Professional Documents
Culture Documents
Herdy Harman
PT Telekomunikasi Indonesia, Tbk
National Policy
Law and Regulations
Equipment Security
Implementation Approach
ID-SIRTII Mechanism
2
TELKOM is an infocom service TELKOM listed on the Jakarta
provider in Indonesia, owned Stock Exchange (JSE), London
by the government of Stock Exchange (LSE) and New
Indonesia (51.2%) and York Stock Exchange (NYSE) in
public shareholders November 14, 1995.
(48.8%).
3
History …
Restructuring Transforming
2007 ….
2002
Implementation of Focus On New Wave
Business
duopoly
(10 Strategic
Initiatives)
2001
• Cross ownership
1995 termination with
Go Public & listed on Indosat
JSX , SSX, NYSE & LSX • TELKOM acquired 35% 2003 - 2006
interest in Telkomsel Transformation from
1974 from Indosat Asset-based Company
1991 1999 to Customer-Centric
Separated PN
Govt transformed Company
Telekomunikasi into • Telecommunication
PERUMTEL into
PERUMTEL and industry reforms
PT. TELKOM
PT INTI based on Act No 36
• Terminated the
1948 exclusive rights of
Taken over by 1965
Separated PTT into 2 TELKOM to provide
Indonesia Govt
companies: (PN Pos & fixed-line services
under name PTT
Giro, and PN Restructuring, from Began terminating KSO
1884 Telekomunikasi) 12 WITELS into 7 DIVREs Agreement (2001)
Established by and entered KSO
Agreement in 5 DIVREs
Dutch Govt (1995)
4
Core Business …
FixedPhone
Fixed Phone Cellular
Cellular Multimedia
Multimedia
Divisions
Divisions: :
Regional1-7,
1-7,Fixed
Fixed Division
Division: :MM
MM
Regional
TLKM
TLKM 65%65% Division&&
Division
WirelessNetwork,
Wireless Network, Metra,
Metra,Indonusa,
Indonusa,
LongDistance
Long Distance SingTel
SingTel35%
35%
Infomedia
Subsidiaries
Subsidiaries
Infomedia
Subsidiaries
Subsidiaries
No.11mobile
No. mobile
Marketleader
Market leaderwith
with MarketChallenger
Market Challenger
operatorwith
operator withmore
more Market
Market
morethan
more than90%
90% withsignificant
with significant Position
than50%
than 50%market
market Position
marketshare
market share growth
growth
share
share
5
ICT Market Profile
Status: Q1 2008
6
Implementation on Security Information Management
7
Policies and Procedures
Internal Organization
– To manage information security within the organization.
8
TELKOM Best practices repository for IT process & Governance
How IT is organized to
respond to the requirements
IT IT Business
Resources Processes Focus
•• SecurityPolicy
Security Policy
•• OrganizationalSecurity
Security
Organizational Effectiveness
Effectiveness
Data
Data •• Assetmanagement
Asset management
•• HRMSecurity
HRM Security Efficiency
Efficiency
Application
Application •• Physical&&Environmental
Physical EnvironmentalSecurity
Security Confidentiality
Confidentiality
systems
systems Comm.&Operation
&Operationmanagement
management
•• Comm. Integrity
Integrity
•• AccessControl
Control
Infrastructure
Infrastructure Access
•• SystemAcqusition,
System Acqusition,Devl
Devl&&Mtance
Mtance Availability
Availability
People
People •• Incidentmanagement
Incident management
Compliance
Compliance
•• BCP
BCP
•• Compliance
Compliance Informationreliability
Information reliability
PREVENTION INCIDENT
ID SIRTII
Nation
Analysis & Investigate
Level
Legal Enforcement
10
Law and Regulations
11
Equipment Security as Implementation Approach
• Generic Implementation
CodeRed
The Internet Attack Server
CodeRed
Attack!!
Sensor •••
12
Implementation Approach
NAPs •••
Internet IXPs
ID-SIRTII
•••
Monitoring
Traffic
Legend :
••• ISPs
•••
Sensor
Collecting
Server Log Files
Collecting
Log Files
AnalyseIncident
Analyse IncidentIndication
Indication ResponseIncident
Response IncidentManagement
Management
Provide
Collect and
Stakeholders
Manage Log Files Analyse Alert Receive
with Log Files
from ISPs Patterns Related Formal
Record
and Institutions Requests
Detect regarding from
Provide
Monitor Internet Indication Incident National
Stakeholders with
Traffic on IXPs Signals Occurrences Authorities
Traffic Patterns
and NAPs
Record
Source : ID-SIRTII
14
Security is everyone responsibility…
15