Syntax Literate: Jurnal Ilmiah Indonesia p�ISSN:
2541-0849
e-ISSN:
2548-1398
Vol.
7, Special Issue No. 2, Februari 2022
ANALYTICAL AND EVALUATION CAPABILITY LEVEL OF
KNOWLEDGE MANAGEMENT FOR PENETRATION TESTER KNOWLEDGE PRESERVATION USING
COBIT�5 SELF-ASSESSMENT IN AN IT SECURITY COMPANY
Andriko Perdana, Mohammad Achmad Amin Soetomo,
Charles Lim
Swiss German University Indonesia
Email: [email protected], [email protected],
[email protected]
Abstract
���� The purpose of this study is to standardize work roles and their level of proficiency and to determine the ability of Knowledge Management in preserving Pentester Knowledge using Confluence� at XYZ Company. The data used and processed in this study were obtained from interviews and observations with the principal for work roles. The results of standardization of job roles are obtained by mapping using the NICE Framework, and proficiency levels can be mapped using the CIISec Framework. Knowledge Management capability assessment is carried out using COBIT�5 Domain APO07 (Manage Human Resources and BAI08 (Manage Knowledge). Observations and interviews are carried out in the order of data collection where respondents are represented by IT Director, HR Head, Confluence Manager, Sales Department Chair, and Team IT Governance The result of Capability Level is 2 (Managed Process), meaning that IT Governance at the time of implementing Knowledge Management has generally been carried out with planning, monitoring and adjustment, but several processes have not yet been implemented, have been presented to the Company's management as feedback and recommendations for improvement of planning process.
Keywords: cobit�5; nice framework;
ciisec; knowledge management system; knowledge
capability assessment.
Introduction
Like in other countries, the digital
economy is currently multiplying in Indonesia, where new companies and
start-ups compete to provide digital services as part of their business development.
Indonesia is the largest digital economy market or internet economy in
Southeast Asia (Prayoga, 2020).
IT security projects to ensure data security and applications are popping up a
lot. Many government and private organizations, manufacturing industries, and
small and medium-sized industries are scrambling to implement them. For
example, 13.7 million of those MSMEs have utilized digital technologies in
their business activities (Liputab6.com., 2021).
Many systems and applications are created and can be accessed by the public
through the internet. But the contrast is that cyber security engineers are
limited in number as many companies try to recruit and maintain their talent.
Along with this growth of
technological adoption, cyber-attacks are also multiplying. From 28,430,843
attacks in 2015, the number became 135.672.984 attacks in 2016 (Assidiq, Hasbi, 2020).
In 2021, Cisco discovered that one-third of Indonesian SMEs suffered from
cyberattacks. Financial loss caused reached $1 million (Jakartapost.com., 2021).
Consequently, the requirement for cybersecurity experts also surges and causes
a lack of talent. CEO of PT Xynexis International
stated that Indonesia needs a lot of cybersecurity talents. The Company also
collaborated with Kominfo to search for thousands of
cybersecurity talents in (Suhartadi, 2016).
Besides the positive impacts for I.T.
security companies in terms of growth and revenues, surges in need of
cybersecurity experts also mean a higher turn-over rate for such a company.
According to Washington Post, there are nearly 465,000 unfilled cyber jobs in
the USA, according to data gathered under a Commerce Department grant (Joseph Marks., 2021).
And according to 2021 (ISC)� Cybersecurity Workforce Study (Cybersecurity, I S C, 2021)
the world has a shortage of 2.7 million cyber security professionals to defend organizations
adequately. ((ISC)� stands for International Information System Security
Certification Consortium).
XYZ Company is an I.T. Security
company owned by a U.S. investment group in Dubai (UAE). XYZ company has been
serving I.T. security since 2004. The Company has helped with more than 450
projects. Since 2017, XYC company has expanded I.T. security services to other
countries in Asia Pacific such as Singapore, Thailand, UAE & Australia.
The turn-over rate has become a
significant issue many cybersecurity companies have to deal with lately. Any
companies cannot forbid some employees planning to leave a company to seek a
better future. Especially for the millennial generation, salary and
compensation and employee involvement did not significantly influence turn-over
intention� (Frian, Antonio, 2018).
Although employees leave their companies is inevitable, companies must maintain
their competitiveness. In today's economy, Knowledge has become a considerable
asset for companies.
Moreover, with a high rate of
employee turnover in the XYZ Company, it is crucial to retain Knowledge
accumulated from past Research or projects. The list of turn-over of the
Company's employees in the last three years can be seen in table 1.1.
Table 1
Number of Resign Employers
Year |
Number of resign employee |
2019 |
5 (1 principal, 2 Sr pentester,
and 2 pentester) |
2020 |
3 (1 Sr. Pentester,
1 pentester, and 1 Jr. pentester) |
2021 |
3 (1 pentester,
and 2 Jr. Pentester |
Knowledge Management develops systems and processes for
acquiring and sharing intellectual property and collecting Knowledge. It aims to
increase the amount of valuable, practical, and meaningful Information and
increase learning for both individuals and teams. Additionally, knowledge
management can maximize the value of an organization's intellectual foundation
beyond function and location. In short, knowledge management is the process of
sharing perspectives, ideas, experiences, and information in the right place
and at the right time.
Research Method
NICE and CIISec frameworks are used
as the basis of the current study's Qualitative Research to map and assess XYZ
Company Pentesters KSA with guidance from NIST (NIST., 2021)
COBIT� 5 processes APO07 and BAI08 are used to perform a qualitative analysis
of the Company's KSA management tool (Confluence�) with COBIT� 5
Self-assessment guidance (ISACA 2013b., 2013).
The research method is limited to close interviews and submission of
questionnaires by stakeholders, Interviews and Observation (Based on RACI), and
self-assessment questionnaires to Top Management and the I.T. governance team
(Research schedule can be seen in the appendix C)
There are four milestones to be
achieved in the research flowchart, as shown in Figure 1:
1. Mapping work roles from
the current Pentesters work role and NICE Framework.
2. The mapping Proficiency
level of KSA using CIISec Skills Framework
3. Conduct Knowledge
Management capability assessment using COBIT� 5 processes
4. Conclusion and
Recommendation
Figure 1
Research Method flowchart
1.
Step 1 - Mapping work
roles from the current XYZ company�s Pentesters work
role and work roles from NICE Framework.
Principals and Senior Pentesters
assist this step. They review the mapping work roles between the current and
the NICE Framework. The result will be the work role from NICE Framework that
has similarity function with current Pentesters work
roles.�
2.
Step 2 - Mapping
Proficiency level of KSA using CIISec Skills
Framework.
In this step, with the
help of Principals and Senior Pentesters and validated
with the H.R. department and Sales Department, the Researcher will set and
measure current KSA proficiency level using the CIISec
Skills Framework (�CIISec Skills Framework.,� 2019)
The result of this step is current level of KSA Proficiency. The H.R. department
involved validating the effect while the Sales department applied to have
feedback on current competencies required to conduct I.T. Security Project from
clients. The sample result in this step is shown in table 2.
Table 2
Sample result of
KSA proficiency level
This step will produce KSA Proficiency Level
of XYZ Company Pentesters preserved in Confluence�
(figure 2).
Figure 2
Steps to produce KSA Proficiency Level
3.
Step 3 -
Knowledge Management Capability assessment
Knowledge Management
Capability assessment will be conducted using COBIT� 5 Self-Assessment for
APO07 (Manage Human Resources) and BAI08 (Manage Knowledge).
This step is to
measure the current Capability level of Knowledge Management of the Company to
support the preservation of Pentesters KSA. In this step, the assessment will
use questionnaires from COBIT� 5 Self-Assessment (Figure 3.3 and Figure 3.4).
The result of this step is the current capability level and Action Plan for
Process improvement will be planning in this step (Figure 3.5). Based on
guidance (ISACA 2013b., 2013) assessment is
undertaken by s small team of I.T. Management consists of Top-level Management,
H.R. Head, Confluence Manager and a representative from the I.T. Governance
team.
Figure 3
Step 3 using COBIT�5
Self-Assessment
4.
Step 4 -
Conclusion and Recommendation������
In this
step, we will conclude the result of the Research and provide a recommendation
for KSA Proficiency Mapping Result� (Step
1 & 2) and� Process improvement that
planned in step 3 (figure 3.6). (The detail research activities can be seen in
Appendix D)
Figure 4
Step 4
Results and Discussion
1.
KSA
Proficiency Level Mapping Result
From a series of
interviews and discussion with principals and senior consultants, all agreed
that NICE Framework KSA items is easier to be implemented then CYBOK. Based on
the NICE Framework assessment, penetration testing roles in XYZ Company
comprise two (2) Work Roles defined by the NICE Framework. They are
Vulnerability Assessment Analyst (PR-VAM-001) and Cyber Defense Analyst
(PR-CDA-001) (Table 2.6 dan table 2.7). Both these roles are under Protect and
Defend (P.R.) category.
As defined by
the NICE Framework, the P.R. category is responsible for identifying,
analyzing, and mitigating threats to internal information technology systems
and networks. As for the identified Work Roles, Vulnerability Assessment
Analyst (VAM) and Cyber Defense Analyst (CDA), NICE Framework defined them as:
Vulnerability
Assessment Analyst (PR-VAM-001): Uses data collected from a variety of cyber
defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze
events that occur within their environments for the purposes of mitigating
threats ().
Cyber Defense
Analyst (PR-CDA-001): Performs assessments of systems and networks within the
network environment or enclave and identifies where those systems/networks
deviate from acceptable configurations, enclave policy, or local policy.
Measures effectiveness of defense-in-depth architecture against known
vulnerabilities.
Table 3
Cyber Defense Analyst Work Role
Detail
There is
knowledge that required in XYZ company but not available in NICE Framework work
roles but added in KSA Mapping result (Table 4)
Table 4
Additional knowledge from
other work roles
Knowledge |
Detail |
Work roles in NICE Framework |
K0523 |
Knowledge of product and nomunclature of major vendors (e.g., security suites �
Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products
affect exploitation and reduce vulnerabilities |
Exploitation analyst |
K0529 |
Knowledge of scripting |
Exploitation analyst |
K0555 |
Knowledge of TCP/IP networking protocols |
Target Developer |
K0561 |
K0621Knowledge of the basics of network
security (e.g., encyption, firewalls,
authentication, honey pots, perimeter protection) |
Target Developer |
K0621 |
Knowledge og
risk scoring |
Target Developer |
The
mapping results obtained are 99 KSA items divided into 64 knowledge items, 26
skills items, and 9 abilities items. The results of this KSA Proficiency mapping
provide an overview of the current KSA proficiency level condition of the
Pentesters. The result is shown this table 4 below.
Table 4
is taken from documents containing the results of mapping the knowledge, skills
and abilities of the pentester. This document was created by the researcher
based on the mapping of work roles from the NICE Framework tool provided by
NIST (NICE Framework Owner). The Proficiency level filled by interviewing
Principals using references from the CIISec Framework and the whole results are
validated again by Principals. The results of the mapping so far have been
quite satisfactory for the company after the results were presented to
Management. Especially for principals, it is considered sufficient to guide
Pentesters whose KSA level is below them. Given that one work role in a company
is a combination of 2 work roles in the NICE Framework.
2.
Action Plan
for KSA Proficiency Level Improvement
There is some
action planning recommended by researcher. The first recommendation is to start
standard cyber security workforce for work roles in the company. The other is
to maintain and upgrade KSA Proficiency level to deal with future trends of the
cybersecurity industry, and promote more Junior pen-testers to become
pen-testers and senior pen-testers. Currently, only Pentesters, Senior
Pentesters and Principals Mondays can be sold to the clients when conducting projects.
Junior pen-testers only work as an assistant for roles above them.
To do that
Researcher has recommend a performance review to XYZ Company. Reviewers consist
of the Project Manager, their Supervisor and the H.R. team. The performance of
Penetration testing consultants will be measured based on their achievement in
each project using a scorecard.
To measure the
score of each project, we create a Microsoft Excel (Picture 4.1) file that
consists of measurement on technical skills and soft skills. List of
measurement items made based on input from Project Manager, Principal Level
Consultants and H.R.
The
score is divided into five criteria:
1. Quality
of finding (technical skills)
2. Quality
of report (technical skills)
3. Job
knowledge (technical skills)
4. Interpersonal
(soft skills)
5. Leadership
(soft skills).
Figure 5
Scoring Card
Every
time a project closes, Principals, together with the project manager and H.R.,
will give a score for every team member based on their performance when
involved in the I.T. Security Projects. H.R. Team will collect the score.
The
Researcher also proposed and discussed with the H.R. department to have rewards
based on scores collected using the scoring card, and the result is shown in
table 5.
Table 5
Scoring references for reward
Current Level |
Next Level |
Point |
Time Duration |
Junior Consultant |
Consultant |
Min 6500 24 Project a
year with average score per project 90 |
3 years |
Consultant |
�Sr. Consultant |
Min 11000 |
5 years |
Sr. Consultant |
Principal |
Min 15000 |
7 years |
3.
Self-Assessment
Result for APO07 Manage Human Resources
The process of
managing human resources focuses on ensuring the arrangement, optimal
placement, decision, and human resource skills. The result for Self-assessment
showed in figure 4.2 after being filled by Management Representative (The
Self-assessment form result is available in the appendix A).
Figure 6
APO07 Achievement Level
Based on the
data on the achievement of the level of each process, the calculation of the
average capability levels is as follows.
Level 2 means
that XYX Company Process Capability level is managed. The performed process is
now organised (planned, monitored and adjusted), and its work products are
appropriately established, controlled and maintained.
XYZ company have
not set the capability level target for APO07 yet since this research is the
first assessment for it. Since COBIT� 5 have level 5 as the highest capability,
if we compare with current achievement, the gap will be 3 (Figure 4.3).
Figure 7
Gap Capability analysis
for APO07
4.
Self-Assessment
Result for BAI08 Manage Knowledge
The Manage
Knowledge process focuses on maintaining the availability of relevant, current,
and validated Knowledge that can be trusted to support all process activities
and facilitate decision making. The total result for Self-assessment showed in
figure 4.4 after being filled by Management Representative (The Self-assessment
form result is available in the appendix B).
Figure 8
PA 2.2 Summary of Capability level Assessment of BAI08
Based on the data
on the achievement of the level of each process, the calculation of the average
capability levels is as follows.
Level 2 means
that XYX Company Process Capability level is managed. The performed process is
now organised (planned, monitored and adjusted), and its work products are
appropriately established, controlled and maintained.
XYZ company have
not set the capability level target for BAI08 yet since this research is the
first assessment for it. Since COBIT� 5 have level 5 as the highest capability,
if we compare with current achievement, the gap will be 3 (Figure 4.5).
Figure 9
Gap Capability analysis
for BAI08
5.
Action
Plan for Knowledge Management Process (APO07 and BAI08) Improvement
The resulting
research from the assessment has been gathered and informed to the XYZ Company
Management. The meeting is conducted to discuss the result and the action plan
based on COBIT�5 Self-Assessment guidance. The main result is the management
focus will not set target level or level up the current Capability Level but
more to focus on improvement where investment for the action plan can be
measured. Both actions for processes are shown in table 4.6 and table 4.7.�
The Management
also conduct some action as response of the result, which are:
� Establish Internal Academy as Knowledge sharing
center that act as internal training center to prepare internship employees, new
hire employees and current employees to learn a lot of knowledge in IT Security
that will be mentored by Principals and Senior Pentester. This is as additional
to current Confluence� to improve current Knowledge Management Process (BAI08).
� Hire talent manager and Human Capital expert
for planning Human Capital development for XYC Company to improve current Human
Resources Management (APO07).
6.
Validating
Validity is used
as a measure of the quality of a study. The study is considered objective if
someone comes to the same analysis using the same working method. The validity
of the survey indicates the extent to which the level of interpretation and
concept obtained has appropriate implications between the Researcher and the
participants.
a.
Expert
Validation with COBIT�5 Certified Consultant
Based on
discussions with Siti Kamila (COBIT�5 Certified number:04023484-01-PXG4) and
XYZ Company IT Governance Team. The result is also presented to the Top
Management.
it can be summarized
as follows:
� The Assessment of Processes (APO07 & BAI08)
in the research framework providing a good view of Capability Level assessment
since the guidance from COBIT�5 is followed.
� The data obtained and analysed using COBIT�5
can provide a picture of the current Capability Level of Knowledge Management.
� The questionnaire was filled correctly using
Self-Assessment tool provided by ISACA.
� The result based on judgment by Management
Representative (Top Management, H.R Head, Confluence Manager, and IT
Governance).
� The Top Management has received the result and
use it as feedback and have plan to conduct the assessment as annual activity
that need to be conducted by IT Governance team although the assessment only
for Pentesters not all IT Security workforce of the company.
b.
Expert Validation
with H.R Head and Internal CPHCM consultant
Based on
discussions with Donny Silangit (H.R. Head of XYZ Company) and Robby Anzil
Firdaus (CPHCM Certified) and presented to the top Management, their opinion on
the research result is as follows:
� The research framework can provide an overview
of the current KSA Proficiency Level of the Pentesters, which Management needs.
And their Feedback: It should be conducted to other consultants like I.T.
Governance, Forensics, Threat Hunting, and Fraud Intelligent team.
� The work roles result mapping from NICE
Framework can represent the current work roles condition in the Company.
� The Proficiency Level can describe the
competencies of the Pentesters team where the team competencies for IT. Pentest
Projects suits the client requirement.
� The result has received by Top Management as
feedback for future improvement
7.
Observation
In this thesis,
the researcher immerses himself in the setting where the respondent is, while
taking notes, because the researcher is the Project Manager who sees,
supervises and lead the Pentesters directly in the implementation of the IT
Security project. As part of the company with 4 years of experience is used to
help map out work roles and directly involved in daily process of Knowledge
Management within the company has given the researcher enough information for
conduct capability assessment. The research is going well in terms of data
collection, interview process and presentation process,� because this research is supported by XYZ
Company Management since the beginning. A lot of companies do not agree and
support their employees� competencies capability measured and published as
thesis, since the employee competencies sometimes are compared against other
companies to have winner in the bidding process where the winner will get the
project. This information is used to be kept confidentially . The company
accepts research results with open arms as part of improvement feedback for the
company.
Conclusion
Work roles in the XYZ Company can be mapped using NICE
Framework, Proficiency level of each work roles can be measured using CIISec Framework, The results of COBIT� 5 Self-Assessment
for the Capability level of Knowledge Management is in level 2 (Managed
service), If work roles and proficiency level are using standard frameworks, it
can be measured its capability and its improvement using any frameworks, Although
COBIT 5 Self-assessment is a precursor to more rigorous, evidence-based
assessment but enough to assess the capability level for a system, so that the
company can take further action, and COBIT� 5 have limitation for providing
processes on how to measure costs and time to level up Capability level of
Knowledge Management.
Assidiq, Hasbi, and Armelia Syafira. (2020). Qualifying
Cyber Crime as a Crime of Aggression in International Law. Google Scholar
�CIISec Skills Framework.� (2019). CIISec
Skills Framework. Google Scholar
Cybersecurity, I S C, and Workforce Study.
(2021). A Resilient Cybersecurity Profession Charts the Path Forward. Google Scholar
Frian, Antonio, and Fransiska Mulyani.
(2018). Millenials Employee Turnover Intention In Indonesia. 11(3).
Google Scholar
ISACA 2013b. (2013). COBIT Self-Assessment
Guide: Using COBIT 5. Google Scholar
Jakartapost.com. (2021). Cyberattacks
Crippling Indonesian SMEs: Study. Google Scholar
Joseph Marks. (2021). The Cybersecurity
202: The Government�s Facing a Severe Shortage of Cyber Workers When It Needs
Them the Most. Google Scholar
Liputab6.com. (2021). 13,7 Juta UMKM
Indonesia Telah Gunakan Platform Digital Untuk Berjualan. Google Scholar
NIST. (2021). NICE Framework
Competencies : Assessing Learners for Cybersecurity Work. Google Scholar
Prayoga, Fadel. (2020). Indonesia Jadi
Target Pasar Ekonomi Digital Terbesar di Asia Tenggara. Google Scholar
Suhartadi, Imam. (2016). Indonesia
Kekurangan Bakat Cyber Security. Google Scholar
Copyright holder: Andriko Perdana, Mohammad Achmad Amin Soetomo, Charles Lim (2022) |
First publication right: Syntax Literate: Jurnal Ilmiah
Indonesia |
This article is licensed
under: |