| IT infrastructure – Defense information network(A) |
| Speed(A.1) | <A-1-1>Average speed among main nodes |
| <A-1-2> Average speed between main node and secondary node (branch line) |
| <A-1-3> Average speed between secondary node and user |
| Traffic(A.2) | <A-2-1> Average traffic among main nodes |
| <A-2-2> Average traffic between main node and secondary node (branch line) |
| <A-2-3> Average traffic between secondary node and user |
| Availability/recovery time (A.3) | <A-3-1> Network availability |
| <A-3-2> Recovery time |
| IT infrastructure – Computer systems(B) |
| Server utilization(B.1) | <B-1-1> Average (maximum) CPU use ratio |
| <B-1-2> Average storage use ratio |
| Server availability (B.2) | <B-2-1> Server availability |
| <B-2-2> Server recovery time |
| Server throughput (B.3) | <B-3-1> Average tpmC (Transaction per minute by council) |
| <B-3-2> Average response time |
| Work efficiency (B.4) | <B-4-1> Input automation level (Input interface level) |
| IT infrastructure – Interoperability and standardization(C) |
| Interoperability among ISs(C.1) | <C-1-1> Average interoperability level among battlefield management information systems (MISs) |
| <C-1-2> Average data interconnection ratio among battlefield MISs |
| <C-1-3> Average interoperability level between battlefield MIS and resource MIS |
| <C-1-4> Average data interconnection level between battlefield MIS and resource MIS |
| <C-1-5> Average interoperability level among resource MISs |
| <C-1-6> Average data interconnection level among resource MISs |
| Standardization of reference information (master data) (C.2) | <C-2-1> Standardization ratio of reference information/code data (master data) |
| Interoperability between weapon systems and IS (C.3) | <C-3-1> Average interoperability level between weapon systems and battlefield MIS |
| <C-3-2> Average data interconnection ratio between weapon systems and battlefield MIS |
| IT infrastructure – Information security(D) |
| Detection level (capability) of infringement incident(D.1) | <D-1-1> Intrusion detection ratio in advance |
| Response level (capability) of infringement incident(D.2) | <D-2-1> Number of intrusion incidents per year |
| <D-2-2> Intrusion incident response time |
| Recovery of infringement incident(D.3) | <D-3-1> Trace ratio of infringement incidents |
| <D-3-2> Recovery time after infringement incident |
| Informatization environment(E) |
| Efforts to improve informatization capability(E.1) | <E-1-1> Annual time of informatization education |
| Informatization master plan(E.2) | <E-2-1> Informatization master plan |
| Efficient execution of budget(E.3) | <E-3-1> Efficiency of budget execution |
| IS use(F) |
| Business informatization (F.1) | <F-1-1> Ratio of tasks implemented by IS |
| Business use(F.2) | <F-2-1> Business use |