Id-SIRTII/CC RFC 2350
1. Document Information
This document contains a description of Id-SIRTII/CC according to RFC 2350. It provides basic information about the Id-SIRTII/CC, the ways it can be contacted, describes its responsibilities and the services offered.
1.1 Date of Last Update
This is version 0.9 as of 01/04/2014. Indonesia date format is DD/MM/YYYY.
1.2 Distribution List for Notifications
There is no distribution list for notifications as of 01/04/2014.
1.3 Locations where this Document May Be Found
The current version of this document can always be found at:
For validation purpose, GPG signed ASCII version of this document is located at:
The key used for signing is the Id-SIRTII/CC key as listed under section 2.8. Public Keys and Encryption Information.
2. Contact Information
2.1 Name of the Team
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure / Coordination Center.
Ravindo Tower 17th floor
Kebon Sirih Road Number 75, Central Jakarta
Zip Code 10340, Indonesia.
2.3 Time Zone
We are located in Asia, Jakarta - Indonesia Western Time that is GMT+07:00. No daylight saving time. GMT are consider similar with UTC. Indonesia time format are HH:MM:SS in 24 hours notation – without AM/PM.
Time reference host: ntp.idsirtii.or.id or IP address 184.108.40.206
2.4 Telephone Number
+62 21 3192 5551
2.5 Facsimile Number
+62 21 3193 5556
2.6 Other Telecommunication
Voice and Video Conferencing to IP address: 220.127.116.11
2.7 Electronic Mail Address
Please send incident related reports to incident[at]idsirtii.or.id
Non-incident related mail should be addressed to info[at]idsirtii.or.id
2.8 Public Keys and Encryption Information
Id-SIRTII/CC uses a master-signing key to sign all keys used for operational purposes. This trust anchor is:
Key ID: BE5BB5855708940F
Fingerprint: 1fa1 6655 936e 91ba 4593 3be3 be5b b585 5708 940f
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v1.4.5 (GNU/Linux)
—–END PGP PUBLIC KEY BLOCK—–
Encrypted communications with Id-SIRTII/CC should use this – and only this – operational key.
All keys (including the keys of individual team members) can be found at:
2.9 Team Members
Liaison is provided by Department of Interagency Collaboration of Id-SIRTII/CC.
2.10 Other Information
2.11 Points of Customer Contact
Preferred method to contact Id-SIRTII/CC is through e-mail. For incident reports and related issues, please directly use incident[at]idsirtii.or.id. This procedure will create a ticket number in our tracking system and will alert officer on duty.
For general inquiries please send e-mail to info[at]idsirtii.or.id
If it is not possible – or advisable due to security reasons – to use e-mail, you can contact or reach us through fixed line – telephone at +62 21 31925551.
ID-SIRTII/CC`s operation are generally restricted to regular business hours:
From 8:00 a.m. to 5:00 p.m. that is GMT +07:00
Asia, Jakarta – Indonesia Western Time
Monday through Friday, excluding National Holiday.
Note that: we will response ONLY DURING THESE HOURS.
Our phones are connected to IVR (Interactive Voice Response) System that will record any communication, but officers and staffs are only available during office hours. So, please consider time differences between your area and ours, thus eliminating the possibility of a wasted call.
Otherwise, please use email and or our online incident reporting form.
3.1 Mission Statement
The main purpose of Id-SIRTII/CC is as The National CSIRT/CC of Indonesia, to coordinate security efforts and incident response for Critical Infrastructure and IT-security problems at national level in Indonesia.
3.3 Sponsors and/or Affiliation
Co-founders are not mention directly due some exception and restriction reason. Including individual expert, academia, others Government Agencies and NGO’s.
Members of FIRST, National CSIRT Forum, ANSAC, APCERT and OICCERT.
Id-SIRTII/CC is a quasi government organization. Which means, it is fully funded only by The Government of Republic of Indonesia. But, as a service we are not performing any kind of government function, particularly or in general.
Our accountability and responsibility is to the constituencies.
Id-SIRTII/CC`s main purpose is to coordinate others initiatives to handle any kind of incidents at national level. This includes communication with counterparts and initiate collaboration as needed. In such, we only advise local or sector CSIRT’s to take immediate action. WE DO NOT MITIGATE AND REMEDIATE directly since we do not have direct authority to our constituencies, its network and so on.
We have indirect authority over AS38775. Contact to APNIC are through IDNIC.
4.1 Types of Incidents and Level of Support
Id-SIRTII/CC is authorized to address any kind of cyber security incidents, which occur or threaten our constituency (see section 3.2 Constituency) and its cyber strategic interest, in which required cross-organizational coordination, especially at national level. We will impose any precaution action needed and committed to keep our constituency informed to any potential vulnerability.
The level of support given by Id-SIRTII/CC will vary depending on the type and severity of the incident or issue, type of constituent, size of user or community affected, and Id-SIRTII/CC`s resources in place. Special attention will be given to the issues that are directly affecting to critical infrastructure.
Please note that NO DIRECT SUPPORT WILL BE GIVEN TO END USERS. They are expected to contact their local CSIRT (if any), or system administrator, network administrator and department head for assistance.
4.2 Co-operations, Interaction and Disclosure of Information
Id-SIRTII/CC will cooperate with other organizations in the field of cyber security and Internet infrastructure. Those engagements often require data or information exchange regarding to incident and issue. Nevertheless Id-SIRTII/CC committed to protect privacy of its constituency and therefore (under normal circumstances) only pass on limited and anonymized information to others party, unless some contractual agreements apply, for example Non Disclosure Agreement (NDA).
We operate under restrictions imposed by applicable Indonesian law regarding to information classifications and protection. This involves handling procedures of personal data as required by Indonesian Data Protection law, but it is may be forced to disclose such information due to LEA investigation or by court`s order.
4.3 Communications and Authentication
For usual communication, not containing sensitive information, Id-SIRTII/CC will use conventional methods like unencrypted e-mail or facsimile.
For secure communication PGP-Encrypted e-mail or telephone/fax will be used. If it is necessary to authenticate a person before communicating, this can be done either through existing peers of trust (e.g. FIRST, APCERT) or by other methods like callback, mail-back or even face-to-face meeting if necessary.
5.1 Incident Response
We response the incidents through (online) public reporting procedures, which are:
5.1.1. Incident Triage
5.1.2. Incident Coordination
5.1.3. Incident Resolution
5.2 Proactive Activities
6. Incident Reporting Forms
If possible, please make use of our Incident Reporting Form.
Current version is available from http://idsirtii.or.id/halaman/tentang/kontak-kami.html
Or visit our Online Reporting site http://report.idsirtii.or.id
While every precaution will be taken in the preparation of (those) information, alerts and notifications, Id-SIRTII/CC assumes will not take any responsibility for errors, omissions or damages resulting from the use of the information contained within.
This information should be solely used only as mentioned.