You are on page 1of 60

KULIAH KE 6

Thema

FUNGSI, MAP PROSES DAN NILAI / TARGET


PERFORMANSI (KPI)
SECURITY MANAGEMENT
SECURITY MANAGEMENT
PROCESS & KPI
eTOM Business Process Framework
Conceptual Structure
(Level-0)

CUSTOMER

STRATEGY, INFRASTRUCTURE & PRODUCT OPERATIONS

Market,
Market,Product
Productand
andCustomers
Customers
Service
Service
Resources
Resources
(Application, Computing and Network)
(Application, Computing and Network)
Supplier,
Supplier,Partner
Partner

SUPPLIRES/PARTNERS

ENTERPRISE MANAGEMENT

Shareholders Employees Other Stakeholder


eTOM Business Process Framework
Level-1 Processes
CUSTOMER

STRATEGY, INFRASTRUCTURE & PRODUCT OPERATIONS


Strategy & Infrastructure Product Operation Fulfillment Assurance Billing
Commit Lifecycle Lifecycle Support &
Management Management Readiness
Marketing & Offer Management Customer Relationship Management
Marketing & Offer Management Customer Relationship Management

Service Development & Management Service Management & Operation


Service Development & Management Service Management & Operation

Resources Development & Management Resources Management & Operation (RM&O)


Resources Development & Management Resources Management & Operation (RM&O)
(Application, Computing and Network) (Application, Computing and Network)
(Application, Computing and Network) (Application, Computing and Network)

Supply Chain Development & Management Supply/Partner Relationship Management


Supply Chain Development & Management Supply/Partner Relationship Management

ENTERPRISE MANAGEMENT
Strategic & Enterprise Enterprise Risk Enterprise Effectiveness Knowledge & Re-search
Planning Management Management Management

Stockholder & External


Financial & Asset Relationship Human Resources
Management Management Management
Enterprise Risk Management
Level-2 Processes Decomposition

Enterprise Risk
Enterprise Risk
Management
Management
(ERM)
(ERM)

Business Continuity Security Fraud Management Audit Management lnsurance


Management (ERM Security
Management (ERM- EM)
- EM) Management(ERM
(ERM (ERM- EM) Management
- EM) (ERM- EM)
- EM)

Security Management processes interface to external security, police and/or investigative organizations.
These processes strongly interact with Fraud Management and have common elements and information services and
communications specific elements.
Security Management processes are implemented at many levels of the enterprise and at the user, system/network, etc. levels.
Note that the actual security monitoring, control and management procedures and facilities are embedded in the operational
infrastructure and processes defined and deployed within the SIP and Operations process areas.
Note that Audit Management processes provide assurance that the necessary control structures are in place, and provide an
estimate to the extent to which the procedures are followed and are effective
RM&O level 2 Processes ETOM Vs Rec ITU M.3400 (MFA)

RM&O LEVEL 2
PROCESSES v.3.5. (E- TOM)

Resource Resource Resource Data


RM&O Support Resource
Trouble Performance Collection &
& Readiness Provisioning
Management Management Processing

M.3400 MANAGEMENT
FUNCTIONAL AREAS (MFA)
(M3400 MFA ITU REC)

Security Configuration Fault Performance Accounting


Management Management Management Management Management

(E- TOM)
Security
Management

ENTERPRISE MANAGEMENT 6
M3400 - TMN Functional Decomposition
M3400
Security Configuration Fault Performance Accounting
Management
Management Management Management Management Management
Functional
Areas 4 5 6 4 4

M3400
Containment Security
Security Prevention Detection
& Recovery Administration
Management
5 10 16 24 55

M3400 Network Service


Status &
Configuration Planning Installation Planning & Provisioning
Control
Management & Engineering Negotiation
11 12 10 29 8 70

M3400
RAS Quality Alarm Fault Fault Trouble
Fault Testing
Assurance Surveillance Localization Correction Administration
Management
6 10 5 5 11 7 44

M3400 Performance Performance


Performance Performance
Performance Quality Management
Monitoring Analysis
Management Assurance Control
7 10 11 6 34

M3400 Collections
Usage Tariffing/ Enterprise
Accounting and
Measurement Pricing Control
Management Finance
17 8 21 11 57
7
Total functional units = 260
PREVENTION :
• Legal review
• Physical access security
• Guarding
• Personnal risk analysis
• Security screening

DETECTION
• Investigation of changes inrev.patern • Investigation of theft of service
• Support element protection • Internal traffic and activity pattern analysis
• Customer security alarm • Network security alarm
• Customer profiling • Software intrusion audit
SECURITY • Customer usage pattern analysis • support element security alarm reporting
MANAGEMENT

• Security in communication CONTAINMENT AND RECOVERY :


• Protected storage of business data • Network intrusion recovery
between systems, between
• Exception report action • Adm.of network revocation list
customer and systems,
• Theft service action • Protected storage of network configuration
between internal user and
• Legal action data
systems.
• Apprehending • Severing internal connection
• Service intrusion recovery • NE intrusion recovery
• Adm. of customer revocation • Adm.of NE revocation list
• Protected storage of customer data • Protected storage of NE configuration data
• Severing external connection

SECURITY ADMINSITRATION
• Security policy
• Customer audit trail
• Disaster recovery planning
• Customer security alarm management
• Management guards
• Testing of audit trail mechanism
• Audit trail analysis
• Adm. of internal authentication & access cont.
• Security alarm analysis
• Adm. of internal certification & encryption
• Assessment of corporate data integrity
• Network audit trail management
• Adm.of external authentication
• Network security alarm management
• Adm.of external access control
• NE audit trail management
• Adm. of external certification
• NE security alarm management
• Adm. of external encryption and keys
• Adm. of key for Nes
• Adm.of external security protocols
• Adm.of key by an NE
KPI Security Management
Process
Contoh pada Fraud Management

Accuracy
PREVENTION Security
Performance
Setting

• # Fraud
FRAUD
DETECTION Detected MANAGEMENT
• # Solution
provided Reducing
uncollectable
& Unbillable
Revenue
• # Fraud
CONTAINMENT Corected &
AND RECOVERY Recov ered

• Accuracy
SECURITY • Lengkap
ADMINSITRATION • Timely
SECURITY MANAGEMENT
CONCEPT
SISTIMATIKA
• Introduction, Status and Objective
• Security Management Processes and Procedure
• Security Management Function
o Risk Analysis
o Evaluation Of Security Services
o Evaluation Of Security Management Solution
o Alarming, Logging, and Reporting
o Protection Of Network Management Systems
• Instrumentation Of Security Management
o Monitoring Devices
o Encryption Devices
o Limiting access to End User Devices
o Improving LAN Security Management
• Human Resources demand of Security Management
Introduction, Status and Objective
SECURITY MANAGEMENT

Security Management Definition

Security Management adalah suatu kumpulan kegiatan untuk melindungi jaringan


dan seluruh komponen didalamnya dari aspek yang merugikan Operator atau Pelang-
gan antara lain ; akses keaplikasi , transfer informasi dalam jaringan , ketersediaan
dan kesiapan Back Up atau Cadangan .

Security umumnya berbanding lurus dengan biaya , semakin aman suatu jaringan ma
ka akan semakin mahal dan produk jasa semakin tidak kompetitif ,

Implementasi fungsi Security Management harus sedemikain rupa sehingga jaringan


cukup aman dengan Biaya yang seminimal mungkin .
Introduction, Status and Objective

Security Management Fillosophy

Rev/
Cost/
Risk

nu e
ve
Re T
V I
PRO
rity)
Cost/Risk (Secu

Waktu
Introduction, Status and Objective
• Security Management adalah suatu kumpulan kegiatan
untuk melindungi jaringan dan seluruh komponen
didalamnya dari aspek yang merugikan Operator dan
Pelanggan antara lain ; akses ke aplikasi , transfer
informasi dalam jaringan , ketersediaan dan kesiapan
Back Up atau Cadangan .

• Security umumnya berbanding lurus dengan biaya ,


semakin aman suatu jaringan semakin mahal biaya yang
dibutuhkan sehingga produk jasa menjadi semakin tidak
kompetitif ,

• Fungsi Security Management harus sedemikain rupa


sehingga jaringan cukup aman dengan Biaya yang
seminimal mungkin
Introduction, Status and Objective
Security Management Processes and Procedure
Security Management Function

o Risk Analysis
o Evaluation Of Security Services
o Evaluation Of Security Management Solution
o Alarming, Logging, and Reporting
o Protection Of Network Management Systems
Security Management Function
Risk Analysis
Analysis Object Analysis Result

• End User
• End User Workstation
• Local Area Networks • List and Description Of
• Metropolitan Area Network
• Wide Wrea Network Risk
• Processing component, including operation
system,database, files, and application
Security Management Function
Evaluation Of Security Service
Evaluation Object Evaluation Result

• Sophistication • Matrik Solusi


• Cost • Alternatif / Prioritas
• Implementation Efforts Solusi
• Maintenance Efforts • Rekomendasi
• Demand For Human Ressources
Security Management Function
Evaluation Of Security Management Solution
Evaluation Object Evaluation Result

• Sophistication
• Cost
• Implementation Efforts • Risk Mitigation Ressult
• Maintenance Efforts • Process Improvement
• Demand For Human Ressources
Security Management Function
Alarming, Logging, and Reporting
Activities Result

• Alarming (mengamati dan mendsipatch


alarm) • Catatan dan Laporan
• Logging (mencatat ketidak sesuaian)
• Reporting (membuat laporan)
Security Management Function
Protection Of Network Management Systems
Object Result
• Network Management Functions Group into

Configuration,Fault,Performance,Security,
• Organisasi dan Job
Accounting and Planning .
Desc. Security
• Communication Form
Management
• Principal Application
• Various networks (LAN,MAN,WAN)
• Network Partition (End User
Area,Transmision,Processing Area )
Instrument Of Security Management

o Monitoring Devices
o Encryption Devices
o Limiting access to End User Devices
o Improving LAN Security Management
Instrument Of Security Management
Monitoring Device Functionality
• User identification and verification by password
• Authorization Checking for access requests
• Journaling , logging , and reporting of security violations and access to system
resources
• Facilities for delegating the control of resource to the appropriate argonizational
level
• Programs to report the status of MVS and VM security and integrity
• Real-time status displays (similar to network monitors NET/ALERT (AVAN848B)
• Application and cutomers transparency
• Three types of alerts :
o Security alerts, when an invalid log-on is attempted
o Equipments alerts, which identify hardware malfunction or failure
o Threshold alert, when a dial-in customer exceeds a specifieds connect-time
limit
o or idle time-limit
• A history of log-ons and alerts provided by audit trials
• Hackers trap via :
o Artificial respons delay
o Offering pseudosystem mode
Instrument Of Security Management
Monitoring Device Functionality
•Call-back, Using specific phone nimbersassigned to authoried customers
•Usual audit trails provided include :
o Date and time of all attempts
o Which line the call came in on
o Which line the call went out on
o Entry and disconnect time
o Passsword used
o User assocciated with the call
Instrument Of Security Management
Encription Device
•Montoring dan Pengecheckan Proses Enkripsi
• Perbaikan Proses Encripsi
•Modifikasi atau perubahan proses enkripsi (bila enkripsi telah terpecahkan)
Instrument Of Security Management
Limiting Access to End User Devices
•Melakukan pembatasan atas siapa yang diizinkan masuk pada peralatan peralatan
Peralatan End User ; terminal, personal system,worksatasion, dll.
•Monitoring proses autentifikasi pengguna jaringan
•Menggunakan kartu akses dengan Chip didalamnya
Instrument Of Security Management
Improving LAN Security Management
•Tapping
•Radiation Leakage
•File and Program Protection, and phisical Security
•Autentication, Audit Traill, and Encription bisa dikerjakan sama dengan pada WAN
MAP PROSES
FRAUD MANAGEMENT
(BEST PRACTISE)
REFERENSI NOMOR
TELECOMMUNICATION FRAUD DIVISION
OWNER M. FRAUD
TELCO MANAJEMEN PROSES PENANGANAN FRAUD
TOH Key Indicator :Reduce Uncollectible & Unbillable Revenue
ISSUED DATE

N ( Level 2)
CO
REVISI NOMOR

Metrik # 1A - Potensial fraud


DATEL cases reduced DATEL
PROV INFO Metrik # 2B=#3A Info Koreksi
IINF FRAUD
- Potensial fraud cases - Saving of
- Potensial loss 1.5.4.1 potensial loss
BLUE CHIP
CUST COMPLIN
NIAGA
NIAGA
CUS CARE 4 Prevention Rec for Sys & Proc CUS
Improvement Fraud info Info Koreksi & CARE
INF FRAUD Management Rekomendasi
INTERKONEKSI
FRAUD VALUE- Timely
ADDED SERVICE 2
PERF Akurat PERF
Report
1
5 M. FRAUD/PREV
3 Threshold ,Fraud Rules
STD SETTER
I& Customer Profile
INSTRKSI
FB for
KHUSUS
UNR Improvement
Info Koreksi
UNR
5 4 WO
Metrik # 2B=#3A 1.5.4.4
INFO FRAUD Metrik # 2A
- Cases Detected
MGT System & proccectures
OP & Support MGT
- current fraud - Suitable Solution 2 Rec & Report
IWeaknesses Management
cases
Reporting DIVISI/
PROV INFO - potensial loss 2 Timely Reco
DIVISI/
OPR Lain Akurat mendation OPR
Info Koreksi
& Solusi
Lain
INFO ANOMALI M. FRAUD/SUPPORT
BILLING & CDR
1.5.4.2 1.5.4.3 Info
Correction
SISFO & Status SISFO
Detection Correction Info Koreksi
INF REVENUE &
PENDAPATAN Management Management
- Fraud cases reduced
INTERKONEKSI
- Cases corrected
KUG Of Fraud detected Of Fraud Corrected KUG
solution - Saving of potensial Report &
& Solution provided And Recovered
1 loss Rekomendasi
INFO LAW
INFORCEMENT M. FRAUD/ ANAL & M. FRAUD/ Unit Op Metrik # 4B
Legal / 4 3 Legal /
3
PAM DET Further Invest PAM
& Law Inforc
NEW TECH
,LATEST MODUS 4
MEDIA OF FRAUD MEDIA
PUBLIC Cust Education PUBLIC
Sosialisasi
PROPORSAL
NPD SYST - Cases corrected
NIAGA CAPABILITIES NIAGA
- Saving of potensial
BANG BANG
Dinamic Call loss Input for NPD
Prd Dev Threshold & New Sys Prd Dev
Detail
Fraud Rules
& Cust Record
UIM INFO FRAUD Profils UIM
WO
Human Resources Demand Of Security
Management
INVOLVEMENT IN SECURITY MANAGEMENT

FUNCTION Configuration Fault Performance Security Accounting Net.Cap. Level Of


Management Management Management Management Management Plan Automation

Risk Analysis S E A LOW


Evaluation Of Security Services S S E S LOW
Evaluation Of Security Management Solution E LOW
Alarming,Logging, and Reporting S S E S HIGH
Protection Of Network Management System A S E A LOW

E=Eecuting
S=Suppoting
A=Advising
KESIMPULAN PENTING
KESIMPULAN PENTING
DO (HARUS DILAKUKAN)
•Process
o Consider security management as prime corporate objective
o Allocate sufficient funds and people
o Clearly define security objectives
o Analyze major threaths : Inside/Outside
o Set Up Close Loop: Monitor-Detect-Fix-Report
o Formulate: Four-Layer Security System
o Give Highest Security to Network Management Center System/Procedure
o Emphasize security procedures within the organization

•Product
o Select Products as Part of Close Loop
o Select Products as part of multi layered security
o Select Products with good audit trail function

•People
o Involve all corporate personnel
o Motivate user by explaining damage thet may be caaused by security failure s
KESIMPULAN PENTING
AVOID (JANGAN DILAKUKAN)
•Process
o Single Layer Security Procedure
o Considering Security Management as Overhead
o Being Satisfied with present security status
o Giving unlimited access to any individual
o Maintaining passwords/codes and so on, for extended periods
o Failling to adquately follow on security violations

•Product
o Those product that can be defeated or bypassed easily
o Those not designed with security as an essential part of them

•People
o Hiring Network Management Center personnel without stringent investigation
o Continuing network access to repeated security violators
CONTOH TUGAS KELOMPOK
SECURITY MANAGEMENT
SECURITY MANAGEMENT

Oleh :
Tim /Kelompok Pembuatan Tugas
Manajemen Jaringan Telekomunikasi UMB
Definisi
• Security Management adalah suatu kumpulan kegiatan untuk melindungi
jaringan dan seluruh komponen didalamnya dari aspek yang merugikan
Operator atau Pelanggan antara lain ; akses ke aplikasi , transfer informasi
dalam jaringan , ketersediaan dan kesiapan Back Up atau Cadangan .

• Security umumnya berbanding lurus dengan biaya , semakin aman suatu


jaringan maka akan semakin mahal dan produk jasa semakin tidak
kompetitif ,

• Fungsi Security Management harus sedemikain rupa sehingga jaringan


cukup aman dengan Biaya yang seminimal mungkin
Fungsi Security Management
Bergantung pada hal-hal berikut:
• Ukuran (Size)
• Nilai (Worth) 
• Budaya (Culture) 
• Pengatur (Regulatory)
Struktur Security Fungsional

• Tiga tipe dasar


1. Technical: Security yang ditugaskan kepada personal
utama dalam development, network, dan operation.
Grup security ditemukan dalam infrastruktur
dengan fungsi security non-formal
Struktur Security Fungsional
Struktur Security Fungsional  

2. Technical/Management
Security yang diperluas / dikembangkan dengan
memasukan unsur technical, management, dan
isu-isu strategi perusahaan yang memberikan
solusi security dan memungkinkan antar
pengguna di internal dan eksternal
Struktur Security Fungsional 
Struktur Security Fungsional
3. Management: Peran Security selanjutnya
dikembangkan untuk memberikan pandangan
management ke seluruh program security perusahaan
– Memberikan penguasaan security (governance) dan kartu
catatan (scorecards)
– Tekhnikal security dikembalikan ke development, network dan
operation
Struktur Security Fungsional
Struktur Security Fungsional
Proses-proses Security
• “Security adalah sebuah rangkaian dalam infrastruktur yang mempunyai link yang
aman dan bukan merupakan sebuah produk ataupun serial teknologi. Merupakan
sebuah proses dari solusi yang terukur dalam kebutuhan bisnis organisasi”. 
• “Proses Security desktop adalah pendekatan terpadu dari kebijakan yang mengikat,
terstandard, & berpedoman dengan membangun sebuah roadmap dari proses
customized yang akan menghasilkan sebuah hasil yang diinginkan, terukur & dapat
diaudit.”
• Didalam semua organisasi - kecuali jika pedoman khusus diberikan,
- Tidak akan ada jaminan bahwa security policy akan diimplementasikan dengan
baik.
- Bahwa banyak pengguna / user tidak membaca atau mengerti security policies
dan bahkan security awareness trainingtelah dilakukan.
- Para pengguna / user tidak mematuhi- dikarenakan tekanan pekerjaan yang
dialami tiap hari. 
Proses-proses Security
• Bahwa satu-satunya cara untuk memastikan sesuai dengan security
policy adalah untuk mengakui jika security membutuhkan untuk
menyediakan dokumen proses security kepada user adalah singkat,
langsung, mudah dimengerti, dan dengan memberikan semua
template yang diperlukan.
• Proses ini adalah disebut “middle ground” antara security policy,
measuring, auditing dan memastikan bahwa users akan dan dapat
memberikan infrastruktur yang aman kepada perusahaan.
Dampak Security pada Proses Bisnis
Management Security Perusahaan
• Memulai dari dasar pikiran bahwa Security Service memerlukan untuk
menghasilkan solusi security ketika Organisasi perlu mencapai objektivitas.
• Membutuhkan promosi-promosi proses security yang focus dan
berkepemilikan.
• Melihat pada fidusiari, kwalitas dan kebutuhan security Organisasi serta
memberikan solusi untuk enam kriteria informasi yang dapat digunakan untuk
mendefinisikan secara umum apakah Organisasi membutuhkan Security
Service.
• Kriteria Informasi: 
1. Ketersediaan (Availability)
2. Integritas (Integrity)
3. Kerahasiaan (Confidentiality)
4. Keandalan (Reliability)
5. Pemenuhan (Compliance)
6. Bukan Penanggalan (Non-repudiation)
Key Performance Indicators (KPI)
•Key Performance Area
- Kebijakan Security dan Design – Pedoman - Proses

•Key Performance Indicators


- Prosentase penyelesaian security, pedoman dan
proses dokumentasi
- Prosentase penyelesaian kebijakan kewaspadaan
security dan standard training.

 
 
Key Performance Indicators (KPI)
• Key Performance Area 
- Aplikasi Security
 
• Key Performance Indicators
- Prosentase penyelesaian identifikasi aplikasi yang
sensitif oleh Department dan Data Owner.
- Prosentase penyelesaian identifikasi aplikasi yang
critical oleh Department dan Data Owner.
- Prosentase penyelesaian Sertifikasi security dan
Akreditasi aplikasi yang krusial / sensitif.
- Prosentase training khusus Security Awareness untuk
para developer dan data owners.

 
Key Performance Indicators (KPI)
• Key Performance Area 
- Infrastruktur yang aman

• Key Performance Indicators


- Prosentase penyelesaian dari system bahwa yang memiliki resiko
penilaian dilakukan pada basis system.
- Prosentase security & IT control yang telah ditest dan dievaluasi.
- Prosentase system yang berbasis dokumentasi (facilities manual) di
tempat dan dilakukan audit.
- Prosentase system untuk rencana DR yang telah di test dalam FY yang
sekarang.
- Prosentase personal network and operation yang menerima pelatihan
kewaspadaan security secara khusus.
Key Performance Indicators (KPI)
• Key Performance Area
- System Access Control
 
• Key Performance Indicators 
- Jumlah akun yang tidak deaktivasi.
- Jumlah akun yang tanpa dokumentasi dan persetujuan yang benar.
- Jumlah akun sistem admin yang pemisahan tugasnya menjadi issue.
- Jumlah system tanpa proses dan kapabilitas untuk me-recover
system password.

 
SM Mencakup 4 kelompok grup (rec. ITU-T
M.3400)

• Prevention.
• Detection.
• Containment and recovery.
• Security administration
Prevention includes the following function
sets:

• Legal review function set.


• Physical access security function set.
• Guarding function set.
• Personnel risk analysis function set.
• Security screening function set.
Detection includes the following function sets:

• Investigation of changes in revenue patterns function set.


• Support element protection function set.
• Customer security alarm function set.
• Customer (external user) profiling function set.
• Customer usage pattern analysis function set.
• Investigation of theft of service function set.
• Internal traffic and activity pattern analysis function set.
• Network security alarm function set.
• Software intrusion audit function set.
• Support element security alarm reporting function set.
Containment and Recovery includes the following function sets:

• Protected storage of business data function set.


• Exception report action function set.
• Theft of service action function set.
• Legal action function set.
• Apprehending function set.
• Service intrusion recovery function set.
• Administration of customer revocation list function set.
• Protected storage of customer data function set.
• Severing external connections function set.
• Network intrusion recovery function set.
• Administration of network revocation list function set.
• Protected storage of network configuration data function set.
• Severing internal connections function set.
Security Administration includes the following function sets:

• Security policy function set.


• Disaster recovery planning function set.
• Manage guards function set.
• Audit trial analysis function set.
• Security alarm analysis function set.
• Assessment of corporate data integrity function set.
• Administration of external authentication function set.
• Administration of external access control function set.
• Administration of external certification function set.
• Administration of external encryption and keys function set.
• Administration of external security protocols function set.
Matrik Interelasi
Proses Mapping Security Management

You might also like