Purchase License

Buy licenses for Products, Implementation, and Services

Framework

Choose the perfect license plan for your organization

ISO 20000 Service Management Systems

ISO/IEC 20000 is the first international standard for IT Service Management (ITSM), establishing requirements for organizations to plan, establish, implement, operate, monitor, review, maintain, and improve a Service Management System (SMS). It ensures services meet customer expectations, providing quality, consistency, and alignment with business goals.

IT & Cyber Security
Contact Us

PBI 10 Pengaturan Industri Sistem Pembayaran

PBI 10/2025 adalah Peraturan Bank Indonesia Nomor 10 Tahun 2025 tentang Pengaturan Industri Sistem Pembayaran (PISP), diterbitkan Desember 2025 dan mulai berlaku 31 Maret 2026. Regulasi ini menyatukan seluruh ekosistem pembayaran nasional — penyedia jasa, penyelenggara infrastruktur, dan penunjang — ke dalam satu kerangka regulasi tunggal, sejalan dengan Blueprint Sistem Pembayaran Indonesia (BSPI) 2030.

Financial Compliance
Contact Us

GDPR

Data Privacy Government
Contact Us

SOC Type 2 (System and Organization Controls Type 2)

SOC Type 2 (System and Organization Controls Type 2) is an auditing standard developed by the American Institute of Certified Public Accountants (AICPA) to assess the effectiveness of a service organization's internal controls related to security, availability, processing integrity, confidentiality, and privacy over a period of time (typically 3–12 months).

Types:

  • SOC 2 Type 1 – Evaluates control design at a point in time.
  • SOC 2 Type 2 – Assesses control effectiveness over time (3–12 months).

Need help with SOC 2 compliance or audit prep? Call Bitlion NOWWWWW 🚀

IT & Cyber Security
Contact Us

ISO 22301 Business Continuity Management Systems (BCMS)

  • ISO 22301: International standard for Business Continuity Management Systems (BCMS).
  • Objective: Ensures business resilience against disruptions.
  • Key Elements:
    • Business Impact Analysis (BIA)
    • Risk Assessment
    • Business Continuity Strategy
    • Business Continuity Plans (BCP)
    • Incident Response & Crisis Management
    • Testing & Exercising
    • Continuous Improvement

Quality; Health & Safety
Contact Us

PBI 23 Penyelenggara Jasa Pembayaran

Peraturan Bank Indonesia (PBI) No. 23/6/PBI/2021 tentang Penyelenggaraan Penyedia Jasa Pembayaran (PJP) merupakan regulasi yang mengatur ekosistem layanan pembayaran di Indonesia, termasuk persyaratan dan kewajiban bagi para pelaku industri pembayaran digital.

Hubungi Bitlion untuk membantu anda mengelola perizinan PJP!

Financial Compliance
Contact Us

ISO 9001 Quality Management Standard

Quality; Health & Safety
Contact Us

Payment Card Industry Data Security Standard

IT & Cyber Security Financial Compliance
Contact Us

UU Perlindungan Data Pribadi

IT & Cyber Security Data Privacy Government
Contact Us

ISO 27001 Information Security Management System

ISO/IEC 27001 is the international standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS). Certification demonstrates that your organization applies a structured approach to managing sensitive information, covering people, processes, and technology. This hub summarizes how the standard fits into your compliance roadmap, what clauses and Annex A controls auditors expect, and how to move from initial scope definition through certification and ongoing surveillance. Use the downloadable brief as a shareable summary for executives and project sponsors.

IT & Cyber Security Government
Contact Us

Training

Choose the perfect license plan for your organization

Security Monitoring with Wazuh

Coming Soon

Courses IT
Coming Soon

ISO 27001 Implementasi

Coming Soon

Courses IT
Coming Soon

ITIL V4

coming soon

Courses IT
Coming Soon

Pelindungan Data Pribadi

coming soon

Courses IT Hacking & Cyber Security
Coming Soon

Template

Choose the perfect license plan for your organization

Personal Data Protection Guidelines in the Fintech Industry by AFTECH

The fintech industry is growing rapidly, but behind digital innovation, personal data protection is a crucial issue. Regulations such as Law No. 27 of 2022 on Personal Data Protection (PDP Law) and OJK Regulation No. 22 of 2023 on Consumer Protection in the Financial Services Sector set obligations for fintech companies to protect user data. Compliance is not just a legal requirement but also a way to build consumer trust.

Others
Free Forever

OJK Cybersecurity Guidelines for Financial Sector Technology Innovation (ITSK)

The financial sector is one of the most vulnerable industries to cyber threats. Therefore, the Financial Services Authority (OJK) has developed the Cybersecurity Guidelines for Financial Sector Technology Innovation (ITSK) as a guide for industry players to strengthen cyber resilience and protect financial data and transactions.

Cybersecurity in the financial industry is crucial due to the high risks of cyberattacks, data breaches, and other threats. This guideline aims to:

Increase understanding and awareness of cybersecurity.

Provide guidance on protecting customer data and information.

Ensure compliance with applicable regulations.

Mitigate risks and build a secure and reliable digital financial ecosystem.

Others
Free Forever

Cybersecurity Incident Response Plan (CIRP) Plan 1 & Plan 2

A strong Cybersecurity Incident Response Plan is crucial in today's threat landscape. By following a structured approach—from preparation to recovery—organizations can effectively mitigate cyber threats, protect their digital assets, and ensure compliance with global security standards. Cybersecurity is not just about defense; it's about proactive resilience and continuous improvement.

Others
Free Forever

Hardening Policy

This document outlines the technical standards and procedures applied to the cloud and on-premise environments. The policies aim to uphold information security, adhering to organizational standards and external requirements.

• To protect the data and information stored within the cloud and on-premise environment.
• To ensure the confidentiality, integrity, and availability of the data.
• To maintain standards and procedures that align with the information security management program requirements.
• To implement network segregation based on trust, sensitivity, and criticality.

Toolkits
Free Forever

NDA Template for Indonesia Company (Eng/Indo)

A Non-Disclosure Agreement (NDA) is a legally binding contract that prevents one party from sharing or using confidential information disclosed by another party. It acts as a shield to protect sensitive business data, trade secrets, and proprietary information.

Here are some real-world scenarios where an NDA is essential:

📌 Business Partnerships & Mergers – When discussing potential collaborations, mergers, or acquisitions.
📌 Hiring Employees & Contractors – To ensure they don’t disclose trade secrets or client information.
📌 Investor & Startup Discussions – Protects your business plan while pitching ideas to investors.
📌 Vendor & Supplier Agreements – When sharing production details or proprietary processes.
📌 Product Development & Innovation – To safeguard patents, designs, or unpublished research.

💡 Pro Tip: Always customize your NDA based on the specific nature of the information being protected!

Legal
Free Forever

PCI DSS Requirements V 4.0.1

The Payment Card Industry Data Security Standard (PCI DSS) was developed to encourage and enhance payment account data security and facilitate the broad adoption of consistent data security measures globally. 

PCI DSS provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment account data, PCI DSS can also be used to protect against threats and secure other elements in the payment ecosystem.

Pdf
Free Forever

Employee Screening Form Template

The Employee Screening Form (FRM-1.12.5) is used as a standard document to record all the verification steps during the recruitment process. This form includes checks on various aspects such as identity verification, education, work history, credit records, criminal background, and social media presence.

Reduced Hiring Risks – Prevents recruitment of unqualified or dishonest candidates.
Workplace Safety – Ensures employees have no history of violence or misconduct.
Stronger Company Reputation – Avoids scandals related to employee fraud or criminal activities.
Regulatory Compliance – Meets industry-specific hiring regulations and legal requirements.
Higher Employee Retention – Helps hire candidates who are genuinely suitable for the job, reducing turnover.

Toolkits
Free Forever

THREAT INTELLIGENCE POLICY

The purpose of this Threat Intelligence Policy is to establish a structured approach to identifying, assessing and mitigating security threats. This policy ensures that the organization proactively collects, analyzes and responds to security threats to protect information assets, operations and systems in accordance with the ISO 27001 standard.

Toolkits
Free Forever

Business Continuity Plan (BCP) Document (Bahasa)

This document is a comprehensive guide to implementing a Business Continuity Plan (BCP) to ensure that an organization can maintain or continue critical operations during a disruption. The BCP includes recovery procedures, risk mitigation strategies, and critical roles to play during an emergency, so that the organization remains resilient to challenges.

Pdf ISO27001 BCP
Free Forever

Platform

Choose the perfect license plan for your organization

Vulnerability Assessment

Identifying vulnerabilities is crucial step to address your security posture and to achieve minimal requirement fr ISO 27001

USD 1,000 /month

Enterprise

Our Enterprise version of Open Leo with no data or user limits and all modules. Email support is included.

On Premise
USD 3,000 /year Subscription

Community

A free and open version of Open Leo that allows you to move from spreadsheets at no cost.

On Premise
USD 0

Enterprise

Our Enterprise version is hosted by Open Leo. Install and updates taken care of by our teams. Email Support Included.

SaaS
USD 5,000 /year Subscription

Extended Support

Upgrade your standard E-Mail support to Zoom calls - up to 12 hours a year to help you with generic support questions.

Top Pick
USD 1,500 /year Subscription

Online Learning Platform

Our learning portal is free and packed with content to learn how Open Leo and GRC works in the real world.

USD 0

Instructor Led Training

If you don't want to learn Open Leo using our learning portal or Instructor-led training, a dedicated instructor will teach your GRC team how to use and implement Open Leo in dedicated Zoom workshops of up to 8 Hours of duration.

Workshop
USD 1,750 /month

Risk Management

We will help you configure Open Leo for Risk Management as well as to create your first Risks.

Workshop Top Pick
USD 800 /month

Compliance Management

We will help you configure Open Leo for Compliance Management and link Controls and Policies to any Compliance Package (ISO, PCI, etc.) you wish.

Workshop Top Pick
USD 800 /month

Online Assessments

We will help you create questionnaires and upload them to Open Leo so your suppliers can log in and provide feedback.

Workshop Top Pick
USD 800 /month

Certification Ready

We will help your organisation become certification-ready in ISO 27001 or SOC1/2.

ISO 27001 or SOC1/2
Custom Pricing Request Quote

Generic Consulting

Consulting hours packs for you to use them in any way you want.

8 hours
USD 800 /month

Risk Program Implementation

We help you define a custom Risk framework for your organisation, identify risks and treatment through interviews and implement the entire system on Open Leo using built-in notifications and reports.

Custom Pricing Request Quote

No Implementation Workshop

You decide to implement Open Leo on your own. Note that 70% customers with no assistance will likely delay the implementation for up to 12 months.

USD 0

Penetration Testing

We will perform Realistic, Industry-Specific Attack Simulations

Top Pick
Custom Pricing Request Quote

Audit IT (System, Process etc)

We will perform system information audit to ensure your IT readiness across the organization

Custom Pricing Request Quote

Tools

Choose the perfect license plan for your organization

Nagios - Open-source Monitoring Solution

Enterprise-Grade Monitoring – Provides real-time monitoring for IT infrastructure, applications, networks, and security.

Open-Source & Extensible – Highly customizable with thousands of plugins and integrations.

Proactive Alerting & Incident Response – Detects issues before failures occur, reducing downtime.

Log Management & Compliance Support – Helps meet ISO 27001, PCI DSS, GDPR, HIPAA, NIST, SOC 2, and more.

Scalable & Distributed Architecture – Supports large IT environments with high availability.

Security & Threat Detection – Monitors logs, detects anomalies, and prevents unauthorized access.

Cloud & Hybrid Monitoring – Supports AWS, Azure, GCP, and on-premises environments.

Comprehensive Reporting & Dashboards – Provides insights for audits, compliance, and performance tuning.

Would you like assistance with Nagios setup, best practices, or integrations? Call meeee 😊

IT Security; Forensic & Network
Install Nagios

Zabbix - Network Monitoring Open Source

What is Zabbix?

  • Open-source IT infrastructure monitoring software.
  • Tracks networks, servers, applications, cloud services, etc.
  • Supports agent-based & agentless monitoring (SNMP, ICMP, API, JMX).
  • Provides real-time alerts, dashboards, and automation.

Key Features:

  • Comprehensive Monitoring (network, cloud, databases, apps).
  • Automated Alerts (email, SMS, Slack, Telegram, etc.).
  • Scalability (monitors thousands of devices).
  • Custom Dashboards & Reports.
  • Integration (Ansible, Kubernetes, AWS, Azure, Grafana)

Would you like assistance with Zabbix setup, best practices, or integrations? Call meeee 😊

IT Security; Forensic & Network
Install Now

Wazuh - Open Source SIEM

Wazuh is a free and open source security platform that provides unified SIEM and XDR protection. It protects workloads across on-premises, virtualized, containerized, and cloud-based environments.

The Wazuh platform uses a server/agent model:

  • Wazuh central components (server, indexer, and dashboard) that analyze security data collected from the agents. They can be set up on-premises or in the cloud using the Wazuh Cloud solution.
  • Lightweight and universal security agents are deployed on monitored endpoints to collect security data and perform automatic responses to threats.

The Wazuh solution also provides agentless monitoring for devices such as routers, firewalls, and switches that do not support the installation of agents.

IT Security; Forensic & Network
Install Now