COBIT Control Objectives for Information and related Technology
Manajemen I dan T Meningkatnya kebergantungan suatu perusahaan terhadap informasi dan system yg menyediakannya Meningkatnya kerentanan terhadap ancaman Meningkatnya cakupan dan biaya investasi di bidang I dan T Meningkatnya kemampuan teknologi yg mampu mengubah organisasi dan praktek bisnis, dan sekaligus membuat kesempatan baru dan mengurangi biaya
Fase IT Awareness Centralized Information and Technology suatu institusi dimana semua hal yg terkait dgn IT dibebankan pada 1 unit Distributed Information and Technology suatu institusi dimana hal-hal yg terkait dgn IT dibebankan ke unit terkait Distributed Role suatu institusi dimana setiap unit telah sadar wewenang-nya masing2 di dalam proses bisnis
sisfo sales sales sales manajemen Business Process Owner 3 Actor dalam proses bisnis : Submitter Approval Execution 3 Role dalam proses bisnis : Data Owner Application Owner Business Process Owner
Management’s Questions How far should we go in IT? Is the cost justified by the benefit? What are the indicators of good performance? What are the critical success factor? What are the risk of not achieving our objectives? What do others do? How do we measure and compare?
Support    Enabler IT sbg Support : perusahaan mengedepankan dan memprioritaskan operasional sebagai tulang punggung perusahaan, IT berfungsi sbg pendukung operasional IT sbg Enabler : perusahaan mengedepankan IT sbg tulang punggung yg menggerakkan operasional, operasional ada setelah IT ada
IT Management Guideline Key Goal Indicators Key Performance Indicators Critical Success Factors Maturity Models
Control Definisi : policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected
IT Control Objective Definisi : statement of the desired result or purpose to be achieved by implementing control procedures in a particular IT activity
IT Governance Definisi: A structure of relationship and process to direct and control the enterprise in order to achieve the enterprise’s goal by adding value while balancing risk versus return over IT and its process Enterprise’s Goal Business Process Risk Control
IT Governance IT is aligned with the business, enables the business and maximizes benefits IT resources are used responsibly IT related risks are managed appropriately Direct Report Manage risks : Security Reliability Compliance Realize Benefits Increase automation Decrease cost
Control vs. Risk Manajemen harus memutuskan besar investasi yg cukup untuk menjamin security dan control di bidang IT Manajemen harus dapat menyeimbangkan antara Risk dan Control bahkan di lingkungan yang tidak bisa diprediksi spt IT Security dan Control hanya mengatur Risk, tidak bisa meniadakan Tingkat Risk tidak bisa diketahui dan diukur secara pasti Manajemen harus memutuskan level Risk yang masih bisa diterima oleh perusahaan
Control Objective Level Primary : the degree to which the defined control objective directly impacts the information criterion concerned Secondary : the degree to which the defined control objective satisfies only to a lesser extent or indirectly the information criterion concerned Blank : could be applicable; however, requirements are more appropriately satisfied by another criterion in this process and/or by another process
Data Sales Informasi Sales Order Nama produk : Speedy Bandwidth : 1 Mbps Harga jual : Rp 800.000,- Nama Kastamer : PT. Air Muncul Alamat : Jl. Telekomunikasi 1x Tipe Kastamer : ISP Nama Pemilik : Bpk. Bambang Nomor Telpon pemilik : 022-70707070
Control Objective Principle the control of which satisfy is enabled by considering
Process Control
COBIT IT Process 7 Information 5 IT Resources 4 Domains 34 Control Objectives 318 Measurement IT Resources
Information Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability
Information Effectiveness ,  how information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent, and usable manner Efficiency ,  concerns the provision of information through optimal use of resources Confidentiality ,  concerns the protection of sensitive information from unauthorized disclosure Integrity ,  relates to accuracy and completeness of information as well as to its validity Availability ,  relates to information being available when required by the business process now and in the future Compliance ,  deals with complying with those laws, regulations, and contractual arrangements to which the business process is subject Reliability ,  relates to the provision of appropriate information for management to operate the entity and for management to exercise its financial and compliance reporting responsibilities
IT Resources People Application system Technology Facilities Data
IT Resources People ,  including staff skills, awareness, and productivity to plan, organize, acquire, deliver, support, and monitor information system and service Application system ,  sum of manual and programmed procedures Technology ,  covers hardware, OS, DBMS, network, multimedia, etc Facilities ,  all resources to house and support information system Data ,  are objects in their widest sense (external and internal), structured and unstructured, graphics, sound, etc
Planning & Organization PO1 : define a strategy IT plan PO2 : define the information architecture PO3 : determine the technological direction PO4 : define the IT organization and relationship PO5 : manage the IT investment PO6 : communicate management aims and direction PO7 : manage human resource PO8 : ensure compliance with external requirements PO9 : assess risks PO10 : manage projects PO11 : manage quality
Acquisition & Implementation AI1 : identify automated solution AI2 : acquire and maintain application software AI3 : acquire and maintain technology infrastructure AI4 : develop and maintain procedures AI5 : install and accredit systems AI6 : manage changes
Delivery & Support DS1 : define and manage service levels DS2 : manage third-party services DS3 : manage performance and capacity DS4 : ensure continuous service DS5 : ensure systems security DS6 : identify and allocate costs DS7 : educate and train users DS8 : assist and advice customers DS9 : manage the configuration DS10 : manage problems and incidents DS11 : manage data DS12 : manage facilities DS13 : manage operations
Monitoring M1 : monitor the process M2 : assess internal control adequacy M3 : obtain independent assurance M4 : provide for independent audit
http://www.imtelkom.ac.id

More Related Content

PDF
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
PDF
CHIME Lead Forum - Seattle 2015
PDF
Cyber security maturity model- IT/ITES
PDF
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
PPTX
NIST IT Standards for Local Governments 2010
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PPTX
Cybersecurity Metrics: Reporting to BoD
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Protecting Vital Data With NIST Framework - Patrick Kerpan's Secure260 presen...
CHIME Lead Forum - Seattle 2015
Cyber security maturity model- IT/ITES
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
NIST IT Standards for Local Governments 2010
Scott Hogg - Gtri cloud security knowledge and certs
Cybersecurity Metrics: Reporting to BoD
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter

What's hot (19)

PPTX
How to implement NIST cybersecurity standards in my organization
PDF
Introduction to NIST Cybersecurity Framework
PPTX
How to Use the NIST CSF to Recover from a Healthcare Breach
PDF
Cybersecurity Framework - What are Pundits Saying?
PDF
NIST Cybersecurity Framework 101
PDF
How can i find my security blind spots ulf mattsson - aug 2016
PPTX
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
PDF
Lessons Learned from the NIST CSF
PDF
Helping Utilities with Cybersecurity Preparedness: The C2M2
PDF
How can i find my security blind spots in Oracle - nyoug - sep 2016
PDF
Security Framework for Digital Risk Managment
PDF
Nist cybersecurity framework isc2 quantico
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PDF
CompTIA cysa+ certification changes: Everything you need to know
PDF
Cyber Security Maturity Assessment
PDF
The Measure of Success: Security Metrics to Tell Your Story
PDF
Super CISO 2020: How to Keep Your Job
PPTX
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
PDF
Business case for information security program
How to implement NIST cybersecurity standards in my organization
Introduction to NIST Cybersecurity Framework
How to Use the NIST CSF to Recover from a Healthcare Breach
Cybersecurity Framework - What are Pundits Saying?
NIST Cybersecurity Framework 101
How can i find my security blind spots ulf mattsson - aug 2016
Securing fintech - threats, challenges, best practices, ffiec, nist, and beyo...
Lessons Learned from the NIST CSF
Helping Utilities with Cybersecurity Preparedness: The C2M2
How can i find my security blind spots in Oracle - nyoug - sep 2016
Security Framework for Digital Risk Managment
Nist cybersecurity framework isc2 quantico
Cybersecurity Frameworks and You: The Perfect Match
CompTIA cysa+ certification changes: Everything you need to know
Cyber Security Maturity Assessment
The Measure of Success: Security Metrics to Tell Your Story
Super CISO 2020: How to Keep Your Job
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Business case for information security program
Ad

Similar to COBIT (20)

PPTX
Cobit 41 framework
PPTX
02. cobit 41 dan iso 17799
PPTX
Frameworks For Predictability
PPT
Information systems audit and control
PDF
Tata Kelola_Group Assignment 2_Kelompok 5.pdf
PPTX
Tatakelola Teknologi Informasi
PDF
Understanding co bit 4.1
PPT
COBIT 4.0
PPTX
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
PPT
IT frameworks
PPTX
Marcos cobi t -e-itil-v040811
PPTX
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
PDF
Cobit itil and iso 27001 mapping
PDF
What is Cobit
PPT
Accountability Corbit Overview 06262007
PPT
Cobit Foundation Training
PPTX
Gtag 1 information risk and control
PPTX
Pengelolaan teknologi informasi di badan penelitian
PPTX
Business Objectives & Control Objectives in Information Technology
PDF
Valuendo cyberwar and security (jan 2012) handout
Cobit 41 framework
02. cobit 41 dan iso 17799
Frameworks For Predictability
Information systems audit and control
Tata Kelola_Group Assignment 2_Kelompok 5.pdf
Tatakelola Teknologi Informasi
Understanding co bit 4.1
COBIT 4.0
COBIT Approach to Maintain Healthy Cyber Security Status Using NIST - CSF
IT frameworks
Marcos cobi t -e-itil-v040811
ICAB - ITK Chapter 3 Class 9-10 - Management of IT
Cobit itil and iso 27001 mapping
What is Cobit
Accountability Corbit Overview 06262007
Cobit Foundation Training
Gtag 1 information risk and control
Pengelolaan teknologi informasi di badan penelitian
Business Objectives & Control Objectives in Information Technology
Valuendo cyberwar and security (jan 2012) handout
Ad

More from Telkom Institute of Management (20)

PDF
PDF
AT Rapier Usecase Document
PDF
Building a Secure Web Application
PDF
SAMP (Solaris, Apache, MySQL, PHP)
PDF
PDF
FreeBSD VPN Server
PDF
FreeBSD Traffic Monitoring
PDF
FreeBSD Proxy Server
PDF
FreeBSD Name Server
PDF
FreeBSD web-based MUA
PDF
FreeBSD POP3/IMAP Server
PDF
FreeBSD Securing Mail Server
PDF
FreeBSD Mailing List
PDF
FreeBSD Mail Server
PDF
FreeBSD Log Analyzer
PDF
FreeBSD Database Server
PDF
FreeBSD Web Server
PDF
FreeBSD Installation
PDF
FreeBSD FTP Server
AT Rapier Usecase Document
Building a Secure Web Application
SAMP (Solaris, Apache, MySQL, PHP)
FreeBSD VPN Server
FreeBSD Traffic Monitoring
FreeBSD Proxy Server
FreeBSD Name Server
FreeBSD web-based MUA
FreeBSD POP3/IMAP Server
FreeBSD Securing Mail Server
FreeBSD Mailing List
FreeBSD Mail Server
FreeBSD Log Analyzer
FreeBSD Database Server
FreeBSD Web Server
FreeBSD Installation
FreeBSD FTP Server

Recently uploaded (20)

PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
HVAC Specification 2024 according to central public works department
PDF
Complications of Minimal Access-Surgery.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Empowerment Technology for Senior High School Guide
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
My India Quiz Book_20210205121199924.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Uderstanding digital marketing and marketing stratergie for engaging the digi...
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
Introduction to pro and eukaryotes and differences.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
HVAC Specification 2024 according to central public works department
Complications of Minimal Access-Surgery.pdf
Virtual and Augmented Reality in Current Scenario
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Empowerment Technology for Senior High School Guide
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Computer Architecture Input Output Memory.pptx
What if we spent less time fighting change, and more time building what’s rig...
FORM 1 BIOLOGY MIND MAPS and their schemes
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
My India Quiz Book_20210205121199924.pdf

COBIT

  • 1. COBIT Control Objectives for Information and related Technology
  • 2. Manajemen I dan T Meningkatnya kebergantungan suatu perusahaan terhadap informasi dan system yg menyediakannya Meningkatnya kerentanan terhadap ancaman Meningkatnya cakupan dan biaya investasi di bidang I dan T Meningkatnya kemampuan teknologi yg mampu mengubah organisasi dan praktek bisnis, dan sekaligus membuat kesempatan baru dan mengurangi biaya
  • 3. Fase IT Awareness Centralized Information and Technology suatu institusi dimana semua hal yg terkait dgn IT dibebankan pada 1 unit Distributed Information and Technology suatu institusi dimana hal-hal yg terkait dgn IT dibebankan ke unit terkait Distributed Role suatu institusi dimana setiap unit telah sadar wewenang-nya masing2 di dalam proses bisnis
  • 4. sisfo sales sales sales manajemen Business Process Owner 3 Actor dalam proses bisnis : Submitter Approval Execution 3 Role dalam proses bisnis : Data Owner Application Owner Business Process Owner
  • 5. Management’s Questions How far should we go in IT? Is the cost justified by the benefit? What are the indicators of good performance? What are the critical success factor? What are the risk of not achieving our objectives? What do others do? How do we measure and compare?
  • 6. Support  Enabler IT sbg Support : perusahaan mengedepankan dan memprioritaskan operasional sebagai tulang punggung perusahaan, IT berfungsi sbg pendukung operasional IT sbg Enabler : perusahaan mengedepankan IT sbg tulang punggung yg menggerakkan operasional, operasional ada setelah IT ada
  • 7. IT Management Guideline Key Goal Indicators Key Performance Indicators Critical Success Factors Maturity Models
  • 8. Control Definisi : policies, procedures, practices, and organizational structures designed to provide reasonable assurance that business objectives will be achieved and that undesired events will be prevented or detected and corrected
  • 9. IT Control Objective Definisi : statement of the desired result or purpose to be achieved by implementing control procedures in a particular IT activity
  • 10. IT Governance Definisi: A structure of relationship and process to direct and control the enterprise in order to achieve the enterprise’s goal by adding value while balancing risk versus return over IT and its process Enterprise’s Goal Business Process Risk Control
  • 11. IT Governance IT is aligned with the business, enables the business and maximizes benefits IT resources are used responsibly IT related risks are managed appropriately Direct Report Manage risks : Security Reliability Compliance Realize Benefits Increase automation Decrease cost
  • 12. Control vs. Risk Manajemen harus memutuskan besar investasi yg cukup untuk menjamin security dan control di bidang IT Manajemen harus dapat menyeimbangkan antara Risk dan Control bahkan di lingkungan yang tidak bisa diprediksi spt IT Security dan Control hanya mengatur Risk, tidak bisa meniadakan Tingkat Risk tidak bisa diketahui dan diukur secara pasti Manajemen harus memutuskan level Risk yang masih bisa diterima oleh perusahaan
  • 13. Control Objective Level Primary : the degree to which the defined control objective directly impacts the information criterion concerned Secondary : the degree to which the defined control objective satisfies only to a lesser extent or indirectly the information criterion concerned Blank : could be applicable; however, requirements are more appropriately satisfied by another criterion in this process and/or by another process
  • 14. Data Sales Informasi Sales Order Nama produk : Speedy Bandwidth : 1 Mbps Harga jual : Rp 800.000,- Nama Kastamer : PT. Air Muncul Alamat : Jl. Telekomunikasi 1x Tipe Kastamer : ISP Nama Pemilik : Bpk. Bambang Nomor Telpon pemilik : 022-70707070
  • 15. Control Objective Principle the control of which satisfy is enabled by considering
  • 17. COBIT IT Process 7 Information 5 IT Resources 4 Domains 34 Control Objectives 318 Measurement IT Resources
  • 18. Information Effectiveness Efficiency Confidentiality Integrity Availability Compliance Reliability
  • 19. Information Effectiveness , how information being relevant and pertinent to the business process as well as being delivered in a timely, correct, consistent, and usable manner Efficiency , concerns the provision of information through optimal use of resources Confidentiality , concerns the protection of sensitive information from unauthorized disclosure Integrity , relates to accuracy and completeness of information as well as to its validity Availability , relates to information being available when required by the business process now and in the future Compliance , deals with complying with those laws, regulations, and contractual arrangements to which the business process is subject Reliability , relates to the provision of appropriate information for management to operate the entity and for management to exercise its financial and compliance reporting responsibilities
  • 20. IT Resources People Application system Technology Facilities Data
  • 21. IT Resources People , including staff skills, awareness, and productivity to plan, organize, acquire, deliver, support, and monitor information system and service Application system , sum of manual and programmed procedures Technology , covers hardware, OS, DBMS, network, multimedia, etc Facilities , all resources to house and support information system Data , are objects in their widest sense (external and internal), structured and unstructured, graphics, sound, etc
  • 22. Planning & Organization PO1 : define a strategy IT plan PO2 : define the information architecture PO3 : determine the technological direction PO4 : define the IT organization and relationship PO5 : manage the IT investment PO6 : communicate management aims and direction PO7 : manage human resource PO8 : ensure compliance with external requirements PO9 : assess risks PO10 : manage projects PO11 : manage quality
  • 23. Acquisition & Implementation AI1 : identify automated solution AI2 : acquire and maintain application software AI3 : acquire and maintain technology infrastructure AI4 : develop and maintain procedures AI5 : install and accredit systems AI6 : manage changes
  • 24. Delivery & Support DS1 : define and manage service levels DS2 : manage third-party services DS3 : manage performance and capacity DS4 : ensure continuous service DS5 : ensure systems security DS6 : identify and allocate costs DS7 : educate and train users DS8 : assist and advice customers DS9 : manage the configuration DS10 : manage problems and incidents DS11 : manage data DS12 : manage facilities DS13 : manage operations
  • 25. Monitoring M1 : monitor the process M2 : assess internal control adequacy M3 : obtain independent assurance M4 : provide for independent audit