Information Security Evaluation of Data Centre Architecture Using COBIT 5


  • Nurbojatmiko Universitas Islam Negeri Syarif Hidayatullah Jakarta
  • Muhammad Shidqa Irahman Universitas Islam Negeri Syarif Hidayatullah Jakarta
  • Ainun Nashikha Universitas Islam Negeri Syarif Hidayatullah Jakarta
  • Raihan Lail Ramadhan Universitas Islam Negeri Syarif Hidayatullah Jakarta




APO13, COBIT 5, Data Center, DSS05, EDM


Pusat Teknologi Informasi dan Pangkalan Data (Pustipanda) UIN Jakarta is an institution in charge of managing all information systems and data management for UIN Jakarta. However, security issues are still one of the problems faced by Pustipanda today, such as data leaks, and websites that are often problematic. This research aims to assess the level of information security at the UIN Jakarta Pustipanda data centre using the COBIT 5 framework. Information security is very important in supporting organizational operations, especially facing cyber threats in the data centre environment. The research approach included document analysis, observation, and interviews with stakeholders at Pustipanda UIN Jakarta. Identification of information security weaknesses, assessment of compliance with security standards, and design of appropriate solutions are the subject of the research. It is hoped that the results will provide a comprehensive picture of information security in the data centre as well as concrete recommendations for improvement. The results of the research include an understanding of the status of information security at Pustipanda UIN Jakarta, as well as guidelines for improving information security in accordance with COBIT 5 principles. These efforts aim to reduce risk and protect the integrity, confidentiality, and availability of data in the data centre environment

GS Cited Analysis


Download data is not yet available.


Andry, J.F, & Christianto, K. 2018. Audit Menggunakan COBIT 4.1 dan COBIT 5 Dengan Case Study. Yogyakarta: Teknosian

Aritonang, i. J. (2018). Audit keamanan sistem informasi menggunakan framework COBIT 5 (apo13). Information technology engineering journals, 3(2), 5.

Ciptaningrum, d., nugroho, e., & adhipta, d.(2015). Audit keamanan sistem informasi pada kantor pemerintah kota yogyakarta menggunakan cobit, 5, 10

CNSS. (2010). National Information Assurance (IA) glossary. The National Security Systems Instruction, (4009), 103

Creswell, JW (2014). Desain Penelitian: Pendekatan Metode Kualitatif, Kuantitatif dan Campuran (edisi ke-4). Thousand Oaks, CA: Sage.

Greene, F & CISSP (2015). Selected COBIT 5 Processes for Essential Enterprise Security. ISACA.

ISACA. (2012). "COBIT 5: A Business Framework for the Governance and Management of Enterprise IT." USA: ISACA.

ISACA 2012 COBIT 5.0 Enabling Process ISACA

J. W. Creswell, “Research Design: Qualitative, Quantitative, and Mixed Methods Approaches,” 4 th ed. Thousand Oaks, CA: Sage, 2014.

Matin, i. M. M., arini, a., & wardhani, l. K. (2018). Analisis keamanan informasi data center menggunakan cobit 5. Jurnal teknik informatika, 10(2), 119–128. Https://

Menkominfo. Peraturan Menteri Komunikasi dan Informatika Republik Indonesia: Pedoman Teknis Pusat Data (2013).

NIST. (2013). Glossary of Key Information Security Terms Glossary of Key Information Security Terms. Nist, NISTIR 729(Revision 2).

Santana, G. A. A. (2013). Data center virtualization fundamentals.

Tristiyanto. Octaria, C. (2019). IT Governance Audit at Lampung University Using COBIT 5 Framework Focus on EDM Domain. Journal of Physics: Conference Series.

Zulhuda, S. (2010). Information Security from an Islamic Perspective. International Journal of Innovation in the Digital Economy, 1(4), 1-14.


Crossmark Updates

How to Cite

Nurbojatmiko, N., Irahman, M. S. ., Nashikha, A. ., & Ramadhan, R. L. . (2024). Information Security Evaluation of Data Centre Architecture Using COBIT 5. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 9(1), 466-476.