[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"docs-id-\u002Fdocs\u002Fsecurity\u002Foverview":3},{"id":4,"title":5,"body":6,"category":216,"code_examples":217,"demos":217,"description":218,"extension":219,"meta":220,"navigation":217,"order":221,"path":222,"seo":223,"sitemap":233,"stem":235,"tags":236,"toc":241,"videos":217,"__hash__":242},"docs\u002Fdocs\u002Fsecurity\u002Foverview.md","Keamanan Platform & Data Protection",{"type":7,"value":8,"toc":199},"minimark",[9,14,18,23,28,73,77,97,101,108,119,123,127,130,134,137,141,161,165,174,181,185],[10,11,13],"h1",{"id":12},"keamanan-platform","Keamanan Platform",[15,16,17],"p",{},"Keamanan data Anda adalah prioritas utama kami. Kami menerapkan pendekatan \"defense in depth\" untuk melindungi infrastruktur, aplikasi, dan data Anda dari ancaman.",[19,20,22],"h2",{"id":21},"infrastruktur-keamanan","Infrastruktur Keamanan",[24,25,27],"h3",{"id":26},"enkripsi-data","Enkripsi Data",[29,30,31,43,53,63],"ul",{},[32,33,34,38,39,42],"li",{},[35,36,37],"strong",{},"Data at Rest (Data Tersimpan)",": Menggunakan enkripsi ",[35,40,41],{},"AES-256"," untuk semua database dan backup.",[32,44,45,48,49,52],{},[35,46,47],{},"Data in Transit (Data Bergerak)",": Semua komunikasi dilindungi dengan ",[35,50,51],{},"TLS 1.3"," (HTTPS) yang kuat.",[32,54,55,58,59,62],{},[35,56,57],{},"Perlindungan Data PII",": Data sensitif Lead dan Pengguna (Nama, Email, Telepon) dienkripsi menggunakan ",[35,60,61],{},"AES-256-GCM"," tingkat field dengan kunci terisolasi per Workspace.",[32,64,65,68,69,72],{},[35,66,67],{},"Hashing untuk Blind Index",": Kami menggunakan hashing ",[35,70,71],{},"SHA-256"," untuk Email dan Telepon. Hal ini memungkinkan pencarian data secara cepat tanpa perlu mendekripsi data aslinya (Blind Indexing) serta untuk sinkronisasi aman dengan platform iklan (Meta & Google Ads).",[24,74,76],{"id":75},"akses-kontrol","Akses Kontrol",[29,78,79,85,91],{},[32,80,81,84],{},[35,82,83],{},"Role-Based Access Control (RBAC)",": Batasi akses tim sesuai peran (Admin, Editor, Viewer).",[32,86,87,90],{},[35,88,89],{},"Multi-Factor Authentication (MFA)",": Lapisan keamanan tambahan untuk login.",[32,92,93,96],{},[35,94,95],{},"Audit Logs",": Rekam jejak aktivitas untuk akuntabilitas (Enterprise Plan).",[24,98,100],{"id":99},"proteksi-jaringan","Proteksi Jaringan",[15,102,103,104,107],{},"Kami menggunakan ",[35,105,106],{},"Cloudflare Enterprise"," untuk perlindungan terhadap:",[29,109,110,113,116],{},[32,111,112],{},"DDoS Attacks (L3\u002FL4)",[32,114,115],{},"Web Application Firewall (WAF)",[32,117,118],{},"Malicious Bot Protection",[19,120,122],{"id":121},"sertifikasi-kepatuhan","Sertifikasi & Kepatuhan",[24,124,126],{"id":125},"soc-2-type-ii","SOC 2 Type II",[15,128,129],{},"Konektor menjalani audit tahunan independen untuk memastikan kontrol keamanan, ketersediaan, dan kerahasiaan sesuai standar AICPA.",[24,131,133],{"id":132},"iso-27001","ISO 27001",[15,135,136],{},"Kami mengadopsi standar internasional untuk Sistem Manajemen Keamanan Informasi (ISMS).",[19,138,140],{"id":139},"backups-disaster-recovery","Backups & Disaster Recovery",[29,142,143,149,155],{},[32,144,145,148],{},[35,146,147],{},"Backup Harian",": Database dibackup secara otomatis setiap hari.",[32,150,151,154],{},[35,152,153],{},"Point-in-Time Recovery",": Kemampuan untuk memulihkan data ke detik tertentu dalam 30 hari terakhir.",[32,156,157,160],{},[35,158,159],{},"Geo-Redundancy",": Backup disimpan di lokasi fisik yang berbeda untuk ketahanan bencana.",[19,162,164],{"id":163},"pelaporan-celah-keamanan","Pelaporan Celah Keamanan",[15,166,167,168,173],{},"Jika Anda menemukan kerentanan keamanan di platform kami, mohon laporkan melalui program Bug Bounty atau email langsung ke ",[169,170,172],"a",{"href":171},"mailto:security@konektor.id","security@konektor.id",".",[175,176,178],"warning",{"title":177},"Penting",[15,179,180],{},"Jangan pernah membagikan password atau API Key Anda kepada siapa pun, termasuk staf support kami. Staf Konektor tidak akan pernah meminta kredensial Anda.",[19,182,184],{"id":183},"next-steps","Next Steps",[29,186,187,193],{},[32,188,189],{},[169,190,192],{"href":191},"\u002Fdocs\u002Fbusiness\u002Fteam-management","Manajemen Tim & Akses",[32,194,195],{},[169,196,198],{"href":197},"\u002Fdocs\u002Fprivacy\u002Fgdpr-compliance","Kebijakan GDPR",{"title":200,"searchDepth":201,"depth":201,"links":202},"",2,[203,209,213,214,215],{"id":21,"depth":201,"text":22,"children":204},[205,207,208],{"id":26,"depth":206,"text":27},3,{"id":75,"depth":206,"text":76},{"id":99,"depth":206,"text":100},{"id":121,"depth":201,"text":122,"children":210},[211,212],{"id":125,"depth":206,"text":126},{"id":132,"depth":206,"text":133},{"id":139,"depth":201,"text":140},{"id":163,"depth":201,"text":164},{"id":183,"depth":201,"text":184},"security",null,"Ikhtisar keamanan tingkat enterprise, enkripsi data, dan kepatuhan standar industri di Konektor.","md",{},1,"\u002Fdocs\u002Fsecurity\u002Foverview",{"title":224,"description":225,"keywords":226,"canonical":222,"image":232},"Keamanan Konektor - Enkripsi Data & Kepatuhan Enterprise","Pelajari bagaimana Konektor menjaga keamanan data Anda dengan enkripsi end-to-end, SOC 2 compliance, dan infrastruktur yang andal.",[227,228,229,230,231],"keamanan data","enkripsi","enterprise security","soc 2","iso 27001","\u002Fog-security-overview.png",{"loc":222,"lastmod":234},"2026-01-24","docs\u002Fsecurity\u002Foverview",[216,237,238,239,240],"encryption","compliance","enterprise","reliability",true,"s4QC7ngLwWhykVBrpIvSpk-7Chv9SXAii0jtmemt55I"]