Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS



Similar documents
Information Disclosure Guidelines for Safety and Reliability of IaaS / PaaS

Information Disclosure Reference Guide for Cloud Service Providers

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Retention & Destruction

Service Schedule for CLOUD SERVICES

IT Security Standard: Computing Devices

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Internet Banking Internal Control Questionnaire

Information Technology Branch Access Control Technical Standard

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

CHIS, Inc. Privacy General Guidelines

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

PC Connect Agreement & Disclosure Receipt of Disclosures Equipment Requirements Definition of Business Day

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

OFFICE OF THE STATE AUDITOR General Controls Review Questionnaire

Hosted Testing and Grading

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Understanding Sage CRM Cloud

HIPAA Compliance Evaluation Report

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Autodesk PLM 360 Security Whitepaper

IT - General Controls Questionnaire

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Supplier IT Security Guide

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

How To Protect Decd Information From Harm

Security from a customer s perspective. Halogen s approach to security

Technical Standards for Information Security Measures for the Central Government Computer Systems

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology General Controls And Best Practices

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Information Technology General Controls Review (ITGC) Audit Program Prepared by:

TheBANK of Edwardsville s Online Banking Agreement

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

HIPAA Security Alert

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Music Recording Studio Security Program Security Assessment Version 1.1

Best Practices For Department Server and Enterprise System Checklist

The Practice of Internal Controls. Cornell Municipal Clerks School July 16, 2014

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Bank of Brodhead PO Box E Exchange St Brodhead WI

Data Management Policies. Sage ERP Online

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

ISO COMPLIANCE WITH OBSERVEIT

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Certification Practice Statement

Supplier Information Security Addendum for GE Restricted Data

Ohio Supercomputer Center

Keyfort Cloud Services (KCS)

How To Use Egnyte

Level I - Public. Technical Portfolio. Revised: July 2015

Client Security Risk Assessment Questionnaire

Security Controls for the Autodesk 360 Managed Services

Main Reference : Hall, James A Information Technology Auditing and Assurance, 3 rd Edition, Florida, USA : Auerbach Publications

LCM IT Asset Management

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

Vendor Questionnaire

Central Agency for Information Technology

SRA International Managed Information Systems Internal Audit Report

Introducing Systemwalker Operation Manager V13.3. July 2008 FUJITSU LIMITED

THE BUDAPEST STOCK EXCHANGE LTD. REGULATIONS ON THE USE OF REMOTE TRADING

Information Shield Solution Matrix for CIP Security Standards

FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference

Itron Cloud Services Offering

NYSED DATA DASHBOARD SOLUTIONS RFP ATTACHMENT 6.4 MAINTENANCE AND SUPPORT SERVICES

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

QuickBooks Online: Security & Infrastructure

Cybersecurity Health Check At A Glance

Tom J. Hull & Company Type 1 SSAE

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Risk Management of Outsourced Technology Services. November 28, 2000

CLOUD IN MOTION QUESTIONS EVERY LIFE SCIENCES COMPANY SHOULD ASK BEFORE MOVING TO THE CLOUD. FRANK JACQUETTE, JACQUETTE CONSULTING, INC.

RL Solutions Hosting Service Level Agreement

Supplier Security Assessment Questionnaire

Intel Enhanced Data Security Assessment Form

Storage Guardian Remote Backup Restore and Archive Services

Type of Personal Data We Collect and How We Use It

Transcription:

Information Disclosure Guidelines for Safety and Reliability of ASP / SaaS *1 For items of disclosure, if presence or absence is asked, answer is or absent. *2 If one of items is not disclosed, certification is not given. *3 Among items, especially important items are marked as O, and certification is assumed to be given if all these items can meet certain requirements. *4 Name of reative is essential. Information of other items is optional. Business enterprise Time of the Information Disclosure Items for Information Disclosure Date of the Information Disclosure Description (*1) Definition etc. (*2)/ Year, month, date of information disclosure Place of business enterprise / Business Business Enterprise Name of business Formal name of business enterprise (trade name) Over- view enterprise Established Year / Established year of business enterprise, number of Years in Business years in business Office (enterprise Place of head office of business enterprise, number of place) offices(domestic and foreign), locations of major offices Business Principal business Overview of principal business of business enterprise overview overview in addition to ASP / SaaS business Human resources Management Reatives Name of reative Picture, age, background of reative (academic, career, certificate etc.) (*4) Executives Number of executives, names of executives Employees Number of employees Number of regular employees Financial Conditions Financial Sales Sales of entire business enterprise in the most recent Data financial year (consolidated base) Ordinary profit Ordinary profit of the entire business enterprise in the most recent financial year (consolidated base) Capital Capital of the entire business enterprise in the most recent financial year ( consolidated base ) Equity ratio Ratio of equity capital of the entire business enterprise in the most recent financial year ( consolidated base ) Equity ratio =[Equity capital] / [Total assets] Items which should consider specific requirement (*3)

Financial Reliability Debt to Cash Flow ratio Interest ratio coverage Listing on stock markets Situation on Financial audit / Financial data Mandatory publication of financial statements Capital relationship / Capital relationshisition Shareholder compo- Business Major trading partners connections Main dealing financial institution Member organization Compliance Organization-systepliance Executive for Com- Full-time section and meeting committee structure Rulemaking Policies on the information and documentation security of rules Interest bearing debt to cash flow ratio of the entire business enterprise in the most recent financial year (consolidated base) Interest coverage ratio of the entire business enterprise in the most recent financial year (consolidated base) Whether or not business enterprise is listed on stock market, name of market if listed Select appropriate situation from the following; accounting audit by accounting auditor, audit by accounting adviser, financial data based on checklist according to small and mid-sized enterprise accounting, or none of the above. Whether or not financial statement is published mandatorily Business connections Names of large shareholders (largest 5) and ratio of stock holding of each shareholder Names of major trading partners Name of main dealing financial institution Name of industry organizations, economic organizations and others which enterprise belongs Name of executive for compliance Presence or absence of full-time section and meeting committee structure which is responsible for compliance, name of section and meeting committee if Presence or absence of basic policies, organizational rules, manuals etc, on the information security Names of documents if, and whether or not they are approved by managements (Although the contents of documents are not disclosed, submission is required as examination documents for certification) Debt to Cash Flow ratio =[Interest bearing debt] / [Operating cash flow] Interest coverage ratio =[Operating cash flow] / [Interest payment] O Certification is not given if documents such as information security rules are absent

Policies on the invitation and sales Policies on the complaint procedure relating to ASP / SaaS Service Items for Information Disclosure Presence or absence of basic policies, organizational rules, manuals etc. on the invitation and sales Names of documents if, and whether or not they are approved by managements (Although the contents of documents are not disclosed, submission is required as examination documents for certification) Presence or absence of basic policies, organizational rules, manuals etc. on the complaint response procedure relating to ASP / SaaS service Names of documents if, and whether or not they are approved by managements (Although the contents of documents are not disclosed, submission is required as examination documents for certification) Description (*1) Definition etc. (*2)/ Basic features of services Content of Name of services Name of ASP/SaaS service applied services Start date of services Year, month, date of service launch of ASP/SaaS service applied (If major renewal has occurred between service launch and application, state year, month, date of the renewal) Basic types of services Select appropriate type from the following; application service, network platform service, ASP platform service, or other service Change / termination of services Contents and scope of services Limitation on service customization Prior notice of the change or termination of services Content and characteristics of ASP/SaaS service applied Description of service collaboration with other business enterprise if Range of application customization (It not defined or to be discussed separately, describe so) Time and method of notification to users (Describe time of prior notice using such units as 1 month prior, 3 months, 6 months, and 12 months) Items which should consider specific requirement (*3) O Certification is not given if user notification time is less than 1 month prior

Prices for the services / Cancellation Quality Service of Response and alternative measures for the change or termination of services References relating to the change or termination of services Charging methods Pricing structure / Prices Penalty for cancellation of the contract Term for the prior notice of cancellation from users service availability ratio Management of service performance Reinforcement of service performance Presence or absence of basic policies on response and alternative measures, outline if basic policies are Presence or absence of response to users at contract termination (introducing alternative service etc.), outline of response if Presence or absence of responsibility to return information assets (user data etc.) at contact termination Presence or absence of point of contact (including one for regular complaints), name and opening hours of point of contact if Charging methods of measured rate portion and fixed rate portion respectively Amount of initial cost, monthly charge, minimum contract duration Presence or absence of cancellation penalty (which user must pay), amount of penalty fee if Presence or absence of term for the prior notice of cancellation from users, due date if (describe how many days/months prior the notice should be made) Actual value of service availability If actual value cannot be described by an unavoidable reason, the reason and target value must be described Pattern number of type of service in Information Security Guideline and counter measured reference value History of service suspension accidents Method of detection of equipment failure and system delay (point of detection, detection interval, detection method such as screen display check) Method to understand service performance (point of detection, detection interval, detection method such as screen display check) Presence or absence of system reinforcement determination criteria or plan Outline technical measures (load balancing, network routing, compression etc.) if determination criteria or plan is Service provision time =[contract service time] [service suspension time announced in advance for regular maintenance] Service availability ratio = [actual service available duration] / [service provision time] O Certification is not given if point of contact is not O Certification is not given if service availability ratio does not reach certain level (required figures will be determined for each application based on discussion results of ASP/SaaS information security Committee )

Amount of services used Acquirement of Certification / Implementation of Audits Acquirement of Privacy mark, ISMS, ITSMS, presence or absence of audit report created upon ASCR18 (SAS70 in US) Name of certification or audit if the above is Clear indication of purposes of collecting personal information Target of assessment (application, OS, hardware etc.) Frequency and response to assessment result, state of countermeasure taken for required portion (for each target) Backup execution interval Generations of backup data(describe the number of generations ) Interval of verification of backup data Treatment of personal information Vulnerability assessment Interval on verifications of backup data integrity Maintenance for backup data History of award or commendation Service level agreement (SLA) Number of users History of awards received relevant to ASP/SaaS service Whether or not SLA relevant to this certification items is attached to contract Number or user licenses for ASP/SaaS service applied (identify if this is the number of concurrent users or actual users) Number of agencies Number of agency of ASP/SaaS service applied Application, Infrastructure, Storage Contents Core software Name and overview of core application Name of provider of the core software Name of enterprise that provides core application Cooperation / Scalability Security Method of cooperation with other system Live-or-death monitoring (software, equipment) Fault monitoring (software, equipment) Use of standard API with which cooperation is available, name of API if standard one is used, availability of disclosing API if non-standard one is used Presence or absence of live-or-death monitoring, monitoring target if live-or-death monitoring is carried out (application, platform, storage etc.), and monitoring interval, monitoring time, notification time of each live-or-death monitoring target Presence or absence of fault monitoring Monitoring interval: Duration in minutes at which monitoring is carried out (time interval) Monitoring time =[Actual monitoring time] / [Service provision time] Notification time: Time before live-or-death monitoring result is notified to designated administrator O Certification is not given if live-or-death monitoring is not available

Time Synchronization Anti-virus measures Record (Log) Security Management Patch Method of time synchronization of system O Certification is not given if antivirus measure is not taken O Certification is not given if record ( log etc.) is not taken O Certification is not given if management is not carried out Presence or absence of antivirus measure, if, update interval of pattern file (time from vendor release) Usage of users, whether or not record of exception handling and security event (log etc.) is taken, how long record (log) is kept if taken Patch update interval (time from vendor release to start of patch testing) Network Lines Recommended line Type of line such as dedicated line (including VPN)and Internet Range of responsibility that ASP/SaaS should take for user connection line Recommended band Presence or absence of recommended band, level of recommended band if Recommended terminal Type of devices such as PC and mobile phone, type of browsers to be used Security Firewall Presence or absence of firewall O Certification is not given if firewall is not Network Intrusion Presence or absence of detection mechanism of unauthorized Detection System server intrusion by illegal packet or non-privileged user Network monitoring Reporting time when a failure occurs in the network (dedicated line etc.) between enterprise and end user Management of IDs and passwords User authentication au- Administrator thentication Presence or absence of standards of administration method of ID and password (although the content is not disclosed, submission of standards which describe administration method etc. is required as examination documents for certification Presence or absence of personal authentication (Web, serer) and user authentication by ID/password through authentication platform, method of authentication if Presence or absence of formal procedure to register/remove administrator privileges for server operator (although the content is not disclosed, submission of standards which describe procedures etc. is required as examination documents for certification) O Certification is not given if standards are not O Certification is not given if user authentication is not O Certification is not given if procedure is not

Defence Spoofing against Other security measures Housing (Location of servers) Building Building for data centre or not Location Emergency electric power facilities Fire extinguishing systems Protection against thunders Air conditioning facilities Security Earthquake resistant structures Uninterruptible power supply (UPS) Power supply route Emergency supply power Fire extinguishing systems in the Server Room Fire sensor / alarm system Protection against direct thunders Protection against induced lightning from thunders Adequate air conditioning facilities Control of people's entry and leaving Presence or absence of measures taken for spoofing where a third party pretends to be a user company, method of authentication if Describe freely measures for information leak and data encryption. Whether or not the building is solely occupied by data centre Country name, regional block name (if Japan, e.g. Kanto, Tohoku) Earthquake resistance value Presence or absence of quake-absorbing structure or quake-damping structure Presence or absence of Uninterruptible Power Supply (UPS), power supply duration if UPS is Whether or not 2 or more power supply routes via different substations are secured (except private power generator and UPS) Presence or absence of emergency power supply (private power generation), continuous operating time value if emergency power supply is Presence or absence of automated fire extinguishing system, whether or not it is gas-based fire extinguishing system if Presence or absence of fire detection system Presence or absence of measures for direct lightening stroke Presence or absence of measures for induced lightening stroke, value of maximum endurable voltage if Description of air conditioning facilities (upward blowing air conditioning on the floor, individual air conditioning dedicated for computer) Presence or absence of entry and leaving record, how long record is kept if Presence or absence or surveillance camera, operating hours and monitoring range of surveillance camera if Presence or absence of personal authentication system O Certification is not given if spoofing measure is missing

Service support Service desk (Complaints desk) Guarantee and continuity of the services Notification and report of Services Stock of recording media Other measures security Presence or absence of cabinet with key lock to keep medium such as paper, magnetic tape, and optical media Presence or absence of stock control procedure documents Describe freely other notable security measures (breaking and entering prevention, monitoring for security etc.) Contact address Contacts such as phone/fax, Web, and email address O Certification is not given if point of contact is not Business hours and dates Business days and hours (open hours) Maintenance time Support Availability rate of service support Service support availability rate =[actual work time of point of contact] / [service support open hours] Abandon rate Abandon rate: rate at which operators did not answer incoming calls (operator busy) Response time adherence rate Response time adherence rate: ratio of calls answered by operators within a specified time against all calls On-time completion rate On-time completion rate: ratio of calls completed within the time specified for each point of service or service type against all requested calls Coverage / measures Coverage of support of support Means of support (phone, Email etc.) Structure to avoid Structure to prevent service suspension (redundancy, service disruption load balancing etc.) Liability and amount of the limit of the accident Prior notice of temporary closures by such as maintenances Scope of liability of ASP/SaaS provider at accident occurrence and compensation coverage policy Time and method of prior notice to users (Describe time of prior notice using such units as 1 month prior, 3 months, 6 months, and 12 months) O Certification is not given if prior notice is not

Notification systems of accidents and disasters Periodical reports Presence or absence of notification at failure occurrence O Certification is not given if notification at failure occurrence is not made Presence or absence of regular reporting to users (monitoring results of application, server, platform, and other equipment, service availability ratio, SLA execution result etc.