Indonesia Cybersecurity Report 2024
Indonesia Cybersecurity Report 2024
by Kadin Kominfo
Disclaimer 6
Foreword 8
Executive Summary 12
Chapter 1 Introduction 13
Appendices 115
Kadin INDONESIA
Indonesian Chamber of Commerce and Industry
Indonesia’s digital economy is growing rapidly, and its stability and business continuity. Therefore this docu-
size is projected to exceed $130 billion by 2025. With ment also serves as a valuable contribution from Kadin
internet penetration now exceeding 79%, sectors such Kominfo to the recent White Paper on Indonesia’s
as finance, healthcare, and energy are increasingly Strategic Economic Development and Policy Direc-
reliant on digital infrastructure. However, it is also crucial tion 2024-2029 which represents an essential contri-
to recognize that this growth comes with significant new bution from Indonesia’s business and industries toward
risks. Incidents of ransomware attacks, data breaches, achieving the new government’s target of 8% economic
and cyber espionage are now amongst the cyber growth.
threats which will cost Indonesia’s economy up to $4.79
billion annually by 2028. That is why, beyond regulatory emphasis, this document
explores the broader industry landscape, including the
Therefore, Kadin’s Industry Report and Strategic critical need for enhanced skills, heightened aware-
Guide: Cybersecurity for a Sustainable and Resil- ness, andi investment in cybersecurity education. Amid
ient Digital Indonesia is more than a set of guidelines. the complexities of our digital age, Kadin Indonesia is
Instead, it reflects a broader understanding of the committed to promoting collaboration between public
unique challenges and opportunities across various and private sectors to build a secure digital foundation
industries in Indonesia. This document provides a for Indonesia.
framework that enables organizations and particularly,
businesses and industries, to prepare for and respond It is clear that cybersecurity is no longer a technology
effectively to cyber threats. issue, it has become a business and national priority. By
working together, sharing knowledge, and implementing
As emphasized within this document, strong cyberse- best practices, we can ensure that Indonesian busi-
curity skills are essential and critical to our economic nesses and industries are not only prepared to defend
against cyber threats but are also positioned to thrive in
the digital age.
Sincerely,
10 Foreword Foreword
Cybersecurity for a Sustainable and Resilient Digital Indonesia
Foreword
As we embrace a digital revolution reshaping our ing stringent technical standards and regular updates,
society and economy, Indonesia faces unique cyber- aiming for a cybersecurity posture that is reactive, pre-
security challenges and opportunities. The “Kadin’s dictive, and proactive against current and future threats.
Industry Report and Strategic Guide: Cybersecurity for
a Sustainable and Resilient Digital Indonesia,” created Collaboration between the private sector, government,
in partnership with the US-ASEAN Business Council and academia is crucial for strengthening national
(US-ABC), evaluates our current state of cybersecurity cybersecurity resilience through the growth of the
and proposes a comprehensive strategy to bolster our domestic cybersecurity industry. In line with the report’s
defenses. Digital transformation has unlocked vast recommendations, the “Asosiasi Digitalisasi dan
innovation potential but has also introduced significant Keamanan Siber Indonesia (ADIGSI)” is being estab-
risks. Sectors such as financial services, healthcare, lished as a strategic initiative to enhance collaboration
and manufacturing increasingly depend on digital sys- between the private sector and government in advanc-
tems, exposing them to cyber threats. Data indicates a ing national cybersecurity. This association will support
concerning rise in the frequency and sophistication of Kadin Indonesia and all stakeholders in finalizing and
cyberattacks, posing threats to our national security and implementing the “Blueprint for the Development of
economic stability. Indonesia’s Cybersecurity Industry and Ecosystem.”
This report, based on thorough analysis and collabora- In conclusion, “Kadin’s Industry Report and Strategic
tion, examines the industry landscape to identify vulner- Guide: Cybersecurity for a Sustainable and Resilient
abilities and opportunities for proactive cybersecurity Digital Indonesia” serves as both a roadmap and a call
measures. It underscores the need to update regulatory to action, urging stakeholders—government, indus-
frameworks to align with technological advancements try leaders, and citizens—to strengthen our cyber
and address global compliance requirements to protect defenses. Together, we can secure Indonesia’s digital
citizens and stakeholders. Central to the strategy are future and ensure our nation thrives in the face of future
education and training to build a skilled workforce, along cyber challenges.
with public-private partnerships that enable the sharing
of threat intelligence and best practices. The report Let us commit to this vital endeavor, as the security and
advocates for a layered defense strategy incorporat- prosperity of our digital future depend on our actions
today.
Sincerely,
To support the existing Indonesia government initiatives developing a skilled workforce by investing in cyber-
in building a secure and resilient national cybersecurity. security education, training, and public awareness.
Kadin’s Industry Report and Strategic Guide: Cyberse- It advocates for adopting standardized cybersecurity
curity for a Sustainable and Resilient Digital Indonesia methodologies to ensure Indonesia’s practices are
emphasizes the urgent need for a robust and adaptive competitive globally. Although Indonesia has made
cybersecurity framework to support the nation’s rap- strides in addressing cyber threats, challenges remain,
idly growing digital economy. As Indonesia expands particularly in the form of sophisticated attacks like
its online services, protecting national critical infra- ransomware, data breaches, and cyber espionage. The
structure—such as energy, telecommunications, and government, through its cybersecurity agency, is work-
healthcare—has become essential to ensure service ing to improve national resilience, but further efforts are
continuity and mitigate the impact of cyber incidents. needed to enhance collaboration and talent develop-
The report outlines strategic pillars, including enhanc- ment. Furthermore, this white paper also explores the
ing cybersecurity governance through improved regu- role of Kadin Indonesia in accelerating the implemen-
latory frameworks aligned with international standards, tation of proposed cybersecurity pillars. Overall, the
and fostering public-private partnerships to strengthen white paper provides a strategic roadmap for securing
threat detection, response, and mitigation. Indonesia’s digital future, ensuring it remains resilient in
the face of growing cyber risks.
This report also introduces six main strategic pillars of
cybersecurity for Indonesia inter alia 1) cyber resilience
in critical infrastructure, 2) enhancing cybersecurity
governance and regulations, 3) developing cyberse-
curity talent and awareness, 4) public-private partner-
ships, 5) aligning Indonesia with standardized cyberse-
curity methodologies and standards, and 6) building a
competitive and resilient local cybersecurity industry.
Additionally, the Report stresses the importance of
01
Introduction
Cybersecurity has become a critical element for nations, businesses, and individuals in an increasingly
digital world. As one of Southeast Asia’s fastest-growing digital economies, Indonesia stands at a pivotal point
where immense opportunities are decorated with significant risks.
With over 270 million people, Indonesia’s online services are growing rapidly, from e-commerce to financial
services and online healthcare to Government platforms. This spread of digital has disrupted every aspect of
industries. However, all these developments come with increased vulnerabilities, and failure to address them can
put the entire digital ecosystem at risk of instability and compromise.
These cyberattacks have graduated from ransomware attacks on critical infrastructures to highly sophisti-
cated phishing schemes against citizens and businesses. Critical infrastructure sectors in Indonesia, including
energy, telecommunications, health care, and financial services, are pretty vulnerable to such emerging threats,
which could bring immense financial losses, disruptions in operations, and even threats to national security.
With cyber incidents increasing in frequency and severity, cybersecurity can no longer remain an IT issue;
it is a priority concerning national security. As Indonesia continues to expand its digital economy, the need for a
robust, adaptive, and comprehensive cybersecurity framework becomes more urgent.
1.2 Kadin’s Cybersecurity Industry White Paper and Implementation Roadmap Strategic
Objectives
The cybersecurity challenges in Indonesia can only be resolved through the implementation of unified and
coordinated solutions. This report acts as a foundational guideline for addressing existing vulnerabilities while
building long-term resilience in the Indonesian Cybersecurity Industry, combining public and private sector best
efforts to build a strong and resilient cybersecurity ecosystem.
1. Enhancing the Resilience of National Critical sionals in the workforce. Through targeted actions
Infrastructure at all levels of the education system, training, and
Protecting key assets in critical sectors (finance, upskilling initiatives, Indonesia can address this
healthcare, manufacturing, energy) is vital for In- challenge. In addition, awareness of cybersecurity
donesia. A secure and resilient infrastructure is the issues should be elevated in every layer of Indone-
basis of assuring an uninterrupted supply of goods sia’s local society, covering ordinary citizens to the
and services and the minimal economic impact of large corporations, as this is essential for building a
cyber incidents culture of security awareness in Indonesia.
2. Enhancing Cybersecurity Governance and Reg- 5. Aligning Indonesia with Standardized Cyberse-
ulatory Frameworks curity Methodologies and Standards
A strong regulatory framework is essential for gov- In an attempt to effectively handle cyber incidents,
erning cybersecurity practices in Indonesia’s sev- we should encourage the establishment of stan-
eral different sectors – which can only be achieved dardized cybersecurity methodologies and risk
by implementing and enforcing modernized cyber- frameworks that align with existing best global
security law and synchronizing Indonesian national frameworks. The harmonization of Indonesia’s
law with international standards. A robust legal cybersecurity standards ensures consistency and
framework ensures that Indonesia’s cybersecu- continuity in cybersecurity practices across in-
rity practices are standardized, enforceable, and dustries. Moreover, with this alignment, Indonesia
adaptable to new threats. will become the regional leader in cybersecurity
and, most importantly, ensure the nation’s security
3. Fostering Public-Private Partnerships and Col- frameworks remain globally competitive.
laboration
To achieve a secure and resilient digital nation in 6. Strengthening Local Players in Indonesia Cy-
2045, strong collaboration between the govern- bersecurity Industry Growth
ment, private sector, academic sector and any Competitive and resilient local cybersecurity indus-
international partners is essential. Developing try is crucial to reducing dependence on foreign
public-private partnerships where resources and enterprises and ensuring national digital sovereign-
knowledge are combined can be an effective ty. Key to this will be creating favorable regulations,
approach to creating a secure and resilient digital offering financial incentives for local R&D, estab-
nation in 2045. The partnerships ensure that every lishing a certification framework for local compa-
stakeholder plays a role in securing the cyber land- nies, and encouraging public-private partnerships
scape in Indonesia. to eventually support the growth of Indonesian
cybersecurity companies, creating a more sus-
4. Growing Cybersecurity Talent and Awareness tainable ecosystem for fulfilling the needs of both
Growing a pool of highly qualified cybersecurity domestic and global markets. A reinforcement of
talent is one of the key foundations in an attempt the local capacity bolstered Indonesia’s national
to address the shortage of cybersecurity profes- security and promoted economic prosperity and
technological leadership within the region.
02
Current
Cybersecurity
Landscape
16 Cybersecurity for a Sustainable and Resilient Digital Indonesia
2.1 Global and National Cybersecurity Environment
The threat landscape of global cybercrime continues to evolve. Attacks on both public and private sectors are
becoming increasingly sophisticated. These are increasingly dependent on new attack vectors empowered by AI
and ML, while ransomware-as-a-service attacks boast very focused and destructive breaches. Then, there is cyber
espionage and cyber war carried out by nation-state actors, further complicating this threat environment. Indeed,
against a background of increasing incidence and intensity of data breaches, ransomware incidents, and supply
chain compromises, robust cybersecurity is an issue that takes on an international dimension of imperatives.
Nation-State Actors
They often linked to government-sponsored cyber
activities for espionage, sabotage or strategic advan-
tage.
Hacktivists
Individuals or organizations are driven by politics
or ideologies and seeking to further their objectives
online.
More specifically, nation-state actors, organized cybercriminal groups, and hacktivists are continuous-
ly evolving new attack methods at the global level. With AI and ML in cyberattacks, attackers can automate
large-scale campaigns and amplify their reach and impact. Moreover, with ransomware-as-a-service platforms,
the barriers to entry have been lower for less-skilled attackers; thus, the scale of ransomware attacks globally has
increased. Taken in concert with the sustained cyber espionage from nation-states, this set of trends creates a com-
plex, rapidly changing threat environment that is difficult for governments and businesses.
A rapid surge of ransomware attacks, data breaches, and online fraud against businesses and state entities
has marked the Indonesian cybersecurity landscape. During the past year, ransomware attacks have targeted
Cybersecurity for a Sustainable and Resilient Digital Indonesia Current Cybersecurity Landscape 17
the financial service sector more than any other industry, proving it to be vulnerable to cyber threats. This includes
the ransomware attack against the country’s national data center, which brought down several public services; the
leakage of the Indonesia Automatic Fingerprint Identification System (INAFIS); and the National Armed Forces
Strategic Intelligence Agency. Data shared by Palo Alto Networks Unit 42 shows the following industries were most
affected in Indonesia because of ransomware activities during the last year:
15.1% Manufacturing
24.7% Professionals & Legal Services
Wholesale & Retail
10.5% Construction
High Technology
4.7% Healthcare
10.5% Financial Services
4.9% Transportation & Logistics
Education
5.2%
8.9% Others
7.4%
8.2%
• AlloyTaurus (aka GALLIUM, Softcell): The activities coincide with the ASEAN-Australia
This Chinese advanced persistent threat group Special Summit on March 4-6, 2024. ASEAN en-
customarily runs cyber espionage campaigns tar- tities are natural targets for espionage operations
geting telecommunications, financial institutions, because they contain sensitive diplomatic and
and Government entities across Asia, Europe, and economic information.2
Africa, including Indonesia.1
• February 2024 Data Leak:
• March 2024 Incident: I-Soon, a Chinese enabler, was involved in a data
This report points out two Chinese APT groups breach that revealed access to critical information
involved in cyber espionage activities across from Indonesia’s Department of Commerce.3
ASEAN-affiliated entities and member countries.
18 Current Cybersecurity Landscape Cybersecurity for a Sustainable and Resilient Digital Indonesia
Ongoing Government Efforts
The Indonesian Government is already taking steps to develop its cyber capacities, the most prominent
of which is the creation of the National Cyber and Crypto Agency. However, there are few challenges that still
need to be addressed, including a deficiency of skilled cybersecurity talent and a general absence of the in-depth
coordination of public-private collaboration necessary for strengthening cyber defenses.
Overcoming these challenges will require comprehensive action that improves cyber risk management prac-
tices across Indonesian sectors, harmonizes the regulatory framework towards International cybersecurity
standards-compliant maturity level, invests in capacity-building by establishing a more sustainable model of
over-arching education & awareness campaign as well as skill creation mechanism thereby shaping behavioral
changes and increasing the future talent pool, and strengthening technical capacities for effective response against
attacks on CIIs.
By prioritizing these cybersecurity issues, Indonesia can secure its digital future, increase resilience across critical
sectors, and contribute to regional and global cybersecurity efforts.
1
Unit 42, “GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool.” Unit 42,
June 13, 2022. https://unit42.paloaltonetworks.com/pingpull-gallium/
2
Unit 42, “ASEAN Entities in the Spotlight: Chinese APT Group Targeting.” Unit 42 (blog), March 26, 2024. https://unit42.paloaltonetworks.
com/chinese-apts-target-asean-entities/
3
Christian Shepherd et al., “China’s Hacking Operations Exposed by Document Leak.” *The Washington Post*, February 21, 2024. https://
www.washingtonpost.com/world/2024/02/21/china-hacking-leak-documents-isoon/
Cybersecurity for a Sustainable and Resilient Digital Indonesia Current Cybersecurity Landscape 19
2.2 Sector-Specific Landscape
The global financial services sector continues to be threatened by an ever-evolving cyber threat land-
scape. Threat actors continue evolving tactics to exploit vulnerabilities within this critical industry. This sector
includes various organizations, from credit unions and small insurance companies to large cryptocurrency
exchanges and stock exchanges. Each industry subgroup has threats specific to its unique characteristics; how-
ever, opportunistic and financially motivated cybercriminals, especially ransomware groups and IABs, are the most
significant adversaries.
According to intelligence by Palo Alto Networks, a variety of critical threats have emerged as being of particular
significance both globally and within Indonesia:
20 Current Cybersecurity Landscape Cybersecurity for a Sustainable and Resilient Digital Indonesia
• Spear Phishing and Unpatched Vulnerabilities: tutions, and threat actors find them increasingly
Spear phishing emails and unpatched vulnerabili- attractive.
ties remain essential methods of initial access for
threat actors. These phishing attacks are usually • Ransomware:
made to revolve around current events or business Ransomware remains one of the most preva-
activities and are very effective. The attackers lent threats to the financial services sector. In
often use the “spray-and-pray” method, exploiting Indonesia, this vulnerability is particularly acute.
publicly known vulnerabilities and exposing inter- Over the past year, Palo Alto Networks Unit 42
net-facing assets to breach financial institutions. has observed 271 ransomware attacks targeting
the financial sector, originating from 44 distinct
• Rapid Weaponization of Vulnerabilities: ransomware groups. These groups exhibited
The fast exploitation of zero-day and one-day vul- opportunistic behavior, targeting the sector without
nerabilities is one of the critical risks to the financial displaying significant preference toward specific
services sector. Cybercriminals take little time to sub-industries. The following chart shows the top
exploit these weaknesses, sometimes even when ransomware operators impacting the financial
patches are available or applied. In this, an under- sector in Indonesia. Sub-industries such as finan-
ground market exists for ready-to-use tools, thus cial and investment consulting, banking and secu-
setting the enabling actors of all skill levels with an rities, and investment management were affected.
acquisition tool, source code, and other resources
that increase the frequency and impact of cyber- • Banking Trojans:
criminal activity. Banking trojans have become one of the growing
threats as attackers expand their target base to
• Malvertising and SEO Poisoning: embrace a wider selection of financial institutions
Another significant threat is Malware and SEO poi- and a variety of data types. While banking trojan
soning. These tactics redirect users to malicious malware has become increasingly sophisticated,
websites with the aim of downloading romanized stealing highly sensitive information across multi-
versions of popular software. These actions ple financial services and amplifying the potential
compromise security among both users and insti- impact of these attacks continues unabated.
In Indonesia, these global threats are even more pronounced because of the rapid digital transformation
of the sector. The attack surface keeps growing as financial services are delivered utilizing digital infrastructure.
This will call for the financial services industry to invest more in continuous monitoring, rapid patching of vulnerabil-
ities, and proactive sharing of threat intelligence across the sector. In Indonesia, the inability of financial institutions
to safeguard against the ever-changing cyber world calls for concerted efforts from both the public and private
sectors.
20% 20%
Transforming Scorpius (Medusa Locker)
Spoiled Scorpius (Ransomhub)
RansomHouse
20% 20% Flighty Scorpius (Lockbit)
Salty Scorpius (Trigona)
20%
Exhibit 2.4 Top Ransomware Operators Impacting the Financial Sector in Indonesia, Source: Palo Alto Networks Unit 42
Cybersecurity for a Sustainable and Resilient Digital Indonesia Current Cybersecurity Landscape 21
2.2.2 Healthcare Sector
Numerous cybersecurity risks that could have severe consequences in Indonesia as well as globally
confront the healthcare sector. Due to the industry’s dependence on digital infrastructure and sensitive personal
data, it is a popular target for many types of cyberattacks.
Palo Alto Networks has noted the following actions that have an effect on the healthcare industry:
• DDoS attacks (Distributed Denial of Service): patient care being stopped, and closed access
In order to access patient records, telemedicine, to patient records for healthcare facilities, which
and vital internal communications, network con- might cause serious delays in life-saving treat-
nectivity is essential for the companies in the ments. Recent assaults in Indonesia demonstrate
healthcare sector. These Distributed Denial of Ser- the rising threat posed by ransomware as a result
vice (DDoS) assaults may cause system traffic to of the country’s fast digital transition in the health-
overload, interfering with emergency services and care sector.
potentially postponing patient care or even worse,
posing a threat to human life if left unchecked. The • Data Breach:
repercussions of such attacks could be gravely There may be dangerous repercussions if per-
severe, as our networks are crucial for coordinat- sonal health information is stolen or viewed without
ing lifesaving treatment and maintaining access to authorization. Data breaches can be exploited
timely medical help. for fraud, identity theft, or the black market. For
patients, this means a breach of privacy and even
• Supply Chain Attacks: financial loss; for institutions, it means legal trouble
For solutions ranging from medical supplies to IT and a decline in confidence. Like their international
infrastructure, many healthcare facilities rely on counterparts, Indonesian healthcare institutions
a network of outside vendors. Every link in this manage substantial volumes of personal data,
supply chain could have a security breach that which makes them desirable targets for hackers.
affects the entire network, resulting in compro-
mised medical devices, data leaks, and disruptions • Insider Threats:
to operations. The risk associated with supply Negligence or malicious intent may turn workers or
chain security is increased in Indonesia due to contractors with network and sensitive data access
the interdependence of suppliers and healthcare into threats. The repercussions of selling data,
providers. treating it improperly, or inadvertently disclosing
it can be disastrous, compromising patient safety
• Web Application Attacks: and resulting in problems with the law and large
In healthcare portals, interfaces for provider com- financial damages. Similar difficulties impacted
munication and patient data access are common- Indonesia’s healthcare industry, where insider
place. Online application hacks like cross-site threats seriously jeopardize data security.
scripting (XSS) and SQL injection can take advan-
tage of vulnerabilities in online applications to • Large Attack Surface of IoT Devices:
alter patient data, steal private information, or gain A typical mid-size hospital includes about 100
unauthorized access to healthcare systems. These imaging-related servers or workstations (such
attacks might have a major effect on patient data as PACS servers or DICOM image viewers) and
security and integrity. about 75 various kinds of medical imaging instru-
ments (like X-ray, MRI, CT, or ultrasound scan-
• Ransomware: ners). The attack surface is increased by these
This form of virus encrypts important data and IoT gadgets, which offer several ports of entry for
locks down computers until a ransom is paid. This cyberattacks.
may result in hospital operations being disturbed,
Healthcare organizations in Indonesia and throughout the world may better safeguard their digital infra-
structure, preserve patient data, and guarantee the continuation of vital healthcare services by being
aware of these dangers and putting strong cybersecurity measures in place.
22 Current Cybersecurity Landscape Cybersecurity for a Sustainable and Resilient Digital Indonesia
2.2.3 Manufacturing Sector
Due to its critical role in economic and strategic domains, manufacturing sector companies have emerged
as a prime global target for cyber threats. The sheer number of data points shows how severe and sophisticat-
ed the cyber attacks the industry is facing.
Palo Alto Networks has noted the following actions that have an effect on the manufacturing industry:
• Cyber Extortion and Ransomware: along with its partners and clients, can be disrupt-
The Manufacturing sector tops the list of targeted ed by these attacks, which can have wide-ranging
industries, accounting for 20% of all cyber extor- impacts. It is expected that nation-state actors and
tion, marking a 42% increase compared with 2022 hackers will continue to exploit software supply
figures.4 Palo Alto Networks Unit 42 assesses with chain vulnerabilities to compromise manufacturing
high confidence that ransomware poses the most networks.
significant threat to organizations in the manufac-
turing industry. With 16.8% of cases, extortion-re- • Initial Access Vectors:
lated ransomware is the most common type of The manufacturing industry’s top initial access
investigation observed in the sector. Ransomware vectors, according to data from the Palo Alto
primarily targets the Chemicals and Specialty Networks Unit 42 Incident Response case survey,
Materials sub-industry in Indonesia, with Squalid are software/API vulnerabilities, brute force at-
Scorpius (8Base) being the most common ran- tacks, social engineering, and insider threats. The
somware operator in this market.5 most popular first access channels, according to
reports, were phishing and vulnerabilities, under-
• Nation-State Attacks: scoring the necessity of strong security protocols
Nation-state actors frequently target this industry, and staff awareness programs.7
driven by diverse motivations, including geopo-
litical ambitions and economic interests. Recent • Incident Response and Impact:
data indicates that 17.7% of nation-state attacks Manufacturing accounted for 11% of all incident
have been directed at the manufacturing sector.6 response instances reported in 2023, ranking it as
These attacks often aim to gain access to critical the fourth most affected industry. In 2024, this per-
technologies, economic leverage, and strategic centage rose, highlighting the mounting danger.
advantages essential to national goals. The ransomware that seriously disrupted opera-
tions by encrypting important data and demanding
• Software Supply Chain Compromises: ransom payments was the subject of the most
Software supply chain compromises are likely an important investigations.
active, increasing threat to organizations in the
manufacturing industry. The targeted organization,
The soaring numbers of attacks on the manufacturing sector in Indonesia, these dynamics point to sig-
nificant urgent need for enhanced cybersecurity measures, including regular vulnerability assessments,
comprehensive incident response plans, and stronger collaboration between public and private sectors.
4
Kevin Poireault, “Manufacturing Top Targeted Industry in Record-Breaking Cyber Extortion Surge.” Infosecurity Magazine, October 5, 2024.
https://www.infosecurity-magazine.com/news/manufacturing-top-targeted-orange/
5
Unit 42. “Threat Actor Groups Tracked by Palo Alto Networks Unit 42.” Unit 42, June 27, 2024. https://unit42.paloaltonetworks.com/threat-ac-
tor-groups-tracked-by-palo-alto-networks-unit-42/
6
SentinelOne. “Risks Within the Factory Lines | Examining Top Threats Facing the Manufacturing Industry.” SentinelOne, September 19, 2023.
https://www.sentinelone.com/blog/risks-within-the-factory-lines-examining-top-threats-facing-the-manufacturing-industry/
7
Palo Alto Networks. “Incident Response 2024 Report,” n.d. https://www.paloaltonetworks.com.au/resources/research/unit-42-incident-re-
sponse-report
Cybersecurity for a Sustainable and Resilient Digital Indonesia Current Cybersecurity Landscape 23
2.2.4 Critical Infrastructure Sector
Protecting vital assets in the critical infrastructure sector will probably require more commitment – in par-
ticular, in areas such as energy, oil, and gas sectors. Over the past decades, as this sector is a vital part of the
global economy and national security, Indonesia’s growing reliance on digital infrastructure within the energy, oil,
and gas sectors has boosted the country’s attractiveness as a main target for a range of cyber threats. Moreover,
with their critical role in modern life and complex infrastructure, these sectors face complex, unique challenges.
Analysis from Palo Alto Networks Unit 42 has identified the following trends:
In Indonesia, the country’s growing reliance on digital infrastructure within energy, oil, and gas sectors
continues to make them attractive targets for cybercriminals and nation-state actors alike.
24 Current Cybersecurity Landscape Cybersecurity for a Sustainable and Resilient Digital Indonesia
2.3 Cost of Cybercrime for Indonesia
Global cybercrime continues to proliferate at alarming rates as projections indicate that damage from
cyberattacks will amount to about $10.5 trillion annually by 2025, a staggering increase from $3 trillion in
2015 at the current growth rate.8 Globally, the bulk of these losses stem from ransomware and data breaches,
with the financial services, healthcare, and manufacturing sectors being the hardest hit; in addition to immediate
financial losses, these sectors also confront recovery expenditures, legal accountability, and injury to reputation.
Furthermore, Operational disruptions also result from cyber attacks. For example, the loss of valuable intellectual
property and additional expenditures required for cybersecurity measures all factors that contribute to the widening
economic consequences.
As the Indonesian digital economy grows, high-profile cybercrime grows with it, and also significant
financial impacts in Indonesia, amount to about $4.79 billion annually by 2028 - a 35.7 percent increase
from 2018 level.9 Ransomware attacks on critical infrastructure and data breaches that expose personal and sen-
sitive Government data are some examples of common cybercrime that have occurred in Indonesia.
Exhibit 2.5 Projected Annual Cost of Cyber Crime in Indonesia from 2018 - 2028 (In Billion U.S dollars)
Source: Statista Technology Market Insights
Indonesia has the opportunity to substantially reduce the financial damage caused by cybercrime while
also becoming more resilient against future threats. In an attempt to reduce the financial damage, we have
found that it is a very demanding task to determine effective strategies to address economic costs of a lack of
cybersecurity in Indonesia. Such strategies include enforcing robust cybersecurity policies, public-private sector
collaborations, cybersecurity education investment, and robust incident response framework.
8
Mitangi Parekh, “Cybersecurity Ventures Report on Cybercrime.” eSentire, August 29, 2024. https://www.esentire.com/cybersecurity-funda-
mentals-defined/glossary/cybersecurity-ventures-report-on-cybercrime.
9
Statista, “Annual Cost of Cyber Crime Indonesia 2018-2028,” September 4, 2023. https://www.statista.com/forecasts/1411153/indone-
sia-cost-of-cyber-crime#:~:text=In%202022%2C%20the%20cost%20of%20cyber%20crimes%20in,from%202018%20to%202028%20
%28in%20billion%20U.S.%20dollars%29
Cybersecurity for a Sustainable and Resilient Digital Indonesia Current Cybersecurity Landscape 25
Chapter
03
Strategic
Pillars for
Cybersecurity
26 Cybersecurity for a Sustainable and Resilient Digital Indonesia
As Indonesia accelerates its journey towards digitalization, it is also seeing an increasing range of cyber
threats that could hinder the country’s economic growth, national security, and critical infrastructure. To
address these challenges, Indonesia must establish cybersecurity strategic pillars to outline a firm foundation for
the national cybersecurity ecosystem that is resilient enough to confront ongoing challenges.
Pillars
Critical Focus
Strenghtening critical • Aligning national • Establishing talent Facilitating cross-sector • Adopting global • Policy and regulatory
sector defenses through: cybersecurity laws pipelines collaboration for: methodologies (e.g., support
• Regular audits with global standards • Certification program • Threat intelligence ISO, NIST) • Participation in govern-
• ncident response plans (GDPR, NIST) (professionals, compa- sharing • Adopting risk man- ment projects
• Security Operations • Ensuring centralized nies, etc) • Incident review boards agement frameworks • R&D grants, innovation
Centers (SOC) regulation • Educational programs • Joint R&D efforts across sectors hubs, and IP protection
Strengthening the resilience of Indonesia’s critical infrastructure sectors (such as banking, healthcare,
and energy) is the aim of this pillar. In an attempt to protect these industries from cyberattacks, some key
actions such as implementing periodic sector assessments, cybersecurity framework tailored to each industry,
supported by an Advanced Security Operations Center (SOC) are essential to be implemented.
• Sector-Specific Security Operations Center Establish a dedicated SOC for each critical sector to ensure re-
al-time threat monitoring, analysis, and coordinated responses to cyber incidents that align with a centralized
national SOC to ensure unified defense mechanisms across sectors.
Developing and enforcing a robust cybersecurity governance and regulations is the second pillar’s ob-
jective. It stresses the importance of aligning national laws with international standards, strengthening existing
regulations, creating cybersecurity SROs, and ensuring regular updates in response to emerging cyber threats.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Strategic Pillars for Cybersecurity 27
Critical Areas of Focus:
• Align with International Standards
Adopts and adheres to global data privacy standards such as ISO/IEC 27001 and the General Data Protection
Regulation (GDPR) to drive seamless integration and trust in Indonesia’s cybersecurity procedures.
• Establish Self-Regulatory Organization (SRO) Create Indonesia’s local cybersecurity self-regulatory orga-
nization (SRO) to strengthen the nation’s cybersecurity posture by fostering collaboration, tailored standards,
and protecting local cybersecurity providers.
In an attempt to develop a more unified and successful national cybersecurity strategy, pillar four empha-
sizes the necessity of cooperation between government agencies and businesses in the private sector.
Public-private partnerships are crucial for exchanging resources, intelligence, and best practices.
28 Strategic Pillars for Cybersecurity Cybersecurity for a Sustainable and Resilient Digital Indonesia
• Collaborative Research and Development: Encourage joint R&D projects between government organiza-
tions, educational institutions, and private companies to develop cutting-edge cybersecurity solutions, with a
focus on cutting-edge technologies like blockchain, AI, and quantum computing.
Being able to apply globally accepted cybersecurity methods and standards (such as ISO and NIST) is the
objective of the fifth pillar. And to achieve the seamless integration and efficient defense systems, it will require
to developing an integrated approach to cybersecurity across industries.
The presence of a robust local cybersecurity market is fundamental to protecting Indonesia’s critical
infrastructure, minimizing reliance on foreign technologies, and encouraging economic development. This
pillar discusses primary approaches to creating a competitive, innovative, and independent local cybersecurity
ecosystem.
• Transition to Innovation
It is a must for Indonesia to be able to expand its cyber security offerings and does more than just install off-
the-shelf solutions. RnD will run faster if innovation centers are built and collaboration between academia and
business is encouraged. This will enable solutions that better suit the unique needs of the country.
• SRO Standardization
To guarantee the credibility and competitiveness of local Indonesian businesses in the market, an SRO must
provide certification programs and industry standards. This attempt aims to encourage equal competition and
enable companies to take part in national initiatives.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Strategic Pillars for Cybersecurity 29
Chapter
04
Sector-Specific
Cybersecurity
Insights
30 Strategic
Cybersecurity for Pillars for Cybersecurity
a Sustainable and Resilient Digital Indonesia
As Indonesia accelerates its digital transformation, attacks on sectors such as financial services, health-
care, manufacturing and energy, which are some of the main critical sectors in Indonesia, are increasingly
widespread, making them vulnerable to growing cyber risks. The following sections will discuss sectoral asset
mapping, attack surface management, and vulnerabilities specific to each critical sector.
As the digital ecosystem accelerates its growth, it expands our exposure to cyber risk. It is becoming truly
essential for organizations to prioritize understanding and managing their attack surface as this would help them
to evaluate network infrastructure from an adversary’s perspective in an attempt to identify vulnerabilities that
exist and can be exploited by adversaries as attack vectors. Furthermore, organizations begin to accelerate the
modernization of their IT infrastructure—through cloud adoption, SaaS platforms, and distributed workforces—and
their attack surface, thus will grow dramatically. Effective Attack Surface Management (ASM) should thus
become an integral part of their strong cyber security posture.
Exhibit 4.1 Attack Surface Management , Source: Palo Alto Networks Cyberpedia
Organizations are increasingly unable to manage their sprawling IT environments due to the sheer
number of services added and updated. According to the Palo Alto Networks Unit 42 Threat Assessment
Report, the average organization adds or updates more than 300 services monthly, contributing to 32% of new
high or critical cloud exposures. This challenge is even greater in certain industries:
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 31
• It found out that the media and entertainment industry adds about 7,000 new services each month.
• The life sciences, insurance, telecommunications, and pharmaceutical industries all see significant
growth; each month, more than 1,000 new services are added to their attack surfaces.
• More than 200 new services are added to the attack surfaces of vital industries including finance,
healthcare, and manufacturing each month.
With a lack of centralized control across many public services in Indonesia, their complexity becomes increasing-
ly challenging, increasing the risk of misconfiguration, inconsistent exposure, and data breaches. Attack Surface
Management, which provides programmatic methods to detect, control, and mitigate risk through continuous
observation and evaluation of an organization’s exposed digital assets, is critical in this complexity.
1. Visibility is Critical
• “You cannot secure what you do not know” is the foundational principle of ASM that needs to be
adopted in an attempt to prevent cyber attack. Therefore, it becomes necessary to consistently identify all
the unknown and known company’s existing assets that are exposed to the internet. These may include IP
addresses, domains, and cloud instances that potentially can be leveraged by attackers.
• With ASM organizations can use automated tools that are able to scan public-facing infrastructure and
point out vulnerabilities in real time. This would significantly reduce the window of opportunity for attackers.
Organizations are exposed to a greater variety of risks as they expand, which may be divided into sev-
eral device business functions. Palo Alto Networks Unit 42 identified the following key trends in attack surface
exposures:
32 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Figure 2: Distribution of Exposure Categories Across the 265 Organizations in the 12 Months
1% Database
1% Potential Regulatory Violation
2% IOT and Embedded Devices
2% Weak or Insecure Cryptography 13%
2% Uncategorized Web
3% Insecure File Sharing Framework
3% Unpatched Misconfigured & End-of-Life
(EOL)
23%
26%
Business Operations
IT & Security
Applications
Infrastructure
24%
Remote Access
Services
Exhibit 4.3 Distribution of Exposure Categories Observed Across Organizations in the Last 12 Months
Source: Palo Alto Networks Unit 42 Attack Surface Threat Report 2024
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 33
Emerging Vulnerabilities and Critical Risks
As organizations and businesses work to modernize their IT infrastructure further, new risks pop up. Several
areas need special attention over the following years:
Each industry faces unique cybersecurity issues in terms of cyber risk, so different risk mitigation
strategies must be implemented for different sectors. Due to their unique cybersecurity issues, in the follow-
ing section, sector-specific vulnerabilities and risks (Financial services, healthcare, and manufacturing) will be
examined in detail, and, in the end, develop strategic actions to strengthen cybersecurity resilience in each of the
three key sectors.
Due to its accessibility to sensitive financial data and exhibit 4.4, Indonesian financial institutions under-
other important services closely related to banking performed their regional peers in five of nine critical
institutions and other financial organizations, the security domains.
financial services industry is often becoming the main
target of cyber attacks. In this sector, cybersecurity
breaches can result in significant financial losses,
legal fines, long-term damage to reputation, and other
permanent harm.
34 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Evaluating Indonesia’s Financial Sector
Strengths:
• No reported breach incidents: Indonesian financial institutions have managed to avoid significant breaches
in recent years.
• System Reputation: Few organizations showed infected devices or malware activities associated with their
infrastructure, which indicates malware controls are in place.
Weaknesses:
• Application Security, Email Security, and DNS Security are the domains where most institutions score
poorest in the Security Domain Ratings Diagram. Each of these areas presents critical vulnerabilities that
should be targeted with immediate action to enhance the general cybersecurity posture in the sector.
These findings reveal that more attention needs to be paid to the security of web applications and email vulnera-
bilities, which are vital components in the financial sector’s overall cybersecurity resilience.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 35
Key Vulnerabilities Identified in Financial Sector
20%
19% Web Encryption
Insecure Protocols
Insecure protocols have fundamental
flaws that allow miscreants to break
Software Patching the encryption process, exposing the
authorized parties to risk of data theft
End-of-Life-Software and fraud.
The web server software running 45%
on the system is end of life and no
Invalid Certificate Subjects
longer supported by the vendor.
Websites operating HTTPS have
invalid X.509 encryption certificate
subjects. Systems with an invalid
certificate subject are not trustworthy
and cause the browser to display
security warnings to the user.
Exhibit 4.6 Security Vulnerabilities by Category in Indonesia’s Financial Sector, Source: Mastercard
A total of 1,696 issues within nine security domains were found, as represented in the exhibit 4.6. The most
critical vulnerabilities identified include:
36 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Risk Classification and Mitigation Prioritization
Exhibit 4.7 Indonesia’s Financial Sector Risk Prioritization Matrix, Source: Mastercard
The exhibit 4.7 categorizes the 1,696 vulnerabilities by asset value and issue severity to enable institutions to
prioritize remediation work efforts by risk impact. Key risk categories include:
• High Priority:
On critical issues, some 25 identified high-value systems, such as those dealing in sensitive financial data,
were assessed. These should be immediately remediated to protect against data breaches and system com-
promise.
• Medium Priority:
Medium priority issues to systems immediately adjacent to high-value assets totaled 76. These are systems
that do not handle sensitive data directly but whose exploitation could grant the attackers lateral movement
onto more critical infrastructure.
• Low Priority:
These were the hosts of relatively low-risk systems, such as domains kept idle and non-essential services.
They should not pose any imminent danger, but the vulnerabilities should be patched to avoid future hacks.
The majority of the problems are related to out-of-date software (PHP, IIS, Perl, Apache, and Nginx) that has known
security vulnerabilities, as well as a system that exposes a network service (MySQL) to the Internet that is either
unsafe or inappropriate to use.
In a recent cybersecurity evaluation, Mastercard evaluated 50 healthcare organizations in the Asia-Pacific area with
10 healthcare organizations in Indonesia. This study provides insight into Indonesia’s health sector’s current cyber-
security posture, pointing out strengths and vulnerabilities compared to regional counterparts.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 37
Healthcare Sector Cybersecurity Performance Overview
Exhibit 4.8 Healthcare Sector Cybersecurity Performance Between Indonesia and Asia Pacific, Source: Mastercard
Indonesian healthcare institutions’ overall cybersecurity performance was rated at B (7.6/10), which is
slightly above the Asia-Pacific healthcare industry average score of 7.4. The exhibit 4.8 illustrates this com-
parison, revealing that Indonesian healthcare organizations performed better in six of nine critical security domains
than their regional peers.
38 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Key points from the Performance Summary Diagram include:
Strengths:
• No publicly disclosed breach events: The healthcare institutions assessed have avoided significant data
breaches recently, indicating adequate controls to safeguard patient information.
• System Reputation: Regarding system reputation, none of the institutions in the healthcare sector men-
tioned any severe problems, such as infected devices or malicious activities within their infrastructure.
Weaknesses:
• Application Security, Email Security, and DNS Security were identified as the weakest areas across the
sector, highlighting a critical need for enhanced security measures in these domains. These vulnerabilities
can significantly impact the confidentiality and integrity of patient data.
Insecure Protocols
Insecure protocols have fundamental
flaws that allow miscreants to break
the encryption process, exposing the
authorized parties to risk of data theft
and fraud. Others
57%
Invalid Certificate Subjects
Websites operating HTTPS have
invalid X.509 encryption certificate
subjects. Systems with an invalid
certificate subject are not trustworthy
and cause the browser to display
security warning to the user.
Exhibit 4.10 Breakdown of Security Vulnerabilities by Category in Indonesia’s He Sector, Source: Mastercard
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 39
The assessment uncovered 354 vulnerabilities across nine security domains, as illustrated in the exhibit 4.10.
The most critical vulnerabilities identified include:
• Web Encryption (57%): Press, Nginx, and PHP, among other end-of-life
Ineffective encryption techniques and expired software. These systems are no longer supported
encryption certificates were the most frequent by security updates, thus known security flaws
issues jeopardizing the confidentiality of personal might take advantage of them.
health information. Outdated encryption methods
compromise confidentiality and regulatory compli- • Network Filtering (8%):
ance by making patient data susceptible to theft or Several healthcare facilities’ network services,
fraud. including MySQL, are accessible to the public due
to inadequate security procedures. This broad
• Software Patching (19%): attack surface increases the likelihood of data
It was discovered that many healthcare institu- breaches and unauthorized access.
tions were running outdated versions of Word-
Prioritizing remediation activities was achieved by classifying the 354 vulnerabilities using the Risk
Prioritization Matrix based on issue severity and asset value. Healthcare facilities may concentrate their
security efforts on the most important threats by following the clear route provided by the matrix.
Exhibit 4.11 Indonesia’s Healthcare Sector Risk Prioritization Matrix, Source: Mastercard
40 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Key findings include:
Most of the issues revolve around using outdated software (PHP, WordPress, Perl, Nginx) with known security
vulnerabilities and exposing unsafe network services (such as MySQL) to the internet. These vulnerabilities pose
significant risks to healthcare institutions’ digital infrastructure integrity.
The manufacturing sector is essential to Indonesia’s economy due to its significant GDP contribution
and role in supporting critical infrastructure. This industry’s vital role makes it a great target for cybercriminals
looking to disrupt or exploit sensitive data. In a recent cybersecurity study, Mastercard compared 50 manufactur-
ing institutions in Asia-Pacific with 10 Indonesian manufacturing firms. Compared to its regional counterparts, the
evaluation provides insightful information about the industry’s cybersecurity posture.
Exhibit 4.12 Manufacturing Sector Cybersecurity Performance Between Indonesia and Asia Pacific, Source: Mastercard
The overall cybersecurity performance of Indonesian manufacturing institutions was rated at B (8.2/10),
significantly higher than the Asia-Pacific manufacturing industry average of 7.2. As shown in the exhibit
4.12, Indonesia outperformed the regional average in eight out of nine security domains.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 41
Evaluating Indonesia’s Manufacturing Sector
Strengths:
• No recent publicly disclosed breach events: The absence of notable data breaches announced by Indo-
nesian manufacturing companies suggests that a strong control framework is in place to protect sensitive
data.
• No companies with issues involving System Reputation: The well-maintained network hygiene of all the
evaluated firms was demonstrated by the lack of issues pertaining to system reputation, such as infected
devices or malicious activities.
Weaknesses:
• Application Security:The manufacturing industry has a large number of underperforming firms when it
comes to application security, so there is definitely room for improvement.
• Network Filtering: Weaknesses in network filtering indicate that several organizations have improperly se-
cured or misconfigured network services, increasing the risk of unauthorized access.
• DNS Security: DNS security is another domain where many organizations are performing poorly, which
could expose their systems to attacks like DNS spoofing or man-in-the-middle attacks.
42 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Key Vulnerabilities Identified in Manufacturing Sector
As shown in figure 4.14, the evaluation found 419 vulnerabilities spread across nine security domains.
The following are the most important vulnerabilities found:
Web Encryption
Software Patching Insecure Protocols
Insecure protocols have fundamental
End-of-Life-Software
The web server software running on
50% flaws that allow miscreants to break
the encryption process, exposing the
system is end of life and no longer
authorized parties to risk of data theft
supported by the vendor.
and fraud.
Exhibit 4.14 Security Vulnerabilities by Category in Indonesia’s Manufacturing Sector, Source: Mastercard
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 43
Risk Classification and Mitigation Prioritization
Based on asset value and severity, the 419 found vulnerabilities are grouped using the Risk Prioritization
Matrix to provide a focused and effective remediation process. Based on this classification, manufacturing
organizations may concentrate their cybersecurity efforts where they will have the greatest impact.
Exhibit 4.15 Indonesia’s Manufacturing Sector Risk Prioritization Matrix, Source: Mastercard
Most of the problems are with software (PHP) that is getting close to the end of its life and contains known secu-
rity vulnerabilities. The system exposes a network service (MySQL, MongoDB, Samba) to the internet that is not
safe or appropriate to operate on the internet.
44 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
4.3 Recommendations Based on Sectoral Assessments
Cybersecurity for a Sustainable and Resilient Digital Indonesia Sector-Specific Cybersecurity Insights 45
11. Drive Digital Transformation by Retiring Lega- Collaboration with stakeholders, vendor support,
cy Equipment and a phased approach will facilitate a smooth
To counter growing threats, Indonesian transition and strengthen defenses against cyber-
companies need to proactively migrate from attacks. Fully retiring the legacy system also can
outdated cybersecurity solutions. They have save environmental and financial costs. Several
to start by identifying which legacy system risks things should be considered when decommission-
are critical for business operations and then rank ing legacy systems. Maintaining outdated sys-
those risks appropriately. Then continued by tems up and running forever has security issues
developing a detailed transition plan that includes that can allow hackers to breach a company’s
data migration, integration, testing, and phased firewall and expose its sensitive data to potential
migration to modern solutions like cloud-based threats.10 There’s also a chance that maintaining
security and advanced threat detection systems. an outdated system may violate data privacy laws,
Furthermore, acquiring the required funds via which might result in fines, penalties, and other
grants, budgetary allotment, cost-benefit anal- legal issues.11
ysis, or cybersecurity insurance is also crucial.
Afterwards, allocate funds for employee training
to close skill gaps and ensure employees are
knowledgeable about emerging technologies and
incident response procedures. Continuous mon-
itoring, vulnerability management, and a strong
incident response plan are necessary for main-
taining security.
10
TJC Group. “Decommissioning Legacy Systems for Better Cybersecurity,” July 26, 2024. https://www.tjc-group.com/blogs/the-strategic-im-
perative-decommissioning-legacy-systems-for-better-cybersecurity/.
11
Ibid.
46 Sector-Specific Cybersecurity Insights Cybersecurity for a Sustainable and Resilient Digital Indonesia
Chapter
05
Regulatory and
Governance
Framework
Cybersecurity for a Sustainable and Resilient Digital Indonesia 47
For Indonesia’s national cybersecurity measures to be successful, strong governance and regulations are essen-
tial. This chapter examines the current regulatory environment in Indonesia, providing suggestions for improve-
ments, offering a framework for coordination, governance and ongoing monitoring across the sector.
Level Regulation
Indonesia has made considerable progress in establishing a national cybersecurity framework, enacting several
laws and regulations to enhance cyber resilience across critical sectors. The following are vital regulations that form
the foundation of Indonesia’s cybersecurity governance:
48 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
ing these efforts, assigning clear roles to stake- • BSSN Regulation No. 1 of 2024
holders, and creating Computer Security Incident This regulation focuses on incident management
Response Teams (CSIRTs) at various levels to and crisis response, particularly for Vital Informa-
handle cyber threats.16 tion Infrastructure Providers. It aims to provide a
comprehensive framework, improve coordination
• Formed a Unique Cross-Departmental Team in or chain of command, and minimize the adverse
2022 impact of cyber incidents. This applies to Electron-
In 2022, President Jokowi formed a unique ic System Operators (ESOs), Sectoral Computer
cross-departmental team to investigate and han- Security Incident Response Teams (CSIRTs), and
dle data leaks. The team included representatives National CSIRT. There are several key provisions
from the State Cyber and
Crypto Agency (BSSN), within this regulation including establishment of
the Ministry of Communications and Informatics, CSIRTs, incident reporting, incident response, and
the Indonesian National Police (Polri), and the information sharing.21
State Intelligence Agency (BIN).17
• BSSN Regulation No. 2 of 2024
• Presidential Regulation No. 47 of 2023 This regulation outlines the framework for cyber
This is the establishment of the National Cyber- crisis management. There are three phases of
security Strategy and Framework for Cyber Crisis crisis management which emphasized in the
Management, which mentions governance struc- document which are pre crisis (cyber incident re-
tures, risk management protocols, and incident sponse, early warning, and contingency planning),
response procedures, all aimed at increasing the crisis (declaration, management, and information
national cybersecurity resilience level.18 dissemination), and post-crisis (recovery, evalua-
tion, and lesson learned) through well-established
• Regulation of the Deputy for Cybersecurity procedure, coordinated action, and adequate
and Encryption (BSSN) in the Economic Sec- preparedness.22
tor No. 1 of 2023
Deputy Regulation’s primary objective is to estab- • BSSN Regulation No. 5 of 2024
lish a structured roadmap to develop and nurture This regulation focuses on the establishment of
Indonesia’s local cybersecurity industry over a cybersecurity national action plan 2024-2028
the next five years (2024 -2028). This roadmap which encompasses policy direction, challenges,
is planned to guide the Government, business strategic objectives, activities, indicator of suc-
sector, and other stakeholders in fostering the cess, achievement targets, roles and responsibili-
industry’s growth and encouraging collaboration ties as well as related institutions which should be
between the public and private sectors.19 involved. The national action plan itself outlines
four priority projects which must be executed with-
• Revision of Indonesian National Police Law in in a certain period of time such as establishment
2024 and enhancement of the cybersecurity response
This revision allows the police to slow down, team; strengthening cybersecurity infrastructure,
block, and monitor cyberspace for national se- human resources and regulations; preventing cy-
curity purposes. The Law has been revised and bercrime and increasing international cooperation;
authorized by the parliament. This consent was and solving the cybercrimes itself.23
granted on Tuesday, 28 May 2024, during the
18th parliament plenary meeting for the 5th period
of the 2023–2024 session year.20
12
Undang-undang (UU) Nomor 1 Tahun 2023 tentang Kitab Undang-Undang Hukum Pidana, Pemerintah Pusat. (2023)
13
Undang-undang (UU) Nomor 19 Tahun 2016 tentang Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Tran-
saksi Elektronik, Pemerintah Pusat. (2016)
14
Peraturan Pemerintah (PP) Nomor 71 Tahun 2019 tentang Penyelenggaraan Sistem dan Transaksi Elektronik, Pemerintah Pusat. (2019)
15
Undang-undang (UU) Nomor 27 Tahun 2022 tentang Pelindungan Data Pribadi, Pemerintah Pusat. (2022)
16
Peraturan Presiden (Perpres) Nomor 82 Tahun 2022 tentang Pelindungan Infrastruktur Informasi Vital, Pemerintah Pusat. (2022)
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 49
Currently, the primary reference for Indonesia’s cybersecurity regulatory framework is Presidential Regulation No.
47 of 2023. This regulation provides the basic guidelines for guiding the national cybersecurity Strategy and the
framework for cyber crisis management, then explained further through BSSN Regulation No. 5 of 2024. This regu-
lation outlines several key focus areas. These focus areas are as follows:
Additional Regulations
Several other essential laws and regulations play a role in shaping Indonesia’s cybersecurity landscape:
• Law No. 3 of 2002 on National Defence • Indonesia Central Bank Regulation No. 23 of
2021 on Payment Service Providers
• Ministry of Defence (MOD) Regulation No. 82
of 2014 on Cyber Defense Guidelines • OJK Regulation (POJK) No. 11/POJK.03/2022
on the Implementation of Information Technol-
• Presidential Regulation Number 95 of 2018 on ogy by Commercial Banks
Electronic-Based Government System
• Law No. 7 of 1992 on Banking and OJK Regu-
• Ministry of Communication and Information lation No. 22 of 2023
(MOCI) Regulation No. 5 of 2020
• Law No. 17 of 2023 on Health
• BSSN Regulation No. 10 of 2020 on Cyber Inci-
dent Response Team • OJK Regulation No. 3 of 2024 on Organization
of Financial Sector Technological Innovations
• BSSN Regulation Number 4 of 2021 on Guide- Challenges and the Need for Continuous Im-
lines for Information Security Management of provement
Electronic-Based Government Systems
• And others.
17
Kementerian Komunikasi dan Informatika Republik Indonesia, “Presiden Instruksikan Jajarannya Tindaklanjuti Kebocoran Data Pemerin-
tah”, Kementerian Komunikasi dan Informatika Republik Indonesia, September 14th, 2022, https://www.kominfo.go.id/berita/berita-pemerintah-
an/detail/presiden-instruksikan-jajarannya-tindak-lanjuti-dugaan-kebocoran-data-pemerintah
18
Peraturan Presiden (Perpres) Nomor 47 Tahun 2023 tentang Strategi Keamanan Siber Nasional dan Manajemen Krisis Siber, Pemerintah
Pusat. (2023)
19
Peraturan Deputi Bidang Keamanan Siber dan Sandi Perekonomian Nomor 1 Tahun 2023 tentang Peta Jalan Pembinaan Industri Keaman-
an Siber Tahun 2024-2028, BSSN. (2023)
20
Sari, Amelia Rahima, “Revisi UU Polri Bikin Polisi Bisa Awasi Ruang Siber hingga Blokir Internet, Pengamat: Jadi Dilema”, Tempo.co, May
30th, 2024, https://nasional.tempo.co/read/1873786/revisi-uu-polri-bikin-polisi-bisa-awasi-ruang-siber-hingga-blokir-internet-pengamat-jadi-
dilema
21
Peraturan Badan Siber dan Sandi Negara Nomor 1 Tahun 2024 tentang Pengelolaan Insiden Siber, BSSN. (2024)
22
Peraturan Badan Siber dan Sandi Negara Nomor 2 Tahun 2024 tentang Manajemen Krisis Siber, BSSN. (2024)
23
Peraturan Badan Siber dan Sandi Negara Nomor 5 Tahun 2024 Tentang Rencana Aksi Nasional Keamanan Siber Tahun 2024-2028, BSSN.
(2024)
50 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
Regulatory Gap
The Need to Have Unified Regulation: Cybersecurity Lack of Coordinated Authority and Oversight and
Law Divergent Threat Perceptions
Although Indonesia has several regulations which serve The lack of a central coordinating agency manifests in
as the foundation for the cybersecurity landscape, the the limited authority given to the cybersecurity agency.
country remains scrappy, lacking substantial depth, and Due to its lack of legal authority, the cybersecurity
clarity in terms of a solid regulatory framework.24 agency cannot position itself as a leading body in cyber-
There is a need to create and enforce unified cyberse- security governance, creating gaps between sectors in
curity law which is reflected through how the current terms of regulation and enforcement.26
parliament still has an ongoing discussion about cyber- While awareness of cyberattacks is on the rise, stake-
security and resilience although it has stalled since holders in Indonesia hold diverging views on the nature
2019. The cybersecurity and resilience law is expected and severity of cyber threats. This discrepancy leads
to have more depth on cybersecurity threats, protection to inconsistencies in risk assessment and mitigation
of critical infrastructure, data, information, and cyberse- strategies, undermining a unified approach to national
curity talent. The lack of unified and solid cybersecurity cybersecurity defense.27
law also posed an adverse impact towards the private
sector where most companies should adhere with Severe Underfunding and Resource Limitations
complex yet different laws that are handled by different The cybersecurity agency and other cybersecurity
stakeholders. units face chronic underfunding and lack the necessary
human capital to respond effectively to cyber threats.
The absence of a clear and overarching cybersecurity This resource deficit limits their capacity to combat
law and strategy creates ambiguity and overlaps in evolving cyber risks and proactively protect critical infra-
authority among government agencies. The complex structure and sensitive data.28
compliance bureaucracy could hinder the potential
economic value and investment opportunities. Other
than that, the presence of regulation is also expected to
further create good governance in cybersecurity while
also encouraging public-private partnership to facilitate
collaboration in strengthening cybersecurity and improv-
ing local cybersecurity talents.25
24
Dr. Kartina Sury, “Indonesia’S Cyber Resilience: At the Epicenter of ASEAN Digital Economy Growth” Tech for Good Institute, May 13th,
2024. https://techforgoodinstitute.org/blog/expert-opinion/indonesias-cyber-resilience-at-the-epicenter-of-asean-digital-economy-growth/.
25
Raihan Zahirah & Theo Gerald, “Digitalisasi, Teknologi, dan Inovasi” in Visi dan Peta Jalan Indonesia Emas 2045 Milik Pemuda, ed. Reza
Edriawan et al. (Jakarta: Indonesian Youth Diplomacy, 2024) 84, https://iyd.or.id/wp-content/uploads/2024/09/05092024_IYD_Report_All-Con-
tent.pdf
26
Gatra Priyandita, “Indonesia’s Cybersecurity Woes: Reflections for the Next Government”, CSIS, CSISCOM00624 (2024): 2-6, https://csis.
or.id/publication/indonesias-cybersecurity-woes-reflections-for-the-next-government/
27
Ibid.
28
Ibid.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 51
5.2. Proposed Regulatory Enhancements
Due to the increasingly complex nature of the cyber threat landscape, Indonesia’s regulatory framework must be con-
tinually updated to close regulatory gaps and achieve cyber resilience. Therefore, we will discuss several important
recommendations for regulatory improvement in this section.
The main action that must be taken to achieve cyber resilience is harmonizing national regulation with interna-
tional standards. Harmonizing the regulation will encourage international cooperation, increase competitiveness,
and provide strong protection for organizations and individuals. Therefore, harmonization of cyber laws with existing
frameworks, such as the European Union’s General Data Protection Regulation (GDPR), will be beneficial for cyber-
security governance and the digital economy in Indonesia.
• Global Standard for Data Protection • Facilitating International Trade and Commerce
The GDPR serves as a global benchmark in data Harmonizing data protection laws like GDPR will
protection, emphasizing transparency of informa- enable Indonesian businesses to conduct seam-
tion flow, consent of users, and tight security mea- less activities with the international market. More
sures regarding personal information. Compliance importantly, since cross-border data flows under-
with these types of regulations thus may go on to pin most of the global commerce and collabora-
further develop Indonesia’s cybersecurity frame- tion that happens today, a lack of harmonization
work in ways that will help foster public confidence will only raise the risks to which businesses are
in digital services while improving their defenses exposed.
against cyber threats.
• Attracting Foreign Investment
• Improving Trust and Confidence Strong data privacy regulations that comply with
Strict regulations that protect personal informa- international standards will increase Indonesia’s
tion will increase public and company confidence recognition as a secure and reliable business
in national data security that will lead to better environment. This may attract more foreign
utilization of digital services and more economic investment, especially from companies that want
activity in the digital economy. to operate data-driven businesses in technology,
finance, and e-commerce.
1. Incorporate Key GDPR Principles into Indone- 3. Encourage International Data Transfers
sian Legislation We should develop mechanisms aligning with
Several important GDPR principles, such as global standards to facilitate international data
openness, user consent, data minimization, transfers. This may be by adopting Binding Cor-
rights of access, correction and deletion, must be porate Rules (BCRs) or even joining international
implemented by the Indonesian government and agreements on data privacy and protection so
make these important principles the basis for the Indonesian businesses are fully involved in the
regulatory framework. global digital economy.
52 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
5. Risk-Based Approach ality and flexibility in responding to specific set-
Governments should implement risk-based laws tings and risk profiles. Regulations can efficiently
and regulations and align them with existing reg- protect society and promote economic progress
ulations to prevent contention and fragmentation. by striking a balance between risk management
This key action will provide a safe yet creative and the need to support technical progress, and
technology environment. This methodology rec- by prioritizing existing international standards over
ognizes that not all systems require the maximum those that have not yet been created.
level of security and instead advocates proportion-
Indonesia needs to do regular and ongoing examinations of the law, and this will be necessary to ensure
that the national data, privacy, and cyber law framework is up to date and functional in the face of evolving
technological environments, shifting cyber threat landscapes, and rising social expectations. Technological
innovation gives rise to new threats and weaknesses. Therefore, the legal framework must be updated regularly to
protect society, the business world, and national security. Outdated laws may seriously weaken defenses against
data breaches, privacy violations, and cybercrime. The existence of a regulatory gap could jeopardize the legiti-
macy of the public for stronger protection and transparency. To address this regulatory gap, the Government must
regularly update the legislation to ensure that the legal basis and standards remain effective, responsive, and rele-
vant in addressing the complex modern challenges and keep it aligned with international best practices.
1. Data Breach Notification Laws and Penalties ● Ensure penalties for severe or repeated data
One critical review area is data breach notification breaches reflect public expectations, foster trust,
laws and their associated penalties. Indonesia and ensure accountability.
must ensure the penalties for non-compliance are
significant and severe enough to incentivize good 2. Incident Reporting Framework
cybersecurity practices, which are critical in pre- The existing incident reporting framework should
serving trust and accountability in the digital world. also put an obligation on all private organizations
in the critical sectors to report cyber incidents
Study Case: promptly to the national Computer Security Inci-
Australia’s Notifiable Data Breaches Act intro- dent Response Team (CSIRT), not just public or
duced a maximum of AUD 2 million for severe critical infrastructure operators. This would further
breaches as a penalty, but this penalty was much enhance the national incident response and in-
less than it would have cost organizations in crease transparency at all levels.
Australia to implement appropriate cybersecurity
measures. However, after significant breaches, 3. Legislation on Emerging Technologies and
the Australian Government introduced the Priva- Vulnerable Populations
cy Legislation Amendment (Enforcement and The legislation will move toward the specific risks
Other Measures) Bill 2022, allowing increased from emerging technologies, such as artificial
maximum penalties to the greater of AUD 50 mil- intelligence (AI), blockchain, and the Internet
lion, three times the value of any benefit obtained of Things (IoT), that are integral to digital eco-
through misuse of information or 30% of the systems. Additionally, we should improve online
company’s adjusted turnover during the relevant protection legislation for children, consumer, and
period. This legislative amendment ensures that intellectual property, where this should be re-
penalties reflect the severity of data breaches and viewed regularly to ensure its compatibility with
that consumer protection is of paramount interest. evolving international standards and for the safe
adoption of new technologies.
Focus for Indonesia:
● Review and improve data breach notification
laws to ensure timely reporting of cyber incidents
by private organizations, including non-Critical
Information Infrastructure (non-CII) operators.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 53
Recommendations for the Legislative Review Process:
• Enforce Mandatory Incident Reporting and across industries, the cybersecurity agency may
Regular Audits: occasionally make information regarding cyber-
The cybersecurity agency or certified third-party security incidents or non-compliance publicly
auditors may undertake recurring cybersecurity available.
audits and assessments of organizations, espe-
cially those in important industries. These audits • Facilitate Threat Intelligence Sharing:
assess if regulations are being followed, find weak The cybersecurity agency will create channels
points, and suggest fixes.29 for exchanging cybersecurity best practices and
threat intelligence across many industries and
• Impose Sanctions for Non-Compliance: stakeholders so companies can keep up with new
The cybersecurity agency and sectoral regulators threats and proactively strengthen their cyberse-
have the power to apply administrative conse- curity system.
quences, such as warnings, fines, and license
suspensions should there be any violation to- • Deploy Automated Monitoring and Detection
wards cybersecurity regulations. These penalties Tools
serve as a disincentive and motivate businesses Automated technologies can be used by sectoral
to give cybersecurity a priority.30 authorities and the cybersecurity agency to track
network traffic, spot anomalies, and quickly identi-
• Promote Public Disclosure: fy possible cyber threats.
To promote awareness and better practices
ICT hardware and software are the core component yet foundational backbone for Indonesia’s national and eco-
nomic cybersecurity. This underpins the critical infrastructure, comprising energy grids, telecommunications net-
works, healthcare systems, and defense platforms. The era of growing digitization and global interconnectivity has
significantly increased the risks related to cyberattacks on ICT supply chains. Compromises in these supply chains
can provide adversaries with undetected access to networks or systems, posing severe threats to national security
and sovereignty.
29
Hukumonline, “Strengthening the National Cybersecurity Ecosystem: Unveiling New BSSN Frameworks on Cyber Incidents and Cyber-Cri-
sis Management” hukumonline.com, 868 (2024), https://pro.hukumonline.com/a/lt66165fbd50830/strengthening-the-national-cybersecuri-
ty-ecosystem--unveiling-new-bssn-frameworks-on-cyber-incidents-and-cyber-crisis-management.
30
Denny Rahmansyah, “Data Protection and Cybersecurity in Indonesia: Enforcement and Litigation”, SSEK, December 12th, 2019, https://
www.ssek.com/blog/data-protection-and-cybersecurity-in-indonesia-enforcement-and-litigation/
54 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
Rising Threat of ICT Supply Chain Attacks
Cyber attackers are increasingly targeting hardware and software development activities. By embedding malicious
code or vulnerabilities (often referred to as “backdoors”). They exploit this vulnerability for espionage, sabotage, or
other malicious activities. This threat is posed as a critical issue in the defense and national security sectors that
might disrupt critical activities, where software plays a critical role in data analytics, intelligence operations, and
security functions.
Prominent and high-profile incidents such as the SolarWinds attack (also known as SolarStorm) and NotPetya (a
devastating cyber attack on Ukraine in 2017) have brought attention to the growing sophistication and impact of
supply chain threats. These attacks have accelerated efforts around the world to intensify their cyber defense by
identifying and mitigating risks within their ICT supply chains.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 55
5.2.5 Government Policies Emphasize the Procurement of Commercial Off the Shelf
(COTS) Products
The term Commercial off-the-shelf (COTS) products refers to the software or hardware solutions that are avail-
able in the commercial marketplace which are designed specifically tailored to fulfill predetermined needs. COTS
products offer standardized functionality that can be swiftly deployed to all users.. In government procurement,
especially in cybersecurity, COTS solutions allow agencies to seamlessly adopt established technologies without
the delays and expenses associated with developing custom systems.
• COTS products are supported by high vendor • COTS solutions help address the global chal-
R&D efforts, ensuring that these solutions remain lenges of the shortage of skilled cybersecurity
relevant with the latest technological innovation. professionals by reducing the need for internal
development expertise. Government agencies can
• It is critical to allocate the government’s finite cy- focus their skilled staff on high-impact cyberse-
bersecurity resources efficiently. COTS solutions curity tasks, leaving routine system updates and
procurement will enable the government to gain maintenance to external vendors.
resource efficiency by directing its cybersecurity
personnel to focus on essential functions, such as
protecting critical infrastructure, rather than build-
ing and maintaining custom-built systems.
Key Actions:
• Appoint a Special Advisor to the President on • Make Cybersecurity a Top Agenda Item
Cybersecurity Elevating the cybersecurity agenda as a major
This role will ensure cybersecurity is integrat- focus will facilitate better coordination, resource
ed into all aspects of national strategy, offering allocation, and policy implementation to address
professional advice to the government, facilitating evolving cyber threats.
interagency cooperation, and fostering internation-
al partnerships to enhance national strategy.
Key Actions:
• Increase Budget for Cybersecurity Initiatives • Allocate Resources for Critical Functions
Invest more for education in talent development, Prioritize securing payment processes, national
public awareness campaigns, and modernizing security systems, and defense platforms against
cybersecurity infrastructure. cyber threats.
56 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
Review Organizational Cyber Roles and Responsibilities
To ensure effective cybersecurity, organizations need to clearly define who is responsible for online security within
their structure while ensuring that the leadership, board of directors, and financial officers understand the impor-
tance of cyber risk management.
Key Actions:
• Establish Clear Cybersecurity Accountability: • Launch Cyber Security Review Board:
Every organization should have a Chief Informa- Encourage public-private collaboration and open
tion Security Officer (CISO) or equivalent role, information sharing on incidents and investiga-
directly reporting to the CEO or Head of the orga- tions to strengthen overall cybersecurity resil-
nization, to manage cyber risks effectively. ience. Board members can consist of telecommu-
nication companies, technology companies, the
• Separate CISO from CIO Functions: Attorney General, and law enforcement bodies.
The CISO should not be the same person as the
Chief Information Officer (CIO) or Chief Operating
Officer (COO) to avoid conflicts of interest be-
tween data accessibility and data security priori-
ties.
Key Actions:
• Conduct comprehensive reviews and regu- • Develop tracking tools and analyze key cy-
lar updates of internal policies to ensure roles, bersecurity metrics, including incident response
responsibilities, and operations are aligned with times and threat management efficiency. Regular
evolving cybersecurity threats and best practices. evaluations will help make informed decisions and
optimize resources.
• Conduct frequent cybersecurity drills to test
coordination and response capabilities, ensuring • Strengthen the technical capabilities of cy-
readiness for real-world incidents, financial resil- bersecurity agency and ID-SIRTII in threat intelli-
ience, and seamless stakeholder collaboration. gence, digital forensics, and international opera-
tions. This should be supported by legislation that
• Invest in the ongoing training for all staff expands their roles and functions.
levels with clear metrics to measure the effec-
tiveness of these programs, ensuring skills and • Ensure proper allocation of human, financial,
knowledge stay sharp to handle complex cyber and technological resources, along with updated
threats. awareness programs, to keep pace with emerging
threats and trends.
As the Indonesian government’s strategic partner, the Indonesian Chamber of Commerce and Industry
(Kadin) can play a role as a bridge between the private and government sectors in shaping the national
cybersecurity agenda. Through its extensive network, Kadin could align business interests with national security
objectives, ensuring the private sector actively participates in building a strong cybersecurity ecosystem. The ap-
proach will help Indonesia to create consistent cybersecurity policies, harmonize its cybersecurity policies across
industries, and support broader national objectives, including protection of critical infrastructure and digital trans-
formation.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 57
Key Roles of Kadin
1. Public-Private Partnership (PPP) Leader cybersecurity talent. Then facilitate the intern-
Kadin will lead the development of a structured ships, apprenticeships, and certification programs
Public-Private Partnership (PPP) model that that integrate real-world industry needs with
facilitates and incentivizes businesses to par- academic training. In addition, Kadin can foster
ticipate actively in cybersecurity initiatives. The collaboration with global tech companies to bring
collaboration with the government would enable world-class expertise to Indonesia.
Kadin to facilitate information sharing, cyber inci-
dent coordination, and policy discussions. Such 4. Standards and Regulatory Compliance Facili-
a model has been successfully implemented in tator
other ASEAN countries like Singapore, where they Kadin should help businesses navigate the
enable business and government collaboration increasingly complex regulatory environment
under the Cybersecurity Act of 2018 to enhance around cybersecurity by providing the resources
critical infrastructure protection. they need to meet both national and internation-
al cybersecurity standards. This facilitator role
2. Cybersecurity Awareness and Advocacy includes offering guidance on data privacy laws
Kadin will drive industry-wide cybersecurity (such as Indonesia’s Personal Data Protection
awareness campaigns focusing on fostering a se- Law), cybersecurity risk assessments, and audit
curity-first culture within the business community. frameworks. Imagine Kadin creating an online
Kadin can encourage and promote internationally platform where businesses can access informa-
recognized best practices such as SNI/ISO/IEC tion on complying with cybersecurity laws, con-
27001 and the well-known NIST Cybersecurity duct self-assessments, and even get advice from
Framework. This helps Indonesian businesses cybersecurity experts.
align with global standards. Additionally, Kadin can
advocate for better cyber regulations by facilitating 5. Incident Response and Crisis Management
continuous dialogue between business leaders Coordinator
and policymakers. Given the extensive network and influence of
Kadin, it can play a central role in coordinating
3. Cybersecurity Talent Development Collabora- responses to sophisticated cyber incidents. By
tor acting as an intermediary between businesses
A major challenge for Indonesia is the shortage and government cybersecurity bodies (like cyber-
of skilled cybersecurity professionals. Kadin’s security agency and CSIRT), ensuring a faster
initiatives will initiate the collaboration effort with and more effective response to incidents.
educational institutions, training centers, and cy-
bersecurity agency to create a pipeline of
58 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
By taking on these roles, Kadin can significantly strengthen Indonesia’s cybersecurity, build trust between the
private sector and the government, and ensure that businesses actively contribute to national cybersecurity resil-
ience. This is not only important for protecting businesses but also for strengthening Indonesia’s digital economy
against cyber threats.
The cybersecurity agency plays a role as the primary authority in developing and implementing Indone-
sia’s cybersecurity governance. The agency plays a very crucial role in developing a cohesive framework that
ensures the integrity, security, and resilience of the nation’s digital infrastructure. The mandate of the cybersecu-
rity agency includes capacity building, regulatory enforcement, coordination of incident response, and facilitating
public-private sector collaboration.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 59
which stands for Indonesia Security Incident 5. Facilitator of Public-Private Collaboration
Response Team on Internet Infrastructure/Coor- The cybersecurity agency plays a pivotal role in
dination Center which responsible for improving fostering collaboration between the public and pri-
the whole Indonesia’s cybersecurity landscape, vate sectors. The cybersecurity agency needs to
assisting both public and private sector in provid- facilitate knowledge sharing, best practice dissem-
ing security system, conducting series of works ination, and coordination of collective cybersecuri-
(early monitoring, detection, and warning), man- ty defenses through formalized partnerships.
aging laboratory facilities, supporting law enforce-
ment, acting as the central point of contact for the 6. Promoter of Cybersecurity Innovation and
domestic and international cybersecurity initiatives Technology Adoption
as well as carrying out research and development The cybersecurity agency should actively encour-
initiatives.31 age active adoption and the promotion of innova-
tion in cybersecurity with advanced technologies
3. Regulator and Enforcer of Cybersecurity Com- within the national cybersecurity ecosystem. The
pliance cybersecurity agency also must be involved in
The cybersecurity agency is responsible for the encouraging collaboration between technology
implementation of national regulations in the field providers, academia, and research institutions to
of cybersecurity across industries, including the ensure that the cybersecurity agency drives the
enforcement of the Personal Data Protection creation of solutions to suit Indonesia’s needs. It
(PDP) Law and other relevant cybersecurity laws. also needs to protect personnel and infrastructure
Regular audits, vulnerability assessments, and with cutting-edge technologies like artificial intel-
compliance checks are necessary to ensure ad- ligence; save the most important resources, such
herence to these standards, especially in sectors as AI and the models, training data, and real-time
critical to national security and economic stability. learning that it depends on; exchange knowledge
and skills to safeguard the AI technologies that
4. Capacity Builder for National Cybersecurity keep everyone safe.32 The cybersecurity agency
Talent and the overall country’s systems must priori-
In addressing the national need to develop a tize security by implementing technologies that
robust workforce for cybersecurity, the agency adhere to best practices. This can be achieved
must take a leading role through coordination with through three key recommendations: procuring
relevant educational institutions, industry players, secure-by-design systems and products, ensuring
and international partners. This includes designing security considerations are central to the pro-
cyber education via formal and informal avenues. curement process, and mitigating concentration
This involves creating training programs, certifica- risk to avoid over-reliance on single vendors or
tion pathways, and awareness on cybersecurity technologies.33 By embracing these recommenda-
for capability development in the public-private tions, governments can strengthen their defenses
sector. against cyber threats and safeguard sensitive
information.
These roles will solidify the cybersecurity agency position as the leading authority for cybersecurity governance in
Indonesia. Its leadership will ensure a structured system to maintain compliance and effectively handle incidents,
and at the same time will enable various stakeholders both from the public and private sectors to further develop
a resilient and secure digital ecosystem. By focusing on developing skilled professionals, encouraging innovation,
and collaborating internationally, the cybersecurity agency will help establish Indonesia as a key player in global
cybersecurity.
31
ID-SIRTII, “History Id-SIRTII/CC”, ID-SIRTII, https://www.idsirtii.or.id/en/page/history-id-sirtii-cc.html
32
Google, “How AI Can Reverse the Defender’s Dilemma”, Secure Empower Advance, February (2024):12 , https://services.google.com/fh/
files/misc/how-ai-can-reverse-defenders-dilemma.pdf
33
Royal Hansen & Christoph Kern, “Tackling cybersecurity vulnerabilities through Secure by Design”, Google, March 4th, 2024, https://blog.
google/technology/safety-security/tackling-cybersecurity-vulnerabilities-through-secure-by-design/
60 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
5.3.3 Establishing Self Regulatory Organization (SRO) for Critical Sectors
To bolster Indonesia’s cybersecurity against rising so it can boost trust and confidence. In addition, it can
threats, creating industry-led Self-Regulatory Orga- also provide incubation and mentorship for emerging
nizations (SROs) is crucial to develop and enforce and local cybersecurity businesses by helping them to
cybersecurity standards and best practices with- grow and succeed, also enhancing their credibility and
in a specific sector. These organizations would set marketability. This contributes to stronger growth for
industry-specific frameworks and guidelines, promoting cybersecurity businesses in the country.
knowledge sharing and collaboration, monitoring com-
pliance with established standards, facilitating incident There are few examples of SRO that have existed
response and information sharing about cyber threats, in some countries. For instance, Indonesia itself has
and advocating for cybersecurity interests within their specific SRO within the financial industry, which are
sector through training and educational resources. the Indonesia Stock Exchange, Indonesian Securities
Establishing a successful SRO in Indonesia can pose Underwriting Clearing (KPEI), and Indonesian Central
us to several potential challenges, primarily in building Securities Depository (KSEI). Similarly, the United
trust and cooperation among diverse stakeholders, States also has the New York Stock Exchange (NYSE)
securing adequate resources like funding, personnel, and Financial Industry Regulatory Authority (FINRA),
and technology for effective operation, and striking the which also serve as SRO. Another example specifically
right balance between self-regulation and government related to cybersecurity would be the United States,
oversight. However, these challenges can be effectively where both the Financial Services Information Sharing
addressed through strong partnerships and a shared and Analysis Center (FS-ISAC) and the Information
commitment to cybersecurity from all stakeholders, Sharing and Analysis Center for the Electricity Subsec-
paving the way for a robust and resilient SRO in Indo- tor (E-ISAC) in the US exemplify the SRO model, with
nesia. the former focusing on cybersecurity within the financial
sector and the latter dedicated to protecting the elec-
As we are facing the plethora of cyber threats tricity sector. The Institute of Nuclear Power Operations
targeting critical infrastructure, businesses, and (INPO) in the US focuses on safety and reliability in
individuals, establishing SROs for cybersecurity the nuclear sector, demonstrating an SRO dedicated to
in Indonesia would be significantly beneficial to critical infrastructure. The UK’s Advertising Standards
strengthen the nation’s cybersecurity posture. An Authority (ASA) tackles online safety and misleading
SRO can strengthen the nation’s overall cybersecurity content, showcasing an SRO addressing broader trust
posture by tailoring standards and best practices to the issues within its sector. Another example would be that
unique needs of each critical and non-critical sector. Canada’s CRTC collaborates with broadcasting and
Furthermore, an SRO can facilitate crucial collaboration telecommunications providers to implement security
and information sharing among stakeholders, including measures, illustrating a model where a government
government agencies, businesses, and cybersecurity agency partners with industry to achieve SRO-like
experts, while also drawing upon international best outcomes. Finally, the European Telecommunications
practices for optimal implementation. An SRO can play Standards Institute (ETSI) develops globally applicable
a pivotal role in driving the growth and development of cybersecurity standards, playing a crucial role in setting
the cybersecurity industry in Indonesia while also con- baseline security requirements. These varied examples
tributing to a safer and more secure digital environment offer valuable insights for Indonesia as it considers
for all. It can facilitate collaboration and knowledge which SRO model best suits its unique needs and
sharing through networking, information exchange, and priorities, highlighting the potential for sector-specif-
joint research initiatives that can foster innovation and ic approaches, public-private partnerships, and the
growth while also accelerating the development of new development of both broad and targeted cybersecurity
cybersecurity solutions. Furthermore, an SRO can ad- standards. These organizations highlight the sec-
vocate for supportive policies and promote the industry tor-specific approach that SROs can adopt to address
domestically and internationally to potential investors, unique cybersecurity challenges.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 61
5.3.4 Industry Self Regulation (ISR) for Non-Critical Sectors
Instead of strict regulations, Industry Self-Regu- Agreement for Mobile Content and Payment Services
lation (ISR) in cybersecurity empowers business- safeguards consumer interests in mobile content and
es within the non-critical sector to proactively payments.35 Other examples include the Entertainment
enhance their collective cybersecurity posture Software Rating Board in the United States, which
through voluntary collaboration, information provides age and content ratings for video games. In
sharing, and the development of tailored standards addition, the Electricity and Gas Complaints Commis-
and best practices. This approach is particularly sion in New Zealand, resolves consumer complaints
beneficial for non-critical sectors in Indonesia, allow- in the energy sector.36 Furthermore, initiatives like the
ing for tailored solutions that address each sector’s Code of Marketing of Food and Non-alcoholic Bever-
unique challenges and reduces the burden of following ages to Children in Mexico and the Children’s Food
one-size-fits-all rules. Furthermore, ISR can enhance and Beverage Advertising Initiative in the United States
industry reputation, build trust with customers, and demonstrate ISR’s role in promoting responsible food
establish a minimum cybersecurity baseline across the marketing to children.37 These examples underline
sector, preventing vulnerabilities caused by uneven se- how ISR can be implemented across various sectors
curity practices. To foster successful ISR in non-critical for a wide range of purposes starting from to protect
sectors, Indonesia can encourage industry associations consumers, ensure fair practices, and promote ethical
to lead the development of cybersecurity standards standards, offering valuable insights for strengthening
while the government provides support, resources, and cybersecurity in Indonesia’s non-critical sectors.
incentives for participation. Promoting awareness and
collaboration among businesses is crucial, and learn- For this to be successful and impactful, self-regula-
ing from international best practices can offer valuable tion initiatives must be carefully designed, adopt-
guidance. While challenges like ensuring widespread ed broadly, and monitored effectively to ensure
participation and consistent enforcement exist, a strong compliance and demonstrable results. To build
commitment from all stakeholders can enable effective trust and accountability, independent verification is
ISR implementation, ultimately strengthening Indone- key.38 Furthermore, self-regulation requires continuous
sia’s overall cybersecurity resilience. adaptation and improvement through ongoing moni-
toring, evaluation, and adaptation to remain relevant
Industry Self-Regulation (ISR) is used in many and effective in achieving its desired outcomes. These
different ways across the globe. For instance, the takeaways underscore the importance of designing and
Direct Selling Association Consumer Code in the implementing self-regulation initiatives carefully, with
United Kingdom which focuses on setting the ethical a focus on transparency, accountability, and demon-
standards for consumer protection. Similarly, in New strable results. There is also a need for collaboration
Zealand, the Advertising Standards Authority Adver- among industry players, regulators, and independent
tising Codes of Practice ensures responsible adver- verifiers to ensure that self-regulation truly serves its
tising across all media.34 In Denmark, the Framework intended purpose.
34
OECD, “Industry self regulation”, OECD Digital Economy Papers, 247 (2015): 40-63, https://doi.org/10.1787/5js4k1fjqkwh-en.
35
Ibid.
36
Ibid.
37
Ibid.
38
Martha Lagace, “Industry Self-Regulation: What’s Working (and What’s Not)?”, Harvard Business School, April 9th, 2007, https://hbswk.hbs.
edu/item/industry-self-regulation-whats-working-and-whats-not
62 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
5.3.5 Setting up a Cybersecurity Security Operations Center (SOC)
Security Operations Centers (SOCs) are fundamental for monitoring, detecting, and responding to secu-
rity incidents. This section outlines the strategic approach to establishing Indonesia’s SOC and sector-specific
SOCs, ensuring strong cybersecurity across Indonesia’s critical sectors. A Security Operations Center (SOC) is a
centralized facility for continuously monitoring an organization’s digital infrastructure to detect and respond to cy-
bersecurity threats. An SOC performs the functions of real-time monitoring, rapid incident response, and forensic
analysis after the incident.
National SOC
Incident Threat Proactive Policy and
Response Intelligence Security Regulation
Coordination Sharing Approaches Support
● Leads the response to major incidents, from ● Conduct regular cybersecurity awareness
detection, analysis, containment, eradication, and campaigns and training programs to strengthen
recovery. the cybersecurity posture of organizations and the
public.
● Works with organizations and international
partners to manage and mitigate the impact of 4. Policy and Regulation Support:
cyber incidents. ● Advise policymakers on cybersecurity
matters and support the development of relevant
2. Threat Intelligence Sharing: policies and regulations.
● Collects, analyzes, and shares threat infor-
mation to stakeholders. ● Ensure Indonesian organizations comply
with all international and national cybersecurity
● Facilitate the exchange of threat intelli- laws and standards.
gence between government, critical infrastructure,
and the private sector.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 63
Importance of CSIRT/SOC
Having a Computer Security Incident Response Team (CSIRT) or Security Operations Center (SOC) is real-
ly important for Indonesia’s cybersecurity because:
Phase 1
Initial Setup
Phase 2
Scaling
Phase 3
64 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
Phase 1: Initial Setup • Implement Sector-Specific SOCs: Develop
• Core Agencies: Begin with key agencies like cyber- SOCs for each sector, which report back to the
security agency and ID-SIRTII to establish a central national SOC.
hub for detecting and responding to threats.
Phase 3: Automation and AI Integration
• Data Sources: Deploy tools like endpoint detection • Embrace Advanced Technologies: Incorporate
and response (EDR) and firewalls to collect the data AI and automation to boost the SOC’s ability to
needed for analysis. quickly detect and respond to threats.
• Faster Incident Response: AI tools have been • Expanded Security Data Analysis: By four
proven to reduce Mean Time to Respond (MTTR) times.
from days to under two hours, significantly en-
hancing threat containment speed. Policy Recommendations:
• Incentivize AI Adoption: Provide incentives,
• Resource Optimization: By automating low-level such as tax breaks or subsidies, for organizations
alerts, AI enables cybersecurity professionals to adopting AI-driven SOC tools.
focus on critical, sophisticated threats, increasing
incident closure rates and expanding the amount • Set Performance Standards: Require orga-
of security data analyzed daily. nizations to include MTTD and MTTR in their
cybersecurity strategies to promote faster threat
resolution.
Adopting AI-driven automation will significantly improve the efficiency and resilience of Indonesia’s SOCs, en-
abling faster detection, better resource allocation, and a stronger overall cybersecurity framework.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Regulatory and Governance Framework 65
5.3.6 SOC Intervention Criteria
This outlines when Indonesia’s national SOC (Security Operations Center) should step in to handle cybersecurity
incidents, and how they would provide support.
66 Regulatory and Governance Framework Cybersecurity for a Sustainable and Resilient Digital Indonesia
Chapter
06
Public-Private
Partnerships &
Industry
Collaboration
Building a resilient and collaborative cybersecurity ecosystem requires strong partnerships between the
public and private sectors. A structured multi-tiered cyber public-private partnership (PPP) program is essential
to Indonesia’s national cybersecurity resilience. This program will facilitate formal engagement between the gov-
ernment and industry stakeholders, ensuring aligned cybersecurity strategies, timely threat intelligence sharing,
and strengthened coordinated responses to cyber incidents.
Unidirectional Bidirectional
Communication Communication
(Tier 1) (Tier 2)
68 Public-Private Partnerships & Industry Collaboration Cybersecurity for a Sustainable and Resilient Digital Indonesia
Outcomes of the Multi-Tiered Public-Private Partnership (PPP) Program
By creating a partnership program with different levels of engagement for various organizations, Indone-
sia can achieve the following:
• Strategic Alignment:
Creates a unified national cybersecurity strategy
by aligning efforts across sectors, reducing frag-
mentation and duplication.
An effective framework for cyber threat intelligence sharing is essential for detecting, deterring, and
responding to cyber threats in real time. Since the government and private businesses each have unique
knowledge about these threats, combining their insights gives Indonesia a complete picture and strengthens its
defenses.
• Broader Participation:
Engages organizations of all sizes, ensuring that
even smaller businesses benefit from high-quality
threat intelligence.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Public-Private Partnerships & Industry Collaboration 69
6.3 Establish a Cyber Incident Review Board or Similar Forum
As part of the Public-Private Partnership (PPP) Program, Indonesia should establish a Cyber Incident Re-
view Board to enhance its ability to analyze and learn from major cyber incidents. This board, composed of
government officials and trusted industry experts in cybersecurity and incident response, is responsible for:
By establishing this formal incident review forum, it will enable Indonesia to enhance its cybersecurity posture and
foster stronger collaboration between government agencies and private sector partners, thereby strengthening the
strategic response to ensure a safer digital environment.
In order to tackle the growing complexity and state capacity building, incident response, and infor-
transnational character of cyber threats, Indonesia mation sharing. Furthermore, Indonesia is also actively
acknowledges the crucial need for international involved in Asia-Pacific Economic Cooperation to fight
collaboration in cybersecurity. To improve its cyber- cybercrime and contribute to building international
security posture, Indonesia should actively participate norms on cybersecurity.40
in alliances and cooperative projects with other nations
and international organizations. Globally, Indonesia is dedicated to promoting peace
and strengthening the development of cyber norms.41
Regionally, Indonesia is committed to further Indonesia has actively participated in UN Security
bolstering the role of regional organizations in Council, UN Group of Governmental Experts (GGE)
the cybersecurity landscape through Confidence on Advancing Responsible State Behaviour in Cyber-
Building Measure (CBMs) and the development of space, UN Open-Ended Working Group (OEWG) on
regional capacity.39 An important part of ASEAN’s Developments in the Field of Information and Telecom-
cybersecurity efforts is Indonesia’s participation in the munications in the Context of International Security,
ASEAN Regional Forum (ARF), ASEAN Political-Se- International Telecommunication Union (ITU), United
curity Community, ASEAN Cyber Capacity Program Nations Office on Drugs and Crime (UNODC), Organi-
(ACCP), ASEAN Cybersecurity Coordinating Com- zation of Islamic Cooperation (OIC), Global Commis-
mittee (ASEAN Cyber-CC), and the ASEAN-Japan sion on the Stability of Cyberspace (GCSC), and G20.
42
Cybersecurity Capacity Building Center (AJCCBC).
These programs put a strong emphasis on member
Bilaterally, Indonesia cooperates and collaborates on the cybersecurity landscape with the European Union,
Australia, the United States, China, Japan, South Korea, etc. The scope of cooperation encompasses security
dialogue, workshops, incident management, cybercrime investigations, capacity building programs, cybersecurity
strategy, joint exercises, cyber defense capabilities, information sharing, combating cybercrime, protecting critical
infrastructure, and promoting cyber norms.
39
MoFA Indonesia, “Indonesia Voices Cyber Stability in the UN”, MoFA ID, May 23rd, 2020, https://kemlu.go.id/portal/en/read/1327/berita/
indonesia-voices-cyber-stability-in-the-un
40
IISS, “Indonesia”, Cyber Capabilities and National Power: A Net Assessment, (2021): 143-147, https://www.iiss.org/globalassets/media-li-
brary---content--migration/files/research-papers/cyber-power-report/cyber-capabilities-and-national-power---indonesia.pdf
41
MoFA Indonesia, “Indonesia Voices Cyber Stability in the UN”, MoFA ID, May 23rd, 2020, https://kemlu.go.id/portal/en/read/1327/berita/
indonesia-voices-cyber-stability-in-the-un
42
Ibid.
70 Public-Private Partnerships & Industry Collaboration Cybersecurity for a Sustainable and Resilient Digital Indonesia
Several areas that can be explored for future collaborations would be:
43
Abdurrahman Al-Fatih Ifdal & Kenzie Sultan Ryvantya, “Ketangguhan Diplomasi Internasional” in Visi dan Peta Jalan Indonesia
Emas 2045 Milik Pemuda, ed. Reza Edriawan et al. (Jakarta: Indonesian Youth Diplomacy, 2024) 58, https://iyd.or.id/wp-content/up-
loads/2024/09/05092024_IYD_Report_All-Content.pdf
Cybersecurity for a Sustainable and Resilient Digital Indonesia Public-Private Partnerships & Industry Collaboration 71
Chapter
07
Cybersecurity
Education
and Talent
Development
The cybersecurity agency and Kadin (Indonesian Chamber of Commerce and Industry) will lead these
efforts, ensuring that cybersecurity education and awareness reach everyone. By partnering with the private
sector, industry groups, and schools, Indonesia can build a strong cybersecurity foundation.
The world is facing a growing shortage of cybersecurity experts. Indonesia is also facing a significant
shortage of cybersecurity professionals and a general lack of awareness about cybersecurity best prac-
tices. These gaps hinder the nation’s ability to effectively respond to cyber threats and adopt cybersecurity mea-
sures across industries.
To solve this, both the public and private sectors need to invest in training and supporting these profes-
sionals. It’s also important to maximize the effectiveness of the existing cybersecurity workforce. Building a robust
pipeline of skilled professionals, including those from unconventional backgrounds, will benefit the entire cyberse-
curity ecosystem. Governments should prioritize recruiting diverse talent and reconsider traditional hiring criteria,
such as rigid degree requirements and certifications, which often exclude capable individuals like hackers, vet-
erans, and those from underrepresented groups. Addressing challenges like cybersecurity knowledge and talent
gaps in Indonesia requires a multi-faceted strategy focused on educational reform, professional certification, and
continuous learning. Such an effort has to be performed comprehensively through collaboration between govern-
ment, private sector, and educational institutions in building a skilled cybersecurity workforce.
44
Access Partnership, “Google’s role in helping Indonesia build a safe and productive society through digital tools”, Economic Impact Report,
October (2023): 5, https://cdn.accesspartnership.com/wp-content/uploads/2023/10/ID-EN-FA-OnScn.pdf?hsCtaTracking=be48563c-9c59-4f6c-
9b6e-65c517502ef5%7C087a5bf8-c39f-4fb3-9c18-2aaf7af92354
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Education and Talent Development 73
7.2 Designating a Lead Agency for Cyber Education and Awareness
Indonesia needs a multi-pronged approach to raise cybersecurity awareness and knowledge across all
levels of society. A critical step towards enhancing Indonesia’s national cybersecurity framework is to designate
a central authority responsible for coordinating, developing, and delivering cybersecurity awareness programs.
This lead agency, ideally the cybersecurity agency) or the national CSIRT (or another designated body), would
be the key driver of all cyber education and awareness efforts, working across both the public and private sectors.
The designated agency would have several strategic responsibilities to ensure effective nationwide engagement
and alignment across stakeholders.
74 Cybersecurity Education and Talent Development Cybersecurity for a Sustainable and Resilient Digital Indonesia
3. Launch a Whole-of-Nation Cybersecurity Edu- 4. Implement Evaluation Metrics for Awareness
cation Campaign Programs
● Collaborative Effort: ● Performance Indicators:
The Indonesian government partners with lead- Establish clear metrics to assess the effectiveness
ing industry associations such as USABC and of awareness campaigns, such as participation
Kadin to launch a national cybersecurity aware- rates and reductions in incidents linked to poor
ness campaign. This initiative will be pivotal in awareness.
educating the broader public on how to protect
themselves against cybercrime, with messaging ● Continuous Improvement:
tailored to all levels of society. Use evaluation data to refine content and distribu-
tion methods, keeping programs responsive to the
● Campaign Scope: dynamic cyber landscape.
○ National Messaging:
Develop messaging that resonates with everyone 5. Develop Executive-Level Awareness Programs
from business executives to students. ● Tailored Training:
Create specialized programs for executive manag-
○ Multiple Channels: ers in both the public and private sectors, focusing
Utilize social media, television, and radio to en- on the unique cyber risks their organizations face
sure broad reach. and the strategic countermeasures required.
To combat the ever-changing cyber threats, every organization in Indonesia needs to prioritize cyberse-
curity training for all employees. While many businesses have incorporated cybersecurity into their training
programs, there is a need for a more unified, mandatory approach, especially within government institutions and
state-owned enterprises.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Education and Talent Development 75
Key Recommendations for an Effective Cybersecurity Training Program
1. Inclusive Training for All Business Areas shaping an organization’s cybersecurity strategy
Cybersecurity training should be mandatory for and investments. This training should ensure they
all employees, from entry-level staff to senior are aware of the financial and operational risks
executives and CFOs. This ensures everyone posed by cyber threats, enabling informed deci-
understands the risks and can act as the first line sion-making regarding cybersecurity expenditure
of defense. and strategic initiatives.
Addressing the shortage of cybersecurity professionals is crucial for Indonesia’s national security and
digital economy. A comprehensive strategy spanning all education levels is required to develop a robust pipeline
of skilled professionals. This talent pipeline will support both the public and private sectors, ensuring the country
has the expertise needed to counter evolving cyber threats.
76 Cybersecurity Education and Talent Development Cybersecurity for a Sustainable and Resilient Digital Indonesia
Key recommendations for growing Indonesia’s cybersecurity talent:
1. Align Government Entities on Shared Objec- the overall security posture of local communi-
tives ties. Furthermore, innovative training programs
The cybersecurity agency, the Ministry of Educa- leveraging technologies like generative AI can
tion, and other relevant entities should collaborate personalize the learning experience and efficiently
to define clear cybersecurity education priorities. expand the pool of qualified cybersecurity profes-
This will ensure a unified national approach and sionals.
efficient use of resources.
● Cyber Year of Service:
Actionable Initiatives: To bolster the cybersecurity workforce, we need
● Develop a national cybersecurity education both broader and deeper expertise. Mandating
roadmap as part of the National Cybersecurity standardized cybersecurity content in all computer
Strategy (NCSS). science programs through certification require-
ments can significantly increase baseline knowl-
● Ensure that a dedicated national budget is al- edge. Furthermore, initiatives like a “Cyber Year
located to fund cybersecurity education initiatives, of Service” can provide valuable experience and a
infrastructure development, and talent programs direct pathway to government cybersecurity roles
across all education levels. for graduates. These diverse training avenues,
coupled with equipping professionals with ad-
2. Implement Comprehensive Cyber Education vanced tools like AI and leveraging cloud-based
To ensure that Indonesia can meet its growing security solutions, will maximize their effective-
need for cybersecurity professionals, cybersecu- ness and efficiency in combating cyber threats.
rity education must be integrated across prima-
ry, secondary, and tertiary education levels. This Further Developments:
includes creating specialized cybersecurity cours- ● Regularly review and update the IT and cyber-
es and embedding cybersecurity content within security content taught in schools and universities
existing ICT and STEM curricula. Early exposure to align with current best practices.
cultivates interest and foundational knowledge,
while advanced programs at universities develop ● Allocate additional funding to public universities
specialized skills. to expand their cybersecurity infrastructure, in-
cluding labs and technical facilities, ensuring they
Actionable Initiatives: are equipped to meet the demands of increasing
● Teacher Training: enrollment in cybersecurity courses.
Provide educators with training and resources to
deliver current and industry-relevant cybersecurity 3. Incentivize ICT and STEM Courses
courses Encouraging students to pursue ICT and STEM
fields is key to fostering a steady flow of talent into
● Curriculum Expansion: the cybersecurity workforce. Providing financial
Embed cybersecurity modules across various incentives like grants and scholarships, can
university programs, including non-technical fields make these programs more attractive and acces-
like law and business, to promote cross-disci- sible to a broader range of students. Additionally,
plinary expertise. we also need to provide financial incentives for in-
stitutions and educators to promote and enhance
● Public Access and Informal Education: ICT and cybersecurity education.
Support seminars, MOOCs, mentorship, work-
shops, and lectures on cybersecurity topics ac- 4. Develop Cyber Internships and Apprenticeship
cessible to non-specialists, fostering widespread Programs
awareness. Providing hands-on learning opportunities through
internships and apprenticeship programs is crit-
● Cyber Clinics: ical to bridging the gap between academic educa-
The cyber clinics offer a valuable opportunity to tion and practical cybersecurity experience. These
address the cybersecurity skills gap. By providing programs allow students and professionals to gain
hands-on experience for students while assisting real-world experience in cybersecurity, improving
under resourced organizations, they strengthen their skills and employability.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Education and Talent Development 77
Actionable Initiatives: cybersecurity, including women, minorities, and
Partner with the private sector to offer internships those from disadvantaged backgrounds.
and apprenticeships, providing hands-on experi-
ence that bridges academic learning and practical ● Create partnerships with organizations that
application. promote diversity in STEM fields to increase par-
ticipation from all segments of society in cyberse-
5. Promote Micro-credentials in Cybersecurity curity roles.
Encourage the development and recognition of
short, focused qualifications in areas like cloud 7. Host a National Cyber Challenge
security and incident response. Micro-credentials Organize Capture the Flag (CTF) competitions
allow professionals to upskill rapidly and special- and other cybersecurity challenges to engage stu-
ize according to industry needs. dents and professionals. These events stimulate
interest, encourage skill development, and identify
Actionable Initiatives: promising talent.
● Promote micro-credentials that focus on
emerging areas such as cloud security, threat Actionable Initiatives:
intelligence, incident response, and forensic anal- ● Collaborate with universities, Kadin, and inter-
ysis. national organizations to provide sponsorships
and prizes, enhancing participation.
● Collaborate with industry leaders to ensure
Micro-credential programs are relevant and meet ● Establish pathways from competition participa-
current cybersecurity demands. tion to internships and employment opportunities
within the cybersecurity sector.
6. Enhance Diversity and Inclusion
A diverse cybersecurity workforce is essential for 8. Cybersecurity Talent Retention Strategy
bringing different perspectives and skills to the Retaining skilled cybersecurity professionals is
table. Programs aimed at increasing diversity, par- crucial. Their expertise grows with time, making
ticularly in underrepresented groups, are key to them invaluable assets. Cultivating a supportive
building an inclusive cybersecurity talent pipeline. environment where they feel empowered to ques-
tion, innovate, and adapt ensures job satisfaction
Key Recommendations: and encourages long-term commitment to the
● Develop mentorship programs and outreach organization.
initiatives targeting underrepresented groups in
To further grow the cybersecurity talents and create labor market symmetry, there is a need for the public
and private sector to have a synergy in terms of how to properly channel these talents into the right oc-
cupation through proper career path and occupation mapping. In 2019, BSSN partnered with Kadin, Ministry
of Manpower, Ministry of Communication and Informatics, Ministry of National Development Planning, and BNSP
launched “National Occupational Map in the Indonesian National Qualification Framework in the Area of Cyberse-
curity Function” that outlines cybersecurity job roles, skills, competencies, and career paths while also serves as
the guidelines for individuals, educational institutions, and private sectors. The purpose of this document is also to
provide standardization, skills development, career planning, workforce development, and industry growth. There
are approximately 30 occupations and four key components for each occupation such as job roles, competencies,
career path, and certification or training which are already synchronized with Indonesian National Work Compe-
tency Standards (SKKNI) (see appendix N).45
In the context of Indonesia’s evolving cybersecurity landscape, certification and standards play a critical
role in ensuring that both professionals and organizations are equipped to meet the growing demands for
cybersecurity resilience. This chapter will detail the professional and organizational certification programs nec-
essary to foster a robust cybersecurity environment, building on existing initiatives from the cybersecurity agency,
MOCI, and Kadin while incorporating best practices from global frameworks.
78 Cybersecurity Education and Talent Development Cybersecurity for a Sustainable and Resilient Digital Indonesia
7.6.1 Professional Certification Programs
To ensure that Indonesia develops a skilled and certified cybersecurity workforce capable of addressing complex
threats across sectors. Professional certification programs will focus on closing the cybersecurity skills gap by
providing globally recognized credentials and practical expertise.
Kadin (the Indonesian Chamber of Commerce and Industry) is planning to expand and introduce cybersecurity
certification programs for professionals in collaboration with the cybersecurity agency, MOCI, and international
certification bodies. Kadin will act as the key facilitator, working to ensure that certification programs are aligned
with industry needs and cover the latest technologies.
Implementation Plan
Stage 1
Establish a framework for certifying cybersecurity professionals in critical industries such as
finance, healthcare, and energy over the next three years
Stage 2
Introduce subsidies and financial incentives to support professionals obtaining
certifications, especially those from SMEs and underrepresented regions
Stage 3
Partner with private sector organizations to provide on-demand training and
certification workshops, leveraging both online platforms and in-person training
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Education and Talent Development 79
7.6.2 Organizational Certification Programs
The organizational certification program aims to ensure that organizations across Indonesia, especially those
operating in critical infrastructure sectors, meet internationally recognized cybersecurity standards. This will help
reduce risks and protect important national assets.
Current Initiatives:
• KAMI Index Assessment: • MOCI’s Data Protection Certification:
This facilitates assessment for organizations in This program focuses on ensuring compliance
sectors handling sensitive information, including with Indonesia’s Personal Data Protection Law
finance, government, and telecommunications (PDP), requiring organizations to safeguard per-
which follows the SNI/ISO/IEC 27001. sonal data in alignment with global standards.
Role of Kadin:
Kadin, the Indonesian Chamber of Commerce and Industry, will expand these certification efforts to include more
organizations, especially small and medium-sized enterprises (SMEs). Kadin will facilitate compliance with both
national and international cybersecurity standards, such as ISO/IEC 27001 and/or the NIST Cybersecurity
Framework.
Implementation Plan
Stage 1
Provide resources and support for organizations in critical sectors to achieve necessary
certifications, strengthening national cybersecurity infrstructure
Stage 2
Establish a dedicated cybersecurity compliance portal where organizations can perform
self-assesments, access certification guidance, and seek consultancy
Stage 3
Collaborate with global technology providers to develop customized cybersecurity certification
frameworks for industries like telecom, logistics, and manufacturing
80 Cybersecurity Education and Talent Development Cybersecurity for a Sustainable and Resilient Digital Indonesia
By leveraging the collective efforts of Cybersecurity Agency: MOCI, this ensures the development of a highly
skilled cybersecurity workforce and encourages organizations, particularly in critical sectors, to achieve and main-
tain global cybersecurity standards. Kadin’s role as a facilitator for SMEs and its collaboration with government
bodies will be key to achieving national cybersecurity goals.
Southeast Asia
In Southeast Asia, Google’s charitable arm, Google.org, is giving $15 million to The Asia Foundation to
start the APAC Cyber Security Fund. They’re working with CyberPeace Institute and Global Cyber Alliance to
improve the online security of 300,000 small businesses, nonprofits, and social enterprises in 12 Asian countries.
This involves partnering with organizations and universities to provide training and support to local communities
and students.47
Indonesia
Indonesia faces a growing number of cyber threats, including data breaches and ransomware attacks,
which can disrupt essential services and harm the digital economy. In Indonesia, Google is addressing the
growing cyber threats by providing scholarships for BSSN officials to earn the Google Cybersecurity Certificate,
sharing threat intelligence with BSSN through Mandiant, and collaborating with BSSN on using AI to enhance
cybersecurity. There is a need to improve cybersecurity capabilities in the public sector and among small and
medium-sized enterprises (SMEs) in Indonesia. On the other hand, policymakers in Indonesia need support in
understanding and harnessing the potential of AI for cybersecurity while mitigating its risks.
This partnership is expected to strengthen Indonesia’s cybersecurity workforce, improve threat detection
and response, and raise cybersecurity awareness. By proactively investing in these capabilities, Indonesia
aims to safeguard its digital landscape and protect its citizens from the growing threat of cyberattacks. This in-
volves bolstering cybersecurity in the public sector and among SMEs, enabling them to better detect, prevent, and
respond to cyber threats using AI-powered tools.48
What’s Next
Looking ahead, Google continues its commitment to strengthen Indonesia’s cybersecurity across all lev-
els. In addition to their partnership with BSSN, Google.org is supporting The Asia Foundation to empower 70,000
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Education and Talent Development 81
micro, small, and medium-sized enterprises (MSMEs) with crucial cybersecurity skills. This initiative, implemented
with local partners like PPSW, PUPUK, and Majelis Ekonomi dan Kewirausahaan Muhammadiyah, will provide
training and AI-powered security tools to help MSMEs defend against cyber threats.
Furthermore, Google Cloud offers free cybersecurity and AI training resources through its Skills Boost
program, accessible to all Indonesians. These resources include courses like the Cloud Digital Leader Learn-
ing Path and the Introduction to Generative AI Learning Path, along with gamified learning experiences through
The Arcade. By providing these opportunities, Google aims to equip Indonesians with valuable skills in cybersecu-
rity and AI, enabling them to contribute to a safer and more resilient digital Indonesia.
Initiative
Palo Alto Networks launched the CyberFit Nation program to address cybersecurity education gaps in Indonesia.
The initiative offers free workshops tailored to diverse audiences, including SMEs, corporate leaders, and stu-
dents.
Impact
By equipping different sectors with the knowledge and skills needed to protect their digital environments, CyberFit
Nation enhances overall cybersecurity resilience. Participants gain practical insights into threat prevention and
response strategies.
Collaboration
The Cisco Networking Academy partners with universities, vocational schools, and government agencies to pro-
vide free training in cybersecurity, networking, and IT skills.
Impact
Over 442,000 students in Indonesia have been trained through this program, earning globally recognized certifica-
tions. This enhances individual career prospects and also contributes to a more skilled national workforce capable
of addressing cybersecurity challenges.
45
BSSN et al., National Occupational Map in the Indonesian National Qualification Framework in the Area of Cybersecurity Function. (Jakarta:
BSSN, 2019.
46
Lisa Geverlber & Phil Venables, “New cybersecurity training to help build a safer world”, Google, May 4th, 2024, https://blog.google/out-
reach-initiatives/grow-with-google/google-cybersecurity-career-certificate/
47
The Asia Foundation, “APAC Cybersecurity Fund”, The Asia Foundation, October 10th, 2023 https://asiafoundation.org/apac-cybersecuri-
ty-fund/
48
Google Indonesia, “Google Bekerja Sama dengan BSSN dan Ekosistem Digital Indonesia untuk Memperkuat Pertahanan dan Keamanan
Siber Nasional Berteknologi AI”, Google, March 5th, 2024, https://blog.google/intl/id-id/company-news/technology/2024_03_google-bekerja-
sama-dengan-bssn-dan/?
82 Cybersecurity Education and Talent Development Cybersecurity for a Sustainable and Resilient Digital Indonesia
Chapter
08
Cybersecurity
Methodologies
and Risk
Management
Frameworks
Cybersecurity for a Sustainable and Resilient Digital Indonesia 83
Effective cybersecurity management requires adopting well-defined methodologies and risk management
frameworks that provide organizations with clear guidelines for identifying, mitigating, and responding to
cyber threats. Indonesia should prioritize the implementation of international best practices while also tailoring
them to fit the specific needs of important sectors like finance, healthcare, and energy. This chapter explores how
adopting well-defined cybersecurity methodologies and risk management frameworks provides clear guidelines for
identifying, mitigating, and responding to cyber threats, ensuring organizational resilience.
By adopting these frameworks, Indonesia can establish consistent and standardized approaches to cybersecurity
across sectors, enabling organizations to better protect their assets and manage risks.
84 Cybersecurity Methodologies and Risk Management Frameworks Cybersecurity for a Sustainable and Resilient Digital Indonesia
Exhibit 8.1 The NIST Cybersecurity Framework
To ensure effective cybersecurity risk management, the NIST Cybersecurity Framework provides a comprehen-
sive set of security controls across five core functions:
8.2.1 Identify
The identify function helps organizations understand cybersecurity risks to their systems, assets, and data. By
identifying critical assets and assessing potential threats, organizations can prioritize the implementation of securi-
ty measures that align with their risk profile.
Key Activities:
• Asset management: • Governance:
Catalog all IT assets, including hardware, soft- Establish governance structures to assign ac-
ware, and cloud environments. countability for cybersecurity.
8.2.2 Protect
The protect function focuses on implementing safeguards to ensure service continuity and the protection of as-
sets. This function prioritizes proactive measures to minimize the potential impact of cybersecurity events.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Methodologies and Risk Management Frameworks 85
Key Activities:
• Access Control:
Use multi-factor authentication (MFA) and role- • Information Protection Processes:
based access control to ensure that only autho- Establish policies for secure data handling and
rized personnel have access to sensitive systems storage, and regularly audit compliance with secu-
and data. rity standards like ISO/IEC 27001.
• Data Security:
Encrypt data at rest and in transit, and ensure that
data backups are secure and regularly updated.
For a detailed breakdown of control steps under the Identify function, refer to Appendix C.
8.2.3 Detect
The detect function focuses on monitoring systems to detect cybersecurity events in real time. Early detection of
malicious activity is crucial for mitigating damage and preventing data breaches.
Key Activities:
• Continuous Monitoring: • Detection Processes:
Implement tools such as Security Information and Set up automatic alerts for anomalies and events,
Event Management (SIEM) systems to monitor and ensure that detection rules are regularly up-
networks, endpoints, and applications for suspi- dated to reflect new threats.
cious activities.
Detailed methodologies for detection processes and controls are provided in Appendix D.
8.2.5 Recover
The Recover function ensures organizations can restore services and operations after a cybersecurity incident.
This function emphasizes resilience and continuous improvement in recovery processes.
Key Activities:
• Recovery Planning: • Post-Incident Reviews:
Develop recovery plans to restore systems and Conduct thorough assessments of the incident
services quickly. response process to identify lessons learned and
improve future responses.
Organizations come in all shapes and sizes, with different resources and levels of risk. They vary signifi-
cantly in their resources, risk exposure, and digital environments. Therefore, Indonesia’s cybersecurity framework
must provide tailored methodologies that align with the specific needs of different organizations. To ensure that
cybersecurity efforts are proportional and effective, organizations are categorized into two distinct groups, catego-
ry A and category B, based on the potential damage a cyber incident could cause.
86 Cybersecurity Methodologies and Risk Management Frameworks Cybersecurity for a Sustainable and Resilient Digital Indonesia
8.3.1 Category A Organizations
These include small to medium-sized enterprises (SMEs), which may not have the resources to invest heavily in
cybersecurity infrastructure. For these organizations, a simplified methodology should be implemented, focusing
on basic cyber hygiene and low-cost security measures.
Key Actions:
• Basic Control Families:
Implement approximately ten foundational control families (Appendice) that address fundamental security
needs. These basic cybersecurity controls can ensure SMEs have a foundational level of security even with
limited resources. (Detail on Appendix G).
Implementation Guidance:
The implementation process for Category A organizations should be straightforward and focused on practical
steps:
Additional requirements:
Category A organizations may be subject to additional regulatory obligations if they handle sensitive information
or work with third-party vendors. In such cases, they may be reclassified as Category B organizations, requiring
them to adopt more advanced cybersecurity measures. Similarly, suppliers to Category B organizations may need
to comply with higher security standards to protect the supply chain.
Attention:
In cyber and data security, it is common to assess potential impact based on three categories:
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Methodologies and Risk Management Frameworks 87
8.3.2 Category B Organizations
Category B organizations, such as large enterprises and critical infrastructure operators, face more significant cy-
bersecurity risks due to the complexity of their digital environments and the potential damage that cyber incidents
can cause. As a result, they must adopt more sophisticated cybersecurity frameworks and advanced risk manage-
ment processes.
Stage 1 Stage 2
Define business objectives and determine how cyber Identify and categorize potential threat
risks align with organizational goals actors and their methods
Stage 4 Stage 3
Develop mitigation strategies to address Develop mitigation strategies to address
identified impact identified risks
Stage 5
Implement the mitigation strategies and measure
their effectiveness
Stage 1 Stage 2
Identify risk scenarios specific to the organization’s assets Evaluate the probability and potential impact of these risks
and operations using quantitative analysis
Stage 4 Stage 3
Apply risk treatments and measure the change in risk Calculate the risk in financial terms to prioritize risk
post-implementation management investments
88 Cybersecurity Methodologies and Risk Management Frameworks Cybersecurity for a Sustainable and Resilient Digital Indonesia
Control Implementation Based on Risk Assessment:
Organizations should implement controls based on the outcomes of their risk assessments. Controls should be
prioritized using a Control Complexity Scoring System, which ranks controls from Level 1 to Level 4 according to
their complexity and cost-benefit value.
LEVEL Basic controls that are easy to implemment and involve minimal costs. Suitbale for protecting
assests or fot organizations with limited cybersecurity budgets.
1
LEVEL Controls offering a moderate level of security, requiring some investment in resources and time
to implement effectively.
2
More complex controls that provide higher security but require significant resources and exper-
LEVEL tise to deploy. Suitable for protecting valuable organizational assets that, while not critical, still
3 carry significant risk if compromised.
The most complex controls, designed for assets considered crown jewels or of national/regula-
LEVEL tory interest. These controls involve subtantial investment and are critical for assets where the
4 highest level of security is non-negotiable.
• Identify Critical Assets: Classify assets based on • Resource Allocation: Allocate resources ac-
their importance and the potential impact of their cording to the complexity scores, directing more
compromise. resources toward controls critical for the organiza-
tion’s cybersecurity posture.
• Conduct Risk Assessment: Perform a compre-
hensive risk assessment to understand the threats • Monitoring and Adjustment: Continuously mon-
and vulnerabilities associated with each asset. itor the effectiveness of the implemented controls
and adjust as needed based on evolving threats
• Map Controls to Assets: Based on the risk as- and organizational changes.
sessment and the control complexity score, assign
appropriate controls to each asset. Reserve Level
4 controls for the most critical assets.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Methodologies and Risk Management Frameworks 89
8.4. Advanced Cybersecurity Enhancement Recommendations
In today’s rapidly evolving cyber threat landscape, maintaining continuous visibility and real-time mon-
itoring of an organization’s security posture is critical. Continuous visibility enables organizations to detect
anomalies, identify vulnerabilities, and respond swiftly to threats before they escalate. Regular penetration testing,
red teaming, and cyber exercises further bolster defenses by simulating real-world attacks, uncovering weakness-
es, and preparing teams for actual incidents. Proactive measures such as purple teaming, where offensive and
defensive teams collaborate, enhance the organization’s ability to anticipate and mitigate risks.
Regular audits of compliance with key security standards like ISO/IEC 27001 are also essential. By combining
these strategies, organizations can build a resilient cybersecurity posture that adapts to new threats and with-
stands the dynamic nature of the digital environment.
Entities of all sizes have historically struggled to understand and manage their digital infrastructure,
including devices and applications exposed to the internet. Studies have found that even sophisticated
enterprises may have twice the number of systems exposed on the internet than they are internally monitoring—a
visibility gap that gives adversaries an advantage. Attackers regularly scan the internet for vulnerabilities in pub-
lic-facing infrastructure to exploit them. Adversary scanning can occur every 15 minutes or less following vulner-
ability disclosures. Meanwhile, global enterprises may need an average of 12 hours to find vulnerable systems,
assuming they are aware of all assets on their network.
Recommendations:
• The Indonesian government should incentivize • The cybersecurity agency may consider leveraging
each State-Owned Enterprise (SOE) and other or- ASM capabilities to create a ‘cyber weather’ map
ganizations to implement technologies that improve of government and SOE entities, providing broad,
real-time discovery and visibility over their network near real-time visibility into each entity’s cyber
attack surfaces, particularly internet-facing assets posture.
and assets held in cloud environments.
This approach aligns with global best practices, where entities in regions like the EU, the US, and Australia are
mandated to have real-time visibility into their internet-facing infrastructure.
The Zero Trust model is essential in eliminating implicit trust within networks and validating all user
interactions. Instead of automatically trusting users and devices within a network, the Zero Trust model requires
verification at every access point. By continuously authenticating every access point, Zero Trust improves the
resilience of IT environments and reduces attack vectors. This strategic approach has been popularized by initia-
tives such as President Biden’s Executive Order on Improving the Nation’s Cybersecurity and is being adopted by
countries like Australia to enhance governmental cybersecurity postures.
Recommendation:
The Indonesian government should develop and implement Zero Trust security guidance across both the public
and private sectors. This framework will ensure that all sectors adopt policies that reduce implicit trust, continu-
ously authenticate access, and improve overall security.
90 Cybersecurity Methodologies and Risk Management Frameworks Cybersecurity for a Sustainable and Resilient Digital Indonesia
8.4.4 Develop a Plan for Secure Transition to the Cloud
Cloud adoption provides substantial benefits, including cost savings, scalability, and flexibility. However,
transitioning to cloud environments must be handled securely, as cloud services are not inherently secure by de-
fault. With the rise of multi-cloud environments, organizations may face visibility challenges, increasing exposure
to vulnerabilities.
Recommendation:
The Indonesian government should create a secure cloud transition plan for public and private entities. This plan
must ensure comprehensive visibility and governance across all cloud environments, emphasizing automation
and continuous monitoring.
The protection of Critical Information Infrastructure (CII) is a top priority for Indonesia’s national cyber-
security strategy. Critical infrastructure sectors such as energy, telecommunications, and healthcare are highly
vulnerable to cyberattacks, and robust security measures must be implemented to mitigate these risks.
Sector-specific cybersecurity guidelines, aligned with international standards such as ISO/IEC 27001 and the
NIST Cybersecurity Framework, should be developed and enforced across all critical sectors. These guidelines
will provide detailed protocols for incident response, risk management, and the implementation of advanced secu-
rity controls.
Critical infrastructure sectors should centralize their cybersecurity services within sector-specific Security Op-
erations Centers (SOCs). Centralizing services such as monitoring, incident response, and threat detection will
improve the efficiency and coordination of cybersecurity efforts across critical infrastructure sectors.
To maintain compliance with regulatory standards, all critical infrastructure sectors must be subject to regular
audits and vulnerability assessments. These audits will help identify areas where improvements can be made,
ensuring that cybersecurity measures remain effective in protecting critical infrastructure.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Cybersecurity Methodologies and Risk Management Frameworks 91
Chapter
09
Strengthening
Local Players in
Cybersecurity
Industry Growth
By empowering local firms, promoting indigenous innovation, and ensuring fair competition with foreign enterpris-
es, Indonesia can position itself as a leader in the cybersecurity field both regionally and internationally. Three
major foundations that Indonesia should consider are ideal provision, transition, and SRO standardization.
Local Foreign
Value Added Resellers Technology License
Threat Intelligence Implement Enterprise
Reseller Business Model
Incident Response
Create Locally Relevant Supplying Cutting-Edge
Solutions Technologies
Ideal Provision
Increased digitization is propelling Indonesia’s cybersecurity sector’s explosive expansion, but it also
confronts obstacles like a lack of qualified workers, little R&D, and a dependency on foreign solutions.
Local businesses should concentrate on specialty markets like threat intelligence and incident response, create
locally relevant solutions, and form reliable alliances to support a flourishing local industry while also still being
able to become Value-Added Resellers (VARs). As the VARs, local companies play their role as high-end se-
curity assessors, integrators, consultants, customer success accelerators, consolidators, optimizers, managed
security service providers (MSSPs), managed detection and response services (MDRs), and SOC-as-a-Service
Partners.49 International businesses may help by licensing their technology, allowing enterprise reseller business
models to be applied, sharing best practices worldwide, investing in local talent development, and supplying
cutting-edge technologies. Local innovation should be encouraged by the Government through incentives and
policies.50 To create a workforce of qualified cybersecurity professionals, the Government must also support
cooperation between regional and international actors and invest in education and training to develop a skilled
cybersecurity workforce.51
If Indonesia wants to compete at a high level, it needs to concentrate on promoting innovation rather than
merely implementing current technologies. This entails creating domestic cybersecurity solutions that are
suited to Indonesia’s particular problems, boosting R&D spending to spur innovation and provide a competitive
edge, and fostering a cybersecurity culture by incorporating best practices and awareness into educational and
professional development initiatives.52
Cybersecurity for a Sustainable and Resilient Digital Indonesia Strengthening Local Players in Cybersecurity Industry Growth 93
SRO Standardization
In Chapter 5, we discussed the broader regulatory landscape required to secure Indonesia’s digital future.
Building upon those foundations, Indonesia can build a self-reliant cybersecurity ecosystem by ensuring that local
firms are protected from unfair foreign competition while also fostering innovation.
Key Actions:
• Local Content Mandates meet local content standards while gaining access
The Indonesian Government can implement reg- to cutting-edge technologies and invaluable ex-
ulations requiring a minimum proportion of local perience. For instance, local cybersecurity SMEs
content in cybersecurity procurement for Govern- could receive a 10% pricing preference in Gov-
ment agencies and vital infrastructure projects ernment tenders during the procurement process.
to promote a thriving local cybersecurity sector. One example would be India, which has imposed
Clear definitions of “local” goods and services, preferential treatment in procurement for cyber-
including incorporating standards like Indonesian security products, which is expected to foster
ownership and domestic R&D, can help achieve income and employment growth.54
this. Local businesses could progressively in-
crease their capacity to satisfy demand using a • Regulatory Simplification
phased deployment strategy. A method for au- The Indonesian Government needs to expedite
diting and confirming compliance should also be yet streamline the bureaucratic hurdles of licens-
implemented with the help of independent certify- ing and regulation processes for the establish-
ing organizations. For instance, the Government ment of local cybersecurity businesses where
may require all agencies to purchase at least 40% businesses can quickly acquire licenses, permits,
of services or goods that they need from local and certificates, streamlining the compliance pro-
suppliers.53 cedure. It would ensure that local businesses fully
comply with the criteria and can comply efficiently
• Preferential Treatment in Procurement if clear and concise guidance on cybersecurity
The Indonesian Government can modify regula- standards and regulations were provided through
tions related to procurement to grant preferential the eligibility assessment process, exclusion of
treatment to empower and support the growth of tenderers with poor track records, and cyber in-
local cybersecurity companies, especially SMEs. tegrity of prospective tender, goods, and procure-
This can be achieved by providing price benefits ment procedure. Additionally, tax incentives for
during the procurement bidding process. Further- regional cybersecurity SMEs and startups would
more, some governments, either in municipal or also promote investment and industry expansion.
provincial level contracts, might only be awarded
to regional suppliers, particularly for initiatives that • Anti-Dumping Laws
deal with sensitive data or local needs. Encour- Introduce measures to prevent foreign companies
agement of joint ventures between domestic and from using predatory pricing strategies that under-
foreign businesses will also help local businesses mine local firms’ competitiveness.
49
Emily Real, “Rethinking Cyber Security Strategies: The Role of VARs”, Veeam, December 27th, 2023, https://www.veeam.com/blog/cy-
ber-security-resellers-veeam.html
50
International Trade Administration, “Indonesia Digital Economy”, International Trade Administration, September 19th, 2024, https://www.
trade.gov/country-commercial-guides/indonesia-digital-economy
94 Strengthening Local Players in Cybersecurity Industry Growth Cybersecurity for a Sustainable and Resilient Digital Indonesia
Impact:
• Increase opportunities for local companies, giving • Enhance competitiveness of local startups and
local cybersecurity firms greater access to nation- SMEs, allowing them to innovate, compete inter-
al projects and enabling them to scale and grow. nationally, and strengthen Indonesia’s cybersecu-
rity resilience.
• Reduce reliance on foreign solutions, decreasing
Indonesia’s dependence on foreign technologies
and fostering technological sovereignty.
Every successful industry is built on innovation, and Indonesia’s cybersecurity market is no different. This
section explores the particular mechanisms that stimulate innovation in the community’s cybersecurity ecosystem.
By supporting R&D, public-private collaborations, and intellectual property protection, Indonesia can lessen its
need for foreign technologies and create a competitive, self-sustaining cybersecurity economy.
Key Actions:
• R&D Grants and Incentives to partner with academic institutions to co-develop
The Government must introduce R&D grants and technologies tailored to Indonesia’s specific chal-
tax incentives for local firms investing in cyberse- lenges. Several promising academic institutions
curity technologies to stimulate local innovation. in Indonesia are ready to support the initiatives.
R&D grants are expected to cultivate the culture This model will facilitate knowledge transfer and
of science and innovation further. By offering information exchange between academia and
direct funding and tax breaks, the Government industry, ensuring that research is science-backed
can lower the cost barriers for local firms, enabling and grounded in practical applications. Some
them to explore new and advanced cybersecurity case study examples are the UK Research Insti-
solutions. The Government of the United States tute in Secure Hardware and Embedded Systems
has done this through its R&D Tax Credit.55 (RISE), Cyber NYC, and Stanford Cyber Initiative
(SCI).57 By combining both strengths, Indonesia
• Innovation Hubs can further accelerate the development of local
The establishment of cybersecurity innovation cybersecurity solutions.
hubs will provide a collaborative environment
where startups, research institutions, and corpo- • Intellectual Property (IP) Protection and Com-
rations can co-create solutions. These hubs will mercialization
serve as incubators for new technologies and Protecting local innovation is crucial to ensuring
business models, supporting the growth of local that Indonesian firms benefit from their invest-
talent and companies. Each hub will focus on ments in R&D by strengthening the regulations
Indonesia’s unique cybersecurity needs, such as and related ruling institutions in enforcing IP
securing critical infrastructure and protecting digi- protection.58 The Government should enhance IP
tal identities while fostering a culture of continuous protection laws, ensuring local firms can secure
innovation. For instance, in Europe, an innovation patents for their innovations, especially for digital
hub for cybersecurity called European Digital In- products.59 Moreover, support mechanisms for
novation Hubs (EDIHs) - Cybersecurity Innovation commercialization need to be introduced, help-
Hub provides a wide range of programs, including ing local firms bring their technologies to market
pre-investment testing, networking, skilling, and domestically and internationally. This will drive
networking.56 competitiveness and incentivize further invest-
ments in R&D. It is highly recommended that the
• Research Collaborations government of Indonesia also learn from WIPO
Local cybersecurity firms should be encouraged about the protection of IP.
51
edX Enterprise, “Indonesia Cyber Education Institute case study: Supporting students in building in-demand skills”, edX Enterprise, March
7th, 2024, https://business.edx.org/case-study/indonesia-cyber-education-institute-case-study-supporting-students-in-building-in-demand-skills
Cybersecurity for a Sustainable and Resilient Digital Indonesia Strengthening Local Players in Cybersecurity Industry Growth 95
Impact:
• Increase R&D investment in the local cyberse- • The cultivation of innovation culture can drive
curity sector, leading to the development of local technological advancement across the industry.
solutions tailored to national needs.
Through these series of actions, it is expected that the growth of the local cybersecurity industry can be boosted,
human capital can be harnessed, and the ecosystem can be harmonized. This is aligned with the blueprint’s pro-
posal to foster a competitive and resilient local cybersecurity industry.
For Indonesia’s local cybersecurity industry to thrive, they must be provided meaningful opportunities to partic-
ipate in national projects. By creating designated procurement set-asides, offering capacity-building programs,
and facilitating mentorships, the Government can ensure that local firms gain experience and build the credibility
needed to grow.
Key Actions:
• Designate Procurement Set-Asides for Local the form of hackathons, workshops, and boot
Companies camps to nurture emerging local talent.
Designate a portion of Government cybersecurity
projects exclusively for local companies, providing • Pilot Programs for Local Firms
them with opportunities to secure national con- Launch pilot projects to allow local firms to
tracts and gain valuable experience.60 demonstrate their capabilities in Government
projects, building a track record to bid for larger
• Capacity Building and Standardization for contracts.
Local Companies
Offer training programs and technical assistance • Business Incubation
to help local firms meet the standards for partici- Grow and nurture local cybersecurity firms by
pating in large-scale national projects. partnering with accelerators, incubators, enablers,
venture capital, and angel investors to unleash
• Mentoring Program the economic opportunity further. One example is
Facilitate mentorship programs where internation- Italy, where the Incubator of Politecnico di Torino
al cybersecurity firms mentor local companies, partnered with the Italian Agency for National
helping them develop the expertise needed to Cybersecurity (ACN) to provide a cybersecurity
compete in the market. These programs can take incubation program for cybersecurity startups.61
Impact:
• Increase participation of local companies in na- • Strengthened capabilities among local firms can
tional cybersecurity projects can drive business enhance their ability to take on larger projects and
maturity, growth, and experience. compete with international players.
52
Indosec, “What should be Indonesia’s national cybersecurity strategy in 2024?”, Indosec, July 25th, 2024, https://indosecsummit.com/indo-
nesia-national-cybersecurity-strategy-2024/
53
Sekretariat Kabinet, “Pengadaan Barang dan Jasa Pemerintah, Wapres: 40 Persen Alokasi untuk UMKM”, Sekretariat Kabinet, June 18th,
2021, https://setkab.go.id/pengadaan-barang-dan-jasa-pemerintah-wapres-40-persen-alokasi-untuk-umkm/
54
ET Bureau, “Government to introduce preferential public procurement for cybersecurity products”, The Economic Times, Sep 26, 2017,
https://economictimes.indiatimes.com/tech/software/government-to-introduce-preferential-public-procurement-for-cybersecurity-products/arti-
cleshow/60843739.cms?from=mdr
96 Strengthening Local Players in Cybersecurity Industry Growth Cybersecurity for a Sustainable and Resilient Digital Indonesia
9.4 Encouraging Technology Transfer and Fair Competition
As Indonesia continues attracting foreign investment in its growing digital economy, partnerships developed with
foreign players must be linked to empower local cybersecurity companies. Therefore, structuring foreign partner-
ships to benefit local companies and putting measures in place to safeguard national interests can ensure that
Indonesia’s cybersecurity industry develops in a competitive and sustainable way.
Key Actions:
• Licensing, Value Added Resellers (VARs), and • Joint Ventures and Strategic Alliances
Enterprise Reseller Business Model Encourage partnerships between foreign and local
Local firms should be able to get licensing and firms to combine international expertise with local
decide to become resellers of foreign firms’ cyber- knowledge.
security products and services.62
• Knowledge Sharing Initiatives
• Technology Transfer Agreements Establish knowledge-sharing platforms where
Foreign firms are required to engage in technolo- foreign companies provide training and techni-
gy transfer when entering the Indonesian market, cal expertise to local professionals, ensuring the
ensuring that local companies benefit from access transfer of valuable skills.
to advanced technologies.
Impact:
• Strengthen local industry capabilities through • Increase collaboration between local and foreign
knowledge sharing and access to advanced tech- firms, fostering innovation and growth.
nologies.
55
Omar Assoudi, “Leveraging the R&D Tax Credit: Cybersecurity Innovation”, Leyton, February 8th, 2024, https://leyton.com/us/insights/arti-
cles/leveraging-the-rd-tax-credit-cybersecurity-innovation/
56
European Commission, “European Digital Innovation Hubs (EDIHs) - Cybersecurity Innovation Hub”, https://commission.europa.eu/projects/
european-digital-innovation-hubs-edihs-cybersecurity-innovation-hub_en
57
European Commission, “European Digital Innovation Hubs (EDIHs) - Cybersecurity Innovation Hub”, https://commission.europa.eu/projects/
european-digital-innovation-hubs-edihs-cybersecurity-innovation-hub_en
58
Raihan Zahirah & Theo Gerald, “Digitalisasi, Teknologi, dan Inovasi” in Visi dan Peta Jalan Indonesia Emas 2045 Milik Pemuda, ed. Reza
Edriawan et al. (Jakarta: Indonesian Youth Diplomacy, 2024) 84, https://iyd.or.id/wp-content/uploads/2024/09/05092024_IYD_Report_All-Con-
tent.pdf
59
Thales Group, “Software Intellectual Property: What It Is & How to Protect It”, Thales Group, https://cpl.thalesgroup.com/software-moneti-
zation/protecting-software-intellectual-property
60
OECD, “Intervening to support SMEs in public procurement” in SMEs in Public Procurement: Practices and Strategies for Shared Benefits.
OECD. (Paris: OECD, 2018), 84-86.
61
i3P, “I3P launches the Cybersecurity Incubation Program, promoted with ACN and in collaboration with Leonardo and C*Sparks”, i3P, Febru-
ary 5th, 2024, https://www.i3p.it/en/news/i3p-launches-cybersecurity-incubation-program-acn-leonardo-c-sparks
62
Emily Real, “Rethinking Cyber Security Strategies: The Role of VARs”, Veeam, December 27th, 2023, https://www.veeam.com/blog/cy-
ber-security-resellers-veeam.html
Cybersecurity for a Sustainable and Resilient Digital Indonesia Strengthening Local Players in Cybersecurity Industry Growth 97
Chapter
10
Implementation
Roadmap
I. Short Term Target II. Medium Term Target III. Long Term Target
(by 2030) (by 2035) (by 2040)
Foundation Building & Advanced Capabilities & Full Resilience & Global
Early Strengthening Ecosystem Growth Leadership
• Establish National Cyber Defense Infra- • Advanced Threat Management: Capa- • Achieve Maximum Cyber Resilience:
structure: Form National CERT, develop bilities to address APTs, disinformation, Attain robust cyber defense capabilities
incident response frameworks. infrastructure outages, and sophisticated across all sectors to predict, withstand, and
cyber threats. recover from cyber incidents.
• Cybersecurity Education & Talent
Programs: Integrate basic cybersecurity • Adoption of Emerging Technologies: AI • Become a Global Cybersecurity Leader:
curriculum in schools and universities. integration for surveillance, automation of Lead in specific cybersecurity domains,
threat detection and incident response. acting as an enabler for best practices and
• Critical Sector Protection: Secure finan- innovations.
cial services, and critical infrastructure with • Build a Cybersecurity Ecosystem: Pro-
international-standard protocols. mote startups, invest in R&D, and enhance • Influence Global Norms & Policies:
the skilled cybersecurity workforce. Actively contribute to the creation of inter-
• Strengthen Legal & Regulatory Frame- national standards for responsible behavior
wor: Implement strict data protection laws, • Regional & Global Engagement: Estab- and collaboration in cyberspace.
incident reporting standards, and cyberse- lish international threat intelligence sharing,
curity regulations. cyber treaties, and a rapid response team
for cross-border security.
• Indonesia should develop essential cybersecurity cybercrime, bolster trust, and facilitate growth.
capabilities, including a national Computer Se- This includes international-standard security pro-
curity Incident Response Team (CSIRT), incident tocols, establishing early detection and monitoring
response plans, basic cybersecurity education in systems, and conducting regular security checks
schools, and a skilled cybersecurity workforce. and audits.
Furthermore, the country should strengthen cyber
infrastructure and implement strong data protec- • Indonesia must enhance law enforcement ca-
tion measures and establish early cybersecurity pacity and international collaboration to tackle
regulations for important sectors. Indonesia also complex cyber threats including malware, social
must enhance the capacity of law enforcement engineering, network-based attacks, web appli-
agencies to handle cybercrime, clarifying their cation attacks until AI powered attacks. Indonesia
roles, responsibilities, and organizational struc- also needs to develop comprehensive regulations
ture. This will streamline the process for citizens to address cyber security issues, including data
to report cybercrime and ensure a swift response protection, privacy, incident reporting, and security
from law enforcement. standards for digital products and services. These
regulations will guide the handling of cyberattacks,
• Indonesia needs to prioritize critical sectors such prevention, detection, response, and recovery
as financial services, healthcare, manufacturing, procedures.
and critical infrastructure to be protected from
• Indonesia should be able to have advanced threat • Indonesia needs to build a strong local cybersecu-
management to handle more sophisticated threats rity industry ecosystem and growth by supporting
such as APT attacks, disinformation operations, the creation of startups, investing in research and
and major infrastructure outages. In addition, development, and developing a skilled workforce.
Indonesia also should adopting latest high-capa-
bility technology, which include integrating artificial • Indonesia must take a more active role in regional
intelligence to improve surveillance, automating and international information sharing, cyberse-
threat detection and response, and enhancing curity cooperation, and capacity building. This
the capacity of the Computer Security Incident includes exchanging cyber threat intelligence, de-
Response Team (NCSIRT) veloping digital extradition treaties, and forming an
international rapid response team for cross-border
security.
• Indonesia must attain the highest cyber resiliency • Indonesia needs to actively participate in creating
level across all sectors, including the ability to an- global norms and guidelines for cyberspace, en-
ticipate, withstand, mitigate, respond, and recover couraging responsible behavior and collaboration
from major cyber incidents. between countries.
Coord. Ministry of
Establish incident response and recovery plans
Politics, Law, and
tailored to critical sectors (energy, healthcare, etc.).
Security
MOCI
Establish SOC for continuous monitoring of govern-
ment and SOE networks.
MOD
Medium- Implement regular penetration testing, red team-
term Action ing, and cyber exercises for critical infrastructure Cybersecurity
sectors. Agency
SOE
Indonesia National
Expand SOC capabilities with AI-driven monitoring Police
and response systems Indonesia National
Army
House of
Representatives
100 Implementation Roadmap Cybersecurity for a Sustainable and Resilient Digital Indonesia
Fully integrate SOC across all sectors to enable State Intelligence
Long- real-time threat intelligence and response coordina- Agency
term Action tion. Private sector
Academia
Research
Upgrade SOC with next-gen technologies like AI
and machine learning. Institutions
Industry association
IGO
Cybersecurity for a Sustainable and Resilient Digital Indonesia Implementation Roadmap 101
3rd Pillar: Developing a Skilled Cybersecurity Workforce
Kadin
Incentivizing ICT and STEM Courses via scholar-
ships or other initiatives. MOCI
MOD
Cybersecurity
Medium- Design cyber education through informal avenues Agency
term Action such as MOOC, workshop, mentorship, etc.
MOE
SOE
Build comprehensive cybersecurity education and Private Sector
training programs at schools and universities.
Education Institutions
Develop internships, micro-credentials, and appren- Academia
ticeships for cybersecurity roles. Civil society
Practitioner
Initiate standardized certification programs for pro- Media
fessionals and organizations. Industry association
Think Tanks
102 Implementation Roadmap Cybersecurity for a Sustainable and Resilient Digital Indonesia
Create a self-regulatory organization for cybersecu-
State Intelligence
rity management.
Agency
Private sector
Industry Association
Media
Cybersecurity for a Sustainable and Resilient Digital Indonesia Implementation Roadmap 103
Medium- Expand R&D grants and tax incentives for local
term Action cybersecurity firms and innovation hubs.
Financing Pathways
Options State budget, investment, grants, CSR, PPP, foreign aid, Government Cooper-
ation with Business Entities (KPBU), innovation matching funds, and blended
finance.
104 Implementation Roadmap Cybersecurity for a Sustainable and Resilient Digital Indonesia
10.2 Measuring Success
1.1 Frequency of audits and 2.1 The quantity of cyberse- 3.1 Total number of trained cy-
assessments curity laws that conform to bersecurity professionals
global norms
1.2 Time to patch critical vul- 3.2 Number of colleges that
nerabilities 2.2 Regulatory compliance grant degrees in cyberse-
rate curity
1.3 Incident response time
(Mean Time to Re- 2.3 Frequency of legal frame- 3.3 The degree of public
spond-MTTR) work updates knowledge on cybersecu-
rity threats
1.4 Recovery Time Objective 2.4 Number of organizations
(RTO) with a dedicated CISO 3.4 Number of participants in
1.5 Number of sector-specific upskilling programs
SOCs established
4.2 Frequency of threat intelli- 5.2 Frequency of cybersecuri- 6.2 Fostering a Competi-
gence sharing ty audits tive and Resilient Local
Industry
4.3 Number of joint R&D proj- 5.3 Adoption rate of risk man-
ects initiated agement frameworks 6.3 Local Firms’ Participation
in Government Projects
4.4 Number of Cyber Incident 5.4 Number of organizations
Review Boards forged achieving specific CMMC 6.4 Technology Transfer and
level Fair Competition
Cybersecurity for a Sustainable and Resilient Digital Indonesia Implementation Roadmap 105
Pillar 1: Strengthening Cybersecurity Infrastructure
1.1 Frequency of audits and assessments: 1.4 Recovery Time Objective (RTO):
In order to find flaws and vulnerabilities in systems The maximum allowable time to restore a system or
and procedures before attackers can take advantage service following an outage is defined by the RTO. A
of them, regular audits and assessments are helpful. shorter RTO is a sign of a more resilient company that
Generally speaking, a higher frequency denotes a can recover from setbacks fast. Maintaining vital ser-
more proactive security posture. The risk profile of the vices and reducing downtime depend on this.
systems being audited should dictate how frequently
these audits occur. Aim for less than 4 hours for critical systems, with
well-tested recovery plans.
Aim for at least once a year for critical infrastructure
companies and more frequently for businesses that 1.5 Number of sector-specific SOCs established:
pose a higher risk. Within critical infrastructure sectors, sector-specific Se-
curity Operations Centers (SOCs) facilitate specialized
1.2 Time to patch critical vulnerabilities: threat intelligence exchange and incident response. An
This indicator assesses how fast a company can increased number of SOCs points to a more effective
address serious security flaws in its hardware and and well-coordinated defense across several indus-
software. Attackers have a smaller window of oppor- tries. This demonstrates an industry-wide commitment
tunity when patches are applied more quickly. This is to cybersecurity.
a crucial sign of how well-equipped a company is to
handle threats. At least one dedicated SOC per critical sector, integrat-
ed with the national SOC.
Aim for less than 2 hours, with continuous improvement
towards real-time response. 1.6 Rate of information sharing between Indone-
sia’s SOC and sector-specific SOCs:
1.3 Incident response time (Mean Time to Re- For rapid threat identification and response, sector-spe-
spond-MTTR): cific SOCs and the national SOC must effectively share
The duration required to identify, contain, and resolve information. A high sharing rate promotes effective
a cybersecurity incident is measured by MTTR. A lower teamwork and makes it possible to comprehend the
MTTR means an organization can minimize damage danger landscape more thoroughly. A concerted nation-
and downtime caused by attacks. This is an important al cybersecurity effort requires this.
indicator of how prepared a company is for cybersecu-
rity threats. Enable real-time, automated sharing of threat intelli-
gence and incident reports between the national SOC
Less than 2 hours, with continuous improvement to- and sector-specific SOCs.
wards real-time response
2.1 The quantity of cybersecurity laws that conform of organizations adhering to established regulations
to global norms: within a jurisdiction. High compliance suggests effec-
A country’s alignment with international cybersecurity tive enforcement and strong cybersecurity awareness,
standards like SNI/ISO/IEC 27001 and GDPR demon- contributing to a more secure environment, while low
strates its commitment to robust cybersecurity prac- compliance may indicate awareness gaps, enforce-
tices. This alignment fosters trust in digital services, ment challenges, or overly burdensome regulations.
facilitates cross-border data flows, and strengthens the
overall cybersecurity posture, indicating a dedication to Achieve at least 90% compliance with cybersecurity
protecting data and systems in the digital age. regulations within 5 years, with stricter targets for criti-
cal sectors.
100% alignment with key standards like SNI/ISO/IEC
27001 and GDPR within 3 years 2.3 Frequency of legal framework updates:
The frequency of updates to a country’s cybersecurity
2.2 Regulatory compliance rate: laws reflects its proactive approach to addressing new
Cybersecurity compliance rates reflect the percentage threats and technologies. Regular updates ensure a
106 Implementation Roadmap Cybersecurity for a Sustainable and Resilient Digital Indonesia
robust and effective legal framework, while infrequent (CISOs) within organizations signifies a strong com-
updates can leave organizations vulnerable due to an mitment to cybersecurity. CISOs provide expertise and
outdated legal landscape. leadership to manage risks, foster a security-conscious
culture, and align cybersecurity with business goals,
Review of cybersecurity rules and regulations once a ultimately enhancing an organization’s cybersecurity
year to keep pace with the developments in technology maturity.
and threats.
Ensure 100% of critical infrastructure organizations
2.4 Number of organizations with a dedicated CISO: and large enterprises have a Chief Information Security
The prevalence of Chief Information Security Officers Officer (CISO) within 4 years.
3.1 Total number of trained cybersecurity profes- 3.3 The degree of public knowledge on cybersecu-
sionals: rity threats:
The number of people who have obtained cybersecu- This assesses how well-informed the general popula-
rity education or training is tracked by this measure. tion is about cybersecurity threats, hazards, and best
These could be online courses, workshops, official practices. It demonstrates how knowledgeable people
degrees, or certifications. It sheds light on the pool of are about internet safety and their capacity for self-de-
talent that is accessible for cybersecurity positions. fense. Surveys, tests, and the observation of security
measure adoption can all be used to gauge this.
Train at least 500,000 new cybersecurity professionals
within 3-5 years, with a focus on critical sectors. Achieve 80% public awareness on basic cybersecurity
hygiene within 5 years through national campaigns.
3.2 Number of colleges that grant degrees in cyber-
security: 3.4 Number of participants in upskilling programs:
This refers to the number of universities and other This monitors the quantity of people who are active-
educational establishments that provide formal courses ly participating in courses intended to improve their
(such bachelor’s or master’s degrees) with a cyberse- current cybersecurity expertise. To address new threats
curity concentration. This shows how much is being and technology, these programs may involve work-
invested in training the next generation of cybersecurity shops, certifications, or specialized training. This indi-
experts. cates a dedication to lifelong learning and professional
growth for cybersecurity professionals.
Establish and develop at least 10 universities with ded-
icated cybersecurity undergraduate and postgraduate Upskill at least 10,000 IT professionals in specialized
programs within 3 years. cybersecurity areas within 3 years.
4.1 Number of public-private partnerships formed: 4.2 Frequency of threat intelligence sharing:
This measures the degree to which formal collabora- This gauges the frequency with which various institu-
tion on cybersecurity projects occurs between public tions exchange cybersecurity-related information about
and commercial sector entities. These collaborations risks, vulnerabilities, and attack techniques. Numerous
can be in the form of cooperative research initiatives, metrics, including the quantity of data exchanged, the
information sharing agreements, or joint task force, frequency of meetings and communications, and the
among other things. A higher figure denotes a stronger number of alerts shared, can be used to monitor this.
dedication to shared cybersecurity responsibility and Higher frequency typically indicates improved coopera-
cooperative defense. tion and communication when reacting to cyberthreats.
Formalize at least 10 major public-private partner- Real-time sharing of actionable threat intelligence
ships in cybersecurity within 2 years, with at least one between government and private sector via a dedicated
focused on each critical sector. platform.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Implementation Roadmap 107
4.3 Number of joint R&D projects initiated: 4.4 Number of Cyber Incident Review Boards
This monitors the quantity of collaborative research forged:
and development initiatives with a cybersecurity focus. This assesses the official entities established to ex-
Through these projects, several organizations collabo- amine and assess noteworthy cybersecurity incidents.
rate to create innovative technology, approaches, and Experts from several companies or sectors usually
strategies to deal with cybersecurity issues. A greater serve on these boards, collaborating to comprehend
figure suggests more funding for innovation and a team the origins, effects, and reactions to incidents. An
effort to improve cybersecurity skills. increasing number of boards suggests a stronger focus
on enhancing future cybersecurity posture and drawing
Initiate at least 5 collaborative research and develop- lessons from previous occurrences.
ment projects in cybersecurity within 3 years, involv-
ing the public, private, and academic sectors with an Within 2 years, create at least one sector-specific
emphasis on fields like AI-driven security. board for critical infrastructure and one national Cyber
Incident Review Board.
5.1 Number of organizations adhering to interna- 5.3 Adoption rate of risk management frameworks:
tional standards (NIST, ISO): This measures the proportion of companies that have
This monitors the number of companies who have em- explicitly implemented a framework for risk manage-
braced and put into practice well-known cybersecurity ment in order to recognize, evaluate, and reduce
frameworks and standards, such as the NIST Cyberse- cybersecurity threats. Frameworks such as NIST SP
curity Framework or SNI/ISO/IEC 27001 (information 800-30 offer an organized method for managing risk
security management). Adhering to these guidelines and assisting organizations in setting security priorities
indicates a dedication to methodical security proce- according to their unique requirements and the threats
dures and frequently entails external evaluations or they face.
accreditations.
80% adoption of comprehensive risk management
100% compliance with SNI/ISO/IEC 27001 or NIST frameworks (like NIST CSF or FAIR) across large orga-
Cybersecurity Framework for critical infrastructure nizations and critical sectors within 5 years.
organizations within 5 years, with voluntary adoption for
others. 5.4 Number of organizations achieving specific
CMMC levels:
5.2 Frequency of cybersecurity audits: The Cybersecurity Maturity Model Certification (CMMC)
This gauges how frequently businesses assess their program mandates that defense contractors adhere to
cybersecurity posture through internal or external particular cybersecurity requirements. There are vari-
audits. Frequent audits assist in finding weaknesses, ous maturity levels for the CMMC; higher levels corre-
evaluating standard compliance, and guaranteeing spond to more sophisticated cybersecurity procedures.
the efficacy of security procedures. A more proactive This indicator shows the number of organizations that
and sophisticated approach to security management is have attained every certification level.
typically indicated by higher frequency.
Within 3 years, target certain CMMC levels for defense
Annual audits for all organizations, with more frequent and sensitive industry firms based on their risk profile
audits for high-risk entities and critical infrastructure. and data sensitivity.
108 Implementation Roadmap Cybersecurity for a Sustainable and Resilient Digital Indonesia
6.2 Fostering a Competitive and Resilient Local business incubation. This ensures widespread involve-
Industry: ment and opportunity for local businesses.
This tracks how R&D grants, tax incentives, research
collaboration between industry and universities as To significantly boost local companies’ participation in
well as IP protection leads to the creation of new local government cybersecurity projects, the goal is to have
cybersecurity companies and innovation. The bigger 30-40% of local companies becoming capable of inde-
number resulted from this metric, it indicates a vibrant pendently leading large-scale projects.
and growing ecosystem with new players emerging.
6.4 Technology Transfer and Fair Competition:
Thriving local cybersecurity industry in Indonesia This monitors the inflow of advanced technologies and
should see 30-50 new companies and startups, 5-10% knowledge which derived from technology licensing,
annual R&D growth, and new patents filed annually, Value Added Resellers (VARs), and enterprise reseller
demonstrating a commitment to innovation and techno- business model, transfer agreement, joint venture, and
logical advancement. knowledge sharing initiatives.
6.3 Local Firms’ Participation in Government Proj- Indonesia aims to facilitate 3-7 major technology trans-
ects: fer agreements or joint ventures each year, involve
This gauges the uplift of local companies’ participation 500-1,000 local professionals in knowledge sharing,
in procurement and government cybersecurity projects and ensure that local companies maintain majority
generated from procurement set aside mode, standard- ownership in critical cybersecurity infrastructure.
ization, capacity building, mentorship, pilot project, and
Cybersecurity for a Sustainable and Resilient Digital Indonesia Implementation Roadmap 109
Works Cited
Access Partnership. 2023. Google’s role in helping Indonesia build a safe and
productive society through digital tools. Economic Impact Report, Access
Partnership.
Assoudi, Omar. 2024. Leveraging the R&D Tax Credit: Cybersecurity Innovation.
February 8th. Accessed October 3rd, 2024. https://leyton.com/us/
insights/articles/leveraging-the-rd-tax-credit-cybersecurity-innovation/.
edX Enterprise. 2024. Indonesia Cyber Education Institute case study: Supporting
students in building in-demand skills. March 27th. Accessed October 1, 2024.
https://business.edx.org/case-study/indonesia-cyber-education-institute-case-
study-supporting-students-in-building-in-demand-skills.
Gevelber, Lisa, and Phil Venables. 2023. New cybersecurity training to help build
a safer world. May 4th. Accessed October 3rd, 2024. https://blog.google/
outreach-initiatives/grow-with-google/google-cybersecurity-career-certificate/.
Google. 2024. Secure, Empower, Advance: How AI Can Reverse the Defender’s
Dilemma. Industry Report, Google.
Google Indonesia. 2024. Google Bekerja Sama dengan BSSN dan Ekosistem Digital
Indonesia untuk Memperkuat Pertahanan dan Keamanan Siber Nasional
Berteknologi AI. March 5. Accessed October 1st, 2024. https://blog.google/intl/
id-id/company-news/technology/2024_03_google-bekerja-sama-dengan-bssn-
dan/?
Cybersecurity for a Sustainable and Resilient Digital Indonesia Works Cited 111
Hansen, Royal, and Christoph Kern. 2024. Tackling cybersecurity vulnerabilities
through Secure by Design. March 4th. Accessed October 4th, 2024.
i3P. 2024. I3P launches the Cybersecurity Incubation Program, promoted with ACN
and in collaboration with Leonardo and C*Spark. February 5th. Accessed
October 6th, 2024. https://www.i3p.it/en/news/i3p-launches-cybersecurity-
incubation-program-acn-leonardo-c-sparks .
IISS. 2021. Cyber Capabilities and National Power: A Net Assessment. Assessment
Report, IISS.
Lagace, Martha. 2007. Industry Self-Regulation: What’s Working (and What’s Not)?
April 9th. Accessed September 26, 2024. https://hbswk.hbs.edu/item/industry-
self-regulation-whats-working-and-whats-not .
OECD. 2015. “Industry self regulation.” OECD Digital Economy Papers 40-63.
OECD (2018), SMEs in Public Procurement: Practices and Strategies for Shared
Benefits, OECD Public Governance Reviews, OECD Publishing, Paris, https://
doi.org/10.1787/9789264307476-en.
Palo Alto Networks. n.d. What Is Attack Surface Management? Accessed September
26, 2024. https://www.paloaltonetworks.com/cyberpedia/what-is-attack-surface-
management.
112 Works Cited Cybersecurity for a Sustainable and Resilient Digital Indonesia
Parekh, Mitangi. 2024. Cybersecurity Ventures Report on Cybercrime. July 23.
Accessed September 11, 2024. https://www.esentire.com/cybersecurity-
fundamentals-defined/glossary/cybersecurity-ventures-report-on-cybercrime.
Priyandita, Gatra. 2024. Indonesia’s Cybersecurity Woes: Reflections for the Next
Government. Commentaries, Jakarta: CSIS.
Real, Emily. 2023. Rethinking Cyber Security Strategies: The Role of VARs. December
27th. Accessed October 4th, 2024. https://www.veeam.com/blog/cyber-security-
resellers-veeam.html .
Ridwan, Raihan, and Theo Gerald. 2024. “Digitalisasi, Teknologi, dan Inovasi.”
In Visi dan Peta Jalan Indonesia Emas 2045 Milik Pemuda, by Reza Edriawan,
Raihan Zahirah and Stephanie Gabrielle, 84. Jakarta: Indonesian Youth
Diplomacy.
Sari, Amelia Rahima. 2024. Revisi UU Polri Bikin Polisi Bisa Awasi Ruang Siber
hingga Blokir Internet, Pengamat: Jadi Dilema. May 30th. Accessed
October 1, 2024. https://nasional.tempo.co/read/1873786/revisi-uu-polri-bikin-
polisi-bisa-awasi-ruang-siber-hingga-blokir-internet-pengamat-jadi-dilema .
SentinelOne. 2023. Risks Within The Factory Lines | Examining Top Threats Facing
The Manufacturing Industry. September 19. Accessed September 11, 2024.
https://www.sentinelone.com/blog/risks-within-the-factory-lines-examining-top-
threats-facing-the-manufacturing-industry/.
Shepherd, Christian, Cate Cadell, Ellen Nakashima, Joseph Menn, and Aaron
Schaffer. 2024. Leaked files from Chinese firm show vast
international hacking effort. February 22. Accessed September 4, 2024. https://
www.washingtonpost.com/world/2024/02/21/china-hacking-leak-documents-
isoon/.
Statista. 2023. Estimated annual cost of cyber crime in Indonesia from 2018 to 2028.
March. Accessed September 11, 2024. https://www.statista.com/
forecasts/1411153/indonesia-cost-of-cyber-crime#:~:text=In%202022%2C%20
the%20cost%20of%20cyber%20crimes%20in,from%202018%20to%20
2028%20%28in%20billion%20U.S.%20dollars%29.
Sury, Dr. Kartina. 2023. Indonesia’s Cyber Resilience: At the Epicenter of ASEAN
Digital Economy Growth. Accessed September 25, 2024.
https://techforgoodinstitute.org/blog/expert-opinion/indonesias-cyber-resilience-
at-the-epicenter-of-asean-digital-economy-growth/.
Cybersecurity for a Sustainable and Resilient Digital Indonesia Works Cited 113
Thales Group. n.d. Software Intellectual Property: What It Is & How to Protect It.
Accessed October 4th, 2024. https://cpl.thalesgroup.com/software-
monetization/protecting-software-intellectual-property .
The Asia Foundation. 2023. APAC Cybersecurity Fund. October 10th. Accessed
October 1st, 2024. https://asiafoundation.org/apac-cybersecurity-fund/ .
Unit 42. 2024. ASEAN Entities in the Spotlight: Chinese APT Group Targeting. March
26. Accessed September 4, 2024. https://unit42.paloaltonetworks.com/chinese-
apts-target-asean-entities/.
Unit 42. 2024. Threat Actor Groups Tracked by Palo Alto Networks Unit 42. June 27.
Accessed September 10, 2024. https://unit42.paloaltonetworks.com/threat-
actor-groups-tracked-by-palo-alto-networks-unit-42/.
Unit 42 by Palo Alto Networks. 2024. Incident Response Report. Industry Report, Unit
42 by Palo Alto Networks.
114 Works Cited Cybersecurity for a Sustainable and Resilient Digital Indonesia
Appendices
Mastercard’s innovative technology, RiskRecon, allows Automated Asset Value and True Risk Prioritization
organizations to monitor the security programs of third In addition, understanding asset importance with the
parties and business associates based on their inter- severity of an issue creates the critical capability to
net presence alone. Through close collaboration with understand actual risk. RiskRecon automatically com-
governments worldwide, RiskRecon offers improved bines both of these-the issue severity and the asset’s
third-party risk management and better cyber hygiene. risk categorization-to determine true risk.
It does not require any proprietary information, permis-
sions, disclosures, or invasive scans—it observes only RiskRecon runs all that data against sophisticated
what is directly available on the internet. models, generating an asset value profile that charac-
terizes each IT system as high, medium, low, or idle
Unique Technology and Data Ownership value. Where issue severity calculates the likelihood of
RiskRecon uses proprietary techniques that combine a system being compromised, asset value calculates
algorithmic and machine learning processes to discover the impact should that system be compromised. It may
the global IT profile of any internet-facing domain. A dis- be an online banking system or an electronic commerce
covery process would involve all the systems managed portal. This is a high-value asset since it contains very
by an entity, systems outsourced by them, including sensitive information like names, credit card numbers,
fourth-party domains such as Amazon, GoDaddy, and and login credentials. In contrast, the marketing web-
Azure. Once a system has been identified, RiskRecon site, if hosted separately, may be considered a low-
captures its network information, geolocation, and all value asset in that it does not ask for sensitive data from
the corresponding host details. It captures in-depth its visitors, and it is not linked to those systems that do.
security measurements through direct observation and
data collection across nine security domains and 40 Together, asset value and issue severity measurements
unique security criteria. for each system, combined with the specific risk policy
of its clients, enable RiskRecon to provide custom-
Unlike competitors that leverage bought databases or er-specific, risk-prioritized action plans for monitored
licensed feeds, RiskRecon owns its data. Owning the companies, along with all the supporting evidence
data allows the firm to create highly accurate informa- needed to identify precisely which issues make the big-
tion-a false positive rate of less than 1.0 percent-and gest difference to the risk. Whereas competitors provide
provide a thorough, detailed data set to customers. mere lists or categorizations of the problems based on
Owning the data set in this way also enables RiskRecon criticality, RiskRecon delivers prioritized action plans
to innovate rapidly, adding new measurements or that identify the small set of issues that most make a dif-
scanning for additional exposures as new vulnerabilities ference in risk reduction. This enables clients to under-
emerge. stand specific risk quantification and drive dramatic
improvement in risk reduction and process efficiencies.
1. Software Patching
2. Web Application Security
3. Network Filtering
4. Web Encryption
5. System Reputation (e.g., Command and Control, Botnet, Phishing)
6. Breach Events
7. System Hosting
8. Email Security
9. DNS Security
With its true risk-responsive rating model, RiskRecon is the only provider. From its data, the company provides
risk-adjusted weighting to each and every one of the security criteria and domains. The overall risk performance of
each company with a rating falls within the range from 0. These risk-based scores are further classified, based on
performance, into performance tiers of A, B, C, D, or F. This combination of performance tier and risk score provides
an intuitive, risk-informed understanding of the cybersecurity maturity and risk posture of any entity.
The Identify function lays the groundwork for an effec- The Detect function focuses on identifying the occur-
tive cybersecurity program. This pillar focuses on rence of cybersecurity events in a timely manner. This
developing an organizational understanding to manage pillar is crucial for the early detection of anomalies and
cybersecurity risk to systems, assets, data, and capa- incidents, enabling organizations to respond promptly
bilities. By identifying critical functions and the related and mitigate potential damage.
cybersecurity risks, organizations can prioritize their
efforts in line with their risk management strategy and
business needs.
The Protect function outlines the safeguards necessary The Respond function details the steps necessary to
to ensure the delivery of critical infrastructure services. take action regarding a detected cybersecurity event.
This pillar emphasizes the implementation of appro- This pillar involves developing and implementing appro-
priate safeguards to protect organizational systems, priate activities to respond to detected incidents and
assets, and data from cybersecurity threats. By devel- mitigate their impact. Controls in this section focus on
oping and implementing these protection mechanisms, response planning, communication, analysis, mitigation,
organizations can limit or contain the impact of potential and improvements. By establishing a robust response
cybersecurity events. framework, organizations can manage and contain inci-
dents effectively, reducing their potential harm.
The Recover function emphasizes the importance of restoring services and capabil-
ities following a cybersecurity incident. This pillar focuses on planning for resilience
and the timely recovery of normal operations to reduce the impact of cyber incidents.
1. Management Responbility
Understand exhisting cyber threats, and devise a work plan to close defense cyber gaps
Introduction:
This guide is intended for regulators and provides tools for risk assessment and classification of organizations
within critical infrastructure sectors. This process is essential to ensure that regulatory measures are appropriately
tailored to the risk level and operational significance of each organization.
1. Overview:
This annex outlines heightened cybersecurity expectations specifically for financial institutions in Indonesia,
including banks, insurance companies, and fintech firms. It focuses on high-risk financial operations such as credit
issuance, loan processing, and payment clearing systems.
5. Corporate Governance:
• Board of Directors and Senior Management: Ensure • Chief Information Security Officer (CISO): Develop
comprehensive oversight and alignment with cyberse- and enforce cybersecurity policies, enhancing sec-
curity initiatives and financial regulations. tor-specific threat awareness and preparedness.
9. Conclusion:
Adherence to these tailored guidelines is crucial for protecting the financial sector against unique cyber threats,
maintaining consumer trust and financial stability.
8. Conclusion:
This framework ensures the resilience of Indonesia’s energy sector against evolving cyber threats, promoting secu-
rity and reliability of critical energy infrastructure.
These annexes provide a detailed regulatory approach tailored to the specific needs of the financial and energy
sectors in Indonesia, enhancing the overall cybersecurity posture and readiness of these critical areas.
1. Introduction
This policy outlines the approach that institutions in Indonesia should take to effectively manage cybersecurity
incidents.
2. Purpose
The purpose of this policy is to establish a structured framework for responding to cybersecurity incidents within crit-
ical sectors. It aims to define roles, responsibilities, and procedures to ensure a coordinated and effective response
to incidents.
3. Scope
This policy applies to all institutions under the jurisdiction of Kadin in Indonesia. It covers all types of cybersecurity
incidents, including data breaches, ransomware attacks, and system outages.
2. Triage and Classification: The IRT will assess the inci- 5. Recovery: The IRT will restore affected systems from
dent’s severity and classify it according to its impact secure backups, prioritizing critical systems essential
on operations. to institutions activities.
3. Containment: The IRT will implement measures 6. Post-Incident Review: The IRT will conduct a review
to contain the incident, such as isolating affected of the incident to identify lessons learned and update
systems and disconnecting infected devices from the the incident response plan as needed.
network.
7. Incident Reporting
• Internal Reporting: The IRT must document all inci- • External Reporting: Significant incidents, such as data
dents and report them to institutions leadership and breaches, must be reported to regulatory bodies like
the CISO. Kadin and cybersecurity agency within the required
timeframes.
8. Training and Awareness
All staff must undergo regular training on cybersecurity best practices and the incident response process. This train-
ing should include phishing simulations, tabletop exercises, and role-specific scenarios.
Appendix M: Incident Response Management based on the BSSN Regulation No.1 of 2024
According to the BSSN Regulation No. 1 of 2024, the incident response management consist of:
1. Cyber Incident Response Team
a. National Cyber Incident Response Team
b. Sectoral Cyber Incident Response Team
c. Organization’s Cyber Incident Response Team
This team is responsible to issue cybersecurity warnings, formulating technical guidelines for incident handling,
issuing cybersecurity warnings; formulating technical guidelines for incident handling; recording all reported inci-
dents/complaints and providing initial handling recommendations to affected parties; triaging incidents based on
established criteria to prioritize response; coordinating incident handling with relevant stakeholders; and performing
other necessary functions. These other functions may include: addressing vulnerabilities in electronic systems;
handling digital artifacts; notifying about potential threat observations; detecting attacks; conducting cybersecurity
risk analyses; providing consultations on incident handling preparedness; and/or raising awareness and concern
for cybersecurity.
63
Peraturan Badan Siber dan Sandi Negara Nomor 1 Tahun 2024 tentang Pengelolaan Insiden Siber, BSSN. (2024)