MettaDC Datacenter Protection
MettaDC Datacenter Protection
DATA
CENTER
INDONESIA NEXT LEADING NEUTRAL
CARRIER DATA CENTER PROVIDER
   www.mettadc.com
Enlighten Your Business
at Our Future-Ready Data Center
Table of Content
                                       05    The Data
 Milestone                                                                           17
                                       08
                                             Pentest Method                          19
 World Secure Data Center Sample
                                                                                          3
                                                        SUKOCO HALIM
            2000
                                                         2008                                          2020
2005 2018
                                                       Deep marketing and sales experience, with                                     Team has deep domain experience delivering
                                                       executive -level roles for China IDC, Alliance                                DCs and major projects across Asia, covering
                                                       SE Asia and SG Tech's Data and Cloud                                          International BFSI, global cloud provider and
                                                       Chapter. Prior customer relationships large                                   international Telco providers.
                                                       global corporates such as Google, Alibaba,
                                                       Tencent, Bloomberg and many more.
                                                       Regional relationships with KEB Hana Bank,
                                                       Darta Media Indonesia (KASKUS), Maybank
                                                       Indonesia, CIMB Niaga, Aliansi Teknology
                                                       Indonesia (Alipay/Dana).                                                                                                6
What are the most common
causes of Data Breach?
Sutcliffe & Co. Insurance Brokers recently outlined
the most common causes of data breach, as follows:
“When selecting a data center partner, security is of one the most important features of
any data center. After all, your mission-critical infrastructure will be housed within
someone else’s facility. Today, securing the data center has never been more important.
Data breaches and other cyberattacks are a growing threat for any businesses. Learn
how and more importantly why it’s important to secure and protect your data center.”
World secure data center sample           1
                            Service                         Descriptions
         MettaDC ID01
                            Data Center Building Facility   •      3 Storey building
       Jababeka - Bekasi                                    •      10,000 sqm total IT Hall
                                                            •      Earthquake sustainability until 9RS
                            Data Hall                       •      500 racks per data hall
                                                            •      Average rack density 5 kW
                                                            •      Maximum high density 15kW
                                                            •      Rack dimension: 48U, 600mmx1200mm
                            Connectivity                    •      Carrier neutral
                                                            •      4 MMR Room each floor
                                                            •      Multiple entry points and diverse
                                                                   underground cable pathways
                            Mechanical & Electrical         •      2N Generators Configuration
                                                            •      2N Power Distribution
                                                                                                          11
                                                            •      2 Blocks with @2N UPS configurations
                            MettaDC ID01 Security & Protection
                                   Layer Data Center
                                                                                     Antiblastic gate
Surrounding Surveillance                                                           perimeter entrance
                                        Roof Top double layer
        System                          construction building
                                                    Anti Crash
                                                  Steel Car Trap
                  Car Plate                         with UVSS                                Face Recognition                          Biometric
                 Recognition                         (Under Vehicle                            Gate Access                            Contactless
                                                  Surveillance System)                             Door                               Fingerprint
Touchless Security Process to provide best world class security data center
Perimeter
                 01
                                 Gates | Surveillance (CCTV) | Plate recognition| UVSS| QR System| Face recognition |
Building         02              Manned | Flap barrier| Face recognition| Access Card | Iris Recognition | Fingerprint Scanner |
                                 Turnstile gate| Air Lock| Monitoring & Control | Alarm Management
Operational
                 04
                                                                                                                                   14
MettaDC ID01 - Facility and Infrastructure
Independent Dedicated Facility per Data Hall
                                                                                                    15
MettaDC Team Certifications
                              16
$6 Trillion USD                 Direct losses from cyberattacks are the tip of the
                                iceberg. Unidentified losses is bigger than the
Global Cybercrime Damage Cost   existing cost.
                                Source: Cybersecurity ventures
                                                             1    Attack Target
            Trade Secret              4
                                                                  More than 70% target infrastructure,
                                                                  20% target web. 90% of web attacks
      In accordance with data                                     use Social Engineering.
       privacy, a trade secret is
  another motive of cybercrime
         during the last 3 years.
                                                 Cyber
                                               Security in
                                                Nutshell
                                                             2   Attack Increasement
                                           3
                   Data Privacy                                  Attack increase 25% YoY comparison.
                                                                 Most of attacks utilized vulnerability
       During 2018 – 2019, data privacy                          addressed by code development
     breaches in increase significantly.                         (almost 75%).
      More than 90% of breach utilized
                     web vulnerability.
Our Services
               01
                       SA2T
                    Security Assessment
                    and Testing
                    We assist businesses in gaining a clear picture of their
                    security resilience by properly measuring and managing
                    potential threats.
               02
                       CSC2
               03
                       CORS
                    Cybersecurity Operations
                    and Resilience Service
               04
                       SARS
                    Security Architecture
                    Review Service
               05
                       vCISO
                                                      31
Pentest Method
                                  03   Vulnerability        05 Report
      01 Planning & Preparation        Assessment
                                                                   06 Remediation &
                                          04 Intrusion &              Closing
             02 Reconnaissance
                                             exploitation
                                                                                      32
Risk Method
                                                                                                 Identification and
      Critical      16 – 25   9.0 - 10.0   Cryptography
                                                            2                            7       Authentication Flaws
                                                 Failure
                                                                                                                            33
Our Competencies
TEMUAN SEVERITY
TEMUAN SEVERITY
TEMUAN SEVERITY
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
                           The .git/config disclosure bug is a security vulnerability in the Git version control system. This happens when
                           a Git configuration file (.git/config) that should be accessed only by users who have access rights to the
      Root Cause           repository and accidentally published to the public. This configuration file contains important information
                           such as the username and password used to access the Git repository, so that unauthorized users can access
                           the repository using that information.
                           Threat actors can access sensitive information in the repository such as source code or
         Impact            credentials on the system.
Credential information leak from System Database
               IDOR On Several API Endpoints Lead To Patient Data Leak
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
      Impact            The impact of this is leakage from patients who register and book on the mobile app. Some of the data
                        leaked because of this issue are names, telephone numbers, email addresses, addresses, etc
IDOR On Several API Endpoints Lead To Data Leak
    /Api/getMember
IDOR On Several API Endpoints Lead To Data Leak
 /ApiV2/getList*****on
IDOR On Several API Endpoints Lead To Data Leak
    /api/get*****tPID
Leaked Guest Account Credentials
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
                         With access as a guest, threat actors can carry out further exploitation
        Impact           of the system
Leaked Guest Account Credentials
assets/index.android.js
HACKING CASE EXAMPLE
Take over the mobile application account
      CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
                           The takeover of the user account can occur because there is an IDOR
           Root            issue in the endpoint to change the user data. By changing the email
                           from a particular user, then the Threat Actor resets the password
          Cause            from the account. In this way, the account of the mobile application
                           user can be taken completely.
   1                                                3
       Hacker analyze       Hacker get guest            Find out endpoint that            Change email user
       mobile app           credential hard coded       affected IDOR vulnerability       using IDOR vulnerability
                        2                                                             4
Take over the mobile application account
www.mettadc.com