THE DESIGN OF SECURITY OPERATION CENTER (SOC) ON APPLICATION PROGRAMMING INTERFACE (API)

The development of information technology is increasingly rapid, the need for companies and organizations to use information technology is a necessity to facilitate routine work activities. This makes more and more applications that are connected. Information security is a crucial issue in the ma...

Full description

Saved in:
Bibliographic Details
Main Author: Yuliana, Frentina
Format: Theses
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/54509
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
Description
Summary:The development of information technology is increasingly rapid, the need for companies and organizations to use information technology is a necessity to facilitate routine work activities. This makes more and more applications that are connected. Information security is a crucial issue in the management of data centers owned by state administering agencies. The existence of strategic electronic systems demands serious security. One of the efforts made in maintaining information security is using an Application Program Interface (API), an API is a program or system that can be accessed by other programs. API has brought about revolutionary changes in current applications. However, API has several vulnerabilities that pose a threat. for data confidentiality, one of which is the abuse of access rights. This can be minimized by monitoring and detection of the API. This monitoring is related to information security with an emphasis on confidentiality, integrity and availability of information. This activity can be applied to a special work function responsible for information security, namely the Security Operation Center (SOC). SOC is a work unit with competence in information security, both in terms of the process and the technology used, so it is hoped that SOC can secure the API during the interaction process. The design begins with an analysis of the existing risks in the API and calculating information security index (KAMI), followed by designing an organizational structure using an analysis of the ideal situation. The business process is carried out using ISO 27001: 2013 and OWASP API Security TOP 10 and followed by designing technology using GAP analysis. The research methodology used is a case study with the Design Research Methodology (DRM) approach. Data collection in the form of interviews, document studies, and observations. This study's results are the design of the SOC and the roadmap for implementing the SOC to fulfil the objectives of ensuring information security on the API.