Information Security Measures for ASP/SaaS - From the Report from the Study Group on ASP/SaaS Information Security Measures -



Similar documents
*-*-*-*-*-*-*-*-*-*-*-*-*-* STATISTICS Results of 2012 Basic Survey on the Information and Communications Industry (preliminary report)

Guide to Protecting Cloud Service Users and Ensuring Compliance

Interim Report on Results of. "Verification Experiments on Copyright Clearance System"

Business Conditions for Japan s Emerging Internet Companies (Fiscal Year 2002 to Fiscal Year 2007)

Information Disclosure Reference Guide for Cloud Service Providers

How To Handle Your Phone Information Safely

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

On-Site Examination Policy for Fiscal Examination Policy for Fiscal 2016" briefly reviews on-site examinations carried out in

Cloud Services in Japan

Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS

White paper Fujitsu s Initiatives through Fujitsu Cloud Standard Security Measures

FUJITSU Education Solution K-12 School Business Support Services for Elementary and Junior High Schools

Guidelines for the Security Management of Health. information Systems. Edition 4

Fujitsu Group s Information Security

Expected Social and Economic Impact and Application of Cloud Computing in Japan

Standards for Information Security Measures for the Central Government Computer Systems (Fourth Edition)

An organization properly establishes and operates its control over risks regarding the information system to fulfill the following objectives:

Information Security Management Systems

SaaS-Based ERP EXPLANNER for SaaS to Support the Growth of Enterprises

Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS

1. Sales Forecast. Attachment. Table 1: Sales Forecast Diffusion Index. Category Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1

CSMS. Cyber Security Management System. Conformity Assessment Scheme

The Second Action Plan on. Information Security Measures for. Critical Infrastructures. Safety as a matter of course for our daily lives

FOR IMMEDIATE RELEASE

Insurance Inspection Manual

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

TSE-Listed Companies White Paper on Corporate Governance TSE-Listed Companies White Paper on Corporate Governance 2015

Smart Cloud Study Group Report

How To Protect Information Security In Japanese Government Computers

Information Technology Engineers Examination. Network Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for

Adlib Hosting - Service Level Agreement

Input and Output of ISM-Benchmark

ICT. Overview. The Information and Communications Industry Japan s Largest Industry. Contribution to real GDP by industry (2010)

IT Infrastructure Service Business Strategy for India

INSPECTION MANUAL FOR CREDIT RATING AGENCIES

Report of Study Group on Revitalization Policies of Data. Centers in the Cloud Computing Age

The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency

Facility & IT Management Service for Data Center Design, Construction and Management Launched

Information security education for students in Japan

Business Continuity Planning at the Bank of Japan

Development of Technology for Detecting Advanced Persistent Threat Activities

Cyber Security and the Impact on Banks in China

Secure Healthcare IT Solutions Covering Wide Range of Medical Care Information

SECTION 15 INFORMATION TECHNOLOGY

INFORMATION TECHNOLOGY MANAGEMENT CONTENTS. CHAPTER C RISKS Risk Assessment 357-7

NEC s Efforts for Security NEC s Security Solution and Trend of Security Consulting Business

State of Development and a Strategy Outlook for China s Big Data Industry

Priority within the policy system Organizational and Operational Principles 1. Goal. The basic idea about the Goal

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

BRIDGEVALLEY COMMUNITY AND TECHNICAL COLLEGE OPERATING POLICY

Market Forecast Report -Semiconductor and FPD Manufacturing Equipment-

Information Security Policy. Information Security Policy. Working Together. May Borders College 19/10/12. Uncontrolled Copy

State of Cable Television - Current Affect on Demand

The Second National HIPAA Summit

Commencement for Smart Community Project in Greater Manchester, UK

European Commission Consultation document on Voice over IP

TACKLING MANAGEMENT TASKS

Application Performance Monitoring/Management (APM) Request for Information (RFI) CH

Survey Report. February 20, To the press. CyberZ, Inc.

There are three highlights of results of operations in the fiscal year that ended in March 2014.

Outsourcing With ASPs in the Internet Age

Reporting Status of Vulnerability-related Information about Software Products and Websites - 2 nd Quarter of 2013 (April June) -

Information Technology Engineers Examination. Systems Auditor Examination. (Level 4) Syllabus

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

Summary Translation of Question & Answer Session at FY 2014 Third Quarter Financial Results Briefing for Analysts

SEMIANNUAL REPORT 2005

Table of Contents. Chapter No. 1. Introduction Objective Use Compliance Definitions Roles and Responsibilities 2

IT - General Controls Questionnaire

What are the benefits of Cloud Computing for Small Business?

Result of the Attitude Survey on Information Security

Solutions and IT services for Oil-Gas & Energy markets

Security Controls What Works. Southside Virginia Community College: Security Awareness

ISMS Implementation Guide

Medium-Term Business Plan

NTT DATA Big Data Reference Architecture Ver. 1.0

CA Privileged Identity Manager Supports Tightly Controlled Access Management Systems

Infrastructure Technical Support Services. Request for Proposal

How To Protect Decd Information From Harm

Professional Graduate Business School Standards

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds

Current State and Challenges of the Education and. Training Services Market

Human Resource Development in Small and Medium-Sized Enterprises. Preliminary Consideration. Summary

CLOUD SERVICES AS A BUSINESS DRIVER FOR RESELLERS

NHS 24 - Business Continuity Strategy

Internet Initiative Japan Inc.

MAXIMUM PROTECTION, MINIMUM DOWNTIME

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

Engineering Cloud: Flexible and Integrated Development Environment

Independent Service Auditor s Report

K-12 Technology Support Requirements

Translation Service Provider according to ISO 17100

SaaS with a Face: User Satisfaction in Cloud- based E- mail Management with Mimecast

Guide to Safe Use of Cloud Services

Draft Information Technology Policy

OS with Enhanced Security Functions for Protecting Information Systems against Unauthorized Access, Viruses, and Worms

Information Technology Engineers Examination

Chapter 2 Competitiveness of Japanese Companies

NIPPON PAINT HOLDINGS CORPORATE GOVERNANCE POLICY

Transcription:

International Affairs Department, Telecommunications Bureau Vol. 19 No. 4 Biweekly Newsletter of the Ministry of Internal Affairs and Communications (MIC), Japan ISSN 1349-7987 Please feel free to use the articles in this publication, with proper credits. Formulation of Guidelines for Information Security Measures for ASP/SaaS - From the Report from the Study Group on ASP/SaaS Information Security Measures - Formulation of Guidelines for Information Security Measures for ASP/SaaS - From the Report from the Study Group on ASP/SaaS Information Security Measures - 1 MIC set up the Study Group on ASP/SaaS Information Security Measures (Chair: Prof. SASAKI Ryoichi, Tokyo Denki University) in June 2007 in order to investigate information security measures for ASP/SaaS which are showing rapid penetration as ICT services that provide application and related functions over networks. The following is an outline of the report compiled by the study group in January 2008, as well as guidelines for information security measures. Background (1) The development of the broadband environment Japan's Internet users now account for over 68% of the total population, and in fact, two out of three citizens are now using the Internet. Also, there were 26.44 million broadband users as of the end of fiscal year 2006, and with the penetration of broadband, the distribution of high volume contents such as music and movies has become possible, turning the Internet into a major infrastructure supporting people's lives and the economic activities of society. (2) The promotion of penetration of ASP/SaaS There is no denying that Japan is facing a declining population and that the existing economic model is nearing its limits. In order to put the economic back on track for growth in the current conditions, it is vital to use ICT to improve productivity and strengthen international competitiveness. Under such conditions, ASP (Application Service Provider) and SaaS (Software as a Service) which provide applications and related functions through networks have attracted attention as easyto-use new ICT services for small and medium sized companies, and having been mentioned in the likes of the Program for Enhancing Growth Potential (Council on Economic and Fiscal Policy) and the final compilation by the Panel on ICT International Competitiveness (MIC), the government as a whole is working towards promoting the penetration of ASP/SaaS as trump cards to International Policy Division, International Affairs Department, Telecommunications Bureau, Ministry of Internal Affairs and Communications (MIC) 1-2, Kasumigaseki 2-chome, Chiy odaku, Tokyo 100-8926, Japan Fax: +81-3-5253-5924 Tel: +81-3-5253-5920 We welcome your comments via: http://www.soumu.go.jp/joho_tsusin/ eng/contact.html MIC Communications News is available at: http://www.soumu.go.jp/joho_tsusin/ eng/newsletter.html Presentation materials of MIC are available at: http://www.soumu.go.jp/joho_tsusin/ eng/presentation.html E-mail distribution of this newsletter is possible if desired. 1

improving productivity and strengthening global competitiveness. (3) Goals of setting up study group The corporate usage of ASP/SaaS offers enormous advantages from the point of view of costs and ICT literacy, including the ability to build and operate systems in a short time rather than developing them separately, plus the reduction in the burden related to system maintenance, operation and management. This is why the use of ASP/SaaS seriously contributes to improvements in productivity in small and medium-sized companies where both human and financial resources are limited. On the other hand, given that ASP/SaaS operators accumulate large-scale confidential information and customer information from the corporations that are their users, the implementation of appropriate security measures is important. This is why the Study Group on ASP/SaaS Information Security Measures was established in order to investigate information security measures that ASP/SaaS operators should implement, having grasped the actual condition of ASP/SaaS, the current status of information security measures, and future Figure 1: What are ASP/SaaS? Definition of ASP/SaaS "To make available for use application software and related services through networks, or business models that provide such services." (from the 2004 "ASP White Paper") Business operation ASP/SaaS operators implement server operation, maintenance, ASP updating of SaaS application versions, etc. Server - Web server AP - AP server ASP/SaaS DB ASP SaaS- DB server Data center operator Conclusion of contract Usage patterns for ASP/SaaS services Facility installations - Ventilation installations - Generators - Fire extinguishing equipment - Breakdown countermeasures (duplication, load dispersion) - Disaster countermeasures (remote back-up) - Physical security - Logical security etc. Monthly payment of usage fees Groupware, CRM, and other applications Internet and other communications circuits Shared usage of software by users http://www Browser or other interface Users Users http://www Browser or other interface Characteristics of ASP/SaaS services - Providing application functions via networks - Shared usage by multiple users - Payment of fees on a regular basis in response to time used - ASP/SaaS operators implement operation and maintenance Advantages for users - Reduction in initial investment when installing system and in maintenance costs - Usage of fast and flexible system - Operation and maintenance by specialized -operators with a high level of know-how 2

Figure 2: Diversification of ASP/SaaS services and increase in scale of market - Rapid development in diversification of ASP/SaaS services from the two viewpoints of implementation status and contents of services provided. - In response to the diversification of ASP/SaaS services, the user base is also expanding to a wider range of industrial sectors. - The scale of the ASP/SaaS market is continuing to grow at a pace of approximately 1.3 times a year since its value of 326 billion yen in 2003, and is expected to reach 1,539 billion yen by the 2010, which is just under five times the 2003 figure. Diversification of implementation status and services provided by ASP/SaaS Integrated and coordinated types - Providing services in detailed service units - Dynamic coordination of services Customized type - Customization for individual customers Shared usage outsourcing type - Shared usage by multiple designated customers Customer on-site type - Placing server at customer site Implementation status diversification Existing ASP - Package rental services - Standard applications Services provided diversification Development towards business process and services - Fusion of operations and data management - Fusion with human resources outsourcing services Development towards IT infrastructure services - Network systems - Verification infrastructure - Call center system Development of various businesses and fields - Cross-business service (CRM etc.) - Handling of mobile phones, electronic tags, digital appliances, etc. Trends and forecasts (domestic) in scale of ASP/SaaS related market (100 million yen) 18,000 16,000 15,390 14,000 12,790 12,000 10,630 10,000 8,000 8,070 6,000 5,490 6,470 4,280 4,000 3,260 2,000 0 2003 2004 2005 2006 2007 2008 2009 2010 NB: ASP-related services include data centers for security hosting and the like. The ASP market forecasts and data center market forecasts in the 2002 ASP White Paper, vendor sales in businesses classified as systems business within the e-learning market in the e-learning White Paper, as well as the portion that is expected to shift to ASP, and, within the e- Japan related budget, the budgeting related to "informatization of administration and the use of information communications technology in the public sector," and the budgeting that falls under ASP related markets, were estimated based on individual parameter settings. Source: 2005 ASP White paper (ASPIC Japan/Foundation for Multimedia Communications) Current Status and Issues Related to ASP/SaaS Information Security Measures The two major characteristic of ASP/SaaS services can be said to be that the majority of providers are small and medium-sized operators, and that there is a wide diversity in the services on offer. Taking these characteristics into consideration, the results of interviews implemented with ASP/SaaS operators revealed the following issues in relation to the implementation of information security measures: o There has been no prioritization of information security measures. o The most appropriate information security measures based on the characteristics of the ASP/SaaS services provided have not been developed. On the one hand, in terms of existing standards and guidelines for information security measures, there are a variety of things out there that can serve as guidelines in implementing measures, such as the JIS Q 27001 (ISO/IEC 27001) and the JIS Q 27002 (ISO/IEC 27002). Since, however, these were not necessarily formulated with the particular characteristics of ASP/SaaS in mind, if ASP/SaaS business operators make use of such standards and guidelines as they stand, there will be a problem in introducing and operating information security guidelines that are in line with actual conditions. From the results of the above analysis, the study group came to the conclusion that there is a need to produce new information security guidelines that reflect the characteristics of ASP/SaaS, and are in line with the current conditions of ASP/SaaS operators. 3

Figure 3: Current ASP/SaaS information security status and issues - If one takes into consideration the current status of ASP/SaaS (the majority of operators being small and medium-sized, the diversification of services etc.), there has been no prioritizing of appropriate measures and the implementation of measures in response to the characteristics of the services provided is inadequate. - At present, there are no standards or guidelines adapted to the actual condition of ASP/SaaS operators or the characteristics of the services. Information security measure issues that take into consideration the current status of ASP/SaaS - Small and medium-sized companies are a majority among operators in the fields of ASP/Saas - The services provided by ASP/SaaS operators are very varied - Operators that have limitations in terms of human resources and finances should allocate their resources by importance, with regards to the information security measures that should be prioritized, but they have not prioritized information security measures by appropriate risk assessment. - Despite the fact that, due to differences in the information handled, there are differences between services in what should be implemented and to what extent, there are no appropriate information security measures being implemented based on the characteristics of each service. Existing standards and guidelines concerning information security measures - These have not been produced taking into consideration the characteristics of ASP/SaaS - Where ASP/SaaS operators use these standards and guidelines as they stand, it is difficult to introduce and implement information security measures that are in line with actual conditions at the ASP/SaaS operator. There is a need for new information security measures that are in line with current conditions at ASP/SaaS operators. The Formulation of Guidelines for Information Security Measures (1) Basic outlook concerning the guidelines In order to work towards solving the issues related to information security measures for ASP/SaaS, "Concrete guidelines for ASP/SaaS service operators when investigating the implementation of appropriate information security measures based on the characteristics of the services provided" should be the basic positioning of the guidelines, and in producing them, the following important points were kept in mind. o To pinpoint the information security guidelines that should be given priority, and that reflect the characteristics of the ASP/SaaS operators and their services. o Making it possible to relatively easily implement information security measures which take into account the services each provides, by having the ASP/SaaS business operator use the guidelines as they stand. o Offering concrete information security guidelines that are easy for ASP/SaaS business operators to understand and implement. Furthermore, investigations took place to consider the facts of the guidelines being used as reference by the ASP/SaaS service providers, but these have also been produced keeping in mind that they should be easy to understand for users of ASP/SaaS services. (2) Investigations ahead of formulation of guidelines In order to work towards ongoing operation and revisions of the information security guidelines for ASP/SaaS operators, there is a need for putting in place an operation management system within the internal organization of the ASP/SaaS business operators, for measures for the organizational and operational sides of the matters for consideration in contracts with external organizations. In parallel, physical and technical measures will be needed that apply to the hardware and software that makes up the systems, as well as housing such as buildings, power sources, etc. in order to preserve the information resources of the ASP/SaaS services. With regard to the information security measures for the organizational and operational sides, ASP/SaaS stakeholders (those with interests) were taken into consideration and measure items were obtained using the information security detailed management measures shown in appendix A of the JIS Q 27001. On the other hand, with 4

regard to physical and operational security, measure items were obtained by categorizing the widely varied ASP/SaaS services into 6 patterns, specifying the elements that make up ASP/SaaS, clarifying information resources and conducting an analysis of dangers facing information resources, and then referring to existing standards and guidelines such as Appendix A of the JIS Q 27001 and the guidelines concerning outsourcing in public IT (MIC). In addition, with regard to the deriving of each measure item, the fact that a large proportion of ASP/SaaS business operators are small and mediumsized companies was taken into consideration, investigations are focused on measures that are easy to understand as well as prioritizing the order in which they should be applied, and similar measure items are being grouped together and rewritten so as to reduce the number of measure items. Following on from that, a twolevel priority system was established regarding the necessity and importance of each measure item, with measure items that should be given priority implementation, regardless of ease of implementation or cost, classified as "basic," and measure items that could be applied selectively when working to differentiate oneself from other companies or responding to highlevel user demands classified as "recommended." In addition, in order to deepen the understanding of ASP/SaaS business operators concerning measure items, an explanatory document for a best practice addendum of concrete implementation methods and warnings relating to implementing the measures was produced, referring to the JIS Q 27002 as well as "Security Guidelines and Explanations for Financial Institution Computer Systems" (The Center for Financial Industry Information Systems), and attached to the measure items. Furthermore, with regard to physical and technical measures, as there are differences in the information resources depending on the type of ASP/SaaS service, it is necessary to put in place a measure implementation level that complies with the pattern, while keeping in mind that different levels of information security are required. Consequently, it was decided to establish a "measure reference value" that is attached to each pattern as a value for gauging implementation levels, and an "evaluation item" that works as an indicator for evaluating the implementation level of each measure item quantitatively or concretely, so as to obtain easily the measure implementation level that should be aimed for. Also, in terms of investigating best practices, valuation items and measure reference values, by including the opinions of experts in relevant fields (ASP/SaaS business operators, information equipment manufacturers, ISPs and data center business operators), attention was paid to the extent possible to consistency with the actual condition of ASP/SaaS services, for example with regard to attention to difficulties relating to the actual implementation of measures by ASP/SaaS business operators. (3) Composition of the guidelines The guidelines that were completed according to the process described above were composed out of the three parts shown below. o Prologue: Introduction including the guideline objectives, range covered, usage methods, warnings and definition of terms o Organization and Operation: A collection of information security measures related to organization and operations such as operation management systems to secure information security, points to consider in contracts with outside organizations, and responsibilities towards users. This will probably mainly be used as reference material by organizational managers such as executives. o Physical and Technical Measures: Information security measures for operations, failure surveillance, virus countermeasures, back-ups and damage measures, taking into consideration the variety of ASP/SaaS services as well as structural elements (applications, networks, and also buildings and power sources etc.). This will probably be mainly used as reference by on-site engineers. 5

Figure 4: Derivations of necessary information security measures - Focusing on the organizational elements of ASP/SaaS, investigating the necessary information security measures, and turning these into guidelines. - Deriving organizational and operational measures relating to the putting in place of an internal operational management system within ASP/SaaS business operators, as well as physical and technical measures applying to the hardware and software that make up the ASP/SaaS services. Organizational and operational measures Derivation flow of information security measures - Putting in place an internal operation management system within ASP/SaaS business operators (management of information resources, management of personnel, etc.) - Items for agreements with externally related organizations - User support responsibility, etc. ASP SaaS ASP/SaaS Organization and personnel Operation management Reference to existing standards and guidelines JIS 27001 * JIS Q 27001 JIS 27002 * JIS Q 27002 IT etc * Public IT guidelines, etc. Information security measures Measures related to organization and operations Measure items Best practice Physical and technical measures - Operation supervision and fault supervision of the hardware and software that make up ASP/SaaS, as well as anti-virus measures - Unauthorized access prevention, data back-up - Limitation of administrator authority assignment, management of entrances and exits, etc. Organization elements By service type Clarification of information resources Analysis of dangers Typing CIA according to CIA demand level (pattern development) Physical and technical measures Measure items Evaluation items Measure reference value Best practice 6

Figure 5: Structure and outline of guidelines - Overall target of information security measures that should be implemented when ASP/SaaS business operators provide services. - In order to encourage pro-active and wide-ranging use, produced while taking care to make them as easily understandable and as easy to use as possible, and divided into three parts, the "prologue," the "organization and operation," and the "physical and technical measures." Prologue - Introduction including the guideline objectives, range covered, usage methods, warnings and definition of terms Organization and Operation Physical and Technical Measures - Information security measures related to organization and operation, such as operation management systems, points to consider in contracts with outside organizations, and responsibilities towards users. - This will probably mainly be used as reference material by organizational managers such as executives. - A compilation of information securities for information resources in structural elements such as applications, networks, buildings and power sources, based on typical ASP or SaaS systems - This will probably be mainly used as reference by on-site engineers who operate ASP/SaaS services 1. Basic guidelines for organizational approaches for information security 2. Organization for information security 3. Management of coordinated ASP/SaaS business operators 4. Management of information resources 5. Information security as it applies to employees 6. Management of information security incidents 7. Compliance 8. User support responsibility 1. Information security measures that are common to applications, platforms, servers and storage, and networks 2. Information security measures related to applications, platforms, servers and storage 3. Information security measures for networks 4. Information security systems for buildings, power sources (air conditioning, etc.) 5. Other information security measures The Effects of Proper Use of the Guidelines and Future Topics (1) The effects of proper use of the guidelines By using these guidelines effectively, the following results can be expected both for the ASP/SaaS business operators and for the service users. o The promotion of the implementation of appropriate information security measures that are in line with the characteristics of the services provided, and the development of approaches for small and medium-sized operators as well as new entrant business operators (ASP/SaaS business operators). o They can be used as guidelines for desirable information security items with regard to business operators that coordinate to offer services (ASP/SaaS business operators). o They can be used as guidelines for the contents of the information security measures implementation status that is provided to users (ASP/SaaS business operators). o They can be used as guidelines when evaluating the appropriateness of the state of implementation of information security measures by ASP/SaaS business operators (service users). o Overall information security levels can be improved by receiving a service in which appropriate information security measures have been implemented (service users). With these results of effective usage, there is a move towards the improvement of information security levels for the ASP/SaaS industry as a whole, as well as an increase in awareness of information security, including among users, with the expectation of vitalization and a healthy development for the ASP/SaaS industry. 7

Figure 6: Results of effective usage of guidelines and future topics - The vitalization and healthy development of the ASP/SaaS industry can be expected as a result of effective use of the guidelines. - Therefore, the wide-ranging penetration of the guidelines and their ongoing revision and amendment in response to changes in the ASP/SaaS usage environment are necessary. The results expected from the effective use of the guidelines - The promotion of the implementation of appropriate information security measures by ASP/SaaS business operators (promotion of the development of approaches for small and medium-sized operators as well as new entrants) - Usage as guidelines for desirable items for information security for coordinated ASP/SaaS business operators - Usage as guidelines for proposed contents for the state of implementation of information security measures for users - Usage as guidelines for when users evaluate the appropriateness of the state of implementation of information security measures by ASP/SaaS business operators - Increasing the information security level of the ASP/SaaS industry as a whole, and increasing awareness of information security, including among users The vitalization and healthy development of the ASP/SaaS industry can be expected Future Topics - Wide-ranging promotion of the guidelines Proactive usage within the industry as well as a greater awareness of the guidelines are expected, not just as guidelines for implementing measures by ASP/SaaS business operators, but as standards for setting SLA in contracts with users, or announcing the state of implementation to users - Revisions and amendments in response to changes in the ASP/SaaS usage environment In conjunction with changes in the environment surrounding ASP/SaaS, such as technological advances, there is the fear that the contents of the guidelines will become dated and will no longer be relevant to current conditions A structure is expected for a system of ongoing revisions and amendments Expectation of promotion of penetration through the ASP/SaaS industry and ongoing revisions and amendments Conclusion By making proactive effective usage of these guidelines in the future, centering on the ASP/SaaS industry, the provision of ASP/SaaS services with appropriate information security measures will be promoted, leading to expectations of the even greater growth as one of the ICT services that lead Japan's economic growth. MIC will continue to provide the necessary support in looking towards further promoting the penetration of ASP/SaaS as well as improving the level of information security. 8