Building a Compliance-Ready SMS: The Integrated Indonesian Compliance Architecture

The Indonesian Multi-Regulatory Challenge

Indonesian IT service organizations operate within a complex regulatory environment. Financial sector organizations face OJK requirements under POJK 11/2022. All organizations processing personal data face UU PDP requirements. Government organizations and government IT suppliers face SPBE and BSSN requirements. Payment system providers face Bank Indonesia (BI) requirements under PBI 10/2025.

These regulatory requirements have significant overlaps. Both POJK 11/2022 and SPBE require IT service management discipline. Both UU PDP and ISO 27001 require information security controls. Both BSSN and ISO 27001 address cybersecurity. Rather than maintaining separate compliance programs for each regulation and standard, the integrated compliance architecture designs a single SMS-centered program that satisfies multiple requirements simultaneously.

 

The Integrated Compliance Architecture Concept

The integrated compliance architecture rests on three core standards: ISO 20000 for IT service management, ISO 27001 for information security management, and ISO 22301 for business continuity management. These three standards, implemented integrally, address the majority of Indonesian regulatory IT governance requirements.

The SMS is the operational foundation. ISO 20000 Clause 8 practices (incident, problem, change, configuration, availability, continuity management) govern how IT services are delivered. ISO 27001 Annex A controls address information security. ISO 22301 governance addresses business continuity.

The integration is not sequential (first implement ISO 20000, then ISO 27001, then ISO 22301). Rather, the three standards are designed together as a unified governance framework where overlapping elements are implemented once, serving all three standards simultaneously.

 

Mapping Indonesian Regulatory Requirements to the Integrated SMS

OJK POJK 11/2022 Mapping

POJK 11/2022 IT service management requirements map directly to ISO 20000 Clause 8 practices. Incident management requirements are satisfied by ISO 20000 incident management (Clause 8.6.1). Change management requirements are satisfied by ISO 20000 change management (Clause 8.6.5). Availability requirements are satisfied by ISO 20000 availability management (Clause 8.7.1). Continuity requirements are satisfied by ISO 20000 and ISO 22301 continuity management.

POJK 11/2022 IT security requirements map to ISO 27001 Annex A controls. ISO 27001 includes controls for access control, encryption, authentication, and incident response that directly satisfy POJK security requirements.

UU PDP Mapping

UU PDP technical security measures map to ISO 27001 controls. Data breach notification requirements map to ISO 20000 major incident management. Data subject rights requests map to ISO 20000 service request management. Data processing register requirements map to ISO 20000 service portfolio and configuration management.

SPBE Mapping

SPBE IT service management requirements map to ISO 20000 Clause 8 practices identically to POJK requirements. SPBE audit criteria evaluate incident management capability, change control, availability monitoring, and continuity planning — all addressed by the integrated SMS.

BSSN Cybersecurity Framework Mapping

BSSN cybersecurity requirements map to ISO 27001 controls and to ISO 20000 incident and change management practices. ISO 20000 incident management enables rapid detection and response to security incidents. ISO 20000 change management prevents unauthorized configuration changes. These practices directly support BSSN cybersecurity implementation.

 

Indonesian-Specific Service Management Challenges

Power Infrastructure

Indonesia's power supply varies by region. Some areas experience frequent power outages; others have more stable power. IT service management must account for this reality. Availability SLA definitions must account for utility outages. If a region experiences 5% of hours without power, defining an availability SLA of 99.5% is unrealistic without backup power infrastructure.

The SMS must address power infrastructure challenges through documented practices: UPS policies specifying backup power duration, generator testing and maintenance schedules, availability SLA definitions that account for utility outages or that require customer investment in UPS/generator infrastructure.

Geographic Complexity

Indonesia is an archipelago with thousands of islands. IT services are delivered across geographically distributed locations with varying connectivity quality. Inter-island communications rely on submarine cables and satellite links with latency and bandwidth constraints.

The SMS must account for geographic distribution. Availability management must address distributed infrastructure dependencies. Incident management must account for remote support challenges and must define escalation procedures for remote support teams. Change management must accommodate time-zone differences and geographic separation of implementation teams.

Talent Constraints

The pool of experienced IT service management practitioners is limited in Indonesia outside major metropolitan areas. ITIL certification and ISO 20000 auditor experience are concentrated in Jakarta and a few other cities. Organizations outside major centers face challenges recruiting experienced IT governance personnel.

The SMS approach helps address this challenge through documented procedures and competence management. Well-documented SMS procedures reduce key-person dependency. Competence management practices ensure that staff training is tracked and that knowledge transfer occurs. Remote audit and advisory support from specialists in major centers can support distributed teams.

Bahasa Indonesia vs English Documentation

A practical question: should SMS documentation be in English (for international certification alignment) or Bahasa Indonesia (for staff comprehension)? The recommended approach: governance policies and procedures in Bahasa Indonesia for internal staff clarity; summary documents and audit presentations in English where required for international auditor assessment.

English-only documentation often results in poor internal understanding of procedures, as non-native English readers struggle with technical terminology. Bahasa Indonesia documentation increases internal engagement and procedure compliance. Selected executive summaries and compliance attestation letters can be provided in English for certification and regulatory purposes.

 

Building the Integrated Compliance Roadmap

24-Month Program Timeline

The integrated compliance roadmap is a 24-month program integrating ISO 20000, ISO 27001, and UU PDP compliance. The timeline is organized in six phases:

Months 1-3: Foundation. Conduct gap assessment for all three frameworks (ISO 20000, ISO 27001, UU PDP). Define SMS scope and governance structure. Secure leadership commitment and project governance. Assess current IT service management maturity and security posture.

Months 4-9: Design. Design integrated SMS documentation covering all three frameworks. Design ISO 27001 information security management system (ISMS) as extension of SMS. Document UU PDP data processing register and breach management procedures. Design service management practices (incident, change, configuration, availability, continuity) to address all three frameworks simultaneously.

Months 10-18: Implementation. Operate all SMS and ISMS practices against documented procedures. Build evidence base through incident records, change logs, availability metrics, training records. Conduct integrated internal audit program addressing ISO 20000, ISO 27001, and UU PDP requirements. Identify and remediate gaps.

Months 19-24: Certification. Conduct ISO 27001 and ISO 20000 combined audit (or sequential if on different certification timelines). Prepare UU PDP compliance documentation. Achieve certification. Document compliance with multiple regulatory frameworks.

 

The Compliance ROI Calculation

Integrated compliance delivers better ROI than parallel programs. The cost of developing documented procedures once is lower than developing separate SMS, ISMS, and compliance programs. The cost of operating unified governance practices is lower than operating parallel practices. The cost of a combined certification audit is lower than sequential audits.

Cost savings from integrated compliance are typically 40-60% relative to parallel programs. Additionally, integrated compliance improves operational consistency: incident management procedures are consistent with security incident requirements; change management accounts for both operational and security implications; configuration management serves both IT governance and security assurance.

Risk reduction value from integrated compliance is substantial. A mature integrated SMS reduces operational incidents, SLA breaches, and security incidents simultaneously. Risk reduction translates to customer confidence, improved contract retention, and reduced regulatory examination findings.

Revenue opportunity from certified market positioning is significant. Organizations with ISO 20000 + ISO 27001 certification can access government procurement opportunities that uncertified competitors cannot access. Financial services clients prefer certified providers. IT outsourcing contracts increasingly require certification.

 

Organizational Structure for Integrated Compliance

The most critical success factor in integrated compliance programs is organizational structure. Integrated compliance requires a single executive owner with accountability for the entire compliance portfolio. This owner must have authority to make decisions across ISO 20000, ISO 27001, and UU PDP domains. If separate owners are assigned (one for IT service management, one for IT security, one for data protection), they often operate in silos with conflicting decisions and incomplete integration.

 

The Compliance Architecture in Practice

In practice, the integrated compliance architecture looks like this: A unified documented information set covers service definition, incident management, change management, and availability management. The same incident management procedure identifies both operational incidents and security incidents (data breaches). The same change management procedure assesses both operational and security impact. The same configuration management system flags both operational and security-relevant infrastructure.

ISMS controls (access control, encryption, authentication) are documented as service design requirements. Services are designed to incorporate required security controls. Data processing is managed through the service portfolio and configuration management system. UU PDP breach notification integrates with major incident management.

KEY CONCEPTThe integrated compliance architecture is not about doing less compliance — it is about doing compliance once rather than multiple times. Each SMS practice satisfies multiple regulatory requirements simultaneously, dramatically increasing compliance efficiency.
IMPORTANTIntegrated compliance requires a single executive owner who has accountability for the entire compliance portfolio, not separate owners for each standard and regulation who operate in silos. Organizational structure is the most common failure point in integrated compliance programs.
BITLION INSIGHTBitlion GRC is purpose-built for the integrated Indonesian compliance architecture — a single platform covering ISO 20000, ISO 27001, ISO 22301, UU PDP, and POJK 11/2022 with shared evidence management, unified audit program, and consolidated regulatory reporting.

 

Indonesian Regulatory Requirement Mapping

Regulation/StandardKey IT Service RequirementsISO 20000 CoverageAdditional Coverage Needed
OJK POJK 11/2022Incident management, problem management, change control, configuration management, availability targets, continuity planning, SLA management8.6.1-8.6.5, 8.7.1-8.7.2 fully cover service management requirementsISO 27001 for security controls; compliance mapping to regulatory reporting obligations
UU PDP (Data Protection)Personal data breach notification (72hr), data subject rights requests (access, deletion, portability), data processing register, technical security measuresIncident mgmt for breach notification; Service request mgmt for rights requests; Service portfolio as processing registerISO 27001 for technical security controls; data protection governance procedures; DPIA process
SPBE (Government Services)Service documentation, availability targets, incident response, change control, configuration management, continuity planning8.6.1-8.6.5, 8.7.1-8.7.2 fully cover SPBE service management requirementsISO 27001 for BSSN cybersecurity; government-specific audit rights and reporting; inter-agency coordination procedures
BSSN Cybersecurity FrameworkSecurity controls, incident response, change management affecting security, access control, encryption, authenticationChange and incident management support cybersecurity implementation; configuration management maintains security baselinesISO 27001 Annex A controls comprehensively address BSSN requirements; integration with SMS
Bank Indonesia PBI 10/2025 (Payment Systems)Service management for payment processing, availability/continuity for payment systems, incident response for payment disruptions8.6.1, 8.6.3, 8.6.5, 8.7.1-8.7.2 cover payment system management if scopedISO 27001 for payment system security; specific payment processing SLA targets; regulatory reporting integration

 

Integrated Implementation Roadmap

PhaseMonthsKey ActivitiesISO 20000 MilestoneISO 27001 MilestoneUU PDP Milestone
Foundation1-3Gap assessment; scope definition; leadership alignment; current state maturity assessmentSMS scope defined; SMS governance structure approvedISMS scope defined; security requirements assessedData processing register initiated; UU PDP obligations documented
Design Phase 14-6Service portfolio design; incident/change/availability procedure drafting; policy frameworkService definitions drafted; incident/change procedures designed; SLA templates createdISMS policy framework drafted; control mapping to ISO 27001 Annex AData processing register drafted; breach notification procedure designed
Design Phase 27-9Procedure finalization; configuration management design; CMDB structure; tool requirementsAll Clause 8 procedures documented; CMDB design finalized; metrics framework definedAccess control and encryption policies finalized; ISMS procedures documentedData subject rights request process designed; DPIA template created
Implementation Phase 110-12Tool deployment; procedure rollout; staff training; pilot operations on limited scopeSMS tool deployed; procedures in pilot with 1-2 services; incident/change logs initiatedAccess controls implemented; encryption baseline established; security metrics initiatedData processing register populated; breach notification procedure tested with tabletop exercise
Implementation Phase 213-15Full production operation; evidence collection; metrics trending; internal audit preparationAll services operating under SMS; incident/change logs complete; availability metrics trending; SLA achievement trackedISMS controls operating; security incidents tracked; access control audits initiated; encryption audit completedData subject rights requests handled through process; breach notification timelines met; DPIA conducted for major changes
Implementation Phase 316-18Internal audit cycle; gap remediation; certification readiness; documentation finalizationInternal audit completed; gaps remediated; certification readiness assessed; management review completedInternal audit completed; control gaps remediated; certification readiness confirmed; management review documentedUU PDP compliance documentation complete; breach management tested; data subject communication templates finalized
Certification19-24ISO 27001 audit; ISO 20000 audit; combined audit or sequential; certificate issuance; regulatory filingISO 20000 certification audit conducted; certificate issued; scope publishedISO 27001 certification audit conducted; certificate issued; scope publishedUU PDP compliance attestation documented; regulatory notification completed if required