PENERAPAN JSON API UNTUK VERIFIKASI MINIMUM BASELINE SECURITY STANDARD (MBSS) PADA PERANGKAT CISCO NEXUS

Authors

  • Dadang Iskandar Mulyana Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika
  • Arief Sofyan Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

DOI:

https://doi.org/10.31294/conten.v5i2.9733

Keywords:

MBSS, CISCO NEXUS ACI, API, JSON, verifikasi keamanan, konfigurasi jaringan

Abstract

Verifikasi Minimum Baseline Security Standard (MBSS) merupakan prosedur penting untuk memastikan bahwa konfigurasi keamanan pada perangkat jaringan telah sesuai sebelum dioperasikan dalam jaringan produksi. Dalam lingkungan Cisco Nexus ACI yang berskala besar dan kompleks, proses verifikasi memerlukan pendekatan yang efisien, akurat, dan terdokumentasi. Namun, pendekatan tradisional yang digunakan selama ini sering kali kurang praktis karena data konfigurasi tersebar, tidak terstruktur, dan membutuhkan banyak langkah untuk diakses. Penelitian ini bertujuan untuk menerapkan metode GET API dalam menampilkan data verifikasi MBSS perangkat Cisco Nexus ACI secara langsung dan ringkas dalam format JavaScript Object Notation (JSON). Penelitian dilakukan dengan studi literatur dan eksplorasi API menggunakan client Postman terhadap beberapa endpoint konfigurasi pada Cisco ACI. Hasil yang diperoleh menunjukkan bahwa metode GET API mampu menyajikan data konfigurasi MBSS secara spesifik dalam satu langkah aksi per poin dan per perangkat. Dengan format JSON yang terstruktur, proses verifikasi menjadi lebih mudah didokumentasikan dan mencapai tingkat keberhasilan & relevansi penarikan data konfigurasi mencapai 100% pada seluruh 6 parameter MBSS yang diuji. Pendekatan ini dapat menjadi alternatif yang relevan untuk meningkatkan efisiensi verifikasi keamanan jaringan di infrastruktur skala besar.

 

Minimum Baseline Security Standard (MBSS) verification is a critical procedure to ensure that network device security configurations meet predefined requirements before integration into the production environment. In large-scale and complex Cisco Nexus ACI environments, the verification process demands an efficient, accurate, and well-documented approach. However, traditional methods commonly used are often impractical due to scattered configuration data, lack of structure, and multi-step retrieval processes. This research aims to explore the use of the GET API method to display MBSS verification data of Cisco Nexus ACI devices directly and concisely in JavaScript Object Notation (JSON) format. The study involves literature review and API exploration using the Postman client across several configuration endpoints available in Cisco ACI. The results show that the GET API method can present MBSS configuration data specifically in a single action per point and per device. With a structured JSON format, the verification process becomes easier to document and have a 100% success rate for retrieving configuration data across all 6 tested MBSS parameters. This approach presents a relevant alternative to enhance the effeciency of security verification in large-scale network infrastructures.

Author Biography

  • Arief Sofyan, Sekolah Tinggi Ilmu Komputer Cipta Karya Informatika

    Arief Sofyan is an Informatics Engineering student at STIKOM CKI Jakarta with 5 years of professional networking experience—2 years in enterprise networks and 3 years in data centers, specializing in Cisco ACI fabric, Nexus Dashboard, and traditional Cisco Nexus platforms. His passion for technology, sparked during his SMK years at IDN (Islamic Development Network), drives his ability to bridge deep technical expertise with practical, high-performance network solutions.

References

[1] H. Taherdoost, “Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview,” Electronics, vol. 11, no. 14, 2022, doi:10.3390/electronics11142181.

[2] F. Djebbar and K. Nordstrom, “A Comparative Analysis of Industrial Cybersecurity Standards,” IEEE Access, vol. 11, no. July, pp. 85315–85332, 2023, doi:10.1109/ACCESS.2023.3303205.

[3] D. Olifer, N. Goranin, A. Cenys, A. Kaceniauskas, and J. Janulevicius, “Defining the minimum security baseline in a multiple security standards environment by graph theory techniques,” Applied Sciences, vol. 9, no. 4, 2019, doi:10.3390/app9040681.

[4] S. M. Ali, A. Razzaque, M. Yousaf, and R. U. Shan, “An Automated Compliance Framework for Critical Infrastructure Security through Artificial Intelligence,” IEEE Access, vol. 13, pp. 4436–4459, 2024, doi:10.1109/ACCESS.2024.3524496.

[5] D. Mellado, E. Fernandez-Medina, and M. Piattini, “Applying a Security Domain Requirements Engineering Process for Software Product Lines,” IEEE Latin America Transactions, vol. 6, no. 3, pp. 298–305, 2008, doi:10.1109/tla.2008.4653861.

[6] S. Majumdar et al., “User-Level Runtime Security Auditing for the Cloud,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1185–1199, 2018, doi:10.1109/TIFS.2017.2779444.

[7] S. P. Ong et al., “The Materials Application Programming Interface (API): A simple, flexible and efficient API for materials data based on REpresentational State Transfer (REST) principles,” Computational Materials Science, vol. 97, pp. 209–215, 2015, doi:10.1016/j.commatsci.2014.10.037.

[8] K. N. Markert et al., “Design and implementation of a BigQuery dataset and application programmer interface (API) for the U.S. National Water Model,” Environmental Modelling & Software, vol. 179, p. 106123, 2024, doi:10.1016/j.envsoft.2024.106123.

[9] F. Palma, T. Olsson, A. Wingkvist, and J. Gonzalez-Huerta, “Assessing the linguistic quality of REST APIs for IoT applications,” Journal of Systems and Software, vol. 191, p. 111369, 2022, doi:10.1016/j.jss.2022.111369.

[10] P. Bourhis, J. L. Reutter, and D. Vrgoč, “JSON: Data model and query languages,” Information Systems, vol. 89, 2020, doi:10.1016/j.is.2019.101478.

[11] C. O. Truică, E. S. Apostol, J. Darmont, and T. B. Pedersen, “Oriented Database Management Systems: An Overview and Benchmark of Native XML DODBMSes in Comparison with JSON DODBMSes,” Big Data Research, vol. 25, 2021, doi:10.1016/j.bdr.2021.100205.

[12] R. Maurya, “Application of Restful APIs in IoT: A Review,” International Journal for Research in Applied Science and Engineering Technology, vol. 9, no. 2, pp. 145–151, 2021, doi:10.22214/ijraset.2021.33013.

[13] D. Shah and V. Giomo, “Verified Scalability Guide for Cisco APIC, Release 6.1(3) and Cisco Nexus 9000 Series ACI-Mode Switches, Release 16.1(3),” Text. View Mag., vol. 1, no. 113, pp. 184–185, 2016.

[14] B. Lebiednik, A. Mangal, and N. Tiwari, “A Survey and Evaluation of Data Center Network Topologies,” 2016, [Online]. Available: http://arxiv.org/abs/1605.01701.

[15] P. Ijari, “Comparison between Cisco ACI and VMWARE NSX,” IOSR Journal of Computer Engineering, vol. 19, no. 01, pp. 70–72, 2017, doi:10.9790/0661-1901047072.

[16] E. Chavarriaga, F. Jurado, and F. D. Rodríguez, “An approach to build JSON-based Domain Specific Languages solutions for web applications,” Journal of Computer Languages, vol. 75, p. 101203, 2023, doi:10.1016/j.cola.2023.101203.

[17] Y. H. Wang and I. C. Wu, “Definition of REST web services with JSON schema,” Software: Practice and Experience, vol. 39, no. 7, pp. 701–736, 2009, doi:10.1002/spe.

[18] J. S. Horsburgh, K. Lippold, and D. L. Slaugh, “Adapting OGC’s SensorThings API and data model to support data management and sharing for environmental sensors,” Environmental Modelling & Software, vol. 183, p. 106241, 2025, doi:10.1016/j.envsoft.2024.106241.

[19] Y. Ding, Z. Wu, Z. Tan, and X. Jiang, “Research and application of security baseline in business information system,” Procedia Computer Science, vol. 183, pp. 630–635, 2021, doi:10.1016/j.procs.2021.02.107.

[20] NIST SP800-53, Security and Privacy Controls for Information Systems and Organizations. Gaithersburg, MD, 2020, doi:10.6028/NIST.SP.800-53r5.

Downloads

Published

2025-12-30