The Center for Financial Industry Information Systems (FISC) 金融情報システムセンタhas established “FISC Security Guidelines on Computer Systems for Financial Institutions 金融機関等コンピュータシステムの安全対策基準" (FISC Security Guidelines ) for the promotion of security measures for financial institutions' information systems, in collaboration with its member institutions, the Financial Services Agency, and the Bank of Japan.
The FISC Security Guidelines were first released in 1985 to provide a comprehensive and practical framework for financial institutions to build, maintain, and enhance the security, reliability, and resilience of their computer systems. These guidelines were revised over the years to reflect the changing environment, and the latest 13th edition was released in March 2025.
The latest edition of the FISC Security Guidelines aims to help financial institutions adopt practical and effective security measures for their information systems, based on decisions made by management and the risk profile of the system. The Council of Experts on Outsourcing in Financial Institutions recommended extensive revisions to the FISC Security Guidelines, including expanding external controls and IT governance based on a risk-based approach.
The FISC Security Guideline is composed of four parts: Control, Practice, Facilities and Audit Guidelines.
Learn how financial institutions in Japan can comply with FISC Security Guidelines using risk-based controls for data, applications, identities, and cloud systems.
Thales’ solutions can help financial institutions in Malaysia to address the Security Guidelines on the four guidelines – Control, Practice, Facilities and Audit by simplifying compliance and automating security with visibility and control, reducing the burden on security and compliance teams.
FISC Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, and a secure Content Delivery Network (CDN).
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Application Security
Data Security
Data Security
Identity & Access Management
Data Security
Identity & Access Management
Data Security
Identity & Access Management
Data Security
Identity & Access Management
Application Security
Data Security
Data Discovery & Classification
Identity & Access Management
Application Security
Data Security
Application Security
Data Security
Application Security
Data Security
Data Security
Identity & Access Management
Application Security
Data Security
Identity & Access Management
Application Security
Data Security
Application Security
Data Security
Identity & Access Management