Syntax
Literate: Jurnal Ilmiah Indonesia p�ISSN: 2541-0849 e-ISSN: 2548-1398
Vol.
7, No. 12,
December 2022
IMPROVING
CYBER SECURITY INCIDENT RESPONSE MATURITY OF XYZ ORGANIZATION USING TMPI
Rachmat
Budijanto
Swiss
German University, Indonesia
Email:
[email protected]
Abstract
This thesis proposes to analyze how an organization can determine the
condition of its incident handling capability and how an organization can plan activities
for improvement and its relation to increasing resilience of an organization.
The method to answer this question, the researcher measures the existing and
expected capabilities of handling organizational incidents by using TMPI. The
GAP obtained can be made recommendations based on the TMPI with reference to
the specified Targets or Expectations. GAP is also analyzed with IPA
(Imprortant Performance Analysis) to determine priority scale. In this
research, the recommendation from TMPI is tested on the CRR (Cyber Resilience
Review) to see if there is an improvement on the resilience side. The
evaluation and validation process is carried out using the Interview and FGD
method with SME (Subject Matter Experts). The results of the research show that
TMPI can measure the current condition of an organization's incident handling
ability so that a work plan recommendation can be prepared to improve its
ability to refer to TMPI according to the desired target. With IPA it can be
described Mapping of the priority areas for improvement, namely Post Incident
Review, Lesson Learn, Maturity assessment, Threat analysis, Trend Analysis, The
Recovery. The results also reveal that from the recommendations for increasing
TMPI when measured by CRR, there is an increase in resilience in the
Situational Awareness area was an increase of 66%, Incident Management 52%,
External Dependency Management 23%, Training and Awareness 17% and the last is
Service Continuity Management 8%. However, this thesis has not discussed in the
Reality area in resilience. Such as how to apply Protection, Sustainability and
Detection to protected assets in accordance with the Organization in cases
faced by the organization in improving resilience operations. From the
perspective of operational resilience, this study needs to be complemented by
Resilience in the Realibility area, This is important because the organization
cannot secure everything but the important thing is how the operational
organization is running well and security can still be controlled.
Keywords: TMPI,
Incident Response, CSIR, BSSN, Maturity Level, Resilience, CRR, IPA.
Introduction
In order to support the management, supervision, and control
of cooperation contracts for upstream oil and gas (oil and gas) business
activities, security against the Cooperation contract contractors data (KKKS)
must be ensured in order to ensure data confidentiality, integrity, and
availability (Setiawan
& Nugroho, 2016).
1.
The
KKKS data in question contains information:
2.
Development
and exploration strategies
3.
Data
Production / Lifting
4.
Data
on Oil and Gas Profit Sharing Funds
5.
Lifting
Performance of OIL for each KKKS
XYZ organization is included in the category of National
Vital Object so that viewed from the perspective of cyber crime, this
organization is the main target for Cybercriminals.
In the world cybersecurity incidents, such as advanced
persistent threats (APTs), which are considered serious cybersecurity attacks,
are currently making headlines (Herdiana
et al., 2021). This attack had serious
repercussions on all organizations � and on governments and international
agencies (Windiani,
2017). Methods to respond to this attack
comprehensively, quickly and effectively are being actively developed in
corporate organizations, government agencies and the international community
(World Economic Forum) (Daniri,
2008). This attack is considered a major
threat (Creasey,
2013).
The following Figure 1. is a report in Indonesia on reports
of attacks during the January � October 2021.
Figure 1. Traffic Anomaly - BSSN
(January � October 2021)
From the traffic anomaly reports, it can be concluded that
cyber attacks are quite serious and need to be addressed. This requires a
capable enough cyber incident handling so that most organizations need
professionals to help deal with cybersecurity incidents in an appropriate
manner. However, organizations find it difficult to find competent experts who
can assist in incident response to protect critical organizational information
from serious attacks.
At Mei 2021, a Ransomware attack occurred at the XYZ
Organization, to improve information security capabilities, activities were
made that aim to increase the organization's ability to deal with emerging
cyber attacks that cause disruption in carrying out IT Operations in the
organization, one of which is making activities for Cyber Security. Incident
Response (CSIR).
����������� Cyber risk
has become an inseparable part of the company's digitalization process, the
magnitude of the potential threat of cyber attacks by individuals, fun hacking,
intended hacking and cyber wars between countries can no longer be
underestimated (Indarta
et al., 2022).
����������� Often
organizations focus on how to make preventive defenses such as purchasing
Firewalls, IPS, WAF, Endpoint Security and so on. Concerns related to
correctives are sometimes ignored even though in terms of probability of
occurrence, almost all organizations have experienced the inevitable cyber
incidents that were also experienced by the XYZ organization.
����������� XYZ
Organizational Management has realized that this is an important thing to be
managed properly, this can be seen by the implementation of ISO 27001:2013
initiatives in 2018 and the Security Operation Center starting in 2021.
����������� However,
the management does not yet know the extent of the incident response capability
in the XYZ organization. Management needs a way of measuring this capability as
well as to determine the direction of improvement (targets and roadmaps) that
are appropriate.
����������� In the
current research, the author focuses on research on measuring maturity levels
at the CSIR XYZ Organization with TMPI and making recommendations and work
programs aimed at increasing the CSIR maturity level as desired by the
organization. This research also examines recommendations for increasing the
TMPI maturity level.
This research aims to know Capability and the maturity level
CSIR of Organization, to support organizations for improving cyber-security
incident Response of Organization and to know Capability and the maturity level
resilency of Organization in The context of incident response.
Today's cyber threats are universal and impact all
organizations around the world (Balan,
S, Otto, J, Minasian, E & Aryal, 2017), As IT activities generate complex
cybersecurity risks in organizations, Cybercriminals are learning new ways to
attack and quickly adapt to changing environments. The objectives of cyber
attacks include stealing new identities, disrupting distribution services and
stealing money (Ferdinand,
2015). (Balan,
S, Otto, J, Minasian, E & Aryal, 2017) In 2017 254 companies in Australia,
Germany, France, Japan, England, Italy and America from the interviews found
that the average cost of cybercrimes was around US$11.7 million per
organization. The annual cost of cybercrime amounts to billions of US dollars
and global losses are around US$400 billion. indicated that 91 percent of
organizations in the US experienced economic losses from cyber attack
activities (Balan,
S, Otto, J, Minasian, E & Aryal, 2017).
Indonesia is the fourth most populous country in the world,
and 64.8% of them are active internet users (Permana,
2021). The current development of
countries in the face of increasing cyber attacks has become offensive not
defensive anymore, and this has become a cyber security policy among countries.
Seeing the escalation of this trend, what is needed by
Indonesia is also to prepare itself to face the global cyber war. Given that
anonymous actors often use Indonesian territory as a base to carry out attacks,
this could have unintended consequences for Indonesia. According to AKAMAI,
Indonesia even replaced China in 2013 as the top source of cyber-attack traffic
in the world. According to the Ministry of Communication and Information, in
2017 Indonesia was the target of more than 205 million attacks. Indonesia will
face multiple attacks that can cripple critical infrastructure, businesses and
public services. This means that cyber warfare is a serious threat to
Indonesia, which has a vision of becoming the largest digital economy in
Southeast Asia by 2020. Indonesia must first publish an official white paper on
its international strategy in cyberspace to anticipate increasing capabilities
in cyber warfare globally. The document contains an explanation of Indonesia's
current offensive cyber capabilities and their impact on security and threats to
international stability (Tri
Aryadi, 2018).
A clear threat model is essential for setting resilience
goals.4 Cyber threats can be variously characterized � for example, in terms of
enemy characteristics and in terms of behavior. ability, intent, and targeting
can be categorized as enemy Characteristics (Bodeau
& Graubart, 2011).
Cyber kill chain is a way of describing the activity or
behavior of an adversary who persistently and stealthily gains a foothold from
malware present in an organization's system or mission and then uses that
foothold to achieve goals. The components of the cyber kill chain� are: (Cloppert,
2009).
1.
Reconnaissance:
A way to obtain information in carrying out an attack.
2. Weapons: payloads placed in delivery
vehicles (e.g., hyperlinks to sites contaminated with phishing email malware,
malware in email attachments).
3. Delivery:
Sending the attack vehicle to the potential victim.
4. Exploitation/installation:
Exploiting system vulnerabilities to install malware on the victim system. This
is identified as the pivotal point in the cyber kill chain. (Cloppert,
2009)
5. Command
and control: Directing the victim system to take actions (e.g., to download
additional malware, to perform more advanced reconnaissance within the enterprise
information infrastructure, to propagate malware to other systems).
6. Actions to
achieve adversary objectives: Depending on the adversary�s objectives, these
may include exfiltrating data, corrupting mission or organizational data or
replacing it with deceptive data, and degrading or denying the functionality of
cyber resources.
7. Maintenance:
Taking actions to ensure future access (e.g., changing the profile of
adversary-installed malware, modifying logs).
The number of violations against information security is
increasing every year accompanied by the development of increasingly advanced
technology, so that information security control is needed. Some of these types
of threats include: viruses, system failures, misuse of information by users,
absence of access authorization and theft of access to information (DR
Windriya, H Tanuwijaya, 2014)
Indonesia is a country whose cyber security level is still
weak. This can be seen from several incidents, In Table 2.2 are described that in mid-May 2014 there was
an incident of breaking into the debit card data of a bank that hacked by
infiltrating the bank customer card security system. (Ardiyanti,
2014).
Even according to the Minister of Law and Human Rights,
Yasonna Laoly in a webinar on the Potential Threat of Cyber Crime
for business people, he said that losses due to cyber crime in 2021 will reach
6 trillion USD (Lendong,
2020) Cybercrime crime has increased
significantly along with the increasing number of e-commerce players.
Utilization of internet services and information technology as a running
business platform has the potential to increase cybercrime attacks. One of the existing
cybercrime handling is indeed the existence of cyber law (Pratama,
2013).
In business, the proportion of violations identified as
having attacks is lower (32%) when compared to 2018 (43%) and 2017 (46%) (Department
for Digital, Culture, 2019). The business' findings are
consistent with 2017 when this question first arose. When charities first
surveyed, the survey showed an increase in cybersecurity incidents from 19% in
2018 and 22% in 2019, to 26% in 2020. This fact shows that charities are either
better at identifying attacks or are being targeted. cyber. Of these 46%
cybersecurity incidents, 19% have experienced data or material loss, 39% were
affected by operational and resource disruptions, even causing a wider business
impact. Some charities also reported that 26% of attacks occurred, 25% suffered
material losses and 56% were negatively affected (Department
for Digital, Culture, 2019).
Associated with Cyber Threats Each organization has specific
characteristics against ransomeware attacks depending on the application and
infrastructure owned by the organization. To find out the possible threats that
can attack an organization can be through several approaches.
In creating a threat model there are several approaches that
differ from the means of the device or from the evaluation system(Potteiger
et al., 2016):
1. Attacker-centric: Threats are seen
from the attacker's point of view by determining how the attacker will damage the
system.
2. Asset centered: This threat is seen
from the perspective of the protected asset by determining the threats to the
asset.
3. System-centric: This threat is seen
from the device or system even per component by determining the assessment of
each threat to the component.
Method
The process of Data
Collection is measuring existing condition level and target condition level for
Cyber Security Incident Response on XYZ Organization based on TMPI maturity
level assessment questions. It will be carried out to experts in their fields
related to the categories of questions in TMPI.
Discussion will be
directed to several teams such as:
1. Head
of IT Division for this session discuuss related Crown jewels of XYZ
Organization, TMPI Questions related and Maturity Level Target That needed.
2. IT
Infrastructure Team for this session discuss about infrastructure concern
related to TMPI Questions
3. Application
Team for this session discuss about application concern related to TMPI
Questions
4. Security
Team for this session discuss about security management concern related to TMPI
Questions
5. CSIR
Provider that Handling Insident Respnse in XYZ Organization.
a.
Maturity
Level Currently
From the results of questions aimed at conducting an
assessment of incident handling, a value for the maturity level will be
obtained. The value is determined based on the facts that apply to the CSIR XYZ
Organization. In this stage, an overview of the maturity value of the existing
condition will be obtained so that it is useful for organizations in knowing
the current condition of incident handling.
b.
Maturity
Level Expected
To determine the desired CSIR maturity level, a
discussion will be held with the head of the IT Division. In this discussion,
it is intended to determine management's expectations of the expected CSIR
maturity level of the organization. This maturity level expectation will be
used as a target in increasing the maturity level of the organization.
c.
Gap
Analysis
In this research, researcher will compare the
existing conditions and the expected conditions so that an analysis can be
carried out on the obtained GAP. Furthermore, this research will include
recommendations as a solution in order to fulfill the gap between existing and
expected conditions. The purpose of this research is to be able to improve the
Incident Response and resilience of the organization can be maintained.
And Researcher also tested the recommendations
generated from TMPI by conducting a self-assessment using CRR and seeing the
results of the test whether there was an increase or not.
d.
Evaluation
and Prioritization
In this research, the next step is to analyze and
evaluate the results of the existing GAP between the existing and the expected
using IPA. The results of the analysis carried out using this IPA can help in
this research to determine the focus areas of concern to be improved because
they are inline with the needs of the organization.
e.
Validation
In this research, the validation that will be
carried out is by conducting FGDs together with experts in their fields. This
FGD will be carried out together with experts in their fields so that at this
stage valid recommendations are produced which are proposed in this thesis to
organizations to carry out activities to full fill GAP in areas obtained from
the results of IPA analysis. The objective of this activities are increasing
cybersecurity. According
to (O.Nyumba,
T., Wilson, K., Derrick, C. J., & Mukherjee, 2018), FGD aims to obtain data from a
group of deliberately selected individuals. Focus group discussion usually
yields both qualitative and observational data where analyses can be demanding.
According to (Leech,
N. L., & Onwuegbuzie, 2007).
Results and Discussion
A. Mapping
Result
From the mapping process carried out between NIST, CRR and TMPI, some
similarities and differences between the three frameworks can be conveyed.
Table 4.1 describe about convey some similarities and differences from the
results of the mapping process:
Table
1.
Similarities
and Differences in NIST, CRR and TMPI Mapping Results
No |
Equality |
|
NIST,
CRR And TMPI |
Description |
|
1 |
Sub Categories in
Domains at NIST, CRR and TMPI have many similarities. |
NIST, CRR and TMPI
all talk about Cyber Security, Cyber Risilience and Cyber Security Incident. |
2 |
PR.PT-5: Mechanisms
(e.g., failsafe, load balancing, hot swap) are implemented to achieve
resilience requirements in normal and adverse situations 2.3.6 Has the technical implementation of defense in your organization
included: DMZ implementation, back up/HA (high availability) system and back
up configuration? |
Specifically related
to Resilience and Sustainability, NIST discusses the PR.PT-5 and TMPI Sub
Categories in Question 2.3.6 |
No |
Difference |
|
NIST
dan CRR |
TMPI |
|
1 |
Supply Chain Risk Management (SC): The organization�s priorities,
constraints, risk tolerances, and assumptions are established and used to
support risk decisions associated with managing supply chain risk. The
organization has established and implemented the processes to identify,
assess and manage supply chain risks. RM:G1.Q1 RM:G1.Q2 RM:G1.Q3 RM:G1.Q4 |
TMPI
discussed BIA on criticality points, but prioritization was not carried out
in the preparation phase, but in the response phase. Meanwhile, if there are
assets that are equally critical, they need to be prioritized. TMPI prioritization
is done when situational during the response phase |
2 |
ID.SC-4:
Suppliers and third-party partners are routinely assessed using audits, test
results, or other forms of evaluations to confirm they are meeting their
contractual obligations. EDM:G4.Q1
EDM:G4.Q2 EDM:G4.Q3 EDM:G4.Q4 |
TMPI does not require review/assessment of third parties who are
partners in SOC handling / data analysis / incident handling |
|
PR.DS-7: The development and testing
environment(s) are separate from the production environment CCM:G2.Q7 |
TMPI does not require
the separation between development and production. |
|
PR.IP-6: Data is destroyed according
to policy AM:G6.Q6 AM:G6.Q7 |
TMPI does not set up
for data destroy procedure for sensitive data |
From the above similarities, it can be concluded that the steps in the
phases at TMPI also discussed the domains and sub-domains of Cyber Security and
Cyber Resillience. And especially in Step 2.3.6 of Phase 2 at TMPI, and PR.PT-5
at NIST is very specific about Resillience.
When using a framework that supports cyber security resilience, and this
framework can also measure the existing conditions, targets and gaps that need
to be done, then when we increase the maturity, we will automatically increase
the cyber resilience. The enhanced cyber resilience domain is of course in
accordance with the focus of this framework and the scope of the research,
namely increasing the capability in Incident Response.
B. Data
Collection
This stage will explain how to collect data for this thesis research,
collecting this data through interviews conducted discussions with Head of IT
Division, IT Infrastructure Team, Application Team and Security Team. Bellows
are results from Self Assessment using TMPI.
For this thesis, research will use TMPI. Detailed Table Result Self
Assessment will be attached to the appendix B. This assessment working paper
document refers to the assessment question document owned by TMPI which is used
to assess the existing and expected conditions.
In this data collection process, there are 3 persons involved, namely
from the Application Team, Infrastructure Team, Security Team and 1 Persons
from provider that handle CSIR in XYZ Organization. Self-assessment is carried
out both offline and online within a period of 4 days.
1.
Summary of
Existing Maturity Level
At this stage, the researcher conducted a FGD with the IT Infrastructure
Team, Application Team, Security Team and 1 Person from CSIR Provider. From the
process of implementing joint discussions in this measurement, the Results
Maturity level of TMPI are as Figure 4.1 follows:
Figure 2. The Existing
Result Recapitulation of Maturity Level
From the figure 1. above, it is obtained that several areas require
recommendations for increasing the maturity level value, and it means that
these areas require an increase in incident handling capabilities aimed at
increasing the security level of the organization.
The following is a table 2. summuray of the areas required for
improvement:
Table
2.
Area
Required Improvement
Radar Graphic |
Steps |
||
Fase 1 |
Fase 2 |
Fase 3 |
|
1.1 - Criticality
assessment |
1 |
||
1.2 - Threat analysis |
2 |
||
1.3 - People, Process,
Technology and Information |
- |
||
1.4 - Control
environment |
- |
||
1.5 - Maturity
assessment |
4 |
||
2.1 - Identification |
2 |
||
2.2 - Investigation |
2 |
||
2.3 - Action |
1 |
||
2.4 - Recovery |
4 |
||
3.1 - Incident
investigation |
|
5 |
|
3.2 - Reporting |
2 |
||
3.3 - Post incident
review |
6 |
||
3.4 - Lessons learned |
5 |
||
3.5 - Updating |
2 |
||
3.6 - Trend analysis |
5 |
From the measurement results in phase 1, it can be seen that there are 7
Steps that need to be improved and the most is in the Area Maturity Assessment,
and in phase 2 there are 9 Steps of weakness and the most is in the Recovery
step. And for phase 3 there are 25 Steps that need to be improved and the most
is the Post Incident Review step.
The following is table 3. which describes the existing gap from the
results of the maturity level measurement.
Table
3.
Existing� Fase Maturity Level
Radar Graphic |
Fase 1 |
Fase 2 |
Fase 3 |
1.1 - Criticality
assessment |
2,40 |
||
1.2 - Threat analysis |
2,00 |
||
1.3 - People, Process,
Technology and Information |
3,78 |
||
1.4 - Control
environment |
3,60 |
||
1.5 - Maturity
assessment |
1,55 |
||
2.1 - Identification |
2,44 |
||
2.2 - Investigation |
2,10 |
||
2.3 - Action |
2,37 |
||
2.4 - Recovery |
1,46 |
||
3.1 - Incident
investigation |
1,50 |
||
3.2 - Reporting |
2,37 |
||
3.3 - Post incident
review |
0,77 |
||
3.4 - Lessons learned |
0,67 |
||
3.5 - Updating |
1,70 |
||
3.6 - Trend analysis |
0,60 |
From the average results obtained in the maturity level assessment of
incident handling with TMPI, it can be concluded that there are 6� areas in all Phase 1, Phase 2 and Phase 3
that need attention to make improvement steps. The 6 areas are: Post Incident
Review, Lesson Learn, Maturity assessment, Threat analysis, Trend Analysis, The
Recovery.
And in figure 2, the existing Gap value is described in the form of a
Radar image so that it can be seen in graphic form.
Figure 3. Radar
Existing Matury Level
2.
Summary of
Expectation Maturity Level
From Discussion with Division Head, Researcher get some points from
Expects management for this initial target of CSIR Maturity Level:
a.
The main
target of the organizational maturity level is similar to institutions and
ministries
b.
For
improvement Start from red areas (Weaks Area) but Adjusting to the suitability
of the organization's appetite for resources, budget and organizational
conditions.
And after the re-measurement is carried out, the expected target from
management is obtained to increase the maturity level of the organization.
The Researcher carried out this measurement together with the MSTI
Security and SME Team (VP SME). The focus areas that will be improved are
discussed and set targets to be achieved by referring to the level of the TMPI.
And from figure 3. can be described the results of the implementation of
measurements based on the expectations of the management achieved, represented
by the Security Team and SME MSTI (VP SME).
Figure
4. The Expectation Result Recapitulation of Maturity Level
From the measurement of the targeted maturity level, it is obtained that
the red points have begun to decrease, although some are still red, but it is
because the organization's resources and capabilities require coordination and
readiness from other functions or other institutions, such as an internal audit
program for potential incidents. security, then there is no cooperation with
law enforcement in relation to the applicable positive law.
From the measurement results, it can be described in table 4, in the
table it can be seen how many areas are still weak from each phase of TMPI in
XYZ Organization.
Table 4.
Area After Improvement
Result
Radar Graphic |
Steps |
||
Fase 1 |
Fase 2 |
Fase 3 |
|
1.1 - Criticality
assessment |
1 |
||
1.2 - Threat analysis |
- |
||
1.3 - People, Process,
Technology and Information |
- |
||
1.4 - Control
environment |
- |
||
1.5 - Maturity
assessment |
1 |
||
2.1 - Identification |
1 |
||
2.2 - Investigation |
- |
||
2.3 - Action |
2 |
||
2.4 - Recovery |
2 |
||
3.1 - Incident
investigation |
|
2 |
|
3.2 - Reporting |
- |
||
3.3 - Post incident
review |
- |
||
3.4 - Lessons learned |
2 |
||
3.5 - Updating |
1 |
||
3.6 - Trend analysis |
5 |
From the measurement results in phase 1, it can be seen that there are 2
Steps that still need to be improved in the Area CriticallyAssessment, and in
phase 2 there are 5 Steps of weakness in the Recovery and action steps. And for
phase 3 there are 10 Steps that still need to be improved and the most is the
Trend Analysis step.
Some are still low and still require improvement from the maturity level
assessment, but these conditions are in accordance with management's
expectations. And in Table 5. can be described the value of the target results
of the desired improvement.
Table
5.
Expection
Fase Maturity Level
Grafik Radar |
Fase 1 |
Fase 2 |
Fase 3 |
1.1 - Criticality
assessment |
2,40 |
||
1.2 - Threat analysis |
2,80 |
||
1.3 - People, Process,
Technology and Information |
3,78 |
||
1.4 - Control
environment |
3,60 |
||
1.5 - Maturity
assessment |
2,60 |
||
2.1 - Identification |
2,81 |
||
2.2 - Investigation |
2,47 |
||
2.3 - Action |
2,37 |
||
2.4 - Recovery |
1,99 |
||
3.1 - Incident
investigation |
2,40 |
||
3.2 - Reporting |
2,67 |
||
3.3 - Post incident
review |
2,80 |
||
3.4 - Lessons learned |
1,93 |
||
3.5 - Updating |
2,40 |
||
3.6 - Trend analysis |
1,40 |
And in figure 4. the final result is depicted in the form of a Radar
graphic as can be seen as follows.
Figure
5. Radar Expectation Matury Level
3.
Summary of
Existing Relisiliency Assessment Using CRR
At this stage, mapping of existing conditions to the maturity level of CRR
in the context of incident response is carried out, namely focusing on the
incident management domain.
The measurement of the existing condition of handling in the XYZ
organization is measured using the Assessment from the CRR Tools, and the
results of these measurements are illustrated in Figure 5. as follows:
Figure
6. Existing Resilience CRR Maturity Level
4.
Summary of
Expected Relisiliency Assessment Using CRR
At this stage, a mapping of the expected conditions is carried out
according to the expectation assessment from TMPI by using a simulation of
these conditions against the maturity level of the CRR in the context of
incident response, namely focusing on the incident management domain.
The measurement of the simulation condition from TMPI is measured using
the Assessment from the CRR Tools, and the results of these measurements are
illustrated in Figure 6. as follows:
Figure
7. Existing Resilience CRR Maturity Level
If we look at the results of the maturity level measurement with CRR, it
can be seen that the incident management domain can increase quite
significantly. So that in this test it can be concluded that increasing the
handling of incident management at the TMPI pad can also increase the
resilience level of organizational conditions, especially in this case in the
incident handling area.
C. Data
Analysis
1.
The Gap
Analysis for TMPI
Knowing the GAP is an important step to be able to see and analyze the
Self Assessment results. Based on the literature review results in chapter 2, (Rosmiati
, Imam Riadi , Yudi Prayudi, 2016).
Table
6.
GAP
Maturity Level
Atribut |
Existing |
Expectation |
Gap |
Atribute_Fase1 |
|
|
|
1.1 - Criticality assessment |
2.40 |
2.40 |
- |
1.2 - Threat analysis |
2.00 |
2.80 |
(0.80) |
1.3 - People, Process, Technology and Information |
3.78 |
3.78 |
- |
1.4 - Control environment |
3.60 |
3.60 |
- |
1.5 - Maturity assessment |
1.55 |
2.60 |
(1.05) |
Rata-rata |
2.67 |
3.04 |
(0.37) |
Atribute_Fase2 |
|||
2.1 - Identification |
2.44 |
2.81 |
(0.38) |
2.2 - Investigation |
2.10 |
2.47 |
(0.37) |
2.3 - Action |
2.37 |
2.37 |
(0.10) |
2.4 - Recovery |
1.46 |
1.99 |
(0.53) |
Rata-rata |
2.09 |
2.41 |
(0.32) |
Atribute_Fase3 |
|||
3.1 - Incident investigation |
1.50 |
2.40 |
(0.90) |
3.2 - Reporting |
2.37 |
2.67 |
(0.30) |
3.3 - Post incident review |
0.77 |
2.80 |
(2.03) |
3.4 - Lessons learned |
0.67 |
1.93 |
(1.27) |
3.5 - Updating |
1.70 |
2.40 |
(0.70) |
3.6 - Trend analysis |
0.6 |
1.40 |
(0.80) |
1.27 |
2.27 |
-1.00 |
Based on the table 6, it can be shown that in phase 1 the threat analysis
and maturity assessment factors must be improved, because the
existing/performance is lower than the expectation/importance. On the other
hand, the critically assessment factor; people, processes, technology and
information; and control environment shows that there is no gap between
existing and expectation, so overall in phase 1 there is still a gap of about
0.37 more and must be increased in order to achieve expectation.
2.
The Gap
Analysis for CRR
In this table 7, the changes (both increase/decrease) to the level of
resilience are mapped based on the CRR during the existing TMPI conditions and
the expected TMPI conditions. To prove the hypothesis that increasing incident
response capabilities based on TMPI also increases the level of organizational
resilience.
Table 7.
GAP Maturity Level
Atribut |
Existing |
Expectation |
GAP |
Asset Management |
99% |
99% |
- |
Controls Management |
90% |
90% |
- |
Configuration and Change Management |
93% |
93% |
- |
Vulnerability Management |
94% |
94% |
- |
Incident Management |
48% |
100% |
52% |
Service Continuity Management |
6% |
14% |
8% |
Risk Management External Dependency Management |
100% 4% |
100% 27% |
- 23% |
Training and Awareness |
67% |
83% |
17% |
Situational Awarenes |
0% |
66% |
66% |
In particular, the increase in resilience in the Situational Awareness
area was an increase of 66%, Incident Management 52%, External Dependency
Management 23%, Training and Awareness 17% and the last is Service Continuity
Management 8%.
3.
Priority
Analysis with The Quadrant Performance Analysis Based on TMPI Gap Analysis
Table
According to (CR-SAT) In order to aid companies in the correct definition
of actions and complement the prioritization of these actions a cyber
resilience progression model for SMEs was developed in the methodology. Based
on the literature review results in chapter 2, section 2.8 the determination of
the priority scale is analyzed using IPA tools.
Figure
8. IPA calculation output results in phase 1
Based on the results of the IPA analysis in Figure 4.7, it can be shown
that the variables 1.3 people, process, technology and information and the
control environment variable 1.4 are already in Quadrant II, which means that
both variables have high performance (existing) and important (expected).
Meanwhile for variable 1.1 - Criticality assessment, variable 1.2 -
Threat analysis and 1.5 - Maturity assessment are in Quadrant III, which can be
interpreted as having low importance and performance. The threat analysis
variable can still be improved so that it can be in quadrant I.
Figure
8. IPA calculation output results in phase 2
Based on Figure 8. above, it can be shown that the Step 2.1
identification, Step 2.2 investigation and Step 2.3 Action are in Quadrant II,
which means that both variables have high performance (existing) and important
(expected).
While the variable 2.4 Recovery is in Quadrant III, which shows that The
Recovery it has low importance and not so special performance.
On the other hand, no action is in Quadrant IV, or shows that no step has
a low importance (important/expected), but the performance is high.
Figure
9. IPA calculation output results in phase 3
Based on Figure 9. above, it can be shown that the variables 3.1 incident
investigation, 3.2 reporting, and 3.5 updating are in Quadrant II, which means
that both variables have high performance (existing) and important (expected).
Meanwhile, variable 3.3 post incident review is in Quadrant I, which
means this factor has high importance and low performance. And from this it can
be seen that the Post Incident Review has high management expectations and its
performance still needs to be improved, so that Post Incident Review is a top
priority that needs to be improved so that the program to improve these Steps
will be prioritized first.
Furthermore, for variables 3.4 lessons learned and variable 3.6 trend
analysis are in Quadrant III, which means low priority, or low importance and
low performance. The next priority in phase 3 that requires improvement is
Lesson learned. The condition is that expectations are still quite high and in
terms of performance, it still needs to be improved. From the analysis using
this IPA, a table can be made to sort the priority of the Phases and Steps
expected by management.
And the following is a summary of the GAP Analysis sorted by priority
from the results of the analysis using IPA.
a.
Top Priority
to Improvement
1)
Post Incident
Review
b.
Second
Priorities to Improvement
1)
Lesson Learn
2)
Maturity
assessment
3)
Threat
analysis
4)
Trend Analysis
5)
The Recovery
D. Result
Discussin / FGD
Regarding the implementation of this FGD, referring to Chapter 3.2.7, the
FGD is carried out as follows:
1.
Finding and
Improvement Strategy
In this thesis research, after a Data has been successfully analysis, the
next step is how to make Improvement Strategy. Based on the literature review
results in chapter 2. The following is the result of an analysis of what things
need to be improved against the current condition so that it can be adjusted to
management's expectations.
This recommendation is made based on the weakness of the stages obtained
during the maturity level assessment with TMPI. Recommendations are obtained by
analyzing existing and expected conditions by strengthening the GAP analysis
between the conditions desired by management using IPA.
To formulate the recommendations needed in this research by looking at
the requirements of the Basis of Assessment which is a reference in the
existing and target/Expectation assessments as outlined in Table 11.
The determination of the recommended activities that are formulated as
solutions for improvement was also discussed with several teams involved in
Operations in the TMPI assessment process.
Evaluation results This recommendation was submitted by the researcher
for validation and expert opinion to ensure that the recommendations that have
been made are indeed feasible and in accordance with TMPI and Management's
expectations.
�� Refer to Chapter 4.2.2 has been
explained related to the direction of management in formulating recommendations
for improvement of this TMPI, namely:
a.
The main
target of the organizational maturity level is similar to institutions and
ministries
b.
For
improvement Start from red areas but Adjusting to the suitability of the
organization's appetite for resources, budget and organizational conditions.
And the Division Head said to discuss technical matters with the Security
Team in the details of the proposal that would be formulated and reviewed or
validated by SME IT.
�� This management directive has
been discussed with BSSN regarding the organizational strategy in increasing
the maturity level of this TMPI, and BSSN said that the strategy can be carried
out according to the Appetide of the organization and BSSN added that for the
Ministry or institution or agency it is expected to have a maturity level
between 2.2 to 3.0.
And in the proposal in table 4.8, recommendations for CSIR improvement
have been formulated with reference to the direction of the Division head as
stated above.
These recommendations have been analyzed and discussed with the experts,
namely HGF, HD and FH. From the existing FGD process, the experts agreed that
the proposed recommendations were appropriate to be used to make improvements
based on the TMPI.
In this FGD there are 2 suggestions for additional analysis, namely:
a.
Grouping recommendations
based on 3 categories, namely Documents, Capability and Activity.
b.
It is proposed
to test the results of the recommendations on the CRR measurement to test the
relationship with Resilience.
2.
Validation
The validation process will be carried out by conducting interviews with
5 Subject Matter Experts who are experienced in the field of Security. The
selection of people is based on an area that is intended to complement from
several sides, so that their Opinions and Suggestions can better meet the
required aspects.
The implementation is divided into 2 parts, First in the form of a joint
FGD consisting of 1 expert from the internal organization who handles CSIR
Operations, 2 experts from external but who are involved in handling CSIR in
the organization where 1 person is involved in CSIR Operations and 1 person is
a consultant from the third party of the establishment of the CSIR in the
organization.
Based on the results of the FGD, it was obtained the opinion of Bapak HGF
that:
a.
TMPI can be
used to measure the maturity level of an organization's incident handling,
because the questions used for assessment are detailed in the incident handling
area.
b.
TMPI can be
used to map activities aimed at improving incident handling within an
organization. With TMPI it can be seen which areas are still weak so that
activities can be carried out for improvement in accordance with the
expectations of the organization.
Within the XYZ organization itself, activities related to collaboration
with non-IT parties or external parties have also become activities that are
still not supported by management, and this can be seen from the mapping at
TMPI that occurred. It is hoped that TMPI and BSSN can be a factor to convince
management regarding this matter. I hope that TMPI also conveys the risk if a
domain or activity is not carried out as an illustration that makes it easier
for management to reconsider.
c.
I agree with
determining the priority by giving priority based on the expectations and
existing points given. Thus helping the organization in determining which
activities should take precedence.
d.
Based on
observations and evaluations where I participated in these activities using
TMPI (incident response capability) and CRR (organizational resilience
capability), the XYZ organization is indeed still weak in terms of incident
handling execution, this can be seen during the assessment using CRR where the
Incident Management & Continuity domain it really needs to be improved. So
in this case we can conclude that increasing TMPI can also increase the level
of resilience of the organization.
And based on the FGD, the researcher received the opinion of� Bapak HD as follows:
a.
TPMI in my
opinion can be used as a way to measure the maturity level of handling security
incidents, because the existing questions lead to existing conditions and open
a perspective on handling a security incident and what conditions must be
achieved in a company.
b.
I think TMPI
is very able to map incident response activities with existing questions and
open opportunities to provide improvements that must be developed and provide
measurable conditions in the XYZ organization
c.
What I see is
that IPA is very helpful for organizations to see the existing priority scale
and provides an overview of the points that must be improved both in terms of
expectations or existing conditions so that the manpower and resources, both
material and non-material, deployed by the XYZ organization can more focused
and on target.
d.
From the
existing data, it is clear that incident management has made a significant
contribution and has also increased in several other points.
And based on the FGD, the researcher got the opinion from Bapak FH as
follows:
a.
The internal
TMPI measurement method that is carried out is intended to measure the CSIR
maturity level of an organization with several levels in three stages of
maturity phase, making it easier to assess the maturity of the organization
towards incident handling
b.
With the phase
level and assessment points in it, the organization can assess the weaknesses
and strengths of incident handling so that the organization can purposefully
make improvements to visible weak points.
c.
With IPA the
results make the organization see in priority the most important things to be
improved so that it can manage resources to improve the things that are the
highest and highest priority
d.
It can be seen
that the increase in maturity also increases the maturity level of the CRR
because one of the CRR points is incident response which is measured
specifically at TMPI.
For validation, the 2 researchers conducted interviews with 2 Experts
separately, by explaining the methodology and the results obtained from the
existing implementation, the opinion of Bapak BW was obtained. Researcher took
his opinion because he was one of the people who followed the development
process of the TMPI implementation process in Institutions/ Agencies/
Ministries and Companies in Indonesia. The opinions expressed are as follows:
a.
Because the
main focus of CSIR is the ability to respond and manage incidents. Maturity in
handling incidents will also increase CSIR maturity. One of the parameters in
measuring csirt maturity is the ability to respond/handle incidents.
b.
Parameters for
measuring TMPI maturity can be used as a mapping of what activities should/need
to be done to improve the ability to handle incidents and this will have an
effect on increasing CSIR maturity.
c.
This IPA is
very helpful in making priorities that are an important part of incident
response in conducting incident triage, determining asset
classification/criticality and incident classification. Using quadrants in IPA
can greatly help with this priority.
d.
Because one of
the important components of Resilience is the ability to handle incidents.
And one of the SME's that the researcher took his opinion on is Bapak SW,
who has worked at the XYZ Organization for 19 years and his current position is
as an SME in Information Technology. The division head provides direction for
the recommendation results to be validated from the opinion of the Internal SME
and His opinions are as follows:
a.
TMPI pays
great attention not only to the aspect of fulfilling technology, but also other
areas such as compliance with Standard Procedures, Learning Processes,
Habituation in dealing with incidents and many things that currently XYZ
organization is still not optimal in carrying out these things. So that from
TMPI, new insights will be obtained that open up ideas for activities for
improvement and of course very useful in efforts to improve the ability of incident
handling.
b.
Management
expectations are something important as a basis for carrying out activities so
that the activities carried out are in accordance with the needs of the XYZ
Organization, as an analogy that there are many cutting-edge technologies in
the market but not the most up-to-date technology that will be adopted for the
company, but appropriate technology. with the company that will be implemented,
because IPA does map the current level of performance with Management's
Expectations, I think that this is the right thing.
c.
Seeing the
results of measurements carried out at TMPI and the proposed activities are
simulated and the results can increase the results of measurements in CRR, of
course this is one of the evidences in this case that resilience can also
increase.
From the validation results, the researcher can propose that this
Methodology can strengthen the hypothesis:
a.
The
Methodology can increase the maturity and capability of the CSIR to the
expected Target based on the maturity level assessment
b.
The
methodology can increase the maturity of the CSIR as expected by determining
some recommendations for improvement
c.
With the
increasing maturity of TMPI in the case of the XYZ organization, the level of
organizational resilience as measured by CRR in the context of incident
response also increases.
Kesimpulan
Based on the maturity
level assessment using TMPI in chapter 4, this can help XYZ organization to
determine what steps can be taken to improve incident handling that is
currently being developed by the organization. Chapter 4 can also assist the
organization in determining the priority of the program to be carried out so as
to assist the organization in determining which of the activities to be carried
out first and helping to determine the annual work program in the future.
Based on the results of
validation through FGDs and interviews, experts said that measuring maturity
level with TMPI can see more fully and help map the shortcomings of the
organization's current incident handling and help determine the right work
program to improve current incident handling.
Related to the IPA
analysis in this research to help provide an overview to the management of the
current performance achievements with the target management expectations with
the Prioritization. From here, the researcher can provide input to the management
of programs that are really needed in improving incident handling, adjusted to
suitable management targets in determining the ability of incident handling.
Ardiyanti, H. (2014).
Cyber-Security dan Tantangan Pengembangannya di Indonesia. Politica,
95�110.
Balan, S, Otto, J,
Minasian, E & Aryal, A. (2017). Data analysis of cybercrimes in
businesses�, Information Technology and Management Science. 20(1),
64�68.
Bodeau, D. J., &
Graubart, R. (2011). Cyber Resiliency Engineering Framework.
Cloppert, M. (2009). Security
Intelligence: Attacking the Kill Chain. SANS Computer Forensics and Incident
Response Blog. Http://Computer-Forensics.sans.Org/Blog/2009/10/14/Security-Intelligence-Attacking-the-Kill-
Chain/.
Creasey, J. (2013). Cyber
Security Incident Response Guide Version 1 2 Cyber Security Incident Response
Guide DTP notes A Good Tip A Timely Warning An insightful Project Finding.
Daniri, M. A. (2008).
Standarisasi tanggung jawab sosial perusahaan. Indonesia: Kadin Indonesia,
2(1), 1�36.
Department for Digital,
Culture, M. and S. L. (2019). Cyber Security Breaches Survey.
DR Windriya, H
Tanuwijaya, E. S. (2014). Audit Keamanan Sistem Informasi pada Instalasi Sistem
Informasi Manajemen RSUD Bangil Berdasarkan ISO 27002. JSIKA.
Ferdinand, J. (2015).
Building organisational cyber resilience: a strategic knowledge-based view of
cyber security management. Journal of Business Continuity & Emergency
Planning, 9(2), 185�195.
Herdiana, Y., Munawar,
Z., & Putri, N. I. (2021). Mitigasi Ancaman Resiko Keamanan Siber di Masa
Pandemi Covid-19. Jurnal ICT: Information Communication & Technology,
20(1), 42�52.
Indarta, Y., Ranuharja,
F., Ashari, I. F., Sihotang, J. I., Simarmata, J., Harmayani, H., Algifari, M.
H., Muslihi, M. T., Mahmudi, A. A., & Fatkhudin, A. (2022). Keamanan
Siber: Tantangan di Era Revolusi Industri 4.0. Yayasan Kita Menulis.
Leech, N. L., &
Onwuegbuzie, A. J. (2007). array of qualitative data analysis tools: A call
for data analysis triangulation. School Psychology Quarterly.
Lendong, L. G. N.
(2020). Kerugian Akibat Cybercrime di 2021 Diprediksi Akan Tembus 6 Triliun
USD - Tribunnews.com.
O.Nyumba, T., Wilson,
K., Derrick, C. J., & Mukherjee, N. (2018). The use of focus group
discussion methodology: Insights from two decades of application in
conservation. Methods in Ecology and Evolution,. 9, 20�32.
https://doi.org/https://doi.org/10.1111/2041-210X.12860.
Permana, A. (2021). Indonesia�s
Cyber Defense Strategy In Mitigating The Risk of Cyber Warfare Threats
(Vol. 3, Issue 1).
Potteiger, B., Martins,
G., & Koutsoukos, X. (2016). Software and attack centric integrated
threat modeling for quantitative risk assessment. 99�108.
https://doi.org/10.1145/2898375.2898390.
Pratama, E. A. (2013).
Optimalisasi Cyberlaw untuk Penanganan Cybercrime pada E-commerce. Jurnal
Bianglala Informatika.
Setiawan, M. B., &
Nugroho, A. (2016). Penerapan Konsep Continuous Auditing: Studi Kasus Audit
Kepatuhan Terhadap PTK 007 di SKK Migas. Info Artha, 5(1),
107�126.
Tri Aryadi. (2018). Indonesia�s
survival in age of cyber warfare - Opinion - The Jakarta Post.
Windiani, R. (2017).
Peran Indonesia dalam memerangi terorisme. Jurnal Ilmu Sosial, 16(2),
135�152. https://doi.org/10.14710/jis.16.2.2017.135-152.
Copyright holder: Rachmat Budijanto (2022) |
First publication right: Syntax Literate: Jurnal
Ilmiah Indonesia |
This article is licensed under: |