NSOC-VM: Kerangka Kerja Manajemen Kerentanan pada National Security Operation Center

Penulis

  • Muhammad Azza Ulin Nuha Universitas Indonesia, Depok
  • Susila Windarta Politeknik Siber dan Sandi Negara, Bogor
  • Muhammad Salman Universitas Indonesia, Depok

DOI:

https://doi.org/10.25126/jtiik.2025126

Kata Kunci:

IIV, NSOC, manajemen kerentanan, NSOC-VM, metode PDCA

Abstrak

Keamanan siber merupakan aspek penting dalam penyelenggaraan Infrastruktur Informasi Vital (IIV), yaitu sekumpulan infrastruktur strategis yang berdampak signifikan apabila mengalami gangguan. National Security Operation Center (NSOC) berperan sebagai pusat operasi keamanan siber nasional yang memberikan layanan keamanan bagi IIV. Di Indonesia, IIV menghadapi tingkat kerentanan dan ancaman siber yang tinggi, sementara pengelolaan kerentanannya masih menghadapi berbagai tantangan. Saat ini, belum tersedia kerangka kerja khusus yang mengatur pelaksanaan siklus manajemen kerentanan di NSOC untuk pelindungan IIV. Penelitian ini bertujuan untuk mengusulkan kerangka kerja National Security Operation Center-Vulnerability Management (NSOC-VM) yang dirancang untuk membantu NSOC dalam melakukan pengelolaan kerentanan. Kerangka kerja ini disusun dengan pendekatan Plan-Do-Check-Act (PDCA) dan dilengkapi dengan rekomendasi penerapan berdasarkan beberapa standar keamanan siber. Validasi dilakukan oleh sepuluh pakar yang memiliki keahlian dalam pelindungan IIV, operasional NSOC, dan manajemen kerentanan. Hasil penelitian menunjukkan bahwa kerangka kerja terdiri atas empat tahapan, sepuluh aktivitas utama, dan tiga puluh lima rekomendasi implementasi. Berdasarkan validasi yang dilakukan, kerangka kerja tersebut disetujui oleh para pakar sehingga dapat diterapkan oleh NSOC dalam mendukung pelindungan IIV di Indonesia.

 

Abstract

Cybersecurity plays a pivotal role in safeguarding Critical Information Infrastructure (CII), which comprises strategic assets whose disruption could significantly impact national stability. The National Security Operation Center (NSOC) serves as Indonesia’s central entity for cybersecurity operations, providing protection and response capabilities for CII. However, CII in Indonesia continues to face high levels of cyber threats and vulnerabilities, while the implementation of comprehensive vulnerability management practices remains limited. Furthermore, a dedicated framework governing the vulnerability management lifecycle within the NSOC context has yet to be established. This study proposes the National Security Operation Center–Vulnerability Management (NSOC-VM) framework to enhance the effectiveness of vulnerability management activities at the NSOC. The framework is structured using the Plan-Do-Check-Act (PDCA) methodology and incorporates implementation recommendations aligned with recognized cybersecurity standards. Validation was carried out through expert judgment involving ten professionals with expertise in CII protection, NSOC operations, and vulnerability management. The validated framework consists of four phases, ten key activities, and thirty-five implementation recommendations. The experts confirmed the framework’s applicability and relevance, indicating its potential to support NSOC operations in strengthening CII protection in Indonesia.

Downloads

Download data is not yet available.

Referensi

AFERUDIN, F., & RAMLI, K. 2022. The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia. Budapest International Research and Critics Institute (BIRCI-Journal). https://doi.org/10.33258/birci.v5i3.6297

AVADANEI, A., NITESCU, L., CONSTANTIN, I., & SULTANOIU, C. P. 2021. Predictive Model for Software Vulnerability Management in Telecommunication Infrastructures. 2021 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2021. https://doi.org/10.1109/BlackSeaCom52164.2021.9527768

BECKER, G., EISENBARTH, T., FEDERRATH, H., FISCHER, M., LOOSE, N., OTT, S., PECHOLT, J., MARWEDEL, S., MEYER, D., STIJOHANN, J., TALPUR, A., & VALLENTIN, M. 2024. SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection. ACM International Conference Proceeding Series. https://doi.org/10.1145/3664476.3671410

BECKVARD, H. P. 2022. Protecting Critical Infrastructure and Critical Information Infrastructure. CONTEMPORARY MILITARY CHALLENGES, 24(2), 15–28. https://doi.org/10.33179/bsv.99.svi.11.cmc.24.2.1

BSSN. 2022. Keputusan Kepala Badan Siber dan Sandi Negara No. 248 tahun 2022 tentang Peta Proses Bisnis Badan Siber dan Sandi Negara.

BSSN. 2023. Lanskap Keamanan Siber Indonesia 2023. https://www.bssn.go.id/wp-content/uploads/2024/03/Lanskap-Keamanan-Siber-Indonesia-2023.pdf

CHHILLAR, K., & SHRIVASTAVA, S. 2021. Vulnerability Scanning and Management of University Computer Network. IEMECON 2021 - 10th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks. https://doi.org/10.1109/IEMECON53809.2021.9689207

CISA. 2016. CRR Supplemental Resource Guide Vulnerability Management Version 1.1.

CISA. 2020. Insider Threat Mitigation Guide.

DAROJAT, E. Z., SEDIYONO, E., & SEMBIRING, I. 2022.

Vulnerability Assessment Website E-Government dengan NIST SP 800-115 dan OWASP Menggunakan Web Vulnerability

Scanner. JURNAL SISTEM INFORMASI BISNIS, 12(1), 36–44. https://doi.org/10.21456/vol12iss1pp36-44

ENISA. 2020. ISAC in a Box. https://www.enisa.europa.eu/topics/national-cyber-security-strategies/information-sharing/isacs-toolkit/view

FARRIS, K. A., SHAH, A., CYBENKO, G., GANESAN, R., & JAJODIA, S. 2018. VULCON: A system for vulnerability prioritization, mitigation, and management. ACM Transactions on Privacy and Security, 21(4). https://doi.org/10.1145/3196884

FIRST. 2022. TRAFFIC LIGHT PROTOCOL (TLP) FIRST Standards Definitions and Usage Guidance — Version 2.0. https://www.first.org/tlp/

HAN, C. H., PARK, S. T., & LEE, S. J. 2019. The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system. International Journal of Critical Infrastructure Protection, 26. https://doi.org/10.1016/j.ijcip.2019.100312

HOMELAND SECURITY. 2013. NIPP 2013 Partnering for Critical Infrastructure Security and Resilience.

HORE, S., SHAH, A., & BASTIAN, N. D. 2023. Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework. Expert Systems with Applications, 221. https://doi.org/10.1016/j.eswa.2023.119734

ISO. 2018. ISO/IEC 29147:2018 (Information technology — Security techniques — Vulnerability disclosure).

ISO. 2022. Information security, cybersecurity and privacy protection-Information security controls.

JOHNSON, C. S., BADGER, M. L., WALTERMIRE, D. A., SNYDER, J., & SKORUPKA, C. 2016. Guide to Cyber Threat Information Sharing. https://doi.org/10.6028/NIST.SP.800-150

KNERLER, K., PARKER, I., & ZIMMERMAN, C. 2022. 11 Strategies of a World-Class Cybersecurity Operations Center. The MITRE Corporation.

LI, W., TIAN, K., & WANG, W. 2023. Research and Practice on Network Security Vulnerability Management Methods in the Transportation Industry. ACM International Conference Proceeding Series, 318–322. https://doi.org/10.1145/3661638.3661699

MAGNUSSEN, G. M. K., PETTERSEN, M., & NIEMIMAA, M. I. 2023. A Comprehensive Framework for Patching and Vulnerability Management in Enterprises An Exploratory Study of How Enterprises Facilitate Patching and Vulnerability Management. University of Agder.

MEHRI, V. A., ARLOS, P., & CASALICCHIO, E. 2022. Automated Context-Aware Vulnerability Risk Management for Patch Prioritization. Electronics (Switzerland), 11(21). https://doi.org/10.3390/electronics11213580

MUTEMWA, M., MTSWENI, J., & ZIMBA, L. 2018. Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems. 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 1–6. https://doi.org/10.1109/ICONIC.2018.8601251

NIKOLAOU, N., PAPADAKIS, A., PSYCHOGYIOS, K., & ZAHARIADIS, T. 2023. Vulnerability Identification and Assessment for Critical Infrastructures in the Energy Sector. Electronics (Switzerland), 12(14). https://doi.org/10.3390/electronics12143185

NIST. 2012. NIST SP 800-30 Revision 1 - Guide for Conducting Risk Assessments. https://doi.org/10.6028/NIST.SP.800-30r1

NIST. 2020. Security and Privacy Controls for Information Systems and Organizations. https://doi.org/10.6028/NIST.SP.800-53r5

NIST. 2024. The NIST Cybersecurity Framework (CSF) 2.0. https://doi.org/10.6028/NIST.CSWP.29

PALMAERS, T. 2021. Implementing a Vulnerability Management Process Implementing a vulnerability management process 2.

PRESIDEN REPUBLIK INDONESIA. 2022. Peraturan Presiden No. 82 tahun 2022 tentang Perlindungan Infrastruktur Informasi Vital.

PRESIDEN REPUBLIK INDONESIA. 2022. Peraturan Presiden Republik Indonesia No. 63 tahun 2022 tentang Rancangan Induk Ibu Kota Negara.

PUSAT OPERASI KEAMANAN SIBER NASIONAL. 2021. Grand Desain NSOC - National Security Operation Center. BSSN.

PUTRO, P. A. W., & SENSUSE, D. I. 2021. Threats, Vulnerabilities and Security Functions in Critical Information Infrastructure. 2021 8th International Conference on Information Technology, Computer and Electrical Engineering, ICITACEE 2021, 113–117. https://doi.org/10.1109/ICITACEE53184.2021.9617515

RECORDED FUTURE. 2022. The Intelligence Handbook - A Roadmap for Building and Intelligence-Led Security Program (4 ed.). CyberEdge Group, LLC.

ROSHANAEI, M. 2021. Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies. Journal of Computer and Communications, 09(08), 80–102. https://doi.org/10.4236/jcc.2021.98006

RUSSO, P., CAPONI, A., LEUTI, M., & BIANCHI, G. 2019. A web platform for integrated.

Diterbitkan

17-12-2025

Terbitan

Bagian

Ilmu Komputer

Cara Mengutip

NSOC-VM: Kerangka Kerja Manajemen Kerentanan pada National Security Operation Center. (2025). Jurnal Teknologi Informasi Dan Ilmu Komputer, 12(6), 1291-1302. https://doi.org/10.25126/jtiik.2025126