NSOC-VM: Kerangka Kerja Manajemen Kerentanan pada National Security Operation Center
DOI:
https://doi.org/10.25126/jtiik.2025126Kata Kunci:
IIV, NSOC, manajemen kerentanan, NSOC-VM, metode PDCAAbstrak
Keamanan siber merupakan aspek penting dalam penyelenggaraan Infrastruktur Informasi Vital (IIV), yaitu sekumpulan infrastruktur strategis yang berdampak signifikan apabila mengalami gangguan. National Security Operation Center (NSOC) berperan sebagai pusat operasi keamanan siber nasional yang memberikan layanan keamanan bagi IIV. Di Indonesia, IIV menghadapi tingkat kerentanan dan ancaman siber yang tinggi, sementara pengelolaan kerentanannya masih menghadapi berbagai tantangan. Saat ini, belum tersedia kerangka kerja khusus yang mengatur pelaksanaan siklus manajemen kerentanan di NSOC untuk pelindungan IIV. Penelitian ini bertujuan untuk mengusulkan kerangka kerja National Security Operation Center-Vulnerability Management (NSOC-VM) yang dirancang untuk membantu NSOC dalam melakukan pengelolaan kerentanan. Kerangka kerja ini disusun dengan pendekatan Plan-Do-Check-Act (PDCA) dan dilengkapi dengan rekomendasi penerapan berdasarkan beberapa standar keamanan siber. Validasi dilakukan oleh sepuluh pakar yang memiliki keahlian dalam pelindungan IIV, operasional NSOC, dan manajemen kerentanan. Hasil penelitian menunjukkan bahwa kerangka kerja terdiri atas empat tahapan, sepuluh aktivitas utama, dan tiga puluh lima rekomendasi implementasi. Berdasarkan validasi yang dilakukan, kerangka kerja tersebut disetujui oleh para pakar sehingga dapat diterapkan oleh NSOC dalam mendukung pelindungan IIV di Indonesia.
Abstract
Cybersecurity plays a pivotal role in safeguarding Critical Information Infrastructure (CII), which comprises strategic assets whose disruption could significantly impact national stability. The National Security Operation Center (NSOC) serves as Indonesia’s central entity for cybersecurity operations, providing protection and response capabilities for CII. However, CII in Indonesia continues to face high levels of cyber threats and vulnerabilities, while the implementation of comprehensive vulnerability management practices remains limited. Furthermore, a dedicated framework governing the vulnerability management lifecycle within the NSOC context has yet to be established. This study proposes the National Security Operation Center–Vulnerability Management (NSOC-VM) framework to enhance the effectiveness of vulnerability management activities at the NSOC. The framework is structured using the Plan-Do-Check-Act (PDCA) methodology and incorporates implementation recommendations aligned with recognized cybersecurity standards. Validation was carried out through expert judgment involving ten professionals with expertise in CII protection, NSOC operations, and vulnerability management. The validated framework consists of four phases, ten key activities, and thirty-five implementation recommendations. The experts confirmed the framework’s applicability and relevance, indicating its potential to support NSOC operations in strengthening CII protection in Indonesia.
Downloads
Referensi
AFERUDIN, F., & RAMLI, K. 2022. The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia. Budapest International Research and Critics Institute (BIRCI-Journal). https://doi.org/10.33258/birci.v5i3.6297
AVADANEI, A., NITESCU, L., CONSTANTIN, I., & SULTANOIU, C. P. 2021. Predictive Model for Software Vulnerability Management in Telecommunication Infrastructures. 2021 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2021. https://doi.org/10.1109/BlackSeaCom52164.2021.9527768
BECKER, G., EISENBARTH, T., FEDERRATH, H., FISCHER, M., LOOSE, N., OTT, S., PECHOLT, J., MARWEDEL, S., MEYER, D., STIJOHANN, J., TALPUR, A., & VALLENTIN, M. 2024. SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ACM International Conference Proceeding Series. https://doi.org/10.1145/3664476.3671410
BECKVARD, H. P. 2022. Protecting Critical Infrastructure and Critical Information Infrastructure. CONTEMPORARY MILITARY CHALLENGES, 24(2), 15–28. https://doi.org/10.33179/bsv.99.svi.11.cmc.24.2.1
BSSN. 2022. Keputusan Kepala Badan Siber dan Sandi Negara No. 248 tahun 2022 tentang Peta Proses Bisnis Badan Siber dan Sandi Negara.
BSSN. 2023. Lanskap Keamanan Siber Indonesia 2023. https://www.bssn.go.id/wp-content/uploads/2024/03/Lanskap-Keamanan-Siber-Indonesia-2023.pdf
CHHILLAR, K., & SHRIVASTAVA, S. 2021. Vulnerability Scanning and Management of University Computer Network. IEMECON 2021 - 10th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks. https://doi.org/10.1109/IEMECON53809.2021.9689207
CISA. 2016. CRR Supplemental Resource Guide Vulnerability Management Version 1.1.
CISA. 2020. Insider Threat Mitigation Guide.
DAROJAT, E. Z., SEDIYONO, E., & SEMBIRING, I. 2022.
Vulnerability Assessment Website E-Government dengan NIST SP 800-115 dan OWASP Menggunakan Web Vulnerability
Scanner. JURNAL SISTEM INFORMASI BISNIS, 12(1), 36–44. https://doi.org/10.21456/vol12iss1pp36-44
ENISA. 2020. ISAC in a Box. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/information-sharing/isacs-toolkit/view
FARRIS, K. A., SHAH, A., CYBENKO, G., GANESAN, R., & JAJODIA, S. 2018. VULCON: A system for vulnerability prioritization, mitigation, and management. ACM Transactions on Privacy and Security, 21(4). https://doi.org/10.1145/3196884
FIRST. 2022. TRAFFIC LIGHT PROTOCOL (TLP) FIRST Standards Definitions and Usage Guidance — Version 2.0. https://www.first.org/tlp/
HAN, C. H., PARK, S. T., & LEE, S. J. 2019. The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. International Journal of Critical Infrastructure Protection, 26. https://doi.org/10.1016/j.ijcip.2019.100312
HOMELAND SECURITY. 2013. NIPP 2013 Partnering for Critical Infrastructure Security and Resilience.
HORE, S., SHAH, A., & BASTIAN, N. D. 2023. Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework. Expert Systems with Applications, 221. https://doi.org/10.1016/j.eswa.2023.119734
ISO. 2018. ISO/IEC 29147:2018 (Information technology — Security techniques — Vulnerability disclosure).
ISO. 2022. Information security, cybersecurity and privacy protection-Information security controls.
JOHNSON, C. S., BADGER, M. L., WALTERMIRE, D. A., SNYDER, J., & SKORUPKA, C. 2016. Guide to Cyber Threat Information Sharing. https://doi.org/10.6028/NIST.SP.800-150
KNERLER, K., PARKER, I., & ZIMMERMAN, C. 2022. 11 Strategies of a World-Class Cybersecurity Operations Center. The MITRE Corporation.
LI, W., TIAN, K., & WANG, W. 2023. Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry. ACM International Conference Proceeding Series, 318–322. https://doi.org/10.1145/3661638.3661699
MAGNUSSEN, G. M. K., PETTERSEN, M., & NIEMIMAA, M. I. 2023. A Comprehensive Framework for Patching and Vulnerability Management in Enterprises An Exploratory Study of How Enterprises Facilitate Patching and Vulnerability Management. University of Agder.
MEHRI, V. A., ARLOS, P., & CASALICCHIO, E. 2022. Automated Context-Aware Vulnerability Risk Management for Patch Prioritization. Electronics (Switzerland), 11(21). https://doi.org/10.3390/electronics11213580
MUTEMWA, M., MTSWENI, J., & ZIMBA, L. 2018. Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 1–6. https://doi.org/10.1109/ICONIC.2018.8601251
NIKOLAOU, N., PAPADAKIS, A., PSYCHOGYIOS, K., & ZAHARIADIS, T. 2023. Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector. Electronics (Switzerland), 12(14). https://doi.org/10.3390/electronics12143185
NIST. 2012. NIST SP 800-30 Revision 1 - Guide for Conducting Risk Assessments. https://doi.org/10.6028/NIST.SP.800-30r1
NIST. 2020. Security and Privacy Controls for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53r5
NIST. 2024. The NIST Cybersecurity Framework (CSF) 2.0. https://doi.org/10.6028/NIST.CSWP.29
PALMAERS, T. 2021. Implementing a Vulnerability Management Process Implementing a vulnerability management process 2.
PRESIDEN REPUBLIK INDONESIA. 2022. Peraturan Presiden No. 82 tahun 2022 tentang Perlindungan Infrastruktur Informasi Vital.
PRESIDEN REPUBLIK INDONESIA. 2022. Peraturan Presiden Republik Indonesia No. 63 tahun 2022 tentang Rancangan Induk Ibu Kota Negara.
PUSAT OPERASI KEAMANAN SIBER NASIONAL. 2021. Grand Desain NSOC - National Security Operation Center. BSSN.
PUTRO, P. A. W., & SENSUSE, D. I. 2021. Threats, Vulnerabilities and Security Functions in Critical Information Infrastructure. 2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021, 113–117. https://doi.org/10.1109/ICITACEE53184.2021.9617515
RECORDED FUTURE. 2022. The Intelligence Handbook - A Roadmap for Building and Intelligence-Led Security Program (4 ed.). CyberEdge Group, LLC.
ROSHANAEI, M. 2021. Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies. Journal of Computer and Communications, 09(08), 80–102. https://doi.org/10.4236/jcc.2021.98006
RUSSO, P., CAPONI, A., LEUTI, M., & BIANCHI, G. 2019. A web platform for integrated.
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2025 Jurnal Teknologi Informasi dan Ilmu Komputer

Artikel ini berlisensiCreative Commons Attribution-ShareAlike 4.0 International License.

Artikel ini berlisensi Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
Penulis yang menerbitkan di jurnal ini menyetujui ketentuan berikut:
- Penulis menyimpan hak cipta dan memberikan jurnal hak penerbitan pertama naskah secara simultan dengan lisensi di bawah Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) yang mengizinkan orang lain untuk berbagi pekerjaan dengan sebuah pernyataan kepenulisan pekerjaan dan penerbitan awal di jurnal ini.
- Penulis bisa memasukkan ke dalam penyusunan kontraktual tambahan terpisah untuk distribusi non ekslusif versi kaya terbitan jurnal (contoh: mempostingnya ke repositori institusional atau menerbitkannya dalam sebuah buku), dengan pengakuan penerbitan awalnya di jurnal ini.
- Penulis diizinkan dan didorong untuk mem-posting karya mereka online (contoh: di repositori institusional atau di website mereka) sebelum dan selama proses penyerahan, karena dapat mengarahkan ke pertukaran produktif, seperti halnya sitiran yang lebih awal dan lebih hebat dari karya yang diterbitkan. (Lihat Efek Akses Terbuka).












