Nihon Cyber Defence

Preparing for Active Cyber Defense (ACD)

Ret. Adm. Ichida’s Insights for Japanese Businesses

Bannner-1-1.jpg

Japan’s Active Cyber Defense (ACD) policy introduces substantial changes to the way businesses approach cybersecurity, particularly for those in critical infrastructure sectors. Retired Admiral Akira Ichida’s analysis highlights both the opportunities and challenges of this transformative initiative, providing businesses with key considerations as they prepare for its implementation.


Disclaimer:
NCD defines “Active Cyber Defence” in accordance with the UK National Cyber Security Centre (NCSC) definition –  “… services that are designed to reduce high-volume commodity cyber attacks.”

What is Japan’s Active Cyber Defense (ACD)?

This initiative aims to prevent cyber intrusions from spreading on a large scale by establishing a collaborative framework between the government and the private sector for sharing threat intelligence. With a proposed legal framework set for submission to the National Diet in 2025, this marks a pivotal moment in Japan’s efforts to defend its critical infrastructure and digital economy.

Proposed Framework of Government

  1. Targeted Monitoring of Foreign-Related Communications: The government will legally monitor suspicious foreign-related communications for signs of potential cyber threats.
  2. Mandatory Reporting for Critical Infrastructure: Water, electricity, and other essential infrastructure operators will be required to report cyber incidents to the government.
  3. Utilization of the Security Clearance System: To ensure effective information sharing, the framework proposes granting access to sensitive information via a security clearance system.
  4. Learning from International Models: Inspired by systems like the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and its Joint Cyber Defense Collaborative (JCDC), Japan aims to emulate global best practices.

Insights for Businesses

  1. Navigating Increased Responsibilities with Clear Guidance
    Ichida acknowledges the progress of establishing a collaborative council and mandatory reporting obligations for critical infrastructure. However, businesses must be proactive in understanding and meeting these new requirements.


    Actionable Takeaways
    :
    Companies should strengthen their cyber threat monitoring systems by creating a real-time, two-way information-sharing framework between the public and private sectors. This will enable faster, more effective responses to emerging threats. Additionally, establishing clear incident reporting protocols will ensure a smooth and efficient response process.

    For critical infrastructure operators, compliance with these new mandates is non-negotiable, and early adoption of reporting frameworks will ease the transition.

  1. Addressing Challenges in Foreign Communications Monitoring
    The ACD’s plan to focus on “foreign communications” monitoring raises practical challenges. Ichida points out the complexity of distinguishing between foreign and domestic data flows. The term “foreign” lacks clarity—whether it refers to the source of the attack, the communication itself, or both. If the focus is on monitoring communications at Japan’s entry points, there is a risk that attacks initiated by foreign entities within the country may be overlooked. This issue impacts businesses, particularly those involved in global operations.


    Actionable Takeaways
    :
    Companies must collaborate with the government and ISPs to ensure that their networks comply with monitoring requirements without compromising operational efficiency.

    Leveraging AI-powered threat detection technologies, as well as implementing solutions such as SIEM and MFA that contribute to a zero-trust framework, will enhance network security and strengthen the safety of the system environment.

  1. Aligning Cybersecurity Measures with Legal and Constitutional Protections
    Ichida emphasizes the importance of aligning ACD-related initiatives with Japan’s constitutional protections for communication privacy (Article 21). Businesses must remain vigilant about protecting customer and stakeholder data while meeting new government mandates.


    Actionable Takeaways
    :
    Companies must review their data handling and privacy policies to ensure compliance with domestic laws and international regulations.

    Transparency with customers about how their data is protected in light of new cybersecurity policies will be critical in maintaining trust.

  1. Strengthening Organizational and Human Resource Capacity
    Ichida highlights the need for skilled personnel and robust organizations capable of rapid responses to ensure the effective implementation of ACD by the government. Businesses, especially those in critical sectors, will need to address similar challenges internally.


    Actionable Takeaways
    :
    Companies should invest in training cybersecurity professionals and creating dedicated teams to manage compliance and threat response.

    Leveraging external expertise, such as from firms like Nihon Cyber Defence, can fill gaps in knowledge and resources.

  1. Leveraging Lessons from International Models
    Ichida points to the U.S. model (e.g., CISA’s JCDC) as a reference for Japan’s ACD framework. Businesses involved in these global initiatives provide valuable insights for others looking to adapt.


    Actionable Takeaways
    :
    Businesses should study best practices from countries with established proactive cyber defense systems to anticipate potential challenges.

    Participating in international or domestic threat-sharing councils will provide an opportunity to stay ahead of emerging threats.

  1. Opportunities for Innovation and Collaboration
    Ichida underscores the need for collaboration across public and private sectors, with ISPs and other entities playing a critical role. For businesses, this presents both a challenge and an opportunity.


    Actionable Takeaways
    :
    Companies should actively participate in public-private partnerships to share intelligence and enhance their own security capabilities.

    Cybersecurity providers and tech firms should seize the chance to innovate solutions that align with the government’s monitoring and response needs.

Looking Ahead

Japan’s proactive approach to cybersecurity represents a critical step forward, but the road ahead is not without hurdles. The implementation of ACD-related legislation indicates progress in clarifying legal interpretations and potential amendments concerning the protection of communications confidentiality. Based on the assumption that actions taken by the relevant authorities is considered legitimate, the implementation will require transforming government cyber defence capabilities, fostering public-private cooperation, and building organizational and technical capacity.

Ichida’s insights underscore the complexity of the task, reminding us that while the foundations are being laid, continuous adaptation and vigilance will be required to meet the ever-evolving landscape of cyber threats. The next few years will be pivotal as Japan navigates these challenges to secure its digital future. Addressing these challenges and protecting Japan’s digital society will require sustained collaboration between the public and private sectors.

Admiral_Akira_Ichida-1-1.png

Akira Ichida

Retired Admiral, Japan Maritime Self-Defense Force, Senior Advisor @ Nihon Cyber Defence

Akira Ichida

Retired Admiral, Japan Maritime Self-Defense Force, Senior Advisor @ Nihon Cyber Defence
Retired JMSDF Admiral, Ichida led MSDF cyber operations, intelligence enhancements, advancing cyber defense, information sharing, and overseas training for Japan’s military.
Edit Template

Cyber Maturity Assessment

Nihon Cyber Defence (NCD) offers comprehensive Cyber Maturity Assessments designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.

Cyber Security Framework (NIST)

National Institute of Standards and Technology

NIST Framework Graphic

Cyber Assessment Framework (CAF)

National Cyber Security Centre

CAF Framework Graphic
Edit Template

More from NCD​

Nihon Cyber Defence and Fivecast Partner to Enhance Cyber Threat Intelligence for Japan

The collaboration combines Fivecast’s advanced AI-powered OSINT technology with NCD’s expertise in cyber threat intelligence and Japanese cyber security needs, delivering actionable intelligence...

Navigating Cyber Incident Response 

Unprepared cyber incident response can lead to prolonged damage. Learn practical strategies to strengthen resilience, improve decision-making speed, and build a proactive response framework in this...

Safeguarding Japan’s Critical Infrastructure 

Japan's energy and food security depend on resilient supply chains, but cyber threats to critical infrastructure are rising. Discover strategies to safeguard OT systems and protect vital industries in...

A Strategic Guide for Building Cyber Resilience

Cyber resilience is a strategic necessity. Discover five key strategies to minimize cyber incident impacts and strengthen long-term security, based on insights from Dr. Jamie Saunders and the World...

Vol #1 Leadership & Cyber Resilience

Cyber security is a boardroom issue. John Noble shares essential non-technical questions that leaders must ask to strengthen cyber resilience and governance in today’s digital landscape...

NCD Cyber Threat Intelligence: Gelsemium APT Group

The China-linked Gelsemium APT group poses a growing cyber threat to Japanese organizations, targeting sensitive data through advanced malware. Learn how to protect your business from espionage...

How Japanese Organizations Can Overcome Ransomware Challenges

Ransomware attacks are exposing critical weaknesses in Japanese organizations. Learn how to overcome systemic security barriers, enhance resilience, and implement proactive cyber security strategies...

Beyond Dollars: The True Impact of Cyber Attacks

Cyber attacks cause more than financial losses—they disrupt critical services, expose vulnerabilities, and threaten national security. Discover the true cost of cyber threats beyond dollars in this...