Skip to main content

This page has been translated using TexTra by NICT. Please note that the translation may not be completely accurate.If you find any mistranslations, we appreciate your feedback on the "Request form for improving the automatic translation ".

Digital Society Promotion Standard Guidelines

In order to realize a digital society, it is important for relevant parties to work together under "common rules" and create value.
The Digital Society Promotion Standard Guideline Group is a collection of common rules and reference documents on procedures and procedures for service and business reforms and the development and management of government information systems associated with these reforms, as well as various technical standards.

There are two types of positioning for each document:

  • Normative: A document that defines the rules to be observed for the development and management of government information systems.
  • Informative: Helpful Documents

In the past, various guidelines were formulated under the name of the "Digital Government Promotion Standard Guideline Group." However, from the perspective of promoting digitalisation not only within the government but also throughout society as a Digital Agency, the name of these document systems has been changed to the "Digital Society Promotion Standard Guideline Group."
In addition, the name "Digital Government" has been retained for documents that mainly define internal government procedures and processes.

Documents on government information systems in general

DS-100 Digital Government Promotion Standard Guidelines

Articles (PDF/2,532 kb) (updated on June 5, 2024)
Consolidated (PDF/Word file) (ZIP / 2,953 kb) (updated on June 5, 2024)

  • Last Revised: May 31, 2024
  • Document Positioning: Normative
  • Outline: Systematic common government rules that stipulate basic policies and matters related to procedures and procedures and the roles of each organization within the government in relation to service and business reforms and the development and management of government information systems associated with these reforms

DS-110 Digital Government Promotion Standard Guideline Manual

Articles (PDF/8,502 kb) (updated on June 5, 2024)
Consolidated (PDF/Word file) (ZIP / 11,775 kb) (updated on June 5, 2024)

  • Last Revised: May 31, 2024
  • Document Positioning - Informative
  • Summary: As a sub-document of the Standard Guideline, this document is a reference document that includes article-by-article commentary to facilitate understanding of the purpose and objectives of the Standard Guideline.

DS 120 Digital Government Promotion Standard Guideline Implementation Guidebook

Articles (PDF/23,783 kb) (updated on June 5, 2024)
Consolidated (PDF/Word file) (ZIP / 44,471 kb) (updated on June 5, 2024)

  • Last Revised: May 31, 2024
  • Document Positioning - Informative
  • Summary: A practical reference document incorporating know-how and lessons learned to date, as a sub-document of the Standard Guidelines, the Standard Guidelines Annex and the Standard Guidelines Manual

Various Templates ZIP (ZIP / 6,284 kb) (updated on June 5, 2024)

DS-121 Agile Development Practice Guide

Articles (PDF/985KB)
Consolidated (PDF/Word file) (ZIP / 1,087 kb)

  • Last Revised: March 30, 2021
  • Document Positioning - Informative
  • Summary: In the development of government information systems, it is necessary to provide an option of agile development in addition to the traditional development style. This document summarizes the basic knowledge required to understand agile development.

DS-130 Standard Guideline Group Glossary

Articles (PDF/191KB)
Consolidated (PDF/Word file) (ZIP / 248 kb)

  • Last Revised: March 31, 2023
  • Document Positioning - Informative
  • Overview: glossary of standards guidelines

References

Process Review Implementation Procedure Set (ZIP / 397 kb) (updated on April 3, 2023)
Please use them as reference materials for process review.

(Reference) Standard Guidelines Training Materials (PDF / 11,657 kb)
Materials prepared by personnel and other relevant parties to deepen their understanding of the outline of the DS-100, DS-110, and DS-120.

Security Documentation

DS-200 Security by Design Guidelines for Government Information Systems

Articles (PDF/1,376 kb)
Consolidated (PDF/Word file) (ZIP / 1,806 kb)

  • Last Revised: January 31, 2024
  • Document Positioning - Informative
  • Summary: In order to efficiently ensure security for information systems, it is necessary to implement consistent security measures (security by design) from planning to operation of information systems. This document describes the security implementation contents and requirements in each process and defines the roles of related parties in order to grasp the security measures in the system life cycle from a bird's eye view.

References _ Cloud Services ISMAP Control Measures Standards (PDF / 235 kb)

* "Reference Materials _ Cloud Service ISMAP Management Policy Standards" can be viewed only when the following two JIS standards are purchased.
JIS Q 27014:2015 (ISO/IEC 27014:2013)
JIS Q 27017:2016 (ISO/IEC 27017:2015)

DS-201 Guidelines for Security Risk Analysis in Government Information Systems - A Combined Baseline and Business Damage Approach -

Articles (PDF/2,200 kb)
Consolidated (PDF/Word/Excel file) (ZIP / 3,688 kb)

  • Last Revised: March 31, 2023
  • Document Positioning - Informative
  • Description: To ensure the security of information systems, it is essential to be aware of risks and manage them reliably. There are various techniques for security risk analysis. This document introduces the procedures for risk analysis combining baseline and business damage, aiming to balance and improve work efficiency and analysis accuracy.
    This document is specifically presented as an example of the security risk analysis procedures in DS 200, Security by Design Guidelines for Government Information Systems.

DS-202 Technical Report on Security Considerations in CI/CD Pipeline

Articles (PDF/980KB)
Consolidated (PDF/Word/Excel file) (ZIP / 1,533 kb)

  • Last Revised: March 29, 2024
  • Document Positioning - Informative
  • Description: The CI / CD pipeline is an essential information system component for optimizing the development process and security measures in modern applications built on modern technologies. Attackers have begun to focus on its value and target it. This document describes the CI / CD pipeline from a security perspective and guides the points to consider when considering protection measures.

DS-210 Zero Trust Architecture Application Policies

Articles (PDF/774KB)
Consolidated (PDF/Word file) (ZIP / 981 kb)

  • Last Revised: June 30, 2022
  • Document Positioning - Informative
  • Description: With the expansion of the use of cloud services and changes in the business environment in remote work and other regions, it has become difficult to completely prevent and defend against the advanced cyberattacks in recent years only with the conventional boundary-type security model. Therefore, the application of zero trust thinking is required. This document explains the basic policies for applying zero trust and Architecture and describes points to keep in mind when introducing them.

Enterprise Architecture (EA) for DS-211 Continuous Risk Assessment and Response (CRSA)

Articles (PDF/751KB)
Consolidated (PDF/Word file) (ZIP / 1,067 kb)

  • Last Revised: January 31, 2024
  • Document Positioning - Informative
  • Description: In order to realize stable and safe service provision under the circumstances of Zero Trust Architecture, it is necessary to detect and reduce cybersecurity risks of the entire government at an early stage. This document describes the Architecture of the platform for the purpose of information collection and analysis in order to continuously carry out this activity.

DS-212 Technical Report on Attribute-Based Access Control in Zero Trust Architecture Application Policies

Articles (PDF/799KB)
Consolidated (PDF/Word file) (ZIP / 723 kb)

  • Last Revised: March 31, 2023
  • Document Positioning - Informative
  • Description: Following the cloud-by-default principles, many tasks in future government information systems will be handled through cloud services. In order to maintain and improve robustness even in traditional business processing environments, it is important to incorporate the idea of "Zero Trust cybersecurity", which adapts Architecture to new environments. Zero Trust Architecture has as its core the control of access between each resource required for business processes from various information. This document is one of the access control models and describes technical contents in a bird' s-eye view on attribute-based access control utilizing attributes assigned to resources and environmental information, etc.

References _ ABAC Implementation Example -Amazon Web Services (PDF / 537 kb)
References _ ABAC Implementation Example -Microsoft Azure Active Directory (PDF / 973 kb)

DS-220 Technical Report on the Implementation of the Cybersecurity Framework in Government Information Systems

Articles (PDF/1,016 kb)
Consolidated (PDF/Word file) (ZIP / 1,225 kb)

  • Last Revised: March 31, 2023
  • Document Positioning - Informative
  • Summary: With the increasing sophistication and complexity of cyberattacks, there is a need for enhanced cyber resiliency, and an increasing emphasis on enhancing information security confidentiality, integrity, and availability by recognizing detection, response, and recovery, in addition to identification and defense, given the penetration of threats, the NIST cybersecurity framework has gained worldwide attention.
    The purpose of this technical report is to describe the Cybersecurity Framework and to provide key points for its implementation in government information systems.

DS 221 Vulnerability Assessment Implementation Guidelines for Government Information Systems

Articles (PDF/1,148 kb)
Consolidated (PDF/Word file) (ZIP / 1,360 kb)

  • Last Revised: February 6, 2024
  • Document Positioning - Informative
  • Description: In order to ensure cyber resilience in government information systems, it is important to conduct vulnerability assessments. This document describes the criteria and guidelines for vulnerability implementation to enable the selection and procurement of optimal vulnerability assessments.

DS-231 Technical Report on Cataloguing Security Controls

Articles (PDF/599KB)
Consolidated (PDF/Word file) (ZIP / 769 kb)

Cloud Documentation

DS-310 Basic Policy on Appropriate Use of Cloud Services in Government Information Systems

Articles (PDF/391KB)
Consolidated (PDF/Word file) (ZIP / 459 kb)

  • Last Revised: September 29, 2023
  • Document Positioning: Normative
  • Outline: The adoption of cloud services is the default (first choice) for the system method of government information systems, and the Standard Guideline Annex shows the concept of using the cloud appropriately (smartly) rather than simply using the cloud.

Data Federation Documentation

DS-400 Government Interoperability Framework (GIF)

GitHub (external site)

Published on GitHub (external site) on October 13, 2022.

Zip Download

If you cannot use GitHub, please get it from the integrated version.

Trust Documentation

DS-500 Guidelines for Online identity verification Practices in Administrative Procedures

Articles (PDF/1,506 kb)
Consolidated (PDF/Word file) (ZIP / 1,996 kb)

  • Last Revised: February 25, 2019
  • Document Positioning: Normative
  • Summary: Annex to the Standard Guidelines on Online digitalisation Methods for identity verification Various Administrative Procedures

Reference materials _ Interim summary for the revision (fiscal year 2022 (fiscal year 2022)) (PDF / 3,580 kb) (published on June 29, 2023)
Reference materials _ Interim summary for the revision (fiscal year 2023 (fiscal year 2023)) (PDF / 2,123 kb) (updated on July 23, 2024)
References _ "Guidelines for Online identity verification Methods in Administrative Procedures" Q & amp; A (PDF / 387 kb) (posted June 17, 2024)

DS 531 Basic Approach to digitalisation Disposal Notification

Articles (PDF/310KB)
Consolidated (PDF/Word file) (ZIP / 373 kb)

  • Last Revised: March 31, 2023
  • Document Positioning - Informative
  • Summary: With the aim of improving the convenience of individuals and corporations, etc. and the efficiency of administrative management, in order to promote the digitalisation of notices of disciplinary actions, etc. in the short term, common ideas and methods of responding to issues, etc. will be provided so that they can be referred to in practice.

Q & amp; A (PDF / 169 kb) Reference Materials: "Basic Approach to digitalisation Disposal Notices"
Reference Material _ Flowchart for Consideration of Examples of Short-Term Approaches to digitalisation, such as Notification of Disposition
PDF(189KB)/Excel(21KB)

Other Documents

DS 910 Handling of Government Information Systems Related to Security and Other Sensitive Information

Articles (PDF/286KB)
Consolidated (PDF/Word file) (ZIP / 302 kb)

  • Last Revised: July 19, 2023
  • Document Positioning: Normative
  • Outline: Annex to the Standard Guidelines on Information Systems that Handle Security and Other Sensitive Information, which summarizes the viewpoints that users should consider, such as risks requiring attention and countermeasures, consideration of cloud computing, and points to keep in mind in data linkage