Guidelines for security of cloud

servicesISO/IEC 27037:2012 Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidenceISO/IEC 27038:2014 Information technology -- Security techniques -- Specification for digital redaction 60.60 35.040ISO/IEC 27039:2015 Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection and prevention systems

(IDPS) 60.60ISO/IEC 27040:2015 Information technology -- Security techniques -- Storage security 60.60 35.040ISO/IEC 27041:2015 Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative methodISO/IEC 27042:2015 Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence 60.60 35.040ISO/IEC 27043:2015 Information technology -- Security techniques -- Incident investigation principles and processes 60.60 35.040ISO/IEC 27050-1 Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts 60.00 35.040ISO/IEC CD 27050-2 Information technology -- Security techniques -- Electronic discovery -- Part 2: Guidance for governance and management of electronic

discovery30.60 35.040ISO/IEC DIS 27050-3 Information technology -- Security techniques -- Electronic discovery -- Part 3: Code of Practice for electronic discovery

13

Page 14: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Network is Compromised

Page 15: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

threat

Page 16: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Usulan dari ISO/TC 184/SC 4 - Industrial data (1/2)

Page 16

ISO/TS 8000-1:2011 Data quality -- Part 1: Overview90.93 25.040.40 ISO 8000-2:2012 Data quality -- Part 2: Vocabulary60.60 01.040.25ISO 8000-8:2015 Data quality -- Part 8: Information and data quality: Concepts and measuring60.60 01.040.25ISO 8000-100:2016 Data quality -- Part 100: Master data: Exchange of characteristic data: Overview60.60 25.040.40 ISO 8000-110:2009 Data quality -- Part 110: Master data: Exchange of characteristic data: Syntax, semantic encoding, and conformance to data specification90.60 ISO 8000-120:2016 Data quality -- Part 120: Master data: Exchange of characteristic data: Provenance60.60 25.040.40 ISO 8000-130:2016 Data quality -- Part 130: Master data: Exchange of characteristic data: Accuracy60.60 25.040.40 ISO 8000-140:2016 Data quality -- Part 140: Master data: Exchange of characteristic data: Completeness60.60 25.040.40 ISO/TS 8000-150:2011 Data quality -- Part 150: Master data: Quality management framework

Page 17: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Usulan dari ISO/TC 184/SC 4 - Industrial data (2/2)

Page 17

ISO 15926-1:2004 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 1: Overview and fundamental principles90.93 25.ISO 15926-2:2003 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 2: Data model90.93 25.040.40ISO/TS 15926-3:2009 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 3: Reference data for geometry and topology90.93 75.020ISO/TS 15926-4:2007 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 4: Initial reference data90.93 75.020ISO/TS 15926-4:2007/Amd 1:2010 60.60 75.020ISO/TS 15926-6:2013 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 6: Methodology for the development and validation of reference data90.92 25.040.40ISO/TS 15926-7:2011 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 7: Implementation methods for the integration of distributed systems: Template methodology90.93 75.020ISO/TS 15926-8:2011 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 8: Implementation methods for the integration of distributed systems: Web Ontology Language (OWL) implementation90.93 75.020ISO/TS 15926-11:2015 Industrial automation systems and integration -- Integration of life-cycle data for process plants including oil and gas production facilities -- Part 11: Methodology for simplified industrial usage of reference data

Page 18: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Seri ISO 8000 Data Quality

Page 18

ISO 8000 ontology

Part 1 : Scope , Justification and principles

Part 3 Taxonomy : ISO 8000 parts & other standards relationships

Part 8 Information and Data Quality Measuring

Part 9 Information data quality relationship with

other standards

Part 20 Data Quality: Provenance

Part 30 Data Quality Accuracy

Part 40 Data Quality Completeness

Part 50 Data Quality management framework

Part 60 Information & Data Quality Process

Assessment

Part 100 Master data: Exchange of characteristic

data: OverviewPart 10 Data Quality Syntax, semantic encoding,

and conformance to data specification

Part 120 Master data: Exchange of characteristic

data: Provenance

Part 130 Master data: Exchange of characteristic

data: Accuracy

Part 140 Master data: Exchange of characteristic

data: Completeness

Part 150 Master Data Quality management

framework

Part 311 Guidance for the application of PDQ-S

Part 2 Vocabulary

Characteristics or Data quality dimensions

RequirementsSyntax SemanticsPragmatics Measurements methods

Management methods

Introduction

Vocab. / Onto

General concepts & definitions

Specialized concepts & definitions

Management framework

Usage guides

Part 110 Master data: Exchange of characteristic

data: Overview

Page 19: Usulan utk PT35-01 Teknologi Informasi dan Kualitas Data 19 okt2016

Diskusi

19