MettaDC Datacenter Protection
MettaDC Datacenter Protection
DATA
CENTER
INDONESIA NEXT LEADING NEUTRAL
CARRIER DATA CENTER PROVIDER
www.mettadc.com
Enlighten Your Business
at Our Future-Ready Data Center
Table of Content
05 The Data
Milestone 17
08
Pentest Method 19
World Secure Data Center Sample
3
SUKOCO HALIM
2000
2008 2020
2005 2018
Deep marketing and sales experience, with Team has deep domain experience delivering
executive -level roles for China IDC, Alliance DCs and major projects across Asia, covering
SE Asia and SG Tech's Data and Cloud International BFSI, global cloud provider and
Chapter. Prior customer relationships large international Telco providers.
global corporates such as Google, Alibaba,
Tencent, Bloomberg and many more.
Regional relationships with KEB Hana Bank,
Darta Media Indonesia (KASKUS), Maybank
Indonesia, CIMB Niaga, Aliansi Teknology
Indonesia (Alipay/Dana). 6
What are the most common
causes of Data Breach?
Sutcliffe & Co. Insurance Brokers recently outlined
the most common causes of data breach, as follows:
“When selecting a data center partner, security is of one the most important features of
any data center. After all, your mission-critical infrastructure will be housed within
someone else’s facility. Today, securing the data center has never been more important.
Data breaches and other cyberattacks are a growing threat for any businesses. Learn
how and more importantly why it’s important to secure and protect your data center.”
World secure data center sample 1
Service Descriptions
MettaDC ID01
Data Center Building Facility • 3 Storey building
Jababeka - Bekasi • 10,000 sqm total IT Hall
• Earthquake sustainability until 9RS
Data Hall • 500 racks per data hall
• Average rack density 5 kW
• Maximum high density 15kW
• Rack dimension: 48U, 600mmx1200mm
Connectivity • Carrier neutral
• 4 MMR Room each floor
• Multiple entry points and diverse
underground cable pathways
Mechanical & Electrical • 2N Generators Configuration
• 2N Power Distribution
11
• 2 Blocks with @2N UPS configurations
MettaDC ID01 Security & Protection
Layer Data Center
Antiblastic gate
Surrounding Surveillance perimeter entrance
Roof Top double layer
System construction building
Anti Crash
Steel Car Trap
Car Plate with UVSS Face Recognition Biometric
Recognition (Under Vehicle Gate Access Contactless
Surveillance System) Door Fingerprint
Touchless Security Process to provide best world class security data center
Perimeter
01
Gates | Surveillance (CCTV) | Plate recognition| UVSS| QR System| Face recognition |
Building 02 Manned | Flap barrier| Face recognition| Access Card | Iris Recognition | Fingerprint Scanner |
Turnstile gate| Air Lock| Monitoring & Control | Alarm Management
Operational
04
14
MettaDC ID01 - Facility and Infrastructure
Independent Dedicated Facility per Data Hall
15
MettaDC Team Certifications
16
$6 Trillion USD Direct losses from cyberattacks are the tip of the
iceberg. Unidentified losses is bigger than the
Global Cybercrime Damage Cost existing cost.
Source: Cybersecurity ventures
1 Attack Target
Trade Secret 4
More than 70% target infrastructure,
20% target web. 90% of web attacks
In accordance with data use Social Engineering.
privacy, a trade secret is
another motive of cybercrime
during the last 3 years.
Cyber
Security in
Nutshell
2 Attack Increasement
3
Data Privacy Attack increase 25% YoY comparison.
Most of attacks utilized vulnerability
During 2018 – 2019, data privacy addressed by code development
breaches in increase significantly. (almost 75%).
More than 90% of breach utilized
web vulnerability.
Our Services
01
SA2T
Security Assessment
and Testing
We assist businesses in gaining a clear picture of their
security resilience by properly measuring and managing
potential threats.
02
CSC2
03
CORS
Cybersecurity Operations
and Resilience Service
04
SARS
Security Architecture
Review Service
05
vCISO
31
Pentest Method
03 Vulnerability 05 Report
01 Planning & Preparation Assessment
06 Remediation &
04 Intrusion & Closing
02 Reconnaissance
exploitation
32
Risk Method
Identification and
Critical 16 – 25 9.0 - 10.0 Cryptography
2 7 Authentication Flaws
Failure
33
Our Competencies
TEMUAN SEVERITY
TEMUAN SEVERITY
TEMUAN SEVERITY
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
The .git/config disclosure bug is a security vulnerability in the Git version control system. This happens when
a Git configuration file (.git/config) that should be accessed only by users who have access rights to the
Root Cause repository and accidentally published to the public. This configuration file contains important information
such as the username and password used to access the Git repository, so that unauthorized users can access
the repository using that information.
Threat actors can access sensitive information in the repository such as source code or
Impact credentials on the system.
Credential information leak from System Database
IDOR On Several API Endpoints Lead To Patient Data Leak
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Impact The impact of this is leakage from patients who register and book on the mobile app. Some of the data
leaked because of this issue are names, telephone numbers, email addresses, addresses, etc
IDOR On Several API Endpoints Lead To Data Leak
/Api/getMember
IDOR On Several API Endpoints Lead To Data Leak
/ApiV2/getList*****on
IDOR On Several API Endpoints Lead To Data Leak
/api/get*****tPID
Leaked Guest Account Credentials
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
With access as a guest, threat actors can carry out further exploitation
Impact of the system
Leaked Guest Account Credentials
assets/index.android.js
HACKING CASE EXAMPLE
Take over the mobile application account
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
The takeover of the user account can occur because there is an IDOR
Root issue in the endpoint to change the user data. By changing the email
from a particular user, then the Threat Actor resets the password
Cause from the account. In this way, the account of the mobile application
user can be taken completely.
1 3
Hacker analyze Hacker get guest Find out endpoint that Change email user
mobile app credential hard coded affected IDOR vulnerability using IDOR vulnerability
2 4
Take over the mobile application account
www.mettadc.com