SlideShare una empresa de Scribd logo
1 de 34
Verifikasi dan Validasi
Keamanan Informasi
Agung Sediyono, Ir.,MT, Ph.D
Verification & Validation
the process of checking that a product,
service, or system meets specifications and
that it fulfills its intended purpose. These are
critical components of a quality management
system such as ISO 9000. Sometimes
preceded with "Independent" (or IV&V) to
ensure the validation is performed by a
disinterested third party.
Verification
Quality control process that is used to
 evaluate whether or not a product, service,
 or system complies with regulations,
 specifications, or conditions imposed at the
 start of a development phase. Verification
 can be in development, scale-up, or
 production. This is often an internal process
Validation
Quality assurance process of
establishing evidence that provides a
high degree of assurance that a product,
service, or system accomplishes its
intended requirements. This often
involves acceptance of fitness for
purpose with end users and other
product stakeholders
Evaluation
a) analysis and checking of process(es) and procedure(s);
b) checking that process(es) and procedure(s) are being applied;
c) analysis of the correspondence between TOE design
representations;
d) analysis of the TOE design representation against the
requirements;
e) verification of proofs;
f) analysis of guidance documents;
g) analysis of functional tests developed and the results provided;
h) independent functional testing;
i) analysis for vulnerabilities (including flaw hypothesis);
j) penetration testing.
CC Paradigm               System Acquisition      Observations Regarding
                          Paradigm                Commonality Among CC
                                                  and Acquisition
                                                  Paradigms

Protection Profile (PP)   Request for Proposals   Provides customer
                                                  desires, needs, and
                                                  requirements: "What is
                                                  wanted"
Security Target (ST)      Proposals               Indicates how the above
                                                  will be satisfied by
                                                  suppliers: "What will be
                                                  provided"

Target of Evaluation      Delivered System        Is the supplier's physical
(TOE)                                             manifestation of above


Evaluated System          Accepted System         Shows that the three
                                                  preceding
                                                  representations are
                                                  sufficiently consistent
Significant of Vulneralability
a) eliminated -- that is, active steps should be taken to
expose, and remove or neutralize, all exercisable
vulnerabilities;
b) minimised -- that is, active steps should be taken to
reduce, to an acceptable residual level, the potential
impact of any exercise of a vulnerability;
c) monitored -- that is, active steps should be taken to
ensure that any attempt to exercise a residual
vulnerability will be detected so that steps can be taken
to limit the damage
Cause of Vulneralability
a) requirements -- that is, an IT product may possess
all the functions and features required of it and still
contain vulnerabilities that render it unsuitable or
ineffective with respect to security;
b) development -- that is, an IT product does not meet
its specifications and/or vulnerabilities have been
introduced as a result of poor development standards or
incorrect design choices;
c) operation -- that is, an IT product has been
constructed correctly to a correct specification but
vulnerabilities have been introduced as a result of
inadequate controls upon the operation
CC: Level Penjaminan Evaluasi
  (EAL)
 EAL1 : Fuctionality Tested
 EAL2 : Structurally Tested
 EAL3 : Methodically tested and checked
 EAL4 : Methodically designed, tested, and
  reviewed
 EAL5 : Semi-formally designed and tested
 EAL6 : Semi-formally verified, designed, and
  tested
 EAL7 : Formally verified, designed, and tested.
Diterapkan sesuai dengan keadaan atau kriteria
yang ditetapkan oleh kebutuhan pemakai.
OWASP Level (Khusus u aplikasi)
Level 1 : Verifikasi Otomatis
 1A: Pemindaian Dinamis
 1B: Pemindaian Kode Sumber
Level 2 : Verifikasi Manual
 2A: Uji Keamanan
 2B: Code Review
Level 3 : Verifikasi Desain
Level 4 : Verifikasi Internal
Class in CC
  Security Audit
  Communication
  Cryptographic
  User Data Protection
  Identification and Authentication
  Security Management
  Privacy
  Protection of TSF
  Resource Utilization
  TOE Access
  Trusted Path/Channel
Class in ASVS
 Security Architecture
 Authentication
 Session Management
 Access Control
 Input Validation
 Coding
 Cryptography
 Error Handling and Logging
 Data Protection
 Communication Security
 HTTP Security
 Security Configuration
 Malicious Finding
 Internal Security
Information Security Testing and
Assesment Methodology (NIST,2008)
  Planning
    Information gathering about TOE, Ancaman, pengendalian akses
     menangani ancaman, pendekatan evaluasi.
    Pembuatan manajemen proyek untuk mencapai tujuan , lingkup,
     kebutuhan, peran dan tanggung jawab tim, batasan, indikator
     sukses, asumsi, sumber daya, timeline dan delivery.
  Execution
    Indentifikasi vulnerability dan melakukan validasi dengan benar.
    Menjalankan metode dan teknik penilaian keamanan.
    Hasil akhir berupa identifikasi vulnerability pada system komputer
     dan proses organisasi.
  Post-Execution
    Analysis dan identifikasi vulnerability untuk menentukan akar
     masalah, penetapan rekomendasi mitigasi, dan pembuatan
     laporan akhir.
Teknik Penilaian
Review
   Teknik pemeriksaan yang digunakan untuk
    mengevaluasi sistem, aplikasi, jaringan, kebijakan,
    prosedur untuk mencari vulnerability
Identifikasi dan Analysis Target
   Identifikasi sistem, port, service, potensi vulnerability
   Bisa dilakukan secara manual atau menggunakan
    alat
Validasi Vunerability Target
   Pembuktian Vulnerability yang ditemukan
   Ex: password cracking, penetration testing, dan
    social engineering
Review
Document
Log
Ruleset
System Configuration
Network Sniffing
File Integrity Checking
Identifikasi
Network Discovery
Network Port dan Services Scanning
Vulnerability Scanning
Wireless Scanning
 Passive Wireless Scanning
 Active Wireless Scanning
 Wireless Device Locating Tracking
Bluetooth Scanning
Validasi
Password Cracking
Penetration Test
Social Engineering
Test Type (OSSTM)
Trifecta
How do current Operation Work?
   Penggunaan metrik untuk menentukan domain
    masalah
How do they work differently from how
 management think they works?
   Akses ke kebijakan dan trust/resiko penilaian
    dimap ke metrik masalah
How do they need to work?
   Kalau ada gap antara metrik dan kebijakan atau
    resiko penilaian
Methodology (OSSTM)
1.  Passively collect data of normal operations to comprehend the target.
2.  Actively test operations by agitating operations beyond the normal
    baseline.
3. Analyze data received directly from the operations tested.
4. Analyze indirect data from resources and operators (i.e. workers,
    programs).
5. Correlate and reconcile intelligence from direct (step 3) and indirect
    (step 4) data test results to determine operational security processes.
6. Determine and reconcile errors.
7. Derive metrics from both normal and agitated operations.
8. Correlate and reconcile intelligence between normal and agitated (steps
    1 and 2) operations todetermine the optimal level of protection and
    control which would best be implemented.
9. Map the optimal state of operations (step 8) to processes (step 5).
10. Create a gap analysis to determine what enhancements are needed for
    processes governingnecessary protection and controls (step 5) to
    achieve the optimal operational state (step 8) from the current one.
6 langkah Analisis Keamanan
1. Build your knowledge of the target from a variety of the most
   contemporary, factual resources while avoiding commercially biased
   and speculative information.
2. Determine the global level of experience for the type of target and the
   amount of information possibly known about it.
3. Determine any bias or ulterior motives in the information sources.
4. Translate jargon from information sources to similar or known words
   for comparison because what may sound new or complicated may just
   be a trick to differentiate something common.
5. Be sure the test equipment has been properly calibrated and the test
   environment verified to assure the results are not contaminated by the
   test itself.
6. Assure that the translation state of tools or test processes has been
   removed as much as possible so that the results do not come from the
   indirect sources in a process or the pre-analysis from some tools.
Keputusan Verifiksi
 Unknown
 Untested Target
 Identified and Verified Limitation
 False Positive and The means to generate
  them
 Failed Security Process and Procedure
 Good Practices
 Compliance
Network Sniffing
 Merekam semua trafik jaringan untuk bahan analisis
 Tools
    TCPDUMP
    WIRESHARK/TSHARK
 Penempatan peralatan menjadi penting karena harus
  betul-betul dapat menyadap komunikasi yang diinginkan
 Harus dipasang setempat, tidak dapat secara remote
 Contoh teknologi NetFlow dapat dilakukan secara
  remote
Network Discovery
 Test Target yang hidup
 Simple test using ‘ping’, fail to detect firewall
  because firewall reject ping request.
Port and Services Scanning
 Try for all possible ports, 1 – 11000 for example
 Test using standart communication to determine TCP or UDP
 TCP test
    Send SYN packet to target
    Target replay by sending ACK packet
    Send SYN ACK to target to start communication
    Connection established.
 UDP Test
    If send UDP packet is not response assumed the port open
    If send UDP packet is response assumed the port is closed or
     open but not UDP services
 Tools: Nmap and Hping
Verifikasi dan Validasi keamanan informasi

Más contenido relacionado

La actualidad más candente

Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
Nur Islam
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
Sandeep Patalay
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 

La actualidad más candente (13)

A Survey of Software Reliability factor
A Survey of Software Reliability factorA Survey of Software Reliability factor
A Survey of Software Reliability factor
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Chapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test AutomationChapter 1 - Introduction and Objectives for Test Automation
Chapter 1 - Introduction and Objectives for Test Automation
 
Chapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing TasksChapter 4 - Performance Testing Tasks
Chapter 4 - Performance Testing Tasks
 
Chapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of TestingChapter 1 - Fundamentals of Testing
Chapter 1 - Fundamentals of Testing
 
Software and Hardware Reliability
Software and Hardware ReliabilitySoftware and Hardware Reliability
Software and Hardware Reliability
 
An empirical evaluation of
An empirical evaluation ofAn empirical evaluation of
An empirical evaluation of
 
Information hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted ImagesInformation hiding based on optimization technique for Encrypted Images
Information hiding based on optimization technique for Encrypted Images
 
Software reliability
Software reliabilitySoftware reliability
Software reliability
 
@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""@#$@#$@#$"""@#$@#$"""
@#$@#$@#$"""@#$@#$"""
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011Testing Experience Magazine Vol.14 June 2011
Testing Experience Magazine Vol.14 June 2011
 
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
AN EFFECTIVE VERIFICATION AND VALIDATION STRATEGY FOR SAFETY-CRITICAL EMBEDDE...
 

Destacado

HYRUM WEAVER New Resume
HYRUM WEAVER New ResumeHYRUM WEAVER New Resume
HYRUM WEAVER New Resume
Hyrum Weaver
 
Hoivatilat_casebook_2016
Hoivatilat_casebook_2016Hoivatilat_casebook_2016
Hoivatilat_casebook_2016
Jussi Karjula
 

Destacado (11)

payroll pp
payroll pppayroll pp
payroll pp
 
Insuficiencia cardíaca
Insuficiencia cardíacaInsuficiencia cardíaca
Insuficiencia cardíaca
 
Doświadczenia Koła Naukowego "Homunculus"
Doświadczenia Koła Naukowego "Homunculus"Doświadczenia Koła Naukowego "Homunculus"
Doświadczenia Koła Naukowego "Homunculus"
 
HYRUM WEAVER New Resume
HYRUM WEAVER New ResumeHYRUM WEAVER New Resume
HYRUM WEAVER New Resume
 
resume
resumeresume
resume
 
Hoivatilat_casebook_2016
Hoivatilat_casebook_2016Hoivatilat_casebook_2016
Hoivatilat_casebook_2016
 
Esmeralda Clube Residencial
Esmeralda Clube ResidencialEsmeralda Clube Residencial
Esmeralda Clube Residencial
 
Tamil Nadu Assembly Elections 2016
Tamil Nadu Assembly Elections 2016Tamil Nadu Assembly Elections 2016
Tamil Nadu Assembly Elections 2016
 
Type of e filing efiling process
Type of e filing efiling processType of e filing efiling process
Type of e filing efiling process
 
Fixed Deposit vs Debt Oriented Hybrid Fund
Fixed Deposit vs Debt Oriented Hybrid FundFixed Deposit vs Debt Oriented Hybrid Fund
Fixed Deposit vs Debt Oriented Hybrid Fund
 
Cuadro comparativo
Cuadro comparativo Cuadro comparativo
Cuadro comparativo
 

Similar a Verifikasi dan Validasi keamanan informasi

CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
JinElias52
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Vishnu Kesarwani
 
Project Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model EssayProject Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model Essay
Diane Allen
 

Similar a Verifikasi dan Validasi keamanan informasi (20)

Software Quality Assurance
Software Quality Assurance Software Quality Assurance
Software Quality Assurance
 
Computerized System Validation.vinay (1).pptx
Computerized  System  Validation.vinay (1).pptxComputerized  System  Validation.vinay (1).pptx
Computerized System Validation.vinay (1).pptx
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
 
V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3
 
SQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQASQA Lecture 01 (Introduction) - Testing and SQA
SQA Lecture 01 (Introduction) - Testing and SQA
 
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
EVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACHEVALUATING SOFTWAREQUALITY : A QUANTITATIVEAPPROACH
EVALUATING SOFTWARE QUALITY : A QUANTITATIVE APPROACH
 
Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...Extending the 20 critical security controls to gap assessments and security m...
Extending the 20 critical security controls to gap assessments and security m...
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
Software_Verification_and_Validation.ppt
Software_Verification_and_Validation.pptSoftware_Verification_and_Validation.ppt
Software_Verification_and_Validation.ppt
 
Overview of Software QA and What is Software Quality
Overview of Software QA and What is Software QualityOverview of Software QA and What is Software Quality
Overview of Software QA and What is Software Quality
 
System testing
System testingSystem testing
System testing
 
Software testing ppt
Software testing pptSoftware testing ppt
Software testing ppt
 
Software engineering
Software  engineeringSoftware  engineering
Software engineering
 
IT8076 – Software Testing Intro
IT8076 – Software Testing IntroIT8076 – Software Testing Intro
IT8076 – Software Testing Intro
 
Project Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model EssayProject Pluto Will Adopt The Incremental Build Model Essay
Project Pluto Will Adopt The Incremental Build Model Essay
 
T0 numtq0nje=
T0 numtq0nje=T0 numtq0nje=
T0 numtq0nje=
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

Verifikasi dan Validasi keamanan informasi

  • 1. Verifikasi dan Validasi Keamanan Informasi Agung Sediyono, Ir.,MT, Ph.D
  • 2. Verification & Validation the process of checking that a product, service, or system meets specifications and that it fulfills its intended purpose. These are critical components of a quality management system such as ISO 9000. Sometimes preceded with "Independent" (or IV&V) to ensure the validation is performed by a disinterested third party.
  • 3. Verification Quality control process that is used to evaluate whether or not a product, service, or system complies with regulations, specifications, or conditions imposed at the start of a development phase. Verification can be in development, scale-up, or production. This is often an internal process
  • 4. Validation Quality assurance process of establishing evidence that provides a high degree of assurance that a product, service, or system accomplishes its intended requirements. This often involves acceptance of fitness for purpose with end users and other product stakeholders
  • 5. Evaluation a) analysis and checking of process(es) and procedure(s); b) checking that process(es) and procedure(s) are being applied; c) analysis of the correspondence between TOE design representations; d) analysis of the TOE design representation against the requirements; e) verification of proofs; f) analysis of guidance documents; g) analysis of functional tests developed and the results provided; h) independent functional testing; i) analysis for vulnerabilities (including flaw hypothesis); j) penetration testing.
  • 6.
  • 7.
  • 8. CC Paradigm System Acquisition Observations Regarding Paradigm Commonality Among CC and Acquisition Paradigms Protection Profile (PP) Request for Proposals Provides customer desires, needs, and requirements: "What is wanted" Security Target (ST) Proposals Indicates how the above will be satisfied by suppliers: "What will be provided" Target of Evaluation Delivered System Is the supplier's physical (TOE) manifestation of above Evaluated System Accepted System Shows that the three preceding representations are sufficiently consistent
  • 9.
  • 10.
  • 11. Significant of Vulneralability a) eliminated -- that is, active steps should be taken to expose, and remove or neutralize, all exercisable vulnerabilities; b) minimised -- that is, active steps should be taken to reduce, to an acceptable residual level, the potential impact of any exercise of a vulnerability; c) monitored -- that is, active steps should be taken to ensure that any attempt to exercise a residual vulnerability will be detected so that steps can be taken to limit the damage
  • 12. Cause of Vulneralability a) requirements -- that is, an IT product may possess all the functions and features required of it and still contain vulnerabilities that render it unsuitable or ineffective with respect to security; b) development -- that is, an IT product does not meet its specifications and/or vulnerabilities have been introduced as a result of poor development standards or incorrect design choices; c) operation -- that is, an IT product has been constructed correctly to a correct specification but vulnerabilities have been introduced as a result of inadequate controls upon the operation
  • 13. CC: Level Penjaminan Evaluasi (EAL)  EAL1 : Fuctionality Tested  EAL2 : Structurally Tested  EAL3 : Methodically tested and checked  EAL4 : Methodically designed, tested, and reviewed  EAL5 : Semi-formally designed and tested  EAL6 : Semi-formally verified, designed, and tested  EAL7 : Formally verified, designed, and tested. Diterapkan sesuai dengan keadaan atau kriteria yang ditetapkan oleh kebutuhan pemakai.
  • 14. OWASP Level (Khusus u aplikasi) Level 1 : Verifikasi Otomatis 1A: Pemindaian Dinamis 1B: Pemindaian Kode Sumber Level 2 : Verifikasi Manual 2A: Uji Keamanan 2B: Code Review Level 3 : Verifikasi Desain Level 4 : Verifikasi Internal
  • 15. Class in CC  Security Audit  Communication  Cryptographic  User Data Protection  Identification and Authentication  Security Management  Privacy  Protection of TSF  Resource Utilization  TOE Access  Trusted Path/Channel
  • 16. Class in ASVS  Security Architecture  Authentication  Session Management  Access Control  Input Validation  Coding  Cryptography  Error Handling and Logging  Data Protection  Communication Security  HTTP Security  Security Configuration  Malicious Finding  Internal Security
  • 17.
  • 18. Information Security Testing and Assesment Methodology (NIST,2008)  Planning  Information gathering about TOE, Ancaman, pengendalian akses menangani ancaman, pendekatan evaluasi.  Pembuatan manajemen proyek untuk mencapai tujuan , lingkup, kebutuhan, peran dan tanggung jawab tim, batasan, indikator sukses, asumsi, sumber daya, timeline dan delivery.  Execution  Indentifikasi vulnerability dan melakukan validasi dengan benar.  Menjalankan metode dan teknik penilaian keamanan.  Hasil akhir berupa identifikasi vulnerability pada system komputer dan proses organisasi.  Post-Execution  Analysis dan identifikasi vulnerability untuk menentukan akar masalah, penetapan rekomendasi mitigasi, dan pembuatan laporan akhir.
  • 19. Teknik Penilaian Review  Teknik pemeriksaan yang digunakan untuk mengevaluasi sistem, aplikasi, jaringan, kebijakan, prosedur untuk mencari vulnerability Identifikasi dan Analysis Target  Identifikasi sistem, port, service, potensi vulnerability  Bisa dilakukan secara manual atau menggunakan alat Validasi Vunerability Target  Pembuktian Vulnerability yang ditemukan  Ex: password cracking, penetration testing, dan social engineering
  • 21. Identifikasi Network Discovery Network Port dan Services Scanning Vulnerability Scanning Wireless Scanning Passive Wireless Scanning Active Wireless Scanning Wireless Device Locating Tracking Bluetooth Scanning
  • 23.
  • 25.
  • 26. Trifecta How do current Operation Work?  Penggunaan metrik untuk menentukan domain masalah How do they work differently from how management think they works?  Akses ke kebijakan dan trust/resiko penilaian dimap ke metrik masalah How do they need to work?  Kalau ada gap antara metrik dan kebijakan atau resiko penilaian
  • 27.
  • 28. Methodology (OSSTM) 1. Passively collect data of normal operations to comprehend the target. 2. Actively test operations by agitating operations beyond the normal baseline. 3. Analyze data received directly from the operations tested. 4. Analyze indirect data from resources and operators (i.e. workers, programs). 5. Correlate and reconcile intelligence from direct (step 3) and indirect (step 4) data test results to determine operational security processes. 6. Determine and reconcile errors. 7. Derive metrics from both normal and agitated operations. 8. Correlate and reconcile intelligence between normal and agitated (steps 1 and 2) operations todetermine the optimal level of protection and control which would best be implemented. 9. Map the optimal state of operations (step 8) to processes (step 5). 10. Create a gap analysis to determine what enhancements are needed for processes governingnecessary protection and controls (step 5) to achieve the optimal operational state (step 8) from the current one.
  • 29. 6 langkah Analisis Keamanan 1. Build your knowledge of the target from a variety of the most contemporary, factual resources while avoiding commercially biased and speculative information. 2. Determine the global level of experience for the type of target and the amount of information possibly known about it. 3. Determine any bias or ulterior motives in the information sources. 4. Translate jargon from information sources to similar or known words for comparison because what may sound new or complicated may just be a trick to differentiate something common. 5. Be sure the test equipment has been properly calibrated and the test environment verified to assure the results are not contaminated by the test itself. 6. Assure that the translation state of tools or test processes has been removed as much as possible so that the results do not come from the indirect sources in a process or the pre-analysis from some tools.
  • 30. Keputusan Verifiksi Unknown Untested Target Identified and Verified Limitation False Positive and The means to generate them Failed Security Process and Procedure Good Practices Compliance
  • 31. Network Sniffing  Merekam semua trafik jaringan untuk bahan analisis  Tools  TCPDUMP  WIRESHARK/TSHARK  Penempatan peralatan menjadi penting karena harus betul-betul dapat menyadap komunikasi yang diinginkan  Harus dipasang setempat, tidak dapat secara remote  Contoh teknologi NetFlow dapat dilakukan secara remote
  • 32. Network Discovery  Test Target yang hidup  Simple test using ‘ping’, fail to detect firewall because firewall reject ping request.
  • 33. Port and Services Scanning  Try for all possible ports, 1 – 11000 for example  Test using standart communication to determine TCP or UDP  TCP test  Send SYN packet to target  Target replay by sending ACK packet  Send SYN ACK to target to start communication  Connection established.  UDP Test  If send UDP packet is not response assumed the port open  If send UDP packet is response assumed the port is closed or open but not UDP services  Tools: Nmap and Hping