Advanced Search

Regulation Institution Password State Number 11 In 2012

Original Language Title: Peraturan Lembaga Sandi Negara Nomor 11 Tahun 2012

Subscribe to a Global-Regulation Premium Membership Today!

Key Benefits:

Subscribe Now for only USD$40 per month.

The text is not in the original format.
Back


image
STATE NEWS
REPUBLIC OF INDONESIA

No. 809, 2012
STATE PASSWORD AGENCY HEAD ORDINANCES
No. 11 YEAR 2012
ABOUT
PASSWORD SYSTEM KEY MANAGEMENT GUIDELINES

WITH THE GRACE OF THE ALMIGHTY GOD

HEAD OF THE STATE PASSWORD AGENCY,

Weighing: that for order and solubility in the hosting of the Password System Key management activities in the Government Instancy environment, it needs to establish the Head of State Password Regulation on the Key Management Guidelines Of The Passcode;

Remembering: 1. The decision of the President Number 103 of 2001 on the position, duties, functions, functions, authority, organizational structure and work order of the non-department government agencies as amended and last with the Presidential Regulation No. 64 of 2005;
2. Presidential Decree No. 108 of 2003 on the Organization of Representatives of the Republic of Indonesia in Foreign Affairs;
3. Decision Head of State Password Number 76 /K/KEP.4.003/ 2000 Year 2000 about the State Persandian System;
4. Decision Head of State Password Number 119 /K/KEP.4.003/ 2000 Year 2000 about the Password System Coaching Guidelines;
5. Head of the State Password Agency Number 9 Year 2010 on the Password of Passed Equipment Certification;
6. State Code Chief Regulation No. 14 of 2010 on the Guidelines for Password Communication Filter Titles;

DECIDED:

Establish: State password agency ' s head regulations on key management guidelines of the password system.

BAB I
UMUM CONDITIONS
Section 1
In the Rule of the Head of the State Password Society, referred to by:
1. Management is a set of processes that are performed sequentially from planning up to reporting.
2. The Password is a unit of time for which the Cloud Service can be used for use in the Cloud Service.
3. The password is a tool that contains cryptographic algorithms and can be enabled for encryption of both encryption and decryption.
4. The Key Prototype of the Password System that is next called the Sissan Key Prototype is a key model of the password system ready to be produced.
5. The next Password Key is called the Sissan Key is a single paper/collection document, file, or a module in which there is a key data, which serves as the master key or key encrypted key/equipment key or key/communication key data or key inputs on certain passwords including prototipenya.
6. The next cryptographic key is called the Key is a random sequence of a number of specific characters produced by a key generator tool.
7. The subsequent Instruction called KINS is the information or news of the instance which makes the Sissan Key contained regarding the designation of the use of certain Sissan Key uses.
8. The Sissan Key Agenda is a document containing the Sissan Key Prototype data that is performed on a particular book and/or application.
9. Government Instancy is the collective designation of a unit of governmental organization that exercises its duties and functions in accordance with the applicable provisions including the ministry of state, non-ministerial government agencies, provincial government, government The district, the municipal government, as well as the institutions that run the functions of government using APBN and/or APBD.
10.Jaring Communication Password next called JKS is the interconnectedness between users of persandian via telecommunications net.
11.Personnel Password is any password-qualified personnel who are in full duty in the field of persandian.
The 12.Instancy responsible for the distribution of the Sissan Key is an institution given the authority over the implementation of the Sissan Key distribution.
13.5 Key Distribution Parties are the Password Personnel in charge of the instance responsible for the distribution of the Sissan Key.


Section 2
The Sissan Key management activities consist of:
a. Sissan Key Planning;
B. The creation of the Sissan Key Prototype;
C. Sissan Key Production;
D. Sissan Key packaging and Distribution;
e. Use, Maintenance and Comb Key Treatments;
f. The Sissan Key Destruction;
G. Safeguards; and
h. Financing, Evaluation and Reporting.

BAB II
SISSAN KEY PLANNING
Section 3
(1) The Sissan Key Planning is an activity making details of the Sissan Key needs with the schedule of implementation of the Sissan Key creation.
(2) The Sissan Key Planning is carried out by the work unit that enforces the management of the Sissan Key.


BAB III
CREATION OF THE PASSWORD SYSTEM KEY PROTOTYPE
Section 4
(1) The creation of a System-based Prototype of the System for External JKS and Special JKS is performed by the State Password Agency.
(2) The creation of a System-based Prototype of the System for Internal JKS can be performed by its central agency.


Section 5
(1) The creation of the Sissan Key Prototype must meet the requirements as follows:
a. performed by Password Personnel who have technical capabilities in the Sissan Key management field; and
B. using hardware, software or other methods that can produce a random lock sequence after going through a series of statistical tests.
(2) The key testing as referred to in paragraph (1) item b is performed by a working unit in the State Cipher Agencies that are subject to the study of the password system.


Section 6
(1) The Government Instancy that makes the Sissan Key Prototype mandatory creating the Sissan Key Agenda and sending its instalment to the State Password Institute.
(2) The Sissan Key Agenda as referred to in paragraph (1) is governed with the Deputy Regulation.


Section 7
Government agencies that do not carry out the manufacture of the Sissan Key Prototype as referred to in Section 4 of the paragraph (2), the creation of the Sissan Key Prototype is performed by the State Password Society.

BAB IV
KEY PRODUCTION OF THE PASSWORD SYSTEM
Section 8
(1) The Sissan Key Production is an activity of compressing the Sissan Key in accordance with the Sissan Key Prototype based on needs.
(2) Acquisting the Sissan Key as referred to in paragr