Skip to content

Engagement

FDE ModelOutcome PricingEngagement TiersEquity Partnerships

How We Build

Our StackTeam StructureSecurity & ComplianceAI Tooling & Ethics
Security & Compliance

Method / How We Build

Security & Compliance.

Every Indonesian enterprise procurement process now asks the same questions. Are you UU PDP compliant? Do you have a Data Processing Agreement? Are you ISO 27001 certified or in a credible path to it? Can you demonstrate BSSN-aligned incident response? Can your vendor-risk-management evidence pass an OJK audit? This page is the direct answer. Written for the procurement reviewer first; written for the CTO second.

ISO 27001SOC 2UU PDPBSSNOJK TPRM

Procurement-ready, not post-launch-patched

Sprout's security and compliance posture is built for Indonesian enterprise procurement realities. UU PDP (effective October 2024) requires Data Processing Agreements with vendors handling personal data. We provide a default DPA as part of engagement paperwork. OJK's Third-Party Risk Management expectations for supervised financial services now audit vendor security formally. We provide the documentation auditors expect. ISO 27001 is increasingly a procurement-gate requirement for regulated-sector engagements; our certification path is active and documented below. SOC 2 is increasingly requested by US and international clients; timeline documented. Our posture is evolving, and the evolution is visible.

UU PDP compliant
Data Processing Agreements standard in engagement paperwork
ISO 27001 path
Certification timeline documented and actively progressing (status TBD, Arno to confirm target date before launch)
SOC 2 path
Type II target timeline documented (status TBD, Arno to confirm before launch)
OJK + BSSN ready
Vendor-risk documentation, incident response, and regulatory audit evidence packaged for supervised clients

Signature Visual

Concentric compliance layers

A concentric-ring diagram showing compliance layers from the engagement core outward (per-engagement controls, ISO 27001, SOC 2 Type II, UU PDP / BSSN / OJK Indonesian regulatory surface, and international alignment). A right-side status bar reports the current certification state. Compliance-document aesthetic. Coming soon.

How we run the compliance discipline

Four principles that keep security and compliance a property of the firm rather than a document library.

01

Compliance as product requirement

Security and compliance requirements are treated as product requirements in every engagement, not post-launch audits. UU PDP access controls, OJK audit trails, BSSN incident readiness: all wired into the architecture at design review, not layered on before handoff.

02

Certification as public commitment

Certifications that the firm holds or is working toward are published honestly: current status, target dates, scope of certification. If we're not certified, we say so. If we're mid-path, we say where we are. Aspirational claims stay off the website.

03

Incident readiness as ongoing practice

BSSN-aligned incident response plans are not document artifacts. They're drilled quarterly. Runbooks, escalation paths, communication templates, regulator reporting flows. An incident that occurs inside a regulated-sector engagement has to be handled correctly from minute one, and that discipline comes from practice, not preparation.

04

Vendor-of-record discipline

When Sprout is a vendor-of-record for an OJK-supervised or BSSN-monitored client, we operate to the supervisory expectations they apply to us. Vendor-risk documentation, continuous-monitoring evidence, audit cooperation. We are the vendor, and we show up like one.

What's in place

Four areas of compliance posture with specific commitments and status.

UU PDP (Indonesia Personal Data Protection)

Data Processing Agreements included as standard engagement paperwork. Access controls mapped to roles and engagement boundaries. Data-subject request workflows documented. Cross-border transfer safeguards per UU PDP requirements.

DPA StandardRole-Based AccessData-Subject RequestsCross-Border Safeguards

ISO 27001 (Information Security Management)

Certification path active. Scope, target date, and certification body documented. Policy framework, risk assessment, control deployment across information security management domains. Status TBD, Arno to confirm current state before launch.

ISMSRisk AssessmentControl DeploymentCertification Path

SOC 2 Type II

Target timeline for SOC 2 Type II audit documented. Trust-service criteria coverage: security, availability, confidentiality. International-client-facing commitment. Status TBD, Arno to confirm before launch.

Trust Service CriteriaInternational Client CommitmentType II TargetAudit Path

OJK TPRM + BSSN Incident Readiness

OJK Third-Party Risk Management documentation packaged for supervised-client engagements. BSSN-aligned incident response plans with quarterly drill discipline. Vendor-of-record operating posture for regulated-sector clients.

OJK TPRMBSSN CIRTIncident DrillsVendor-of-Record Discipline

The compliance posture, visible

What the posture produces in practice, for clients, procurement reviewers, and regulator audits.

REGULATORY SIGNAL

UU PDP has changed vendor-paperwork defaults across Indonesia

UU PDP's effective date (October 2024) made Data Processing Agreements a required piece of vendor paperwork across Indonesian enterprise procurement. Services firms without a default DPA are increasingly slowing down procurement or losing the engagement. Sprout's DPA is standard.

Oct 2024UU PDP effective; DPA now standard procurement gate
MARKET BENCHMARK

ISO 27001 in Indonesia: 6–12 months, $20–50k cost range

ISO 27001 certification for a Sprout-scale services firm in Indonesia typically takes 6–12 months end-to-end, with cost in the IDR 300–800M range (approximately $20–50k USD). The regulated-sector expectation has made certification a procurement-gate requirement for OJK and BSSN-adjacent engagements.

6–12 mo / $20–50kTypical ISO 27001 certification timeline + cost in Indonesia
MARKET BENCHMARK

SOC 2 Type II: 9–15 months, $30–80k cost range

SOC 2 Type II audit typically takes 9–15 months including the observation period, at cost in the IDR 450M–1.2B range (approximately $30–80k USD). Common request from US and international clients; increasingly expected for SEA firms serving those markets.

9–15 mo / $30–80kTypical SOC 2 Type II timeline + cost

Need the compliance answer before you sign the procurement paperwork?

Tell us the engagement and the compliance surface you operate under (OJK, BI, UU PDP, BSSN, sector-specific). We'll share the current certification status, the DPA template, the vendor-risk-management evidence pack, and the specific compliance commitments we'll make in writing. Procurement-ready, not post-launch-patched.

Start a project