Software Security Hardening Pada Virtual Private Server Berdasarkan NIST SP 800-123 di Universitas XYZ
Abstract
The current level of technological development is very rapid. The most prominent example is the use of websites in industry and government environments. The website provides convenience in supporting ongoing business processes and can assist work in solving problems that occur in an organization. In using the website, of course, a server is needed to process data requests or provide information to users. The XYZ Faculty at XYZ University has a virtualxyz server which contains a website that is used to support academic and administrative activities. However, the development of technology will of course be accompanied by the development of vulnerabilities or attacks against these applications. Therefore, on the virtualxyz server, it is necessary to carry out a Security Hardening process based on the National Institute of Standards and Technology (NIST) Special Publication 800-123. This is done because the virtualxyz server has never done a security check based on certain standards on the server software. The purpose of this research is to analyze the security of the virtualxyz software server to minimize attacks that occur. The results of this study can be used as a reference to strengthen the security of the server software on the virtualxyz server. The results obtained from the analysis on the server software based on NIST SP 800-123 found 6 procedures that have not been implemented on the virtualxyz server.
Downloads
References
F. ’Sirait and M. S. K. . ’Putra, “Implementasi Metode Vulnerability Dan Hardening Pada Sistem Keamanan Jaringan,” J. Teknol. Elektro, Univ. Mercu Buana, vol. Vol. 9, no. No. 1, p. 16, 2018.
Yunanri, Riadi, and Yudnana, “Analisis Keamanan Webserver Menggunakan Metode Penetrasi Testing,” Annu. Res. Semin., vol. 2, no. 1, pp. 300–304, 2016.
A. M. Fanggidae, H. Hermawan, and H. I. Pratiwi, “Sistem Monitoring Server Dengan Menggunakan SNMP,” Widyakala J., vol. 6, no. 2, p. 163, 2019, doi: 10.36262/widyakala.v6i2.218.
Y. S. Aditya, U. Yunan, K. Septo, and M. Fathinuddin, “Pengamanan Data Cloudfri Menggunakan Metode Security Hardening,” vol. 8, no. 5, pp. 9428–9438, 2021.
B. Ahmad and T. Difa, “SISTEM KEAMANAN JARINGAN KOMPUTER MENGGUNAKAN PROXY SERVER DENGAN METODE ASSESSMENT & HARDENING,” 2020.
R. S. Perdana, “AUDIT KEAMANAN SISTEM INFORMASI AKADEMIK MENGGUNAKAN FRAMEWORK NIST SP 800-26 (Studi Kasus : Universitas Sangga Buana YPKP Bandung),” Infotronik J. Teknol. Inf. dan Elektron., vol. 3, no. 1, pp. 9–14, 2018, doi: 10.32897/infotronik.2018.3.1.2.
A. Laurensius Faleddo Giri Retza, “Security Hardening Dengan Cloud Web Service Untuk Pengamanan Website Berbasis Wordpress,” Univ. Dian Nuswantoro, pp. 1–10, 2016.
K. Y. LAYUK, Analisis Keamanan Jaringan Web Server Menggunakan Suricata Pada Sekolah Menengah Pertama Negeri 1 Palopo. 2021.
F. Fachri, A. Fadlil, and I. Riadi, “Analisis Keamanan Webserver menggunakan Penetration Test,” J. Inform., vol. 8, no. 2, pp. 183–190, 2021, doi: 10.31294/ji.v8i2.10854.
D. P. Kuswandono, “TEKNOLOGI VPN ( VIRTUAL PRIVATE NETWORK ) BERBASIS DI CLOUD VPS ( VIRTUAL PRIVATE SERVER ) Domo Pranowo Kuswandono dan juga akses jarak jauh . Untuk mengakses jaringan yang ada dirumah dibutuhkan IP public , mudah untuk melakukan koneksi dengan mudah . Me,” vol. 8, no. 2, p. 9, 2018.
M. Metode, “Sistem Pendukung Keputusan Dalam Pemilihan Control Panel Virtual Private Server,” vol. 5, no. 1, pp. 14–27, 2018.
A. D. Djayali, Muhammad Muzammil, and Abjan Samad, “Implementasi Aplikasi Meeting Online Pada Virtual Private Server di Masa Pandemi,” Simkom, vol. 6, no. 1, pp. 23–33, 2021, doi: 10.51717/simkom.v6i1.52.
K. Scarfone, M. Tracy, and W. Jansen, “Guide to General Server Security,” NIST Spec. Publ. - 800 Ser., p. 53, 2008, [Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-123/SP800-123.pdf.
D. Desmira and R. Wiryadinata, “Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking,” J. Ilmu Komput. dan Sist. Inf., vol. 5, no. 1, pp. 28–33, 2022, doi: 10.55338/jikomsi.v5i1.242.
H. E. Wahanani, “Uji Coba Serangan Man In The Middle Pada Keamanan SSL Protokol HTTP,” J. Sist. Inf. dan Bisnis Cerdas, vol. 13, no. 1, pp. 21–26, 2020, doi: 10.33005/sibc.v13i1.1769.
W. Agustiara et al., “Analisis Keamanan Protokol Secure Socket Layer Terhadap Serangan Packet Sniffing Pada Website Portal Berita Harian Umum Koran Padang,” J. Tek. Inform. Kaputama, vol. 6, no. 1, 2022.
ubuntu, “CIS Benchmark on Ubuntu.” https://ubuntu.com/security/cis.
F. Farhad, “Running Nginx as non root user,” 2017. https://stackoverflow.com/questions/42329261/running-nginx-as-non-root-user.
A. Do Nascimento, “Running the New Relic Infrastructure Agent as a Non-Root User,” 2019. https://newrelic.com/blog/how-to-relic/non-root-user-infrastructure-agent.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Software Security Hardening Pada Virtual Private Server Berdasarkan NIST SP 800-123 di Universitas XYZ
Pages: 94-102
Copyright (c) 2022 Faishal Rizqi Irfandi, Umar Yunan Kurnia Septo Hedianto, Ahmad Almaarif

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















