﻿{"id":18910,"date":"2021-08-03T16:55:59","date_gmt":"2021-08-03T07:55:59","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=18910"},"modified":"2026-04-19T17:32:45","modified_gmt":"2026-04-19T08:32:45","slug":"wg%e6%9c%88%e6%ac%a1%e6%b4%bb%e5%8b%95%e5%a0%b1%e5%91%8a%e3%82%a2%e3%83%bc%e3%82%ab%e3%82%a4%e3%83%96%e3%82%b9","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=18910","title":{"rendered":"WG\u6708\u6b21\u6d3b\u52d5\u5831\u544a\u30a2\u30fc\u30ab\u30a4\u30d6\u30b9"},"content":{"rendered":"<p>\u904e\u53bb\u306eWG\u6708\u4f8b\u6d3b\u52d5\u5831\u544a\u306f\u3001\u3053\u3061\u3089\u306b\u30a2\u30fc\u30ab\u30a4\u30d6\u3057\u307e\u3059\u3002<\/p>\n<h3>2026\u5e742\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>2\u670817\u65e5\u306b\u5b9a\u4f8b\u4f1a\u306e\u5b9f\u65bd\u30013\u670817\u65e5\u306b\u5b9a\u4f8b\u4f1a\u3092\u4e88\u5b9a<\/li>\n<li>CCM \u52c9\u5f37\u4f1a\u306e\u5b9f\u65bd\u3001CCM v4.1 \u7ffb\u8a33\u306e\u958b\u59cb<\/li>\n<li>ValidAIted \u306ePoC\u3092\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\u516c\u958b\u300cISMS\u3092\u57fa\u76e4\u3068\u3057\u305f\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u5c55\u958b\u300d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The Continuous Audit Metrics Catalog\u306e\u7ffb\u8a33\u7740\u624b<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u66f4\u65b0\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u66f4\u65b0\u7121\u3057<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u500b\u4eba\u60c5\u5831\u59d4\u54e1\u4f1a\u3078\u306e\u8cea\u554f<\/li>\n<li>\u59d4\u8a17\u5148\u7ba1\u7406\u306e\u5883\u754c\u306b\u95a2\u3059\u308b\u7c21\u6613\u30ec\u30dd\u30fc\u30c8\u3092\u7de8\u96c6\u4e2d\u30ec\u30dd\u30fc\u30c8\u3092\u307e\u3068\u3081\u308b<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>US\u30ec\u30dd\u30fc\u30c81\u672c\u5171\u6709\uff082\u670818\u65e5\uff09<\/li>\n<li>\u300cData Loss Prevention and Data Security Posture Management in Healthcare\u300d<\/li>\n<li>\u6771\u4eac\u8ca1\u56e3\u304b\u3089\u306e\u5bc4\u7a3f\uff08\u533b\u7642\u30c7\u30fc\u30bf\u306e\u4e8c\u6b21\u5229\u7528\uff09\u30923\u6708\u63d0\u51fa\u4e88\u5b9a<\/li>\n<li>4\u6708\u306b\u540c\u30c6\u30fc\u30de\u306e\u30aa\u30f3\u30e9\u30a4\u30f3\u30bb\u30df\u30ca\u30fc\u5b9f\u65bd\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30d6\u30ed\u30b0\uff1a\u958b\u767a\u8005\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e\uff08\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09<\/li>\n<li>\u95a2\u897f\u652f\u90e8Workshop\u306e\u5b9f\u65bd<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>3\u67082\u65e5\u5b9a\u4f8b\u4f1a\u5b9f\u65bd<\/li>\n<li>WG 1\u20133\u306e\u3046\u3061WG3\u306b\u767b\u9332\u3057\u3066\u6311\u6226\u4e88\u5b9a<\/li>\n<li>CCM v4.1\u7ffb\u8a33\u652f\u63f4<\/li>\n<li>FedRAMP26\u95a2\u9023\u306e\u8b70\u8ad6<\/li>\n<li>\u6b21\u56de\u306f4\u67086\u65e5\u306e\u5b9a\u4f8b\u4f1a\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u66f4\u65b0\u7121\u3057<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30af\u30e9\u30a6\u30c9\u30d5\u30a1\u30fc\u30b9\u30c8\u6642\u4ee3\u306b\u304a\u3051\u308b\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3001\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\uff06\u30d6\u30ed\u30b0\u516c\u958b<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2026\u5e741\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>1\/21 \u306b\u4e8b\u696d\u7d99\u7d9a\u3068\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u30c6\u30fc\u30de\u306b\u6253\u5408\u305b<\/li>\n<li>2\/17\u306b\u5909\u66f4\u7ba1\u7406\u3068\u69cb\u6210\u7ba1\u7406\u3092\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>Step2\u300c\u30c8\u30e9\u30f3\u30b6\u30af\u30b7\u30e7\u30f3\u30d5\u30ed\u30fc\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u300d\u8cc7\u6599\u516c\u958b<\/li>\n<li>IoT WG\u3068\u65b9\u5411\u6027\u3092\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Introductory Guidance to AICM\u7ffb\u8a33\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u66f4\u65b0\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u6280\u8853\u66f8\u5178<br \/>\n\u4eca\u56de\u306e\u307f4\u6708\u3067\u306e\u958b\u50ac\u306b\u5207\u308a\u66ff\u308f\u308a\u3001WG\u30e1\u30f3\u30d0\u30fc\u5168\u54e1\u306e\u53c2\u52a0\u304c\u96e3\u3057\u3044\u3053\u3068\u304b\u3089\u3001\u898b\u9001\u308b\u65b9\u91dd\u3002<br \/>\n\u305d\u306e\u6b21\u306e\u79cb\u306e\u958b\u50ac\u3067\u306f\u3001\u51fa\u5c55\u3059\u308b\u4e88\u5b9a\u3002<br \/>\n\u306a\u304a\u3001\u79cb\u306e\u958b\u50ac\u306f11\u6708\u3092\u60f3\u5b9a\u3002<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9<br \/>\n\u7d99\u7d9a\u5bfe\u5fdc\u4e2d\u3002<\/li>\n<li>Power Platform W-A\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9<br \/>\n4\u6708\u4ee5\u964d\u3067\u306e\u5bfe\u5fdc\u306b\u5909\u66f4\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u6708\u4f8b\uff081\/23\uff09\u958b\u50ac\u3002\u6b21\u306e\u59d4\u8a17\u5148\u9078\u5b9a\u30ac\u30a4\u30c9\u306e\u4f5c\u6210\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>1\/18 \u5916\u90e8\u8b1b\u6f14\u3092\u5b9f\u65bd\u4e88\u5b9a<br \/>\n4\u6708\u306e\u4e88\u5b9a\u306f\u5f8c\u65e5\u8ffd\u8a18<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30d6\u30ed\u30b0\u767a\u884c\uff1a\u958b\u767a\u8005\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e<br \/>\n\u30fb12\u6708\uff1a\u30ef\u30fc\u30af\u30ed\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff081\uff09<br \/>\n\u30fb1\u6708\uff1a\u30ef\u30fc\u30af\u30ed\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff082\uff09<br \/>\n\u30fb2\u6708\uff1a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8<\/li>\n<li>3\/5 \u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u958b\u50ac\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>1\u670826\u65e5\u306b\u5b9a\u4f8b\u4f1a\u5b9f\u65bd<br \/>\nCAR\/FedRAMP 20X\u306e\u6700\u65b0\u72b6\u6cc1\u306e\u60c5\u5831\u4ea4\u63db<br \/>\n\u4eca\u5f8c\u306e\u6d3b\u52d5\u6848\u6a21\u7d22<\/li>\n<li>SSCF\u30d6\u30ed\u30b0\u300cSaaS\u30d7\u30ed\u30d0\u30a4\u30c0\u306b\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u80fd\u529b\u3092\u6574\u7406\/\u53ef\u8996\u5316\u3059\u308b\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\uff08SSCF\uff09\u300d\u516c\u958b(2026\/1\/9)\uff08\u8af8\u89d2\u3055\u3093\uff09<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30fc\u30b0\u306e\u5b9f\u65bd\u3000\u30c6\u30fc\u30de\u300cSaaS \u74b0\u5883\u3067\u3088\u304f\u3042\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\/\u5bfe\u7b56\u304a\u3088\u3073\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8\u306b\u3064\u3044\u3066\u300d\uff08\u8af8\u89d2\u3055\u3093\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u30a4\u30f3\u30d7\u30ea\u30e1\u30f3\u30c6\u30fc\u30b7\u30e7\u30f3\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306e\u7ffb\u8a33\u6700\u7d42\u5de5\u7a0b\u3092\u7d99\u7d9a\uff08\u9045\u5ef6\u3042\u308a\u3001\u4eca\u9031\u4e2d\u306b\u5dfb\u304d\u53d6\u308a\u4e88\u5b9a\uff09<\/li>\n<li>2\/9\u306b\u30ef\u30fc\u30ad\u30f3\u30b0\u958b\u50ac\u3057\u4eca\u5f8c\u306e\u8a08\u753b\u3092\u6c7a\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u6d3b\u52d5\u306f\u4e00\u65e6\u4f11\u6b62<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e7412\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>12\/24 \u6253\u3061\u5408\u308f\u305b\u3001\u52c9\u5f37\u4f1a<br \/>\n1\/21 \u6b21\u56de\u958b\u50ac\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\uff15Step Document Step1\u306f\u65e5\u672c\u8a9e\u5316\u6e08\u3002Step2\u306e\u7ffb\u8a33\u4e2d<br \/>\nStep1\u300c\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u30b5\u30fc\u30d5\u30a7\u30b9\u306e\u5b9a\u7fa9\u300d<br \/>\nStep2\u300c\u30c8\u30e9\u30f3\u30b6\u30af\u30b7\u30e7\u30f3\u30d5\u30ed\u30fc\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u300d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u4ed5\u639b\u4e2d\uff081\u6708\uff09\uff1a\u3000Introductory Guidance to AICM<br \/>\n\u5b8c\u4e86\uff0812\u6708\uff09\uff1a\u3000Managing Privileged Access in the Cloud-First World<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u66f4\u65b0\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u4eca\u6708\u304b\u3089\u52d5\u304f\u304b\u3001\u7d99\u7d9a\u5b9f\u65bd\u4e2d<br \/>\n\u30d1\u30ef\u30fc\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u30fb\u30a6\u30a7\u30eb\u30a2\u30fc\u30ad\u306f2\u20133\u6708\u5b8c\u4e86\u898b\u8fbc\u307f\uff08\u96e3\u3057\u3051\u308c\u30704\u6708\u4ee5\u964d\uff09<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC-JP v1.2\u30ea\u30ea\u30fc\u30b9\u6e08\u307f\u30021\u6708\u52c9\u5f37\u4f1a\u3067\u8aac\u660e\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u59d4\u8a17\u5148\u9078\u5b9a\u306b\u95a2\u3059\u308b\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u691c\u8a0e\uff08SSCF\u3092\u53c2\u7167\u3057\u305f\u304c\u3001CAIQ\u306e\u6d3b\u7528\u304c\u59a5\u5f53\u3068\u306e\u898b\u89e3\u3067\u518d\u691c\u8a0e\u7d99\u7d9a\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u5148\u6708\uff1a\u30d6\u30ed\u30b01\u672c\u516c\u958b\u3002\u4eca\u6708\u3082\u30d6\u30ed\u30b01\u672c\u4e88\u5b9a\u30021\/18\uff1a\u5916\u90e8\u8b1b\u6f14\uff08\u533b\u7642\u95a2\u9023\uff09\u30021\/28\uff1a\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30c7\u30b6\u30a4\u30f3\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b92026\u767b\u58c7\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30fb\u30d6\u30ed\u30b0\uff1a\u958b\u767a\u8005\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e\uff08\u30ef\u30fc\u30af\u30ed\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>12\u6708\u306b\u5b9a\u4f8b\u4f1a\u5b9f\u65bd\u3002CAR\uff0fFedRAMP\u306e\u5b9f\u88c5\u7ffb\u8a33\u304c\u9045\u308c\u3001\u7b2c\u4e00\u6b21\u7ffb\u8a33\u4f5c\u696d\u304c\u672a\u5b8c\u3002\u5bfe\u5fdc\u65b9\u91dd\u306e\u65e9\u671f\u78ba\u5b9a\u304c\u5fc5\u8981\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u300cvalidated\uff1aAI\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6d3b\u7528\u300d\u8a18\u4e8b\u3092\u30ec\u30d3\u30e5\u30fc\u30fb\u516c\u958b\uff081\/5\u20136\u9803\uff09\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u5b9a\u4f8b\u4f1a\u5b9f\u65bd\u3002<\/li>\n<li>Implementation Guideline\u306e\u7ffb\u8a33\u3002CSP\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u304c\u81a8\u5927\u3002\u7ffb\u8a33\u4f5c\u696d\u304c\u9045\u308c\u3001\u7740\u624b\u4e88\u5b9a<\/li>\n<li>ValiDAIted\u306e\u30d6\u30ed\u30b0\u8a18\u4e8b\u30ec\u30d3\u30e5\u30fc<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u6d3b\u52d5\u306f\u4e00\u65e6\u4f11\u6b62<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e7411\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>12\u6708\u6253\u3061\u5408\u308f\u305b\u306e\u8abf\u6574\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>12\/6 \u65e5\u672c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u5b66\u4f1a\uff08JSSM\uff09\u3067\u8b1b\u6f14\u4e88\u5b9a\u3002\u5185\u5bb9\u3068\u3057\u3066\u306fZero Trust\u306e\u8aac\u660e\u3068ISMS\u3067Zero Trust\u3092\u5b9f\u73fe\u3055\u305b\u308b\u306b\u306f\u3068\u3044\u3063\u305f\u3082\u306e\u3068\u3044\u3046\u306e\u3092\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>SSCF\u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d<\/li>\n<li>Managing Privileged Access in the Cloud-First World\u306e\u7ffb\u8a33\u4f5c\u696d\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>Congress\u3067\u306e\u8b1b\u6f14\u6e96\u5099<\/li>\n<li>IoT UseCase\u96c6\u3001\u30ea\u30b9\u30af\u30b1\u30fc\u30b9\u306b\u57fa\u3065\u304f\u30b7\u30ca\u30ea\u30aa\u578b\u306e\u30ea\u30b9\u30af\u8a55\u4fa1\u3068\u5bfe\u7b56\u3092\u691c\u8a0e \u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>Zero Trust Use Case\u306e\u6d3b\u52d5\u518d\u958b<\/li>\n<li>\u6280\u8853\u66f8\u5c55\u53c2\u52a0\u300111\/16 \u5f53\u65e5\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u6570\u306f130\u3060\u3063\u305f<\/li>\n<li>Power Platform \u306e Well-Architected Framework\u306e\u6982\u8aac\u66f8\u4f5c\u6210\u4e88\u5b9a\u3067\u3001Word\u3082\u3057\u304f\u306fPPT\u3067\u4f5c\u6210\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC-JP1.2 \u3092\u30ea\u30ea\u30fc\u30b9\u3057\u305f\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e \u7b2c23\u6761\u306e\u5b89\u5168\u7ba1\u7406\u7b56\u306825\u6761\u306e\u59d4\u8a17\u5148\u306e\u7ba1\u7406\u3068\u3044\u3046\u89b3\u70b9\u3067\u3001CCM\u3068\u304bCAIQ\u3068\u304b SSCF\u306a\u3069\u306e\u6d3b\u7528\u306e\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30b3\u30f3\u30b0\u30ec\u30b9\u767a\u8868\uff1a\u6d77\u5916\u306eAI\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u306b\u5b66\u3076\u7ba1\u7406\u7b56<br \/>\n[\u56fd\u5185]<br \/>\n11\/20\uff1a\u6708\u520a\u65b0\u533b\u7642 2025\u5e7412\u6708\u53f7\u306b\u8a18\u4e8b\u63b2\u8f09\uff1a\u300c\u30ed\u30dc\u30c3\u30c8\u652f\u63f4\u624b\u8853\u30b7\u30b9\u30c6\u30e0\u306b\u5b66\u3076\u30af\u30e9\u30a6\u30c9\u63a5\u7d9a\u578bIoT\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u300d<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"RcfzxdMTUi\"><p><a href=\"https:\/\/www.newmed.co.jp\/shin-iryo\/n2512\">\u6708\u520a\u65b0\u533b\u7642 2025\u5e7412\u6708\u53f7<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;\u6708\u520a\u65b0\u533b\u7642 2025\u5e7412\u6708\u53f7&#8221; &#8212; \u6708\u520a\u65b0\u533b\u7642\" src=\"https:\/\/www.newmed.co.jp\/shin-iryo\/n2512\/embed#?secret=xRPMjTGvnf#?secret=RcfzxdMTUi\" data-secret=\"RcfzxdMTUi\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\n11\/21\uff1a\u300c\u6d77\u5916\u4e8b\u4f8b\u304b\u3089\u4fef\u77b0\u3059\u308b\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u74b0\u5883\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d(CSA Japan Congress 2025)<br \/>\n[\u30b0\u30ed\u30fc\u30d0\u30eb]<br \/>\nCircle\u304b\u3089Zoom + Google Docs\u4f53\u5236\u3078\u79fb\u884c<br \/>\n2025\u5e7411\u670826\u65e5\uff08\u73fe\u5730\u6642\u9593\uff09\u306eMonthly Meeting\u306f\u3001Thanks Giving Day\u306e\u305f\u3081\u4e2d\u6b62\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>2025\u5e7411\u6708<br \/>\n\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/li>\n<li>2025\u5e7412\u6708\u4e88\u5b9a<br \/>\n12\u6708\u4e2d\uff1a\u30d6\u30ed\u30b0\u300c\u958b\u767a\u8005\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e\uff08\u30ef\u30fc\u30af\u30ed\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09\u300d<\/li>\n<li>2026\u5e741\u6708\u4ee5\u964d\u4e88\u5b9a\uff1a\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u958b\u767a\u8005\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u790e\uff08\u30ef\u30fc\u30af\u30ed\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09\u300d<br \/>\nSilverfort\u4f50\u85e4\u6c0f\u306bActive Directory\uff0fMicrosoft Entra ID\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c6\u30fc\u30de\u3067\u6253\u8a3a\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u76e3\u67fb\u306e\u81ea\u52d5\u5316\u306e\u60c5\u5831\u5171\u6709\u306e\u7d99\u7d9a<\/li>\n<li>\u653f\u5e9c\u306e\u9589\u9396\u306e\u5f71\u97ff\u3067CAR\u3001FedRAMP\u306e\u9032\u6357\u304c\u4e4f\u3057\u3044<\/li>\n<li>Congress \u6e96\u5099\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u308b\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Implementation Guideline\u7ffb\u8a33\u4e2d<\/li>\n<li>ValidAIted\u306e\u30d6\u30ed\u30b0\u3092\u51fa\u3057\u305f\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u6d3b\u52d5\u306f\u4e00\u65e6\u4f11\u6b62<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e7410\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM\u306e\u7ba1\u7406\u7b56\u3092\u52c9\u5f37\u4f1a\u309211\u6708\u3088\u308a\u958b\u50ac\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>WG\u30bb\u30df\u30ca\u30fc\u3092\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>SaaS Security Capability Framework\u7ffb\u8a33\u7d42\u4e86\u3002\u516c\u958b\u6e08\u307f\u3002<\/li>\n<li>\u95a2\u9023\u30bb\u30df\u30ca\u30fc\u306e\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>Congress\u3067\u306e\u8b1b\u6f14\u6e96\u5099<\/li>\n<li>IoT UseCase\u96c6\u3001\u30ea\u30b9\u30af\u30b1\u30fc\u30b9\u306b\u57fa\u3065\u304f\u30b7\u30ca\u30ea\u30aa\u578b\u306e\u30ea\u30b9\u30af\u8a55\u4fa1\u3068\u5bfe\u7b56\u3092\u691c\u8a0e \u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u7d99\u7d9a\u5b9f\u65bd\u4e2d<\/li>\n<li>\u6280\u8853\u66f8\u5178\u51fa\u5c55\u306b\u51fa\u5c55\u4e88\u5b9a<\/li>\n<li>Power Platform\u306eWAF\u89e3\u8aac\u66f8\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u7de8\u96c6\u8005\u304b\u3089\u6821\u95b2\u304c\u4e0a\u304c\u3063\u305f\u3002<\/li>\n<li>\u5168\u54e1\u3067\u30ec\u30d3\u30e5\u30fc\u3001\uff15\uff5e\uff16\u304b\u6240\u4fee\u6b63\u3057\u4eca\u6708\u4e2d\u306bFiX\u3001\u6765\u6708\u8868\u7d19\u3092\u542b\u3081\u78ba\u5b9a\u3059\u308b\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff1a\u6d77\u5916\u306eOT\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u306b\u5b66\u3076\u7ba1\u7406\u7b56<\/li>\n<li>\u672c\u90e8\u3067\u533b\u7642\u306b\u304a\u3051\u308bDLT\u3068DSPM\u306e\u30ec\u30dd\u30fc\u30c8\u3092\u5e74\u5185\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u76e3\u67fb\u306e\u81ea\u52d5\u5316\u306e\u60c5\u5831\u5171\u6709\u306e\u7d99\u7d9a<\/li>\n<li>\u653f\u5e9c\u306e\u9589\u9396\u306e\u5f71\u97ff\u3067CAR\u3001FedRAMP\u306e\u9032\u6357\u304c\u4e4f\u3057\u3044<\/li>\n<li>Congress \u6e96\u5099\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u308b\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u5b9a\u4f8b\u65e5\u4ed8\u309212\u65e5\u306b\u5909\u66f4<\/li>\n<li>\u30ab\u30ec\u30f3\u30c0\u30fc\u53c2\u7167\u4e0d\u53ef\u306e\u30e1\u30f3\u30d0\u30fc\u304c\u3044\u308b\u305f\u3081Slack\u3067\u518d\u544a\u77e5<\/li>\n<li>\u30ea\u30fc\u30c0\u30fc\u306e\u51fa\u5f35\u5bfe\u5fdc\u306e\u305f\u3081\u9032\u6357\u306f\u9650\u5b9a\u7684\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30a2\u30ab\u30c7\u30df\u30fc\u304c10\/23\u3067\u5168\u7de8\u7d42\u4e86<\/li>\n<li>\u6d3b\u52d5\u306f\u4e00\u65e6\u4f11\u6b62<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e749\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM V4\u306e\u52c9\u5f37\u4f1a\u3092WG\u5185\u3067\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u5c0e\u5165\u6226\u7565\u306e\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u7d99\u7d9a\uff08\u8af8\u89d2\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>SaaS Security Capability Framework\u7ffb\u8a33\u4f5c\u696d\u4e2d<\/li>\n<li>CCSK V5 \u3010\u5b8c\u4e86\u3011\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>Congress\u5411\u3051\u5185\u5bb9<\/li>\n<li>IoT\u306eZero Trust\u3078\u306e\u5c0e\u5165\u6226\u7565 \u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u7d99\u7d9a\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u306e\u6821\u6b63\u767a\u6ce8\u3057\u6700\u7d42\u7248\u3092\u51fa\u3059<\/li>\n<li>CSA\u30b8\u30e3\u30d1\u30f3\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u306e\u898b\u76f4\u3057\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\uff1a\u6d77\u5916\u306b\u5b66\u3076SMB\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u790e\uff08OT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09\uff11<\/li>\n<li>\u30d6\u30ed\u30b0AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff11\uff088\u6708\uff09\uff12\uff089\u6708\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>ISACA\u8b1b\u6f14\u5b9f\u65bd<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u7d99\u7d9a\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u5b9a\u4f8b\u4f1a11\u67085\u65e5\u5b9f\u65bd<\/li>\n<li>AICM Implementation Guidelines\u306e\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u5b8c\u4e86\u300110\/23\u516c\u958b\u4e88\u5b9a\u3002AI STAR for AI\u306e\u6b63\u5f0f\u30a2\u30ca\u30a6\u30f3\u30b9\u3082\u540c\u65e5\u4e88\u5b9a\u3002<\/li>\n<li>\u30a8\u30fc\u30b8\u30a7\u30f3\u30c6\u30a3\u30c3\u30afAI\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\uff088\u6708\u516c\u958b\uff09\u3082\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u6a19\u6e96\u5316\u89b3\u70b9\u3067\u691c\u8a0e\u5bfe\u8c61\u3002\uff08\u5bae\u5ddd\u6c0f\u8b1b\u6f14\u306e\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u9818\u57df\uff09\u3068\u306e\u9023\u643a\u3092\u8003\u616e\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30a2\u30ab\u30c7\u30df\u30fc\u306e\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e748\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u65b0\u3057\u3044WG\u30ea\u30fc\u30c0\u30fc\u306b\u798f\u4e95\u5c06\u6a39\u3055\u3093\u306b\u304a\u9858\u3044\u3059\u308b\u3053\u3068\u3068\u3057\u305f\u3002WG\u306e\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>9\/4\u306b\u3001ASPIC\u306e\u7b2c\uff14\uff13\u56de\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a\u3067\u8b1b\u6f14\u4e88\u5b9a\uff08\u8af8\u89d2\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u9032\u6357\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u201dZero Trust Guidance for IOT\u201d\u306e\u65e5\u672c\u8a9e\u7248\u3092\u516c\u958b \u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u6280\u8853\u66f8\u5178\u51fa\u5c55\u4e88\u5b9a<br \/>\n\u3053\u308c\u307e\u3067\u306eCSA\u306e\u6210\u679c\u7269\u3092\u51fa\u3059\u4e88\u5b9a<br \/>\n\u30b9\u30c6\u30c3\u30ab\u30fc 11\u6708\u4e2d\u65ec\u307e\u3067\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u306e\u6821\u6b63\u767a\u6ce8\u3057\u6700\u7d42\u7248\u3092\u51fa\u3059<\/li>\n<li>CSA\u30b8\u30e3\u30d1\u30f3\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u306e\u898b\u76f4\u3057\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30fb\u52c9\u5f37\u4f1a\uff1a\u6d77\u5916\u306eMicrosoft Azure\/365\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u306b\u5b66\u3076\u7ba1\u7406\u7b56<br \/>\n\u30fb\u65b0\u533b\u7642\u3068\u3044\u3046\u96d1\u8a8c\u306b\u533b\u7642\u306eIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u57f7\u7b46\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u306a\u3057<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u5b9a\u4f8b\u4f1a\u3092\u5b9f\u65bd\u3057\u3001\u4ee5\u4e0b\u306e\u5185\u5bb9\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u305f\u3002<br \/>\n\u30fbCAR\u306b\u95a2\u3059\u308b\u6700\u65b0\u60c5\u5831\u5171\u6709<br \/>\n\u30fbFedRAMP 20x\/OSCAL Foundation\u306b\u95a2\u3059\u308b\u60c5\u5831\u5171\u6709<br \/>\n\u30fbWG\u30d6\u30ed\u30b0\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u30fbWG\u5185\u60c5\u5831\u5171\u6709\uff08NHI\/SP800-207\/\u30a6\u30e9\u30ce\u30b9\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\uff09<br \/>\n\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u201dAI Control Matrix\u201d\u65e5\u672c\u8a9e\u7248\u516c\u958b\u3002<\/li>\n<li>\u201dAI-CAIQ\u201d\u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>WG\u30bb\u30df\u30ca\u30fc\u300cAICM\u89e3\u8aac\uff01\u300d\u30928\/26\u306b\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30a2\u30ab\u30c7\u30df\u30fc\u306e\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e747\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>AI WG\u3068\u5354\u529b\u3057\u3066AI Control Matrix\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8 \u81ea\u52d5\u5316\u3068\u30aa\u30fc\u30b1\u30b9\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u3001\u53ef\u8996\u5316\u3068\u5206\u6790\u306e\u6982\u8981 \u2013 \u5fc5\u8981\u306a\u6a2a\u65ad\u7684\u6a5f\u80fd\u306e\u5b9f\u73fe\u300d\u306e\u516c\u958b<\/li>\n<li>9\/4 ASPIC\u3067\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306b\u95a2\u3059\u308b\u8b1b\u6f14\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Deep Dive\u306e\u7ffb\u8a33\u9032\u884c\u4e2d<\/li>\n<li>\u80cc\u4e2d\u3092\u9589\u3058\u305f\u66f8\u5f0f\u306a\u306e\u3067\u3001\u4f5c\u696d\u306b\u6642\u9593\u304c\u639b\u304b\u3063\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>Zero Trust Guidance for IOT\u306e\u7ffb\u8a33\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u65e5\u7a0b\u6c7a\u307e\u308a\u6b21\u7b2c\u6280\u8853\u66f8\u5178\u51fa\u5c55\u4e88\u5b9a<\/li>\n<li>Congress\u3067\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u8b1b\u6f14\u4e88\u5b9a\u3060\u3063\u305f\u304c\u300111\u6708\u306b\u306f\u9593\u306b\u5408\u308f\u306a\u3044\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u306e\u6821\u6b63\u767a\u6ce8\u3057\u6700\u7d42\u7248\u3092\u51fa\u3059<\/li>\n<li>CSA\u30b8\u30e3\u30d1\u30f3\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u306e\u898b\u76f4\u3057\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u00a0\u6d77\u5916\u306b\u5b66\u3076SMB\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u790e\uff08AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7de8\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u306a\u3057<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u5b9a\u4f8b\u4f1a\u306e\u5b9f\u65bd<\/li>\n<li>Compliance\u81ea\u52d5\u5316\u306b\u95a2\u9023\u3057\u305fOSCAL\u306b\u3064\u3044\u3066PwC\u3067\u306e\u53d6\u308a\u7d44\u307f\u306b\u3064\u3044\u3066\u5171\u6709\u3057\u3066\u3044\u305f\u3060\u3044\u305f\u3002<\/li>\n<li>CAR\u306e\u6700\u65b0\u60c5\u5831\u306e\u5171\u6709\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<\/li>\n<li>Congress\u3067\u306e\u767a\u8868\u5185\u5bb9\u306e\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Control Matrix\u7ffb\u8a33<\/li>\n<li>IPA ASIC \u306e\u610f\u898b\u4ea4\u63db\u4f1a\u306b\u53c2\u52a0<\/li>\n<li>CSA\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u7d39\u4ecb\uff08ValidAIted\u3001Star for AI\u3001AI Control Matrix\u306a\u3069\uff09\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30a2\u30ab\u30c7\u30df\u30fc\u306e\u5b9f\u65bd\uff087\/10\uff0c24\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e746\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>AICM\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>ZT Automation &amp; Orchestration, Visibility \u7ffb\u8a33\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cTop Threats to Cloud Computing Deep Dive 2025\u300d\u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>ZT for IoT\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u300c\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 2024\u2015\u8981\u7d04\u7248\u2015\u300d\u306eCSA Japan\u516c\u5f0f\u30b5\u30a4\u30c8\u3067\u306e\u516c\u958b<\/li>\n<li>\u305d\u306e\u4ed6\u3001\u7d99\u7d9a\u5bfe\u5fdc\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC1.2\u767a\u6ce8\u5f85\u3061<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u898b\u76f4\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>6\/4 \u52c9\u5f37\u4f1a\uff1a\u6d77\u5916\u306eGoogle Workspace\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u306b\u5b66\u3076\u7ba1\u7406\u7b56<\/li>\n<li>6\/24 \u5916\u90e8\u8b1b\u6f14\uff1a\u30c7\u30f3\u30de\u30fc\u30af\u5927\u4f7f\u9928\u4e3b\u50ac\u30bb\u30df\u30ca\u30fc\u300c\u56fd\u5185\u3067\u306e\u533b\u7642\u30c7\u30fc\u30bf\u5229\u6d3b\u7528\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\u6280\u8853\u300d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AAICM\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\uff56\uff15\u306e\u30a2\u30ab\u30c7\u30df\u30fc\u30925\u6708\u304b\u308910\u6708\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e745\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>WG\u30bb\u30df\u30ca\u30fc\u300cAI\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5411\u3051\u3066STAR\u3001CCM\u3092\u7406\u89e3\u3057\u3088\u3046\uff01\u300d\u30926\/23\u306b\u958b\u50ac\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cTop Thread Deep Dive\u300d\u7ffb\u8a33\u306f6\u6708\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>ZT Guidance for IoT\u306e\u30ec\u30d3\u30e5\u30fc\u3001\u7d50\u679c\u3092CSA\u672c\u90e8\u306b\u30ec\u30dd\u30fc\u30c8\u6e08\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>6\u67081\u65e5\u306b\u958b\u50ac\u3055\u308c\u305f\u6280\u8853\u66f8\u517818\u3067\u51fa\u5178\u3057\u305f\u9812\u5e03\u7269\u306e\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u5b9f\u7e3e\u3092\u5831\u544a\u4e88\u5b9a\u3002<br \/>\n\u30fb\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a32024 -\u8981\u7d04\u7248-: 105\u56de<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9 -\u8981\u7d04\u7248-: 76\u56de<\/li>\n<li>\u6280\u8853\u66f8\u517818\u3067\u306e\u516c\u958b\u306f6\/15\u307e\u3067\u306a\u306e\u3067\u3001\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u8981\u7d04\u7248\u306f\u3001\u305d\u306e\u5f8c\u306bCSA\u306e\u30b5\u30a4\u30c8\u3067\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC-JP 1.2\u5b8c\u6210\u3000\u6821\u95b2\u696d\u52d9\u3068\u8868\u7d19\u4f5c\u6210\u3092\u59d4\u8a17\u4e88\u5b9a\u3002<\/li>\n<li>\u30ea\u30ea\u30fc\u30b9\u306f10\u6708\u76ee\u6a19\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>6\/24 \u30c7\u30f3\u30de\u30fc\u30af\u5927\u4f7f\u9928\u3067\u8b1b\u6f14\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Jim\u3055\u3093\u3068WG\u30e1\u30f3\u30d0\u30fc\u3067\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u81ea\u52d5\u5316\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7<\/li>\n<li>\u30b5\u30a4\u30ea\u30fc\u30b0\u3055\u3093\u3068\u5171\u540c\u3067SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u30e9\u30a6\u30f3\u30c9\u30c6\u30fc\u30d6\u30eb\u3092\u958b\u50ac\uff0811\u540d\u53c2\u52a0\uff09\u3001\u5225\u9014\u30ec\u30dd\u30fc\u30c8\u4f5c\u6210\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Controls Matrix \u7ffb\u8a33\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\uff56\uff15\u306e\u30a2\u30ab\u30c7\u30df\u30fc\u30925\u6708\u304b\u3089\u3002<br \/>\n\u7b2c1\u56de 5\/8\u5b9f\u65bd\u3001\u7b2c2\u56de 5\/22\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2025\u5e743\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30b3\u30f3\u30c6\u30c6\u30ad\u30b9\u30c8\u30d9\u30fc\u30b9\u3069\u30a2\u30af\u30bb\u30b9\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u306e\u8cc7\u6599\u3092\u516c\u958b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300c\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 2024\u300d\u3092\u516c\u958b\u3002<\/li>\n<li>\u300c\u5b8c\u5168\u6e96\u540c\u578b\u6697\u53f7\uff1a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306e\u305f\u3081\u306e\u5305\u62ec\u7684\u30ac\u30a4\u30c9\u300d\u3092\u516c\u958b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>ZT Guidance for IoT\u306e\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u30ec\u30d3\u30e5\u30fc\u7d50\u679c\u3092CSA\u672c\u90e8\u306b\u30ec\u30dd\u30fc\u30c8\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u00a0(\u30bf\u30a4\u30c8\u30eb\u672a\u5b9a) \u30ac\u30a4\u30c0\u30f3\u30b9\u306b\u304a\u3051\u308b\u7279\u5b9a\u306e\u30c9\u30e1\u30a4\u30f3\u3092Deep Dive<\/li>\n<li>\u6280\u8853\u66f8\u517818\u306b\u53c2\u52a0\uff08\u958b\u50ac\u65e5\uff1a\u7269\u7406\u306f2025\/06\/01 (\u65e5) 11:00\uff5e17:00\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u306f2025.05.31-2025.06.15\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>CASB WG\u306f\u30af\u30ed\u30fc\u30b8\u30f3\u30b0\u3057\u81ea\u52d5\u5316WG\u3078\u30b7\u30d5\u30c8\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u629c\u3051\u305f\u30e1\u30f3\u30d0\u30fc\u5206\u3092\u7a74\u57cb\u3081\u3057\u3001\u57f7\u7b46\u7d42\u308f\u308a\u3001\u307e\u3068\u3081\u306b\u5165\u308b\u3002CSA\u30b8\u30e3\u30d1\u30f3\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30dd\u30ea\u30b7\u30fc\u30822\uff5e3\u56de\u5185\u5bb9\u78ba\u8a8d\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d5\u30a1\u30fc\u30deIT\u3078\u306e\u51fa\u5e97\u3092\u4e88\u5b9a\u3057\u3066\u304a\u308a\u3001\u51fa\u5c55\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u672c\u90e8\u3001DevSecOps\u3082\u30d1\u30c3\u30b1\u30fc\u30b8\u304c\u51fa\u305f<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Jim\u306e\u6765\u65e5\u6642\u306bCompliance Automation\u306e\u4f1a\u8b70\u3092\u958b\u50ac\u3001\u9806\u5929\u5802\u5927\u5b66\u3068\u9023\u643a\u3057\u3066\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u6d3b\u52d5\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u7d42\u4e86\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\uff56\uff15\u306e\u30a2\u30ab\u30c7\u30df\u30fc\u30925\u6708\u304b\u3089\u5b9f\u65bd\u4e88\u5b9a\u3001\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e7410\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM\u30d0\u30fc\u30b8\u30e7\u30f34\u3001Implementation Guide\u3002470\u30da\u30fc\u30b8\u306b\u76f8\u5f53\u3059\u308b\u81a8\u5927\u306a\u3082\u306e\u3060\u3063\u305f\u304c\u4e00\u5fdc\u4e00\u901a\u308a\u7d42\u3048\u3001\u6700\u5f8c\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9 V5 \u306e\u7ffb\u8a33\u304c\u7d42\u4e86\u3002<\/li>\n<li>Top Threads Cloud Computing \u306b\u3066 2024 \u306e\u30ec\u30d3\u30e5\u30fc\u524d\u306e\u4e0b\u8a33\u304c\u7d42\u4e86\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>11 \u6708 3 \u65e5\u306b\u6280\u8853\u66f8\u5c55\u306b\u30ac\u30a4\u30c0\u30f3\u30b9 V5 \u306e\u8981\u7d04\u7248\u3092\u4f5c\u6210\u3057\u51fa\u5c55\u3057\u305f\u3002<\/li>\n<li>\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u6570\u304c\u53ef\u8996\u5316\u3055\u308c\u7dcf\u6570\u3068\u3057\u3066 217 \u3068\u306a\u3063\u3066\u3044\u308b\u3002<\/li>\n<li>\u6765\u5834\u8005\u6570\u306f 2600 \u3067\u3042\u308a\u3001\u4f1a\u5834\u3078\u306e\u6765\u5834\u8005\u3001\u975e\u6765\u5834\u8005\u305d\u308c\u305e\u308c\u534a\u3005\u3067\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3055\u308c\u3066\u3044\u308b\u3002<\/li>\n<li>11 \u6708 17 \u65e5\u307e\u3067\u6280\u8853\u66f8\u5c55\u3067\u95b2\u89a7\u53ef\u80fd\u3067\u3042\u308a\u300117 \u65e5\u4ee5\u964d\u306f\u30d6\u30e9\u30c3\u30b7\u30e5\u30a2\u30c3\u30d7\u3057\u3066\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 WG \u304b\u3089\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0\u4eca\u6708\u304b\u3089\u5b9a\u4f8b\u4f1a\u3092\u518d\u958b\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u00a0\u4ee5\u4e0b\u306e\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u5171\u6709\u3068\u5206\u6790<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u672c\u90e8\u8cc7\u6599\u306e\u5171\u6709<\/li>\n<li>SaaS\u904b\u7528\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u2192CCM\/CAIQ\u306a\u3069\u3067AI\uff08SaaS\u306e\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bAI\uff09\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30fb\u78ba\u8a8d\u9805\u76ee\u306e\u5fc5\u8981\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoCJP \u306e\u57f7\u7b46\u4e2d\u3067\u30ec\u30d3\u30e5\u30fc\u3092\u4eca\u6708\u3001\u6765\u6708\u306b\u884c\u3046\u4e88\u5b9a<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u306f\u3001\u542b\u3081\u306a\u3044\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u672c\u90e8\u306b\u3066 Confidential Computing in Healthcare \u3092\u4f5c\u6210\u4e2d\u3067\u6765\u5e74\u306e Q1 \u306b\u767a\u884c\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>11 \u6708 15 \u65e5\u306b IT \u30e1\u30c7\u30a3\u30a2\u3067\u8b1b\u6f14\u306e\u4e88\u5b9a\u3092\u3057\u3066\u304a\u308a\u3001\u8cc7\u6599\u306e\u4f5c\u6210\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\uff15\u793e\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>STAR Registry\u306e\u771f\u306e\u30de\u30eb\u30c1\u30ea\u30f3\u30ac\u30eb\u5316\u3092CSA\u672c\u90e8\u3068\u9032\u3081\u308b\u3002<\/li>\n<li>CSPM,CNAPP,CWPP\u306e\u89e3\u8aac\u30d6\u30ed\u30b0\u3092\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u81ea\u52d5\u5316\u306b\u3064\u3044\u3066\u5168\u822c\u7684\u306a\u65b9\u5411\u6027\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u73fe\u5728\u306f\u30013\u672c\u306e\u7c73\u56fd\u672c\u90e8\u306e\u65b9\u304b\u3089\u516c\u958b\u3055\u308c\u3066\u308b\u8cc7\u6599\u3092\u3059\u3079\u3066\u7ffb\u8a33\u3001\u516c\u958b\u304c\u5b8c\u4e86\u3002<\/li>\n<li>Congress 2024 \u306e\u8b1b\u6f14\u8cc7\u6599\u306e\u4f5c\u6210\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u8f2a\u8b1b\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9 V5 \u306e\u7ffb\u8a33\u304c\u7d42\u4e86\u3001\u516c\u958b\u6e08\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e749\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM\u30d0\u30fc\u30b8\u30e7\u30f34\u3001Implementation Guide\u3002470\u30da\u30fc\u30b8\u306b\u76f8\u5f53\u3059\u308b\u81a8\u5927\u306a\u3082\u306e\u3060\u3063\u305f\u304c\u4e00\u5fdc\u4e00\u901a\u308a\u7d42\u3048\u3001\u6700\u5f8c\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u3057\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u306b\u30e1\u30f3\u30d0\u30fc\u3068\u3082\u306b\u53c2\u52a0\u3057\u3066\u3044\u308b\u3002<br \/>\n\u30ac\u30a4\u30c0\u30f3\u30b9\u304c\u4e00\u533a\u5207\u308a\u3064\u3044\u305f\u3089\u307e\u305f\u7ffb\u8a33WG\u3092\u5225\u30b9\u30ec\u30c3\u30c9\u3067\u518d\u958b\u4e88\u5b9a\u3002<\/li>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002\u30da\u30f3\u30c7\u30a3\u30f3\u30b0\u4e2d\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092\u300c\u30d5\u30ec\u30fc\u30ba\u300d\u306e\u7528\u8a9e\u767b\u9332done\u3002\u4f5c\u696d\u306f\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000V4\u3067\u4f5c\u6210\u3057\u3066\u3001\u305d\u306e\u5f8cV5\u306b\u53d6\u308a\u639b\u304b\u308b\u4e88\u5b9a\uff08\u7ffb\u8a33\u5f8c\uff09\u3002V4\u3068V5\u306e\u5dee\u5206\u6bd4\u8f03\u3092\u3057\u3066\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u306b\u3064\u3044\u3066\u3000V5\u30d9\u30fc\u30b9\u3067\u518a\u5b50\u3092\u4f5c\u308b\u3068\u3044\u3046\u3053\u3068\u3067\u691c\u8a0e\u4e2d\u3002\u7533\u3057\u8fbc\u307f\u6e08\u3002\u96fb\u5b50\u30c7\u30fc\u30bf\u3067\u306e\u63d0\u4f9b\u306e\u307f\u3092\u4e88\u5b9a\u3002<\/li>\n<li>\u8b1b\u6f14\u3002\u30de\u30a4\u30ca\u30d3\u7d42\u4e86(7\/24)\u3002\u8b1b\u6f14\u5185\u5bb9\u3092\u8a18\u4e8b\u5316\u3082\u5b8c\u4e86\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0\u4ee5\u4e0b\u306e\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u5171\u6709\u3068\u5206\u6790<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u672c\u90e8\u8cc7\u6599\u306e\u5171\u6709<\/li>\n<li>SaaS\u904b\u7528\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u2192CCM\/CAIQ\u306a\u3069\u3067AI\uff08SaaS\u306e\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bAI\uff09\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30fb\u78ba\u8a8d\u9805\u76ee\u306e\u5fc5\u8981\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3002<\/li>\n<\/ul>\n<\/li>\n<li>9\u6708\u5b9a\u4f8b\u4f1a\u306f\u4e2d\u6b62\u3057\u305f\u304c\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u8abf\u67fb\u3001\u5171\u6709\u3092\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>COCJP\u306e1.1\u3001\u3042\u30681.2\u306e\u57f7\u7b46\u304c\u307b\u307c\u5b8c\u4e86\u3057\u3001\u3053\u308c\u304b\u3089\u7de8\u96c6\u3001\u304a\u4e92\u3044\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u958b\u59cb\u3057\u300112\u6708\u304b1\u6708\u3050\u3089\u3044\u306b\u5b8c\u6210\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u306f\u3001\u542b\u3081\u306a\u3044\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u751f\u6210AI\u30e1\u30c7\u30a3\u30ab\u30eb\u30b5\u30fc\u30c1\u304c9\u670826\u65e5\u306b\u30a2\u30e1\u30ea\u30ab\u3067\u3053\u3053\u3067\u516c\u958b\u3055\u308c\u305f\u3002<br \/>\n\u6b21\u306e\u30ec\u30dd\u30fc\u30c8\u306f\u30b3\u30f3\u30d5\u30a3\u30c7\u30f3\u30b7\u30e3\u30eb\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u30d8\u30eb\u30b9\u30b1\u30a2\u3068\u3044\u3046\u533b\u7642\u79d8\u5bc6\u8a08\u7b97\u306b\u95a2\u3059\u308b\u30ec\u30dd\u30fc\u30c8\u3092\u4f5c\u6210\u4e2d\u3002<br \/>\n12\u6708\u672b\u307e\u3067\u306b\u306f\u51fa\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>11\u6708\u958b\u50ac\u306eIT\u30e1\u30c7\u30a3\u30a2\u306e\u958b\u767a\u5909\u9769\u30bb\u30df\u30ca\u30fc\u3067\u8b1b\u6f14\u4e88\u5b9a\u3002<\/li>\n<li>\u7b2c6\u56de \u95a2\u897f\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\uff08\u6280\u8853\u7de8\uff09\u300d\u30009\/24\u958b\u50ac<\/li>\n<li>OWASP\u95a2\u897f\u652f\u90e8\u30a4\u30d9\u30f3\u30c89\/21\u3002\u53c2\u52a0\u4e88\u5b9a\u3002<\/li>\n<li>ISACA\u6771\u4eac\u652f\u90e8\u3000\u52c9\u5f37\u4f1a\u8b1b\u5e2b\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\u300d\u30029\u670826\u65e5\u958b\u50ac\u4e88\u5b9a\u3002\u3053\u308c\u306b\u5408\u308f\u305b\u3066\u8cc7\u6599\u3092\u4f5c\u6210\u4e2d\u3002\u30ac\u30a4\u30c0\u30f3\u30b98\u7ae0\u300110\u7ae0\u3092PPT\u306b\u307e\u3068\u3081\u3066\u3044\u308b\u306e\u3067\u5171\u6709\u53ef\u80fd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\uff15\u793e\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>STAR Registry\u306e\u771f\u306e\u30de\u30eb\u30c1\u30ea\u30f3\u30ac\u30eb\u5316\u3092CSA\u672c\u90e8\u3068\u9032\u3081\u308b\u3002<\/li>\n<li>CSPM,CNAPP,CWPP\u306e\u89e3\u8aac\u30d6\u30ed\u30b0\u3092\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u81ea\u52d5\u5316\u306b\u3064\u3044\u3066\u5168\u822c\u7684\u306a\u65b9\u5411\u6027\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>\u73fe\u5728\u306f\u30013\u672c\u306e\u7c73\u56fd\u672c\u90e8\u306e\u65b9\u304b\u3089\u516c\u958b\u3055\u308c\u3066\u308b\u8cc7\u6599\u3092\u7ffb\u8a33\u3057\u3066\u3001\u3046\u30612\u672c\u516c\u958b\u3057\u305f\u3002<\/li>\n<li>\u6b8b\u308a1\u672c\u304c\u3001\u4eca\u59cb\u307e\u3063\u305f\u3068\u3053\u308d\u3060\u304c\u8fd1\u3005\u306b\u4f1a\u54e1\u306e\u65b9\u306b\u516c\u958b\u3067\u304d\u308b\u3068\u601d\u3046\u3002<br \/>\nAI Residence\u306e\u95a2\u4e0e\u3059\u308b\u6cd5\u7684\u306a\u3068\u3053\u308d\u3068\u304b\u3082\u542b\u3081\u3066\u5bfe\u5fdc\u3057\u3066\u3044\u308b\u3002<br \/>\n\u201dPrinciples to Practice &#8211; Responsible AI in a Dynamic Regulatory Environment\u201d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u8f2a\u8b1b\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>V5\u306e\u7ffb\u8a33\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e748\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM V4 Implementation Guidance \u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002\u30da\u30f3\u30c7\u30a3\u30f3\u30b0\u4e2d\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V5\u306e\u7ffb\u8a33\u4e2d\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092\u300c\u30d5\u30ec\u30fc\u30ba\u300d\u306e\u7528\u8a9e\u767b\u9332done\u3002\u4f5c\u696d\u306f\u7d99\u7d9a\u4e2d\u3002<\/li>\n<li>\u751f\u6210AI\u306e\u6a5f\u68b0\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000V4\u3067\u4f5c\u6210\u3057\u3066\u3001\u305d\u306e\u5f8cV5\u306b\u53d6\u308a\u639b\u304b\u308b\u4e88\u5b9a\uff08\u7ffb\u8a33\u5f8c\uff09\u3002V4\u3068V5\u306e\u5dee\u5206\u6bd4\u8f03\u3092\u3057\u3066\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u306b\u3064\u3044\u3066\u3000V5\u30d9\u30fc\u30b9\u3067\u518a\u5b50\u3092\u4f5c\u308b\u3068\u3044\u3046\u3053\u3068\u3067\u691c\u8a0e\u4e2d\u3002\u7533\u3057\u8fbc\u307f\u6e08\u3002\u96fb\u5b50\u30c7\u30fc\u30bf\u3067\u306e\u63d0\u4f9b\u306e\u307f\u3092\u4e88\u5b9a\u3002<\/li>\n<li>\u8b1b\u6f14\u3002\u30de\u30a4\u30ca\u30d3\u7d42\u4e86(7\/24)\u3002\u8b1b\u6f14\u5185\u5bb9\u3092\u8a18\u4e8b\u5316\u3082\u5b8c\u4e86\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0\u4ee5\u4e0b\u306e\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u5171\u6709\u3068\u5206\u6790<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u672c\u90e8\u8cc7\u6599\u306e\u5171\u6709<\/li>\n<li>SaaS\u904b\u7528\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u2192CCM\/CAIQ\u306a\u3069\u3067AI\uff08SaaS\u306e\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bAI\uff09\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30fb\u78ba\u8a8d\u9805\u76ee\u306e\u5fc5\u8981\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u30ea\u30ea\u30fc\u30b9\u76ee\u6a1912\u6708\u3054\u308d\u3092\u4e88\u5b9a\u3002Summit \u3067\u767a\u8868\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u306f\u3001\u542b\u3081\u306a\u3044\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>AI in healthcare V2\u306e\u4f5c\u6210\u4e2d\u30029\u6708\u307e\u3067\u306b\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps(\u6280\u8853\u7de8) (\u524d\u7de8)\u300d 8\u6708\u516c\u958b\u6e08\u3002\u5f8c\u7de8\u306f9\u6708\u30a2\u30c3\u30d7\u4e88\u5b9a\u3002<\/li>\n<li>\u7b2c6\u56de \u95a2\u897f\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\uff08\u6280\u8853\u7de8\uff09\u300d\u30009\/24\u958b\u50ac<\/li>\n<li>OWASP\u95a2\u897f\u652f\u90e8\u30a4\u30d9\u30f3\u30c89\/21\u3002\u53c2\u52a0\u4e88\u5b9a\u3002<\/li>\n<li>ISACA\u6771\u4eac\u652f\u90e8\u3000\u52c9\u5f37\u4f1a\u8b1b\u5e2b\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\u300d\u30029\u670826\u65e5\u958b\u50ac\u4e88\u5b9a\u3002\u3053\u308c\u306b\u5408\u308f\u305b\u3066\u8cc7\u6599\u3092\u4f5c\u6210\u4e2d\u3002\u30ac\u30a4\u30c0\u30f3\u30b98\u7ae0\u300110\u7ae0\u3092PPT\u306b\u307e\u3068\u3081\u3066\u3044\u308b\u306e\u3067\u5171\u6709\u53ef\u80fd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\uff15\u793e\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>STAR Registry\u306e\u771f\u306e\u30de\u30eb\u30c1\u30ea\u30f3\u30ac\u30eb\u5316\u3092CSA\u672c\u90e8\u3068\u9032\u3081\u308b\u3002<\/li>\n<li>CSPM,CNAPP,CWPP\u306e\u89e3\u8aac\u30d6\u30ed\u30b0\u3092\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u81ea\u52d5\u5316\u306b\u3064\u3044\u3066\u5168\u822c\u7684\u306a\u65b9\u5411\u6027\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u3000\u306e\u7ffb\u8a33\u7248\u516c\u958b\u6e08\u3002<\/li>\n<li>AI Resilience: A Revolutionary Benchmarking Model for AI Safety\u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>Principles to Practice &#8211; Responsible AI in a Dynamic Regulatory Environment \u306e\u7ffb\u8a33\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u8f2a\u8b1b\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>V5\u306e\u7ffb\u8a33\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e747\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM V4 Implementation Guide \u306e\u7ffb\u8a33\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092DeepL\u306b\u7528\u8a9e\u767b\u9332\u3059\u308b\u65b9\u6cd5\u306e\u691c\u8a0e\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000V4\u3067\u4f5c\u6210\u3057\u3066\u3001\u305d\u306e\u5f8cV5\u306b\u53d6\u308a\u639b\u304b\u308b\u4e88\u5b9a\uff08\u7ffb\u8a33\u5f8c\uff09\u3002<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u306b\u3064\u3044\u3066\u3000V5\u30d9\u30fc\u30b9\u3067\u518a\u5b50\u3092\u4f5c\u308b\u3068\u3044\u3046\u3053\u3068\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u8b1b\u6f14\u3002\u30de\u30a4\u30ca\u30d3\u7d42\u4e86(7\/24)\u3002\u8b1b\u6f14\u5185\u5bb9\u3092\u8a18\u4e8b\u5316\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0\u4ee5\u4e0b\u306e\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u5171\u6709\u3068\u5206\u6790<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u672c\u90e8\u8cc7\u6599\u306e\u5171\u6709<\/li>\n<li>SaaS\u904b\u7528\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u2192CCM\/CAIQ\u306a\u3069\u3067AI\uff08SaaS\u306e\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bAI\uff09\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30fb\u78ba\u8a8d\u9805\u76ee\u306e\u5fc5\u8981\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u30025\u6708\u6d3b\u52d5\u958b\u59cb\u3002\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u306f12\u6708\u3054\u308d\u3092\u4e88\u5b9a\u3002Summit \u3067\u767a\u8868\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>AI in healthcare V2\u306e\u4f5c\u6210\u4e2d\u30029\u6708\u307e\u3067\u306b\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps(\u7d44\u7e54\u7de8) (\u5f8c\u7de8)\u300d 7\/16\u516c\u958b<\/li>\n<li>\u7b2c5\u56de \u95a2\u897f\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\uff08\u7d44\u7e54\u7de8\uff09\u300d\u30007\/24\u958b\u50ac<\/li>\n<li>OWASP\u95a2\u897f\u652f\u90e8\u30a4\u30d9\u30f3\u30c89\/21\u3002\u53c2\u52a0\u4e88\u5b9a\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps(\u6280\u8853\u7de8)\u300d8\u6708\u516c\u958b\u4e88\u5b9a<\/li>\n<li>9\/24\u3000\u6280\u8853\u7de8\u306e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u4e88\u5b9a<\/li>\n<li>ISACA\u6771\u4eac\u652f\u90e8\u3000\u52c9\u5f37\u4f1a\u8b1b\u5e2b\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps\u300d<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\uff15\u793e\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>STAR Registry\u306e\u771f\u306e\u30de\u30eb\u30c1\u30ea\u30f3\u30ac\u30eb\u5316\u3092CSA\u672c\u90e8\u3068\u9032\u3081\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u306e\u7ffb\u8a33\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u8f2a\u8b1b\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9WG\n<ul>\n<li>\u6d3b\u52d5\u518d\u958b\u3002\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e746\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM V4 Implementation Guide \u306e\u7ffb\u8a33\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092DeepL\u306b\u7528\u8a9e\u767b\u9332\u3059\u308b\u65b9\u6cd5\u306e\u691c\u8a0e\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u30de\u30fc\u30b8\u7248\u306e\u4f5c\u6210\u5b8c\u4e86\u3002\u73fe\u5728\u3001\u516c\u958b\u306b\u5411\u3051\u3066\u4f5c\u696d\u4e2d\u30025\u6708\u4e0a\u65ec\u306b\u5b8c\u6210\u76ee\u51e6\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u30c6\u30fc\u30de\u30cd\u30bf\n<ul>\n<li>SBOM\u306b\u30d5\u30a9\u30fc\u30ab\u30b9\u3057\u305f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u3092\u3069\u3046\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u306b\u7d44\u307f\u8fbc\u3093\u3067\u3044\u304f\u304b\u30fb\u3044\u3051\u308b\u304b<\/li>\n<li>(\u4eee\u306b\u30ac\u30a4\u30c0\u30f3\u30b95.0\u304c\u51fa\u308b\u3068\u3057\u305f\u3089)4.0\u3068\u306e\u6bd4\u8f03\u3092\u542b\u3081\u305f\u30ac\u30a4\u30c0\u30f3\u30b95.0\u306e\u89e3\u8aac<\/li>\n<\/ul>\n<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u3002\u7121\u6599\u914d\u5e03\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0\u4ee5\u4e0b\u306e\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u5b9f\u65bd\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u6700\u65b0\u8105\u5a01\u306e\u5171\u6709\u3068\u5206\u6790<\/li>\n<li>SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u672c\u90e8\u8cc7\u6599\u306e\u5171\u6709<\/li>\n<li>SaaS\u904b\u7528\u7ba1\u7406\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u2192CCM\/CAIQ\u306a\u3069\u3067AI\uff08SaaS\u306e\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bAI\uff09\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30fb\u78ba\u8a8d\u9805\u76ee\u306e\u5fc5\u8981\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u30025\u6708\u6d3b\u52d5\u958b\u59cb\u3002\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u306f12\u6708\u3054\u308d\u3092\u4e88\u5b9a\u3002Summit \u3067\u767a\u8868\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>AI in healthcare V2\u306e\u4f5c\u6210\u4e2d\u30029\u6708\u307e\u3067\u306b\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>2024\u5e746\u6708\u4ee5\u964d\u3001\u5e743\u56de\u30da\u30fc\u30b9\u3067\u3001CSA\u95a2\u897f\u30fbDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u958b\u50ac\u3059\u308b\u8a08\u753b\u3092\u7b56\u5b9a\u4e2d<\/li>\n<li>OWASP\u3068\u9023\u643a\u3092\u6a21\u7d22\u3002DevSecOps\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092\u30d9\u30fc\u30b9\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068DevSecOps(\u7d44\u7e54\u7de8) (\u524d\u7de8)\u300d6\/26\u516c\u958b<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u30007\/24\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\uff15\u793e\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>STAR Registry\u306e\u771f\u306e\u30de\u30eb\u30c1\u30ea\u30f3\u30ac\u30eb\u5316\u3092CSA\u672c\u90e8\u3068\u9032\u3081\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u306e\u7ffb\u8a33\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>\u8f2a\u8b1b\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e745\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>Defining Shadow Access: The Emerging IAM Security Challenge \u65e5\u672c\u8a9e\u7248\u516c\u958b\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092DeepL\u306b\u7528\u8a9e\u767b\u9332\u3059\u308b\u65b9\u6cd5\u306e\u691c\u8a0e\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u30de\u30fc\u30b8\u7248\u306e\u4f5c\u6210\u5b8c\u4e86\u3002\u73fe\u5728\u3001\u516c\u958b\u306b\u5411\u3051\u3066\u4f5c\u696d\u4e2d\u30025\u6708\u4e0a\u65ec\u306b\u5b8c\u6210\u76ee\u51e6\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u30c6\u30fc\u30de\u30cd\u30bf\n<ul>\n<li>SBOM\u306b\u30d5\u30a9\u30fc\u30ab\u30b9\u3057\u305f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u3092\u3069\u3046\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u306b\u7d44\u307f\u8fbc\u3093\u3067\u3044\u304f\u304b\u30fb\u3044\u3051\u308b\u304b<\/li>\n<li>(\u4eee\u306b\u30ac\u30a4\u30c0\u30f3\u30b95.0\u304c\u51fa\u308b\u3068\u3057\u305f\u3089)4.0\u3068\u306e\u6bd4\u8f03\u3092\u542b\u3081\u305f\u30ac\u30a4\u30c0\u30f3\u30b95.0\u306e\u89e3\u8aac<\/li>\n<\/ul>\n<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u3002\u7121\u6599\u914d\u5e03\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0SaaS\u95a2\u9023\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u30d6\u30ed\u30b0\u306e\u305f\u3081\u306b\u53d6\u308a\u307e\u3068\u3081\u3066\u4e2d\u3002\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u542b\u3080\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u2462\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u30025\u6708\u6d3b\u52d5\u958b\u59cb\u3002\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u306f12\u6708\u3054\u308d\u3092\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308bDevSecOps (\u5f8c\u7de8)\u300d5\u6708\u4e2d\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u30006\u6708\u306b\u30ea\u30a2\u30eb\u3067\u5b9f\u65bd\u4e88\u5b9a\u3002\u30c6\u30fc\u30de\u306fDevSecOps<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u00a02024\u5e746\u6708\u4ee5\u964d\u3001\u5e743\u56de\u30da\u30fc\u30b9\u3067\u3001CSA\u95a2\u897f\u30fbDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u958b\u50ac\u3059\u308b\u8a08\u753b\u3092\u7b56\u5b9a\u4e2d<\/li>\n<li>OWASP\u3068\u9023\u643a\u3092\u6a21\u7d22\u3002DevSecOps\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092\u30d9\u30fc\u30b9\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>5\u793e\u767b\u9332\u6e08\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCAKWG\uff1a\n<ul>\n<li>5\/16\u3000\u30ad\u30c3\u30af\u30aa\u30d5\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\u300227\u540d\u53c2\u52a0\u3001\u5272\u308a\u5f53\u3066\u306e\u78ba\u5b9a\u7b49\u3092\u5b9f\u65bd\u3002\u3053\u308c\u304b\u3089\u9694\u9031\u3067\u8f2a\u8b1b\u3092\u9032\u3081\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e744\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30fb\u4fdd\u8b77\u30b5\u30fc\u30d5\u30a7\u30b9\u306e\u5b9a\u7fa9\u300d\u306e\u7ffb\u8a33 4\/14\u30ea\u30ea\u30fc\u30b9<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>Defining Shadow Access: The Emerging IAM Security Challenge \u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002\u307e\u3082\u306a\u304f\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>ISC2\u306e\u7528\u8a9e\u96c6\u3092DeepL\u306b\u7528\u8a9e\u767b\u9332\u3059\u308b\u65b9\u6cd5\u306e\u691c\u8a0e\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u30de\u30fc\u30b8\u7248\u306e\u4f5c\u6210\u5b8c\u4e86\u3002\u73fe\u5728\u3001\u516c\u958b\u306b\u5411\u3051\u3066\u4f5c\u696d\u4e2d\u30025\u6708\u4e0a\u65ec\u306b\u5b8c\u6210\u76ee\u51e6\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u30c6\u30fc\u30de\u30cd\u30bf\n<ul>\n<li>SBOM\u306b\u30d5\u30a9\u30fc\u30ab\u30b9\u3057\u305f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u3092\u3069\u3046\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u306b\u7d44\u307f\u8fbc\u3093\u3067\u3044\u304f\u304b\u30fb\u3044\u3051\u308b\u304b<\/li>\n<li>(\u4eee\u306b\u30ac\u30a4\u30c0\u30f3\u30b95.0\u304c\u51fa\u308b\u3068\u3057\u305f\u3089)4.0\u3068\u306e\u6bd4\u8f03\u3092\u542b\u3081\u305f\u30ac\u30a4\u30c0\u30f3\u30b95.0\u306e\u89e3\u8aac<\/li>\n<\/ul>\n<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u3002\u7121\u6599\u914d\u5e03\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG\n<ul>\n<li>\u00a0SaaS\u95a2\u9023\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u30d6\u30ed\u30b0\u306e\u305f\u3081\u306b\u53d6\u308a\u307e\u3068\u3081\u3066\u4e2d\u3002\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u542b\u3080\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u2462\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u30025\u6708\u6d3b\u52d5\u958b\u59cb\u3002\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u306f12\u6708\u3054\u308d\u3092\u4e88\u5b9a\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\uff08\u5f8c\u7de8\uff09\u3000\u516c\u958b\u6e08<\/li>\n<li>2024\u5e744\u67081\u9031\u958b\u50ac\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\n<ul>\n<li>\u30de\u30af\u30cb\u30ab\u69d8\u3068HSM\uff08\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\uff0f\uff06\u30af\u30e9\u30a6\u30c9\uff09\u95a2\u9023\u8b1b\u6f14<\/li>\n<\/ul>\n<\/li>\n<li>\u30d5\u30a1\u30fc\u30deIT&amp;\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9 \u30a8\u30ad\u30b9\u30dd 2024<br \/>\n\uff08CSA\u30b8\u30e3\u30d1\u30f3\u5f8c\u63f4\u30a4\u30d9\u30f3\u30c8\uff09<br \/>\n\u958b\u50ac\u65e5\uff1a2024\u5e744\u670817\u65e5-19\u65e5<br \/>\n\u51fa\u5c55\u30d6\u30fc\u30b9\uff08\u4e88\u5b9a\uff09\uff1a48-27<br \/>\n\u5c55\u793a\u5185\u5bb9\uff1a<br \/>\nCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306e\u8b1b\u6f14\u8cc7\u6599\u7b49\u3092\u30b5\u30de\u30ea\u30fc\u5316\u3057\u3066\u3001\u30a4\u30d9\u30f3\u30c8\u53c2\u52a0\u8005\u306b\u914d\u5e03\u3059\u308b<br \/>\n\uff09<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u00a02024\u5e746\u6708\u4ee5\u964d\u3001\u5e743\u56de\u30da\u30fc\u30b9\u3067\u3001CSA\u95a2\u897f\u30fbDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u958b\u50ac\u3059\u308b\u8a08\u753b\u3092\u7b56\u5b9a\u4e2d<\/li>\n<li>OWASP\u3068\u9023\u643a\u3092\u6a21\u7d22\u3002DevSecOps\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092\u30d9\u30fc\u30b9\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Servicenow\u69d8\u304c\u65e5\u672c\u8a9eCAIQ\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u3092STAR Registry\u306b\u767b\u9332\u30024\u793e\u76ee\u3002<\/li>\n<li>\u3042\u3068\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e743\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u3053\u3068\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>\u300cBeyond Passwords: The Role of Passkeys in Modern Web Security\u300d\u306e\u7ffb\u8a33\u3001\u516c\u958b\u6e08\u307f\u3002<\/li>\n<li>Defining Shadow Access: The Emerging IAM Security Challenge \u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u30de\u30fc\u30b8\u7248\u306e\u4f5c\u6210\u5b8c\u4e86\u3002\u73fe\u5728\u3001\u516c\u958b\u306b\u5411\u3051\u3066\u4f5c\u696d\u4e2d\u30024\u6708\u4e0a\u65ec\u306b\u5b8c\u6210\u76ee\u51e6\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u30c6\u30fc\u30de\u30cd\u30bf\n<ul>\n<li>SBOM\u306b\u30d5\u30a9\u30fc\u30ab\u30b9\u3057\u305f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528<\/li>\n<li>\u751f\u6210AI\uff08Copilot\u3068\u304b\uff09\u3092\u3069\u3046\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\uff08\u30ec\u30b9\u30dd\u30f3\u30b9\u7b49\uff09\u306b\u7d44\u307f\u8fbc\u3093\u3067\u3044\u304f\u304b\u30fb\u3044\u3051\u308b\u304b<\/li>\n<li>(\u4eee\u306b\u30ac\u30a4\u30c0\u30f3\u30b95.0\u304c\u51fa\u308b\u3068\u3057\u305f\u3089)4.0\u3068\u306e\u6bd4\u8f03\u3092\u542b\u3081\u305f\u30ac\u30a4\u30c0\u30f3\u30b95.0\u306e\u89e3\u8aac<\/li>\n<\/ul>\n<\/li>\n<li>\u6280\u8853\u66f8\u5178\u3067\u306e\u51fa\u5c55\u3002\u7121\u6599\u914d\u5e03\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS\u95a2\u9023\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u30d6\u30ed\u30b0\u306e\u305f\u3081\u306b\u53d6\u308a\u307e\u3068\u3081\u3066\u304a\u308a\u30012\u6708\u306bWG\u3067\u5171\u6709\u30fb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u4e88\u5b9a<\/li>\n<li>\u00a0\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002\u6765\u5e745\u6708\u4ee5\u964d\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>2024\u5e743\u6708\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\uff08\u5f8c\u7de8\uff09\u3000\u516c\u958b\u6e08<\/li>\n<li>2024\u5e744\u67081\u9031\u958b\u50ac\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\n<ul>\n<li>\u30de\u30af\u30cb\u30ab\u69d8\u3068HSM\uff08\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\uff0f\uff06\u30af\u30e9\u30a6\u30c9\uff09\u95a2\u9023\u8b1b\u6f14\u3067\u8abf\u6574\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u30d5\u30a1\u30fc\u30deIT&amp;\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9 \u30a8\u30ad\u30b9\u30dd 2024<br \/>\n\uff08CSA\u30b8\u30e3\u30d1\u30f3\u5f8c\u63f4\u30a4\u30d9\u30f3\u30c8\uff09<br \/>\n\u958b\u50ac\u65e5\uff08\u4e88\u5b9a\uff09\uff1a2024\u5e744\u670817\u65e5-19\u65e5<br \/>\n\u51fa\u5c55\u30d6\u30fc\u30b9\uff08\u4e88\u5b9a\uff09\uff1a48-27<br \/>\n\u5c55\u793a\u5185\u5bb9\uff1a<br \/>\n\uff08\u6848\uff09CSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306e\u8b1b\u6f14\u8cc7\u6599\u7b49\u3092\u30b5\u30de\u30ea\u30fc\u5316\u3057\u3066\u3001\u30a4\u30d9\u30f3\u30c8\u53c2\u52a0\u8005\u306b\u914d\u5e03\u3059\u308b<br \/>\n\uff09<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u00a02024\u5e746\u6708\u4ee5\u964d\u3001\u5e743\u56de\u30da\u30fc\u30b9\u3067\u3001CSA\u95a2\u897f\u30fbDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u958b\u50ac\u3059\u308b\u8a08\u753b\u3092\u7b56\u5b9a\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Kii\u682a\u5f0f\u4f1a\u793e\u69d8\u304c\u65e5\u672c\u8a9eCAIQ\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u3092STAR Registry\u306b\u767b\u9332\u30024\u793e\u76ee\u3002<\/li>\n<li>\u3042\u3068\u3001Servicenow\u3001Fileforce\u3001Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>AI Organization Responsibilities &#8211; Core Security Responsibilities\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e742\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\uf0d8 \u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3092CCM\u304b\u3089\u7a81\u3063\u8fbc\u3080\u300228\u65e5\u306b\u6301\u3061\u5bc4\u3063\u3066\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>\u300cBeyond Passwords: The Role of Passkeys in Modern Web Security\u300d\u306e\u7ffb\u8a33\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u9806\u8abf\u306b\u5bfe\u5fdc\u4e2d<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306f\u65b0\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\u3067\u4f5c\u6210\u3059\u308b\u305f\u3081\u3001\u4e26\u884c\u3057\u3066\u3059\u3059\u3081\u308b\u3002<\/li>\n<li>Well-Arch \u306e\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\u3002\u8981\u691c\u8a0e\u3002<\/li>\n<li>\u6280\u8853\u66f8\u5178\uff1a\u3000\u500b\u4eba\u3067\u51fa\u7248\u3057\u305f\u3082\u306e\u3092\u6301\u3061\u8fbc\u3080\u3068\u3044\u3046\u6848\u3002\u3084\u308b\u304b\u3069\u3046\u304b\u306f\u672a\u5b9a\u3002<\/li>\n<li>\u30bb\u30df\u30ca\u30fc\uff1a\u3000OSINT\u5468\u308a\u3002\u8981\u691c\u8a0e\u3002<\/li>\n<li>ZDnet\u3000\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9\u57fa\u8abf\u8b1b\u6f14\u30023\u6708\u4e2d\u65ec\u306b\u30aa\u30f3\u30e9\u30a4\u30f3\u914d\u4fe1\u4e88\u5b9a\u3002CSA\u3001\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u30ad\u30e3\u30c3\u30d7\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS\u95a2\u9023\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u30d6\u30ed\u30b0\u306e\u305f\u3081\u306b\u53d6\u308a\u307e\u3068\u3081\u3066\u304a\u308a\u30012\u6708\u306bWG\u3067\u5171\u6709\u30fb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u4e88\u5b9a<\/li>\n<li>\u00a0\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002\u6765\u5e745\u6708\u4ee5\u964d\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>2024\u5e742\u670813\u65e5\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\uff08\u524d\u7de8\uff09<br \/>\nhttps:\/\/cloudsecurityalliance.jp\/newblog\/2024\/02\/13\/hms\/<\/li>\n<li>2024\u5e743\u6708\u4e88\u5b9a\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\uff08\u5f8c\u7de8\uff09<\/li>\n<li>2024\u5e743\u6708 or 4\u67081\u9031\u4e88\u5b9a\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n*\u30bf\u30ec\u30b9\u69d8\u3068HSM\uff08\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\uff0f\uff06\u30af\u30e9\u30a6\u30c9\uff09\u95a2\u9023\u8b1b\u6f14\u3067\u8abf\u6574\u4e2d<\/li>\n<li>2024\u5e743\u6708\u4e88\u5b9a\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308bDevSecOps\u300d\uff08\u524d\u7de8\uff09<\/li>\n<li>\u30d5\u30a1\u30fc\u30deIT&amp;\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9 \u30a8\u30ad\u30b9\u30dd 2024<br \/>\n\uff08CSA\u30b8\u30e3\u30d1\u30f3\u5f8c\u63f4\u30a4\u30d9\u30f3\u30c8\uff09<br \/>\n\u958b\u50ac\u65e5\uff08\u4e88\u5b9a\uff09\uff1a2024\u5e744\u670817\u65e5-19\u65e5<br \/>\n\u51fa\u5c55\u30d6\u30fc\u30b9\uff08\u4e88\u5b9a\uff09\uff1a48-27<br \/>\n\u5c55\u793a\u5185\u5bb9\uff1a<br \/>\n\uff08\u6848\uff09CSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306e\u8b1b\u6f14\u8cc7\u6599\u7b49\u3092\u30b5\u30de\u30ea\u30fc\u5316\u3057\u3066\u3001\u30a4\u30d9\u30f3\u30c8\u53c2\u52a0\u8005\u306b\u914d\u5e03\u3059\u308b<br \/>\n\uff09<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u00a02024\u5e746\u6708\u4ee5\u964d\u3001\u5e743\u56de\u30da\u30fc\u30b9\u3067\u3001CSA\u95a2\u897f\u30fbDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u958b\u50ac\u3059\u308b\u8a08\u753b\u3092\u7b56\u5b9a\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>Servicenow\u3001Fileforce\u3002Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>Security Implications of ChatGPT\u3000\u7ffb\u8a33\u7248\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2024\u5e741\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0&#8220;STAR Attestation Value Proposition&#8221;\u306e\u7ffb\u8a33\u7248\u516c\u958b\u3002\uff0812\/24\uff09\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u524d\u56de\u691c\u8a0e\u3057\u3066\u3044\u307e\u3057\u305f\u6559\u80b2\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306b\u304a\u3051\u308b\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u3092\u65ad\u5ff5\u3057\u3001\u6539\u3081\u3066\u306e\u30c6\u30fc\u30de\u306e\u6d17\u3044\u51fa\u3057\u3092\u958b\u59cb\u3002<\/li>\n<li>\u6b21\u56de\uff081\/25\u306e18\u6642\uff09\u306eWG\u3067\u30c6\u30fc\u30de\u3092\u6301\u3061\u5bc4\u308a\u8b70\u8ad6\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>WG\u30bb\u30df\u30ca\u30fc\u300cDevSecOps\u306eFundamentals\u3068CSA\u306b\u3088\u308b\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306e\u89e3\u8aac\u3067\u8ab2\u984c\u89e3\u6c7a\u300d\u958b\u50ac(1\/25)\u3002<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\u3068\u3044\u3046\u540d\u79f0\u306b\u3064\u3044\u3066\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS\u95a2\u9023\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u30d6\u30ed\u30b0\u306e\u305f\u3081\u306b\u53d6\u308a\u307e\u3068\u3081\u3066\u304a\u308a\u30012\u6708\u306bWG\u3067\u5171\u6709\u30fb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u4e88\u5b9a<\/li>\n<li>\u00a0\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002\u6765\u5e745\u6708\u4ee5\u964d\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>2024\u5e741\u670810\u65e5\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)(\u5f8c\u7de8)\u300d\u516c\u958b<br \/>\nhttps:\/\/cloudsecurityalliance.jp\/newblog\/2024\/01\/10\/dlp_in_healthcare_2\/<\/li>\n<li>2024\u5e741\u670823\u65e5\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)\u300d\u958b\u50ac<br \/>\nhttps:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=31134<\/li>\n<li>2024\u5e742\u6708\u4e88\u5b9a\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/li>\n<li>2024\u5e743\u6708\u4e88\u5b9a\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/li>\n<li>\u30d5\u30a1\u30fc\u30deIT&amp;\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9 \u30a8\u30ad\u30b9\u30dd 2024<br \/>\n\uff08CSA\u30b8\u30e3\u30d1\u30f3\u5f8c\u63f4\u30a4\u30d9\u30f3\u30c8\uff09<br \/>\n\u958b\u50ac\u65e5\uff08\u4e88\u5b9a\uff09\uff1a2024\u5e744\u670817\u65e5-19\u65e5<br \/>\n\u51fa\u5c55\u30d6\u30fc\u30b9\uff08\u4e88\u5b9a\uff09\uff1a48-27<br \/>\n\u5c55\u793a\u5185\u5bb9\uff1a<br \/>\n\uff08\u6848\uff09CSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306e\u8b1b\u6f14\u8cc7\u6599\u7b49\u3092\u30b5\u30de\u30ea\u30fc\u5316\u3057\u3066\u3001\u30a4\u30d9\u30f3\u30c8\u53c2\u52a0\u8005\u306b\u914d\u5e03\u3059\u308b<br \/>\n\uff09<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>2024\u5e741\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>Servicenow\u3001Fileforce\u3002Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002DataDog\u306f\u516c\u958b\u3057\u306a\u3044\u3053\u3068\u3068\u306a\u3063\u305f\uff08\u7ffb\u8a33\u4f5c\u696d\u306b\u898b\u5408\u3046\u3060\u3051\u306e\u52b9\u679c\u304c\u898b\u8fbc\u3081\u306a\u3044\u3068\u306e\u3053\u3068\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u65e5\u672c\u8a9eCAIQ\u306e\u5229\u7528\u65b9\u6cd5\u306b\u3064\u3044\u3066WG\u30bb\u30df\u30ca\u30fc\u306e\u958b\u50ac\u4e88\u5b9a(2\/13)\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>Security Implications of ChatGPT\u3000\u7ffb\u8a33\u7248\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e7412\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0&#8220;STAR Attestation Value Proposition&#8221;\u306e\u7ffb\u8a33\u7248\u516c\u958b\u3002\uff0812\/24\uff09\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u7dcf\u52d9\u7701\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u5411\u3051\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u624b\u6cd5\u3092\u6d3b\u7528\u3057\u3066\u884c\u3046\u3053\u3068\u306b\u5bfe\u3057\u3066CSA Japan\u3068\u3057\u3066\u767a\u884c\u3059\u308b\u3053\u3068\u3078\u306e\u7570\u8b70\u610f\u898b\u304c\u51fa\u3055\u308c\u3001\uff11\u6708\uff19\u65e5\u306e\u904b\u55b6\u59d4\u54e1\u4f1a\u3067\u5be9\u8b70\u3092\u56f3\u308b\u3053\u3068\u306b\u306a\u3063\u305f\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u00a0Top-Threats-to-Cloud-Computing-Pandemic 11-Deep-Dive\u306e\u30ec\u30d3\u30e5\u30fc\u7528\u548c\u8a33\u7248\uff08\u6a5f\u68b0\u7ffb\u8a33\uff06\u30dd\u30b9\u30c8\u30a8\u30c7\u30a3\u30c3\u30c8\uff09\u3092\u4f5c\u6210\u4e2d\u3002<br \/>\n\u30ec\u30d3\u30e5\u30fc\u306b\u53c2\u52a0\u3044\u305f\u3060\u3051\u308b\u65b9\u306f\u3001\u6570\u540d\u7acb\u5019\u88dc\u9802\u3044\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u3000\u9806\u8abf\u306b\u5bfe\u5fdc\u4e2d<\/li>\n<li>CSA-JC\u306e16*9\u306ePPTX\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u300012\/17 \u91dc\u5c71\u306b\u3066\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u3002\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306f\u65b0\u30d5\u30a9\u30fc\u30de\u30c3\u30c8\u3067\u4f5c\u6210\u3059\u308b\u305f\u3081\u3001\u4e26\u884c\u3057\u3066\u3059\u3059\u3081\u308b\u3002<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\u3068\u3044\u3046\u540d\u79f0\u306b\u3064\u3044\u3066\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002\u6765\u5e745\u6708\u4ee5\u964d\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u6539\u6b63\u306e\u30d1\u30d6\u30b3\u30e1\u7d42\u4e86\u30024\uff5e5\u6708\u306b\u6700\u7d42\u6539\u6b63\u6848\u304c\u51fa\u308b\u306e\u3067\u306f\uff1f\u3053\u308c\u3092\u53cd\u6620\u3055\u305b\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>2023\u5e7412\u670817\u65e5\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)(\u524d\u7de8)\u300d\u516c\u958b<\/li>\n<li>2024\u5e741\u6708\u4e0a\u65ec\uff1a\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)(\u5f8c\u7de8)\u300d\u516c\u958b\u4e88\u5b9a<\/li>\n<li>2024\u5e741\u670823\u65e5\uff1a\u7b2c15\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)\u300d\u958b\u50ac\u4e88\u5b9a<\/li>\n<li>CSA Health Information Management WG: 2023\u5e7412\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<br \/>\n\u6b21\u56de\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u30002024\u5e742\u67081\u65e5 04:30am-05:30am \u4e88\u5b9a\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>2023\u5e7412\u67085\u65e5\u300c\u5b89\u5168\u306a\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u8a2d\u8a08\u3059\u308b\u306b\u306f\u300d\u516c\u958b<\/li>\n<li>CSA DevSecOps WG:<br \/>\n2023\u5e7412\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<br \/>\n\uff0aZero Trust WG\u3001AI WG\u3068\u306e\u9023\u643a\u306f\u9032\u884c\u4e2d<\/li>\n<li>CSA Serverless WG:<br \/>\n2023\u5e7412\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<br \/>\n2024\u5e74\u7b2c1\u56db\u534a\u671f\u3088\u308a\u65b0Co-Chair\u306e\u3082\u3068\u3067\u6d3b\u52d5\u518d\u958b\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1<br \/>\nSalesForce\u304c\u65e5\u672c\u8a9eCAIQ\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\u3057\u305f\u304c\u3001\u516c\u958b\u306e\u4ed5\u65b9\u306b\u3064\u3044\u3066\u5bfe\u5fdc\u4e2d\u3002<br \/>\n\u3042\u3068\u3001Servicenow\u3001Fileforce\u3002Fortinet\u306f\u72b6\u6cc1\u5f85\u3061\u3002<\/li>\n<li>\u65e5\u672c\u8a9eCAIQ\u306e\u5229\u7528\u65b9\u6cd5\u306b\u3064\u3044\u3066WG\u30bb\u30df\u30ca\u30fc\u306e\u958b\u50ac\u3092\u8a08\u753b\u4e2d\u30022\u6708\u306b\u306a\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>Security Implications of ChatGPT\u3000\u7ffb\u8a33\u7248\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>WG\u30bb\u30df\u30ca\u30fc\u300cMicrosoft Security Copilot\u306e\u8aac\u660e\uff08\u4eee\u984c\uff09\u300d\u309212\/19\uff08\u706b\uff09\u5b9f\u65bd\u6e08\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e7411\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM V4.0.10\u304a\u3088\u3073Implementation Guidelines\/Auditing Guidelinaces\u306e\u65e5\u672c\u8a9e\u7248\u516c\u958b\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>\u6751\u5c71\u5148\u751f\u306e\u30bb\u30df\u30ca\u30fc\u309211\u670817\u65e5\uff08\u91d1\uff0918:30\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The Six Pillars of DevSecOps Achieving Reflexive Security Through\u306e\u7ffb\u8a33\u516c\u958b\u3002<\/li>\n<li>Top Threats to Cloud Computing: Pandemic 11 Deep Dive\u306e\u7ffb\u8a33\u3092\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u3002\u65e9\u6025\u306b\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u5b9a\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u30022\u6708\uff5e3\u6708\u304f\u3089\u3044\u306b\u5b8c\u6210\u4e88\u5b9a\u3002<\/li>\n<li>\u4ee5\u4e0b\u691c\u8a0e\u4e2d\n<ul>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3002<\/li>\n<li>GDPR\u306e\u7f70\u91d1\u3082Appendix\u3068\u3057\u3066\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>2023\u5e7411\u67087\u65e5\u3000\u30d6\u30ed\u30b0\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM\uff08\u5f8c\u7de8\uff09\u300d\u516c\u958b<\/li>\n<li>2023\u5e7411\u670814\u65e5 CSA\u95a2\u897f\u652f\u90e8\u5171\u50ac\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM\u300d\u958b\u50ac<\/li>\n<li>\u4eca\u5f8c\u306e\u30ec\u30dd\u30fc\u30c8\u767a\u884c\u8a08\u753b\n<ul>\n<li>GRC in Healthcare v2 &#8211; 2024\/Q1 \u516c\u958b\u76ee\u6a19<\/li>\n<li>AI in Healthcare v2 &#8211; 2024\/Q2 \u516c\u958b\u76ee\u6a19<\/li>\n<li>Leveraging the data from IoT Wearables &#8211; 2024\/Q3 \u516c\u958b\u76ee\u6a19<\/li>\n<li>Healthcare Top Threats Report 2024 -2024\u5e74\u4e2d\u516c\u958b\u76ee\u6a19<\/li>\n<\/ul>\n<\/li>\n<li>2023\u5e7412\u6708\u4e0a\u65ec\u3000\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)\u300d(\u524d\u7de8)\u3000\u516c\u958b\u4e88\u5b9a<\/li>\n<li>2024\u5e741\u6708\u4e0a\u65ec\u3000\u30d6\u30ed\u30b0\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)\u300d(\u5f8c\u7de8)\u3000\u516c\u958b\u4e88\u5b9a<\/li>\n<li>2024\u5e741\u670823\u65e5\u3000CSA\u95a2\u897f\u652f\u90e8\u5171\u50ac\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u640d\u5931\u9632\u6b62(DLP)\u300d\u958b\u50ac\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>DevSecOps &#8211; Pillar 6 &#8211; Measure, Monitor, Report &amp; Action\u30002023\u5e7411\u67086\u65e5 \u516c\u958b\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u671f\u9593\u7d42\u4e86 &#8211;&gt; \u6700\u7d42\u7248\u4f5c\u6210\u30fb2024\u5e741\u6708\u516c\u958b\u4e88\u5b9a<\/li>\n<li>Practical Guidance for Implementing Privacy by Design and Default\u3000\u30c9\u30e9\u30d5\u30c8\u7248\u4f5c\u6210\u4e2d<\/li>\n<li>\u4eca\u5f8c\u306e\u4f5c\u6210\u4e88\u5b9a\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\uff1aDevSecOps and AI\n<ul>\n<li>AI\u3067\u30b3\u30fc\u30c7\u30a3\u30f3\u30b0\u3092\u52a0\u901f\u3067\u304d\u308b\u304b<\/li>\n<li>AI\u3092\u6d3b\u7528\u3057\u305f\u8106\u5f31\u6027\u4f4e\u6e1b\u7b56<\/li>\n<li>CSA Zero Trust WG\u3068\u306e\u30cf\u30fc\u30e2\u30ca\u30a4\u30bc\u30fc\u30b7\u30e7\u30f3\u6d3b\u52d5<\/li>\n<li>DevSecOps and AI\/ZT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>SalesForce\u3001Servicenow\u3001Fileforce\u306f\u72b6\u6cc1\u5f85\u3061\u3002\u65b0\u305f\u306bFortinet\u306b\u4f9d\u983c\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>Security Implications of ChatGPT\u3000\u7ffb\u8a33\u7248\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>WG\u30bb\u30df\u30ca\u30fc\u300cMicrosoft Security Copilot\u306e\u8aac\u660e\uff08\u4eee\u984c\uff09\u300d\u309212\/19\uff08\u706b\uff09\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e7410\u6708<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCMLite V4.0.9\u304a\u3088\u3073CAIQLiteV4.0.3 \u516c\u958b<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u8fd1\u65e5\u516c\u958b\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u7528\u8a9e\u5b9a\u7fa9\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002CCM\u5185\u3067\u4f7f\u7528\u3057\u3066\u3044\u308b\u7528\u8a9e\u306b\u3064\u3044\u3066\u78ba\u5b9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\uff1a\n<ul>\n<li>13\u65e5\u306b\u7b2c1\u56de\u3092\u30ad\u30c3\u30af\u30aa\u30d5\u3002\u30a2\u30c9\u30d0\u30a4\u30b6\u30fc\u3068\u3057\u3066\u4f50\u3005\u6728\u5148\u751f\u3001\u4eca\u91ce\u3055\u3093\u7b49\u3092\u30ce\u30df\u30cd\u30fc\u30c8\u3002<\/li>\n<li>\u6559\u80b2\u59d4\u54e1\u4f1a\u306b\u304a\u3051\u308b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306b\u3064\u3044\u3066\u6b21\u56de\u8b70\u8ad6\u3059\u308b\u3002<\/li>\n<li>\u6751\u5c71\u5148\u751f\u306e\u30bb\u30df\u30ca\u30fc\u309211\u670817\u65e5\uff08\u91d1\uff0918:30\u3067\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The Six Pillars of DevSecOps Achieving Reflexive Security Through\u306e\u7ffb\u8a33\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u7d42\u4e86\u3002<\/li>\n<li>\u73fe\u5728\u3001\u4f5c\u696d\u4f11\u6b62\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u4e2d\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3001GDPR\u306e\u7f70\u91d1\u4e8b\u4f8b\u306a\u3069\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d \uff1d\uff1eCongress\u5185\u5bb9\u306b\u542b\u3081\u308b\u3002<br \/>\n\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\uff1b\u3000\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM\u306e\u524d\u7de810\u6708\u672b\u306b\u4e88\u5b9a\u300211\u6708\u306b\u5f8c\u7de8\u4e88\u5b9a\u3002<\/li>\n<li>DLP for Healthcare\u3002\u533b\u7642\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u3002\u6539\u8a02\u7248\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u3002<\/li>\n<li>\u6b21\u56de\u52c9\u5f37\u4f1a\uff1a\u300011\/14\u4e88\u5b9a\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM<\/li>\n<li>12\u6708\u533b\u7642\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u306e\u30d6\u30ed\u30b0\u3092\u4f5c\u6210\u4e88\u5b9a\u30021\u6708\u306b\u52c9\u5f37\u4f1a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001Workshop\u306e\u30d1\u30cd\u30eb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3067\u5b9f\u65bd\u6e08\u3002<\/li>\n<li>\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u5b8c\u6210\u3002HOw to design serverless architecture\u304c\u30ea\u30ea\u30fc\u30b9\u3002\u8981\u7ffb\u8a33\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u3092\u7ffb\u8a33WG\u3068\u8981\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\u30bf\u30ec\u30b9\u767b\u9332\u3002<\/li>\n<li>\u3042\u3068\u3001SalesForce\u3001Servicenow\u3001Fileforce\u306f\u72b6\u6cc1\u5f85\u3061\u3002\u65b0\u305f\u306bFortinet\u306b\u4f9d\u983c\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>AIWG\uff1a\n<ul>\n<li>Security Implications of ChatGPT\u3000\u7ffb\u8a33\u7248\u306e\u30b9\u30bf\u30c7\u30a3\u3092\u958b\u59cb\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e749\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>\uf0d8 CCM V4\u304a\u3088\u3073CCM Lite V4\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u3002\u7ffb\u8a33\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\u3092\u958b\u59cb\u3057\u3001SDPWG\u306f\u7d42\u4e86\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>DevSecOps\u306e2\u500b\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u7ffb\u8a33\u3092\u4ed5\u639b\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC Ver1.2\u5206\u62c5\u306f\u5b8c\u4e86\u3002\u5404\u81ea\u57f7\u7b46\u958b\u59cb\u3002<\/li>\n<li>Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3001GDPR\u306e\u7f70\u91d1\u4e8b\u4f8b\u306a\u3069\u306b\u3064\u3044\u3066\u691c\u8a0e\u4e2d \uff1d\uff1eCongress\u5185\u5bb9\u306b\u542b\u3081\u308b\u3002<br \/>\n\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u52c9\u5f37\u4f1a\uff1a9\/19\u5b9f\u65bd\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\uff1b\u30009\u6708\u306b\u5f8c\u7de8\u3092\u51fa\u3057\u305f\u3002<\/li>\n<li>DLP for Healthcare\u3002\u533b\u7642\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u3002<\/li>\n<li>\u6b21\u56de\u52c9\u5f37\u4f1a\uff1a\u300011\/14\u4e88\u5b9a\u3002\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM<\/li>\n<li>\u6b21\u56de\u30d6\u30ed\u30b0\uff1a\u300010\u6708\u306b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u3068SBOM\u306e\u524d\u7de8\u3092\u4e88\u5b9a\u3002<br \/>\n\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u516c\u958b\u6e08\u3002<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u79cb\u3092\u3081\u3069\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u7248\u4f5c\u6210\u4e2d\u3002\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u304c\u8ffd\u52a0\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u300cThe Six Pillars of DevSecOps\u300d\u30b7\u30ea\u30fc\u30ba\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\n<ul>\n<li>DevSecOps &#8211; Pillar 2 &#8211; Collaboration and Integration(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<li>DevSecOps &#8211; Pillar 6 &#8211; Measure, Monitor, Report &amp; Action(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1\n<ul>\n<li>\u30bf\u30ec\u30b9\u767b\u9332\u3002<\/li>\n<li>\u3042\u3068\u3001SalesForce\u3001Servicenow\u3001Fileforce\u306f\u72b6\u6cc1\u5f85\u3061\u3002\u65b0\u305f\u306bFortinet\u306b\u4f9d\u983c\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30d6\u30ed\u30b0\u300cSaaS\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u8ca0\u8377\u3092\u8efd\u6e1b\u3055\u305b\u308b\u65b9\u6cd5\u3068\u306f\u300d\u3000\u516c\u958b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e748\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>\u4eca\u5f8c\u3001CCM Lite V4\u306e\u30ea\u30ea\u30fc\u30b9\u306b\u5408\u308f\u305b\u3066\u7ffb\u8a33\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6b21\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>DevSecOps\u306e2\u500b\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u7ffb\u8a33\u3092\u4ed5\u639b\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u4eca\u5f8c\u306e\u65b9\u5411\u6027\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3057\u3001\u4ee5\u4e0b\u306e\u9805\u76ee\u3092\u4e26\u884c\u3057\u3066\u9032\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002\u7279\u306b\u4e09\u756a\u76ee\u304c\u30e1\u30a4\u30f3\u3068\u306a\u308a\u305d\u3046\u3067\u3001SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306a\u3069\u3092\u6df1\u5800\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6587\u8108\u304b\u3089\u3084\u30c7\u30d0\u30a4\u30b9\u3001SaaS\u9593\u9023\u643a\u306a\u3069\u306e\u69cb\u6210\u8981\u7d20\u3092\u6574\u7406\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<li>\u4ee5\u4e0b\u306e\u5185\u5bb9\u3092\u7e8f\u3081\u3066\u30d6\u30ed\u30b0\u3001\u52c9\u5f37\u4f1a\u3067\u306e\u767a\u8868\u3092\u884c\u3046\u305f\u3081\u3001\u60c5\u5831\u53ce\u96c6\u3092\u5b9f\u65bd\u4e2d\u3067\u3059\u3002\n<ul>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>SaaS\u3092\u72d9\u3063\u305f\u3001SaaS\u7d4c\u7531\u3067\u767a\u751f\u3057\u305f\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u8abf\u67fb\u3001MITRE ATT&amp;CK\u3068\u306e\u7d44\u307f\u5408\u308f\u305b\u306b\u3088\u308b\u653b\u6483\u89e3\u8aac\u305d\u308c\u306b\u5411\u3051\u305f\u5bfe\u7b56\u306a\u3069\u3092\u653b\u6483\u7d4c\u8def\u3054\u3068\u306b\u7e8f\u3081\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\uf0d8 CoC Ver1.2\u57f7\u7b46\u5206\u62c5\u6c7a\u5b9a\u3002\u3053\u308c\u304b\u3089\u3001\u5185\u5bb9\u3092\u8a70\u3081\u3066\u3044\u304f\u3002Appendix\u3068\u3057\u3066\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u3001GDPR\u306e\u7f70\u91d1\u4e8b\u4f8b\u306a\u3069\u3092\u5165\u308c\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u52c9\u5f37\u4f1a\uff1a9\/19\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\uff1b\u30009\u6708\u306b\u5f8c\u7de8\u3092\u51fa\u3059\u4e88\u5b9a\u3002<\/li>\n<li>DLP for Healthcare\u3002\u533b\u7642\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9 peer review \u4fee\u4e86\u3002\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u79cb\u3092\u3081\u3069\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u7248\u4f5c\u6210\u4e2d\u3002\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u304c\u8ffd\u52a0\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u300cThe Six Pillars of DevSecOps\u300d\u30b7\u30ea\u30fc\u30ba\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\n<ul>\n<li>DevSecOps &#8211; Pillar 2 &#8211; Collaboration and Integration(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<li>DevSecOps &#8211; Pillar 6 &#8211; Measure, Monitor, Report &amp; Action(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>Star Registry \u65e5\u672c\u8a9eCAIQ\u767b\u9332\u72b6\u6cc1<br \/>\nSalesForce\u3055\u3093\u3001\u30bf\u30ec\u30b9\u3055\u3093\u3001Servicenow\u3001Fileforce\u306f\u72b6\u6cc1\u5f85\u3061\u3002TrendMicro\u3055\u3093\u306e\u3092\u4e8b\u4f8b\u3068\u3057\u3066\u5c55\u958b\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e747\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>Auditor Guidance\u306e\u7ffb\u8a33\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>\u4eca\u5f8c\u3001CCM Lite V4\u306e\u30ea\u30ea\u30fc\u30b9\u306b\u5408\u308f\u305b\u3066\u7ffb\u8a33\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6b21\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>DevSecOps\u306e2\u500b\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u7ffb\u8a33\u3092\u4ed5\u639b\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u6d3b\u52d5\u3068\u3057\u3066\u306f\u3072\u3068\u6bb5\u843d\u3057\u3066\u3044\u308b\u305f\u3081\u3001\u73fe\u5728\u3001\u4ee5\u4e0b\u306e\u5185\u5bb9\u306b\u3064\u3044\u3066\u30e1\u30f3\u30d0\u30fc\u3067\u691c\u8a0e\u4e2d\u3068\u306a\u308a\u307e\u3059\u3002\n<ul>\n<li>WG\u540d\u306e\u5909\u66f4\uff08WG\u540d\u3068\u6d3b\u52d5\u5185\u5bb9\u304c\u5c11\u3057\u305a\u308c\u3066\u304d\u3066\u3044\u308b\u305f\u3081\uff09\u2192SaaS Security WG\u306b\u540d\u79f0\u3092\u5909\u66f4\u3057\u305f\u3044<\/li>\n<li>SaaS\u306e\u5229\u7528\u72b6\u6cc1\u306b\u95a2\u3059\u308b\u4e8b\u4f8b\u306e\u53ce\u96c6\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u306a\u3069\uff09<\/li>\n<li>SaaS\u904b\u7528\u306b\u304a\u3051\u308b\u8105\u5a01\u5206\u6790\u306e\u5b9f\u65bd<\/li>\n<li>CASB AUTO WG\u3068\u306e\u9023\u643a<\/li>\n<li>\uff08\u3042\u308c\u3070\uff09SaaS\u95a2\u9023\u8cc7\u6599\u306e\u7ffb\u8a33<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>7\/25\u306bCoC Ver1.2\u306e\u7de8\u96c6\u4f1a\u8b70\u3092\u5b9f\u65bd\u4e88\u5b9a\u3067\u57f7\u7b46\u65b9\u91dd\u3068\u5206\u62c5\u3092\u6c7a\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>7\u6708\u5b9f\u7e3e\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08\u5f8c\u7de8\uff09\u300d\u3000\uff087\/2\uff09<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7(\u5bfe\u9762@\u4eac\u90fd)\u3000\uff087\/5\uff09<br \/>\n\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u300d<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09\u3000\uff087\/25\uff09<br \/>\n\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u300d<\/li>\n<\/ul>\n<\/li>\n<li>8\u6708\u4e88\u5b9a\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u30ed\u30dc\u30c3\u30c8\u652f\u63f4\u624b\u8853(RAS)\u30b7\u30b9\u30c6\u30e0\u306e\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\u300d(8\/\u4e0a\u65ec)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u300cNIST 800-53 controls implementation to Serverless FaaS\u300d\u306e\u516c\u958b\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u7d42\u4e86(7\/12) &#8211;&gt; \u516c\u958b\u306b\u5411\u3051\u305f\u6700\u7d42\u4f5c\u696d\u4e2d(\u8fd1\u65e5\u4e2d\u516c\u958b)<\/li>\n<li>\u300c\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u306e\u6700\u3082\u91cd\u5927\u306a12\u306e\u30ea\u30b9\u30af\u300d\u306e\u6539\u8a02\u7248\u4f5c\u6210\u4f5c\u696d\u3092\u958b\u59cb\u4e88\u5b9a<\/li>\n<li>\u300cThe Six Pillars of DevSecOps\u300d\u30b7\u30ea\u30fc\u30ba\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\n<ul>\n<li>DevSecOps &#8211; Pillar 2 &#8211; Collaboration and Integration(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<li>DevSecOps &#8211; Pillar 6 &#8211; Measure, Monitor, Report &amp; Action(\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d)<\/li>\n<\/ul>\n<\/li>\n<li>\u300cPrivacy by Design\u300d\u7b56\u5b9a\u306b\u5411\u3051\u305fWG\u6a2a\u65ad\u7684\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30b7\u30e7\u30d7(7\/27)<\/li>\n<li>CSA DevSecOps WG\u3068NIST\u3068\u306e\u9023\u643a\u6d3b\u52d5\uff1a\n<ul>\n<li>\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2(OSS)\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3+ DevSecOps<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>TrendMicro\u3055\u3093\u304c\u3001CAIQ\u65e5\u672c\u8a9e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\uff01(7\/14)<br \/>\n\u3042\u3068\u3001SalesForce\u3055\u3093\u3001\u30bf\u30ec\u30b9\u3055\u3093\u3001Servicenow\u3001Fileforce\u306f\u72b6\u6cc1\u5f85\u3061\u3002TrendMicro\u3055\u3093\u306e\u3092\u4e8b\u4f8b\u3068\u3057\u3066\u5c55\u958b\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e746\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>\u00a0ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u516c\u958b\u6e08\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u3092\u884c\u3046\u3002<\/li>\n<li>\u4eca\u5f8c\u3001CCM Lite V4\u306e\u30ea\u30ea\u30fc\u30b9\u306b\u5408\u308f\u305b\u3066\u7ffb\u8a33\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Medical Devices in A Zero Trust Architecture\u306e\u7ffb\u8a33\u516c\u958b\u6e08\u307f\u3002<\/li>\n<li>\u6b21\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>DevSecOps\u306e2\u500b\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u7ffb\u8a33\u3092\u4ed5\u639b\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u6d3b\u52d5\u3068\u3057\u3066\u306f\u3072\u3068\u6bb5\u843d\u3057\u3066\u3044\u308b\u305f\u3081\u3001\u73fe\u5728\u3001\u4ee5\u4e0b\u306e\u5185\u5bb9\u306b\u3064\u3044\u3066\u30e1\u30f3\u30d0\u30fc\u3067\u691c\u8a0e\u4e2d\u3068\u306a\u308a\u307e\u3059\u3002\n<ul>\n<li>WG\u540d\u79f0\u306e\u5909\u66f4\u6848\uff08SaaS Governance\u306b\u5408\u308f\u305b\u308b\u304b\uff09<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u4e88\u5b9a\u7b56\u5b9a\uff08SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u9023\u3057\u305f\u60c5\u5831\u306e\u53ce\u96c6\u3001\u5553\u8499\u306a\u3069\uff09<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u65b0\u3057\u3044\u500b\u4eba\u60c5\u5831\u306e\u6761\u756a\u53f7\u306b\u5408\u308f\u305b\u305fCoCJP1.2\u306f\uff16\u6708\u306e\u5b9a\u4f8b\u304b\u3089\u958b\u59cb\u3057\u305f\u3002Appendix\u3068\u3057\u3066\u3001GDPR\u306e\u7f70\u91d1\u4e8b\u4f8b\u3001\u7c73\u56fd\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u6cd5\u6848\u306e\u52d5\u5411\u3092\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u305d\u308c\u306b\u5411\u3051\u3066\u65b0\u3057\u3044\u30e1\u30f3\u30d0\u30fc\u52df\u96c6\u3092\u5b9f\u65bd\u30024\uff5e5\u540d\u304c\u65b0\u305f\u306b\u53c2\u52a0\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>7\u6708\u4e88\u5b9a\n<ul>\n<li>\u30d6\u30ed\u30b0\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08\u5f8c\u7de8\uff09\u300d\u3000\uff087\/\u4e0a\u65ec\uff09<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7(\u5bfe\u9762@\u4eac\u90fd)\u3000\uff087\/5\uff09<br \/>\n\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u300d<\/li>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09\u3000\uff087\/25\uff09<br \/>\n\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u300d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u300cNIST 800-53 controls implementation to Serverless FaaS\u300d\u306e\u5185\u90e8\u7b56\u5b9a\u4f5c\u696d\u5b8c\u4e86\u3002\u516c\u958b\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u306e\u30b9\u30c6\u30fc\u30b8\u3078\u79fb\u884c\u3002<\/li>\n<li>\u300cPrivacy by Design\u300d\u7b56\u5b9a\u306b\u5411\u3051\u305fWG\u6a2a\u65ad\u7684\u306a\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30b7\u30e7\u30d7\u3092\u4f01\u753b\u4e2d<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u3067\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u65e5\u672c\u8a9eCAIQ\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u306eSTAR Registry\u3078\u306e\u516c\u958b\u306b\u5411\u3051\u3066\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3002<br \/>\nTrendMicro\u3055\u3093\u304c\u3001CAIQ\u65e5\u672c\u8a9e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\uff01<br \/>\n\u3042\u3068\u3001SalesForce\u3055\u3093\u3001\u30bf\u30ec\u30b9\u3055\u3093\u306f\u72b6\u6cc1\u5f85\u3061\u3002TrendMicro\u3055\u3093\u306e\u3092\u4e8b\u4f8b\u3068\u3057\u3066\u5c55\u958b\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e745\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u4e88\u5b9a\u3002<\/li>\n<li>\u4eca\u5f8c\u3001CCM Lite V4\u306e\u30ea\u30ea\u30fc\u30b9\u306b\u5408\u308f\u305b\u3066\u7ffb\u8a33\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Medical Devices in A Zero Trust Architecture\u306e\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u958b\u59cb\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>DevSecOps\u306e2\u500b\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u7ffb\u8a33\u3092\u4ed5\u639b\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u306e\u305f\u3081\u306eSaaS\u30ac\u30d0\u30ca\u30f3\u30b9\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3000V1.1\u300d\u516c\u958b\u3002<\/li>\n<li>Summit\u3067\u306e\u8b1b\u6f14\u7d42\u4e86\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u30016\u6708\u306e\u4f1a\u8b70\u3067\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u65b0\u3057\u3044\u500b\u4eba\u60c5\u5831\u306e\u6761\u756a\u53f7\u306b\u5408\u308f\u305b\u305fCoCJP1.2\u306f\uff16\u6708\u306e\u5b9a\u4f8b\u304b\u3089\u958b\u59cb\u3059\u308b\u3002Appendix\u3068\u3057\u3066\u3001GDPR\u306e\u7f70\u91d1\u4e8b\u4f8b\u3001\u7c73\u56fd\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u6cd5\u6848\u306e\u52d5\u5411\u3092\u542b\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u305d\u308c\u306b\u5411\u3051\u3066\u65b0\u3057\u3044\u30e1\u30f3\u30d0\u30fc\u52df\u96c6\u3059\u308b\u65b9\u5411\u3067\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u52c9\u5f37\u4f1a\uff1a5\/22\u306b\u30df\u30fc\u30c8\u30a2\u30c3\u30d7\u3092\u5b9f\u65bd<\/li>\n<li>\u65e5\u672c\u7dcf\u7814\u3067\u30a8\u30b9\u30c8\u30cb\u30a2\u3092\u62db\u3044\u3066\u30bb\u30df\u30ca\u30fc\uff08\u30aa\u30f3\u30e9\u30a4\u30f3\uff09\u3092\u884c\u3046\u3002CSA\u95a2\u897f\u304c\u3053\u308c\u3092\u30b5\u30dd\u30fc\u30c8\u3059\u308b\u3002\u30c6\u30fc\u30de\u306fE-health\u3002<\/li>\n<li>6\u6708\u30d6\u30ed\u30b0\u4e88\u5b9a\u3002\u300c\u30b2\u30ce\u30e0\u30c7\u30fc\u30bf\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u300d\u3002\u540c\u3058\u30c6\u30fc\u30de\u30677\u6708\u306b\u52c9\u5f37\u4f1a\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306eRSA conference(4\u6708)\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u3067\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u65e5\u672c\u8a9eCAIQ\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u306eSTAR Registry\u3078\u306e\u516c\u958b\u306b\u5411\u3051\u3066\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u3002<br \/>\n\u6570\u793e\u304c\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e744\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u8ffd\u52a0\u8cc7\u6599\u306e\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cDevSecOps\u306e6\u3064\u306e\u67f1\uff1a\u81ea\u52d5\u5316\u300d\u516c\u958b\u3002<\/li>\n<li>\u5f8c2\u3064\u3092\u7ffb\u8a33\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS Governance Best Practice\u306e\u7ffb\u8a33\u8cc7\u6599\u3092\u518d\u30ec\u30d3\u30e5\u30fc\u3002\u30ec\u30d3\u30e5\u30fc\u306f\u307b\u307c\u5b8c\u4e86\u3057\u3001\u65e2\u5b58\u8cc7\u6599\u3092\u66f4\u65b0\u4e88\u5b9a<\/li>\n<li>Summit\u3067\u672c\u5185\u5bb9\u306b\u3064\u3044\u3066\u3092\u767a\u8868\u3059\u308b\u305f\u3081\u3001\u53c2\u52a0\u8005\u3067\u767a\u8868\u7528\u8cc7\u6599\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u65b0\u3057\u3044\u500b\u4eba\u60c5\u5831\u306e\u6761\u756a\u53f7\u306b\u5408\u308f\u305b\u305fCoCJP1.2\u306f\uff16\u6708\u304b\u3089\u691c\u8a0e\u958b\u59cb\u4e88\u5b9a\u3002<\/li>\n<li>\u305d\u308c\u306b\u5411\u3051\u3066\u65b0\u3057\u3044\u30e1\u30f3\u30d0\u30fc\u52df\u96c6\u3059\u308b\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>4\/20 \u52c9\u5f37\u4f1a\u5b9f\u65bd\u3000SDGs\u9054\u6210\u306b\u5411\u3051\u305f\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9\u3092\u652f\u3048\u308b\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3000(\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9\u30a8\u30ad\u30b9\u30dd2023)<\/li>\n<li>4\/23 \u30d6\u30ed\u30b0\u516c\u958b\u3000\u533b\u7642\u306b\u304a\u3051\u308bIT\u30ac\u30d0\u30ca\u30f3\u30b9\u30fb\u30ea\u30b9\u30af\u30fb\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9(IT-GRC)\uff08\u5f8c\u7de8)<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306eRSA conference(4\u6708)\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u3067\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u306b\u304a\u3051\u308b\u65b0\u3057\u3044\u8cac\u4efb\u5171\u6709\u30e2\u30c7\u30eb\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8003\u3048\u65b9\u300d\u30d6\u30ed\u30b0\u3092\u516c\u958b (3\/29)<\/li>\n<li>\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u7d99\u7d9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e743\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u8ffd\u52a0\u8cc7\u6599\u306e\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>CSA_The-Six-Pillars-of-DevSecOps-Automation-SafeCode \u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002\u9031\u660e\u3051\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>\u5f8c2\u3064\u3092\u7ffb\u8a33\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>Guidance v4 \u548c\u8a33\u898b\u76f4\u3057\u3001\u3044\u3063\u305f\u3093\u4e2d\u6b62\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u30b5\u30de\u30ea\u7248\u8cc7\u6599\u306e\u4f5c\u6210\uff08SaaS Governance Best Practices for Cloud Customers\uff09\u3002Congress\u3067\u767a\u8868\u3057\u305f\u8cc7\u6599\u3092\u30d9\u30fc\u30b9\u306b\u8981\u70b9\u3092\u307e\u3068\u3081\u305f\u30b5\u30de\u30ea\u7248\u306e\u8cc7\u6599\u306e\u5b8c\u6210\u3092\u76ee\u6307\u3059\u3002\u305d\u306e\u8cc7\u6599\u4f5c\u6210\u3057\u516c\u958b\u3059\u308b\u3053\u3068\u3092\u8a08\u753b\u3002\u6642\u671f\u306f4\u6708\uff5e5\u6708\u3054\u308d\u3092\u60f3\u5b9a\u3002<\/li>\n<li>Summit\u3067\u306e\u8b1b\u6f14\u5185\u5bb9\u306e\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u30893\u304b\u6708\u9593\u306f\u610f\u898b\u3092\u6301\u3061\u5bc4\u308b\u4f1a\u8b70\u3092\u884c\u3046\u3002<\/li>\n<li>\u7d71\u5408\u7248(V1.2)\u306e\u57f7\u7b46\u306f6\u6708\u958b\u59cb\u3092\u4e88\u5b9a\u3002<\/li>\n<li>5\u6708\u3053\u308d\u65b0\u4f1a\u54e1\u306e\u52df\u96c6\u3092\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u304c4\u670820\u65e5\u4e88\u5b9a\u3002\u30d5\u30a1\u30fc\u30deIT EXPO\u3067\u5bfe\u9762\u3002<\/li>\n<li>ZeroTrust Architecture in Healthcare\u3000\u516c\u958b\u5f85\u3061\u3002<\/li>\n<li>4\/19~21\u3000\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8\u3000\u30d5\u30a1\u30fc\u30deIT\u306e\u51fa\u5c55\u30d6\u30fc\u30b9\u3042\u308a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306eRSA conference(4\u6708)\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3082\u8981\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u306b\u304a\u3051\u308b\u65b0\u3057\u3044\u8cac\u4efb\u5171\u6709\u30e2\u30c7\u30eb\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8003\u3048\u65b9\u300d\u30d6\u30ed\u30b0\u3092\u516c\u958b (3\/29)<\/li>\n<li>\u6b21\u56de\u4f1a\u8b70\u304b\u3089\u3001\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e742\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u7ffb\u8a33\u4e2d\uff0860%\u304f\u3089\u3044\u5b8c\u4e86\uff09\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3000\u30ea\u30bd\u30fc\u30b9\u30cf\u30d6\u300d\u3092\u516c\u958b<\/li>\n<li>\u8ffd\u52a0\u8cc7\u6599\u306e\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The Six Pillars of DevSecOps: Automation \u7ffb\u8a33\u4f5c\u696d\u3092\u7d99\u7d9a\u4e2d<\/li>\n<li>\u7ffb\u8a33\u306e\u3084\u308a\u65b9\u3092\u5909\u66f4\u3059\u308b\u3002\u7ffb\u8a33\u7248\u3092\u3042\u308b\u7a0b\u5ea6\u69cb\u6210\u3057\u305f\u3082\u306e\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u3068\u3044\u3046\u5f62\u3067\u9032\u3081\u308b\u3002<\/li>\n<li>Guidance v4 \u548c\u8a33\u898b\u76f4\u3057\u3002\u3044\u3063\u305f\u3093\u4e2d\u6b62\u3001\u518d\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u30b5\u30de\u30ea\u7248\u8cc7\u6599\u306e\u4f5c\u6210\uff08SaaS Governance Best Practices for Cloud Customers\uff09\u3002Congress\u3067\u767a\u8868\u3057\u305f\u8cc7\u6599\u3092\u30d9\u30fc\u30b9\u306b\u8981\u70b9\u3092\u307e\u3068\u3081\u305f\u30b5\u30de\u30ea\u7248\u306e\u8cc7\u6599\u306e\u5b8c\u6210\u3092\u76ee\u6307\u3059\u3002\u305d\u306e\u8cc7\u6599\u4f5c\u6210\u3057\u516c\u958b\u3059\u308b\u3053\u3068\u3092\u8a08\u753b\u3002\u6642\u671f\u306f4\u6708\uff5e5\u6708\u3054\u308d\u3092\u60f3\u5b9a\u3002<\/li>\n<li>Summit\u3067\u306e\u8b1b\u6f14\u5185\u5bb9\u306e\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3002\u30ea\u30ea\u30fc\u30b9\u6e08\u3002\u8ffd\u88dc\u7248\u306a\u306e\u3067\u3001\u524d\u306e\u3082\u306e\u3068\u4e21\u65b9\u3092\u516c\u958b\u3059\u308b\u3002<\/li>\n<li>2\u6708\u304b\u30893\u304b\u6708\u9593\u306f\u610f\u898b\u3092\u6301\u3061\u5bc4\u308b\u4f1a\u8b70\u3092\u884c\u3046\u3002<\/li>\n<li>\u7d71\u5408\u7248\u306e\u57f7\u7b46\u306f5\u6708\u304b\u30896\u6708\u958b\u59cb\u3092\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u9060\u9694\u652f\u63f4\u30ed\u30dc\u30c3\u30c8\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3002\u516c\u958b\u3002.<\/li>\n<li>\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3068\u3057\u3066\u65e5\u672c\u3082\u5165\u308c\u305f\uff08\u5ddd\u5d0e\u91cd\u5de5\uff09\u3051\u3069\u3001\u554f\u984c\u3042\u308a\u3042\u308a\u3002<\/li>\n<li>ZeroTrust Architecture in Healthcare\u306ePeer Review\u4e2d\u3002<\/li>\n<li>4\/19~21\u3000\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8\u3000\u30d5\u30a1\u30fc\u30deIT\u306e\u51fa\u5c55\u30d6\u30fc\u30b9\u3042\u308a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3068IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u306e\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u6e08\uff082\/17\uff09<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u304c3\u5206\u306e2\u304f\u3089\u3044\u7d42\u4e86\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306eRSA conference(4\u6708)\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3082\u8981\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u300c\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u300d\u306fIT\u90e8\u9580\u306e\u91cd\u8981\u30df\u30c3\u30b7\u30e7\u30f3\uff01\u9032\u3081\u65b9\u3068\u6709\u7528\u306a\u30c4\u30fc\u30eb\u300dIT Leaders\u30e1\u30c7\u30a3\u30a2\u304b\u3089\u516c\u958b\u3000(2\/17)<\/li>\n<li>\u6b21\u56de\u4f1a\u8b70\u304b\u3089\u3001\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2023\u5e741\u6708 \u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>\u540d\u524d\u3092CCM WG\u306b\u5909\u66f4\u6e08\u3002<\/li>\n<li>CCM V4.0.6\u306e\u65e5\u672c\u8a9e\u7248\u63d0\u4f9b\u306b\u5408\u308f\u305b\u3066\u3001Implementation Guidance\u306e\u7ffb\u8a33\u4e2d\uff0850%\u304f\u3089\u3044\u5b8c\u4e86\uff09\u3002\u3053\u306e\u5f8c\u3001Auditor Guidance\u306e\u7ffb\u8a33\u4e88\u5b9a\u3002<\/li>\n<li>ISMAP\u306e\u30c1\u30e3\u30cd\u30eb\u3092\u524a\u9664\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u4f11\u6b62\u3057\u3066\u3044\u305f\u304c\u3001Zero Trust Resource Hub\u304cCSA\u672c\u90e8\u3067\u516c\u958b\u3055\u308c\u3066\u304a\u308a\u3001\u3053\u308c\u306e\u65e5\u672c\u8a9e\u30b5\u30a4\u30c8\u306e\u4f5c\u6210\u7b49\u304b\u3089\u518d\u958b\u3057\u305f\u3044\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>CSA_The-Six-Pillars-of-DevSecOps-Automation-SafeCode \u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>DevOps\u306b\u95a2\u3059\u308b\u4ed6\u306e2\u3064\u306e\u8cc7\u6599\u306e\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u306e\u3084\u308a\u65b9\u3092\u5909\u66f4\u3059\u308b\u3002\u7ffb\u8a33\u7248\u3092\u3042\u308b\u7a0b\u5ea6\u69cb\u6210\u3057\u305f\u3082\u306e\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u3068\u3044\u3046\u5f62\u3067\u9032\u3081\u308b\u3002<\/li>\n<li>Guidance v4 \u548c\u8a33\u898b\u76f4\u3057\u3002\u3044\u3063\u305f\u3093\u4e2d\u6b62\u3001\u518d\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30e1\u30f3\u30d0\u30fc\u4f5c\u696d\u306f\u7d42\u4e86\u3002\u6700\u7d42\u5019\u88dc\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u3053\u308c\u3092\u30ec\u30d3\u30e5\u30fc\u3059\u308b\u30023\uff5e4\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u5f53\u9762\u7121\u7406\u3002<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\uff1aSecure configuration&amp;miss configuration\u3002\u7ffb\u8a33\u306f\u7d42\u4e86\u3002\u6700\u7d42\u78ba\u8a8d\u304c\u5fc5\u8981\u306a\u72b6\u6cc1\u3002\u6700\u7d42\u6821\u6b63\u3092\u3069\u3046\u3059\u308b\u304b\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002\u91dc\u5c71\u3055\u3093-&gt;\u677e\u6d66\u3055\u3093\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u306b\u3064\u3044\u3066\u3001\u65b9\u91dd\u6c7a\u3081\u3092\u884c\u3063\u3066\u3044\u308b\u3002\u5404\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u8aac\u3092\u4f5c\u3063\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u30b5\u30de\u30ea\u7248\u8cc7\u6599\u306e\u4f5c\u6210\uff08SaaS Governance Best Practices for Cloud Customers\uff09\u3002Congress\u3067\u767a\u8868\u3057\u305f\u8cc7\u6599\u3092\u30d9\u30fc\u30b9\u306b\u8981\u70b9\u3092\u307e\u3068\u3081\u305f\u30b5\u30de\u30ea\u7248\u306e\u8cc7\u6599\u306e\u5b8c\u6210\u3092\u76ee\u6307\u3059\u3002\u305d\u306e\u8cc7\u6599\u4f5c\u6210\u3057\u516c\u958b\u3059\u308b\u3053\u3068\u3092\u8a08\u753b\u3002\u6642\u671f\u306f4\u6708\uff5e5\u6708\u3054\u308d\u3092\u60f3\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3002\u57f7\u7b46\u7d42\u308f\u308a\u3002\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u5b8c\u3002\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3002\u8ffd\u88dc\u7248\u306a\u306e\u3067\u3001\u524d\u306e\u3082\u306e\u3068\u4e21\u65b9\u3092\u516c\u958b\u3059\u308b\u3002<\/li>\n<li>\u6b21\u306b\u7d71\u5408\u7248\u306e\u57f7\u7b46\u306b\u5165\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>1\u670818\u65e5\uff08\u6c34\uff09\u516c\u958b\u3000\u30d6\u30ed\u30b0\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30c7\u30fc\u30bf\u306e\u76f8\u4e92\u904b\u7528\u6027\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6280\u8853\u300d\uff08\u524d\u7de8\uff09<\/li>\n<li>2\u6708\u4e0a\u65ec\u516c\u958b\u4e88\u5b9a\u3000\u30d6\u30ed\u30b0\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30c7\u30fc\u30bf\u306e\u76f8\u4e92\u904b\u7528\u6027\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6280\u8853\u300d\uff08\u5f8c\u7de8\uff09<\/li>\n<li>2\/13\uff08\u6708\uff09\u958b\u50ac\u4e88\u5b9a\u3000\u7b2c10\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30c7\u30fc\u30bf\u306e\u76f8\u4e92\u904b\u7528\u6027\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6280\u8853\u300d<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>1\u670811\u65e5\uff08\u6c34\uff09\u6642\u70b9\u306e\u300cPrivacy by Design\u300d\u69cb\u6210\u6848\u78ba\u5b9a<\/li>\n<li>1\u670812\u65e5\uff08\u6728\uff09\u6642\u70b9\u306e\u300cNIST controls implementation to FaaS\u300d\u72b6\u6cc1<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>DevSecOps\u306e\u7ffb\u8a33\u304c\u5b8c\u4e86\u3057\u305f\u6642\u70b9\u3067\u3001\u30d6\u30ed\u30b0\u516c\u958b\u3092\u4e88\u5b9a\u3002<\/li>\n<li>\u6b21\u56de\u4f1a\u8b70\u304b\u3089\u3001\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30ec\u30d3\u30e5\u30fc\u3092\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e7412\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\u3000WG:\n<ul>\n<li>CCM\/STAR WG\u306f\u3001\u540d\u79f0\u3092CCM WG\u306b\u5909\u66f4\u3057\u307e\u3057\u305f\u3002<\/li>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>WG\u306e\u540d\u524d\u3092\u540d\u524d\u3092CCM WG\u306b\u5909\u66f4\u3059\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG : \u4f11\u6b62\u4e2d\n<ul>\n<li>\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6d3b\u52d5\u4f11\u6b62\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>CSA_six-pillars-of-devsecops, CSA_The-Six-Pillars-of-DevSecOps-Automation-SafeCode \u306e\u7ffb\u8a33\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u5408\u308f\u305b\u3066\u3001The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3082\u691c\u8a0e\u8981\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u306b\u7d9a\u3044\u3066V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u3002\u6b21\u56de\u4f1a\u8b70\u3067\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u30b5\u30de\u30ea\u7248\u8cc7\u6599\u306e\u4f5c\u6210\uff08SaaS Governance Best Practices for Cloud Customers\uff09\u3002Congress\u3067\u767a\u8868\u3057\u305f\u8cc7\u6599\u3092\u30d9\u30fc\u30b9\u306b\u8981\u70b9\u3092\u307e\u3068\u3081\u305f\u30b5\u30de\u30ea\u7248\u306e\u8cc7\u6599\u306e\u5b8c\u6210\u3092\u76ee\u6307\u3059\u3002\u305d\u306e\u8cc7\u6599\u4f5c\u6210\u3057\u516c\u958b\u3059\u308b\u3053\u3068\u3092\u8a08\u753b\u3002\u6642\u671f\u306f4\u6708\uff5e5\u6708\u3054\u308d\u3092\u60f3\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3002\u57f7\u7b46\u7d42\u308f\u308a\u3002\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u30021\u6708\u672b\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>\u6b21\u306b\u3001\u7d71\u5408\u7248\u3092\u8003\u3048\u305f\u3044\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u9060\u9694\u652f\u63f4\u30ed\u30dc\u30c3\u30c8\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3002peer review\u7248\u304c\u516c\u958b\u3002CSA\uff0bMITRE\u3067\u9032\u3081\u3066\u3044\u308b\u3002\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3068\u3057\u3066\u65e5\u672c\u3082\u5165\u3063\u3066\u3044\u308b\u3002<\/li>\n<li>ZeroTrust Architecture in Healthcare\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u304c3\u5206\u306e\uff12\u304f\u3089\u3044\u7d42\u4e86\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306e4\u6708\u672b\u307e\u3067\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u8b1b\u6f14\u7d42\u4e86\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<li>The Six Pillars of DevSecOps &#8211; Pragmatic Implementation\u306e\u7ffb\u8a33\u3082\u8981\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u81ea\u52d5\u5316WG\uff1a\n<ul>\n<li>\u30ad\u30c3\u30af\u30aa\u30d5\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u309211\/29\u306b\u5b9f\u65bd\u3002<\/li>\n<li>SSPM\u3068VRM\/TPRM\u306e\u8aac\u660e\u4f1a\u3092\u5b9f\u65bd\u3002\uff0812\/12<\/li>\n<li>DevSecOps\u306e\u7ffb\u8a33\u304c\u5b8c\u4e86\u3057\u305f\u6642\u70b9\u3067\u3001\u30d6\u30ed\u30b0\u516c\u958b\u3092\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e7411\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>ISMAP 2022, ISMAP LIU\u3092\u4e2d\u5fc3\u306b\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<li>WG\u306e\u540d\u524d\u3092\u540d\u524d\u3092CCM WG\u306b\u5909\u66f4\u3059\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG : \u4f11\u6b62\u4e2d\n<ul>\n<li>\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6d3b\u52d5\u4f11\u6b62\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing Pandemic Eleven : \u516c\u958b\u6e08\u3002\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u306b\u7d9a\u3044\u3066V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3059\u308b\u3002\u6b21\u56de\u4f1a\u8b70\u3088\u308a\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u8abf\u67fb\uff08SaaS Governance Best Practices for Cloud Customers\uff09<\/li>\n<li>\u3053\u306e\u8cc7\u6599\u3092\u4f7f\u3063\u305fCongress \u306e\u8b1b\u6f14\u5185\u5bb9\u306e\u4f5c\u6210\u3001\u5185\u5bb9\u306e\u3059\u308a\u5408\u308f\u305b\u3092\u5b9f\u65bd\u4e2d<\/li>\n<li>Congress\u7d42\u4e86\u5f8c\u3001\u5185\u5bb9\u3092\u30d6\u30ed\u30b0\u5c55\u958b\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3002\u57f7\u7b46\u7d42\u308f\u308a\u3002\u73fe\u5728\u7de8\u96c6\u8005\u306b\u59d4\u8a17\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u9060\u9694\u652f\u63f4\u30ed\u30dc\u30c3\u30c8\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3002peer review\u7248\u304c\u516c\u958b\u3002CSA\uff0bMITRE\u3067\u9032\u3081\u3066\u3044\u308b\u3002\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3068\u3057\u3066\u65e5\u672c\u3082\u5165\u3063\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u304c3\u5206\u306e1\u304f\u3089\u3044\u7d42\u4e86\u3002<\/li>\n<li>\u65b0\u305f\u306a\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3001\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30d0\u30a4\u30c7\u30b6\u30a4\u30f3\u304c\u3001\u6765\u5e74\u306e4\u6708\u672b\u307e\u3067\u306b\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u3092\u51fa\u3059\u4e88\u5b9a\u3002\u7d44\u307f\u8fbc\u307f\u3082\u542b\u307e\u308c\u308b\u306e\u3067IoT\u3082\u542b\u3080\u3002<\/li>\n<li>\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u8b1b\u6f14\u7d42\u4e86\u3002<\/li>\n<li>DevSecOps 6Piller \u306e automation \u7ffb\u8a33\u304c\u5fc5\u8981\u304b\u3002\u7ffb\u8a33WG\u3068\u691c\u8a0e\u8981\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e7410\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>ISMAP\u30de\u30c3\u30d4\u30f3\u30b0\u306e\u82f1\u8a9e\u7248\u3092CSA\u672c\u90e8\u306b\u9001\u4ed8\u3057\u3066\u30aa\u30ea\u30b8\u30ca\u30eb\u3068\u3057\u3066\u30ea\u30ea\u30fc\u30b9\u5b8c\u4e86\u3002<\/li>\n<li>WG\u306e\u540d\u524d\u3092\u540d\u524d\u3092CCM WG\u306b\u5909\u66f4\u3059\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\n<ul>\n<li>\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6d3b\u52d5\u4f11\u6b62\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Top Threats to Cloud Computing Pandemic Eleven : \u4f5c\u696d\u9032\u884c\u4e2d\u3002\u62c5\u5f53\u8005\u5225\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u304a\u3088\u3073\u30c1\u30fc\u30e0\u30ec\u30d3\u30e5\u30fc\u4f1a\u8b70\u958b\u50ac\u6e08\u307f\u3067\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u7248\u4f5c\u6210\u6e08\u3002\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u306b\u7d9a\u3044\u3066V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3059\u308b\u3002\u6b21\u56de\u4f1a\u8b70\u3088\u308a\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u8abf\u67fb\uff08SaaS Governance Best Practices for Cloud Customers\uff09<br \/>\n\u3053\u306e\u8cc7\u6599\u3092\u4f7f\u3063\u305fCongress \u306e\u8b1b\u6f14\u5185\u5bb9\u306e\u4f5c\u6210\u3001\u5185\u5bb9\u306e\u3059\u308a\u5408\u308f\u305b\u3092\u5b9f\u65bd\u4e2d<\/li>\n<li>Congress\u7d42\u4e86\u5f8c\u3001\u5185\u5bb9\u3092\u30d6\u30ed\u30b0\u5c55\u958b\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30028\u6708\u304b\u3089\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u30d5\u30a7\u30fc\u30ba\u306b\u5165\u308b\u3002\u7ae0\u756a\u53f7\u306e\u4fee\u6b63\u306b\u624b\u9593\u53d6\u3063\u3066\u3044\u308b\u3002\u5185\u5bb9\u306f\u6b21\u56de\u3067\u30d5\u30a3\u30c3\u30af\u30b9\u3002editorial\u4fee\u6b63\u3092\u542b\u308112\u6708\uff5e1\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>WORD\u306e\u6821\u6b63\u3092\u884c\u3044\u305f\u3044\u306e\u3067\u3001WORD\u5c02\u9580\u8005\u3092\u9078\u5b9a\u5b8c\u4e86\u3002NDA\u304c\u5fc5\u8981\u3002<\/li>\n<li>\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u7ae0\u756a\u53f7\u304c\u5927\u304d\u304f\u5909\u308f\u3063\u3066\u3044\u308b\u3002\u53c2\u7167\u5148\u306e\u7ae0\u756a\u53f7\u306e\u898b\u76f4\u3057\u304c\u5fc5\u8981\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u6b21\u56de\u30d6\u30ed\u30b0\u300010\u6708\u3002\u300c\u533b\u7642\u306e\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30fc\u30d9\u30f3\u30c0\u30fc\u30ea\u30b9\u30af\u7ba1\u7406\u300d<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3001\u4f5c\u696d\u5206\u62c5\u304c\u6c7a\u307e\u308a\u3001\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u3088\u308a\u3001Security Days\u3067\u8b1b\u6f14\u3002\u5408\u308f\u305b\u3066\u4ee5\u4e0b\u306e\u8b1b\u6f14\u3092\u5b9f\u65bd\u4e88\u5b9a\u3002<br \/>\n\u30a4\u30d9\u30f3\u30c8\u540d\uff1aEdgeTech+ 2022<br \/>\n\u4f1a\u5834\uff1a\u30d1\u30b7\u30d5\u30a3\u30b3\u6a2a\u6d5c<br \/>\n\u65e5\u6642\uff1a11\u670818\u65e5(\u91d1) 15:30-16:15<br \/>\n\u8868\u984c\uff1a\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3068IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30d0\u30a4\u30fb\u30c7\u30b6\u30a4\u30f3<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e749\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>\u82f1\u8a9e\u7248\u3092CSA\u672c\u90e8\u306b\u9001\u4ed8\u3057\u3066\u30aa\u30ea\u30b8\u30ca\u30eb\u3068\u3057\u3066\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3053\u3068\u306b\u95a2\u3057\u3066\u306f\u3001CSA\u672c\u90e8\u306e\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u3092\u5143\u306b\u8abf\u6574\u4e2d\u3002<\/li>\n<li>Congress\u3067\u306e\u8b1b\u6f14\u306e\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\n<ul>\n<li>\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6d3b\u52d5\u4f11\u6b62\u4e2d<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cTop Threats to Cloud Computing Pandemic Eleven\u300d\u306e\u7ffb\u8a33\u4e2d\u3002\u62c5\u5f53\u8005\u5225\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u304a\u3088\u3073\u30c1\u30fc\u30e0\u30ec\u30d3\u30e5\u30fc\u4f1a\u8b70\u958b\u50ac\u6e08\u307f\u3067\u3001\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u7248\u3092\u7de8\u96c6\u4e2d\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u306b\u7d9a\u3044\u3066V3\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3059\u308b\u3002\u6b21\u56de\u4f1a\u8b70\u3088\u308a\u958b\u59cb\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u3001\u4ee5\u4e0b\u3092\u9032\u3081\u308b\u3002\n<ul>\n<li>LAC\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u30fc\u306e\u304a\u8a71<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<\/li>\n<li>SaaS governance best practices for Cloud customers\u306b\u95a2\u3059\u308bCongress \u306e\u8b1b\u6f14\u5185\u5bb9\u306b\u3064\u3044\u3066\u8907\u6570\u56de\u3001\u3059\u308a\u5408\u308f\u305b\u3092\u7d99\u7d9a\u4e2d\u3002\u4eca\u5f8c\u3053\u308c\u3089\u306e\u5185\u5bb9\u3092\u30d6\u30ed\u30b0\u5c55\u958b\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u3002\u7ae0\u756a\u53f7\u306e\u4fee\u6b63\u306b\u624b\u9593\u53d6\u3063\u3066\u3044\u308b\u3002\u5185\u5bb9\u306f\u6b21\u56de\u3067\u30d5\u30a3\u30c3\u30af\u30b9\u3002editorial\u4fee\u6b63\u3092\u542b\u308112\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u6b21\u56de\u30d6\u30ed\u30b0\u300010\u6708\u3002\u300c\u533b\u7642\u306e\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30d9\u30f3\u30c0\u30fc\u30ea\u30b9\u30af\u30de\u30cd\u30fc\u30b8\u30e1\u30f3\u30c8\u300d\u3092\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3001\u4f5c\u696d\u5206\u62c5\u304c\u6c7a\u307e\u308a\u3001\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u3088\u308a\u3001Security Days\u3067\u8b1b\u6f14\u3002\u5408\u308f\u305b\u3066\u4ee5\u4e0b\u306e\u8b1b\u6f14\u3092\u5b9f\u65bd\u4e88\u5b9a\u3002<br \/>\n\u30a4\u30d9\u30f3\u30c8\u540d\uff1aEdgeTech+ 2022<br \/>\n\u4f1a\u5834\uff1a\u30d1\u30b7\u30d5\u30a3\u30b3\u6a2a\u6d5c<br \/>\n\u65e5\u6642\uff1a11\u670818\u65e5(\u91d1) 15:30-16:15<br \/>\n\u8868\u984c\uff1a\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3068IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30d0\u30a4\u30fb\u30c7\u30b6\u30a4\u30f3<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e748\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>\u82f1\u8a9e\u7248\u3092CSA\u672c\u90e8\u306b\u9001\u4ed8\u3057\u3066\u30aa\u30ea\u30b8\u30ca\u30eb\u3068\u3057\u3066\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3053\u3068\u306b\u95a2\u3057\u3066\u306f\u3001CSA\u672c\u90e8\u306e\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u3092\u5143\u306b\u8abf\u6574\u4e2d\u3002<\/li>\n<li>\u691c\u8a0e\u4e2d\u306eWG\u30bb\u30df\u30ca\u30fc\u691c\u8a0e\u4e2d\u306f\u3001Congress\u3067\u306e\u8b1b\u6f14\u306e\u691c\u8a0e\u306b\u5909\u66f4\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\n<ul>\n<li>\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cTop Threats to Cloud Computing Pandemic Eleven\u300d\u306e\u7ffb\u8a33\u4e2d\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c5\u56de\u4f1a\u8b70\uff1a8\/4\u5b9f\u65bd\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u306b\u3064\u3044\u3066\u3001\u4ee5\u4e0b\u3092\u9032\u3081\u308b\u3002\n<ul>\n<li>LAC\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u30fc\u306e\u304a\u8a71<\/li>\n<li>IoT\u3000V3\u306e\u52c9\u5f37\u4f1a\n<ul>\n<li>V2\u306e\u52c9\u5f37\u4f1a\u3092\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3057\u3066\u9032\u3081\u308b<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u8abf\u67fb\n<ul>\n<li>\u3053\u306e\u8cc7\u6599\u3092\u4f7f\u3063\u305fCongress\u306e\u8b1b\u6f14\u5185\u5bb9\u306e\u4ed5\u8fbc\u307f\u4e2d\u3002\u3053\u308c\u3092\u30d6\u30ed\u30b0\u5c55\u958b\u3057\u3066\u3044\u304f\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SaaS\u306e\u904b\u7528\u72b6\u6cc1\u306e\u8abf\u67fb\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u4f01\u753b\uff09\uff1a\u30da\u30f3\u30c7\u30a3\u30f3\u30b0<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30028\u6708\u304b\u3089\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u30d5\u30a7\u30fc\u30ba\u306b\u5165\u308b\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u30927\/27\u306b\u958b\u50ac\u6e08\u3002<\/li>\n<li>\u30d6\u30ed\u30b0\u30018\u6708\u516c\u958b\u6e08\u3002\u300c\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/li>\n<li>\u6b21\u56de\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u30009\/22\u3002\u300c\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d\u30de\u30af\u30cb\u30ab\u306b\u53c2\u52a0\u3057\u3066\u3044\u305f\u3060\u304f\uff08\u88fd\u9020\u696d\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3001\u4f5c\u696d\u5206\u62c5\u304c\u6c7a\u307e\u308a\u3001\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>8\/23\u3000\uff20IT\u3067\u8b1b\u6f14\u6e08\u3002\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u306e\u8b1b\u6f14\uff1a11\/8\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e747\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u65e5\u672c\u8a9e\u7248\u516c\u958b\u3002\u82f1\u8a9e\u7248\u3092CSA\u672c\u90e8\u306b\u9001\u4ed8\u3057\u3066\u30aa\u30ea\u30b8\u30ca\u30eb\u3068\u3057\u3066\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3053\u3068\u306b\u95a2\u3057\u3066\u306f\u3001CSA\u672c\u90e8\u306e\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u3092\u5143\u306b\u8abf\u6574\u4e2d\u3002<\/li>\n<li>\u4e0a\u8a18\u306b\u3064\u3044\u3066WG\u30bb\u30df\u30ca\u30fc\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u304c\u30b9\u30bf\u30fc\u30c8\u3002<br \/>\n\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300cTop Threats to Cloud Computing Pandemic Eleven\u300d\u306e\u7ffb\u8a33\u3092\u958b\u59cb\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c4\u56de\u4f1a\u8b70\uff1a7\/7\u5b9f\u65bd\u3002<\/li>\n<li>Guide to IoT Controls Matrix V3, IoT Control Matrix V3\u306e\u7ffb\u8a33\u7248\u516c\u958b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS Governance Best Practices for Cloud Customers\uff08CASBWG\u3067\u7ffb\u8a33\u4e2d\uff09<\/li>\n<li>SaaS\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u306b\u95a2\u3059\u308b\u8ab2\u984c\u3001CAIQ\u3084CMM\u306a\u3069\u306e\u6d3b\u7528\u3092\u4fc3\u3059\u65b9\u6cd5\u306b\u3064\u3044\u3066<\/li>\n<li>\u5171\u901a\u306e\u8ab2\u984c\u8a8d\u8b58\u3092\u3082\u3063\u3066\u3044\u308b\u30df\u30c4\u30ab\u30eb\u69d8\u306eConoris\u306e\u4e8b\u4f8b\u3092\u53d7\u3051\u3066\u3001\u4eca\u5f8c\u306e\u65b9\u91dd\u306b\u3064\u3044\u3066\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3002\u4eca\u5f8c\u306e\u53c2\u8003\u3067\u6539\u3081\u3066\u30df\u30c4\u30ab\u30eb\u69d8\u306b\u8a71\u3092\u4f3a\u3046\u65b9\u5411<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30028\u6708\u304b\u3089\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u30d5\u30a7\u30fc\u30ba\u306b\u5165\u308b\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u7b2c7\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u7523\u696d\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6700\u65b0\u52d5\u5411\u300d(7\/27)<\/li>\n<li>\u30d6\u30ed\u30b0\u30018\u6708\u516c\u958b\u4e88\u5b9a\u3002\u300c\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3001\u4f5c\u696d\u5206\u62c5\u304c\u6c7a\u307e\u308a\u3001\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>\uff20IT\u3067\u8b1b\u6f14\u4e88\u5b9a\uff088\/23\uff09\u3002\u30ca\u30ce\u30aa\u30d7\u30c8\u30e1\u30c7\u30a3\u30a2\u3068\u540c\u3058\u8a71\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e746\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CSA\u672c\u90e8\u306b\u3001CCM\/ISMAP\u30de\u30c3\u30d4\u30f3\u30b0\u3092\u63d0\u51fa\u3057\u3001\u8cdb\u540c\u3092\u5f97\u305f\u3002<\/li>\n<li>\u65e5\u672c\u8a9e\u306e\u516c\u958b\u7528\u30c9\u30e9\u30d5\u30c8\u3092\u4f5c\u6210\u3057\u30017\u6708\u516c\u958b\u3067\u6e96\u5099\u4e2d\u3002<\/li>\n<li>\u6b21\u671f\u53d6\u308a\u7d44\u307f\u306b\u3064\u3044\u3066\u306e\u8ab2\u984c\n<ul>\n<li>CCM\u306ev405\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f<\/li>\n<li>ISMAP\u306e2022\u7248\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f<\/li>\n<li>ISMAP\u306b\u300cISMAP-LIU (Low Impact Use)\u300d\u3068\u3044\u3046\u65b0\u305f\u306aSaaS\u30b5\u30fc\u30d3\u30b9\u767b\u9332\u5236\u5ea6\u304c\u5275\u8a2d\u3055\u308c\u305f\u3002\u3053\u308c\u306f\u6a5f\u5bc6\u60272\u4ee5\u4e0b\u306e\u4f4e\u30ea\u30b9\u30af\u696d\u52d9\u51e6\u7406\u30fb\u60c5\u5831\u51e6\u7406\u3092\u5bfe\u8c61\u3068\u3057\u3001\u8abf\u9054\u5074\u306e\u5f71\u97ff\u5ea6\u8a55\u4fa1\u306e\u8ca0\u62c5\u8efd\u6e1b\u3092\u76ee\u6307\u3057\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u304c\u30b9\u30bf\u30fc\u30c8\u3002<br \/>\n\u6700\u521d\u306e\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u3066\u3001The Evolution of STAR-Introducing Continuous Auditing\u306e\u7ffb\u8a33\u516c\u958b\u3092\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u300c\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30af\u30e9\u30a6\u30c9\u306e\u30bb\u30ad\u30e5\u30a2\u306a\u63a5\u7d9a\u8981\u4ef6\u300d\u516c\u958b\u3002<\/li>\n<li>\u300cTop Threats to Cloud Computing Pandemic Eleven\u300d\u306e\u7ffb\u8a33\u3092\u958b\u59cb\u3002<\/li>\n<li>Security Guidance v4\u898b\u76f4\u3057\uff1a\u4f5c\u696d\u4e2d\uff08\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoTControl Matrix V3\u306e\u7ffb\u8a33\u3082\u8fd1\u3005\u958b\u59cb\u4e88\u5b9a\u3002\u7ffb\u8a33\u30dc\u30e9\u30f3\u30c6\u30a3\u30a2\u3092\u52df\u3063\u3066\u5b9f\u65bd\u30026\u670828\u65e5\u516c\u958b\u3002<\/li>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c4\u56de\u4f1a\u8b70\uff1a6\/9\u5b9f\u65bd\u3002\u5b9a\u671f\u7684\u306b\u8f2a\u8b1b\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>Guide to IoT Controls Matrix V3 \u7ffb\u8a33\u4f5c\u696d\u4e2d\u30026\u670828\u65e5\u516c\u958b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u3002WORD\u304c\u5d29\u308c\u308b\u3002\u3042\u308b\u7a0b\u5ea6\u3067\u304d\u305f\u3068\u3053\u308d\u3067\u7ffb\u8a33WG\u306b\u6e21\u3059\u3002<\/li>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>6\u670822\u65e5\u306b\u5b9a\u4f8b\u3092\u5b9f\u65bd\n<ul>\n<li>SaaS\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u306b\u95a2\u3059\u308b\u8ab2\u984c\u3001CAIQ\u3084CMM\u306a\u3069\u306e\u6d3b\u7528\u3092\u4fc3\u3059\u65b9\u6cd5\u306b\u3064\u3044\u3066<\/li>\n<li>\u5171\u901a\u306e\u8ab2\u984c\u8a8d\u8b58\u3092\u3082\u3063\u3066\u3044\u308b\u30df\u30c4\u30ab\u30eb\u69d8\u306eConoris\u306e\u4e8b\u4f8b\u3092\u53d7\u3051\u3066\u3001\u4eca\u5f8c\u306e\u65b9\u91dd\u306b\u3064\u3044\u3066\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\u4eca\u5f8c\u306e\u53c2\u8003\u3067\u6539\u3081\u3066\u30df\u30c4\u30ab\u30eb\u69d8\u306b\u8a71\u3092\u4f3a\u3046\u65b9\u5411<\/li>\n<\/ul>\n<\/li>\n<li>SaaS Governance Best Practices for Cloud Customers\u306e\u7ffb\u8a33\u5bfe\u5fdc\u306b\u3064\u3044\u3066\n<ul>\n<li>\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u305f\u3081\u3001\u7ffb\u8a33\u30d7\u30ed\u30bb\u30b9\u3092\u958b\u59cb<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30025\/6\u6708\u304b\u3089\u539f\u7a3f\u6848\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<br \/>\n\u500b\u4eba\u95a2\u9023\u60c5\u5831\u306e\u7b2c\u4e09\u8005\u63d0\u4f9b\u3001\u6d77\u5916\u79fb\u8ee2\u306e\u78ba\u8a8d\u3002\u4fdd\u8b77\u59d4\u54e1\u4f1a\u306b\u554f\u3044\u5408\u308f\u305b\u4e2d\u3002\u57f7\u7b46\u306f\u3001\u305d\u308c\u304c\u660e\u78ba\u306b\u306a\u308a\u6b21\u7b2c\u7740\u624b\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u30927\/27\u306b\u958b\u50ac\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9WG:\n<ul>\n<li>DevSecOps\u3000WG\u3068\u306e\u5354\u8abf\u3067\u3001\u968f\u6642\u8cc7\u6599\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u3002\u30a6\u30a8\u30d6\u306e\u5909\u66f4\u7b49\u7d42\u4e86\u3002<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3092\u30b9\u30bf\u30fc\u30c8\u3002<\/li>\n<li>C-Level Guidance to Securing Serverless Architectures\u3000\u7ffb\u8a33\u516c\u958b\u6e08\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e745\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u30026\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002\u6700\u7d42\u8abf\u6574\u30fb\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002\u6e21\u9089\u3055\u3093\u30d7\u30e9\u30f3\u306b\u57fa\u3065\u3044\u3066\u3001FY22\u3088\u308a\u30b9\u30bf\u30fc\u30c8\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>SDP Specification v2_0\u3000\u7ffb\u8a33\u516c\u958b\u6e08<\/li>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u7ffb\u8a33\u4f5c\u696d\u4e2d\uff1aSecure Connection Requirements of Hybrid Cloud<br \/>\n\u2192\u6a5f\u68b0\u7ffb\u8a33\uff06\u7ffb\u8a33\u30e1\u30e2\u30ea\u30c4\u30fc\u30eb\u3092\u7528\u3044\u305f\u3001\u7ffb\u8a33\u4f5c\u696d\u306e\u65b0\u30d7\u30ed\u30bb\u30b9\u3067\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>\u4f5c\u696d\u7d99\u7d9a\u4e2d\uff1aGuidance v4 \u548c\u8a33\u898b\u76f4\u3057\uff08\u9032\u6357\u505c\u6ede\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c3\u56de\u4f1a\u8b70\uff1a5\/12\u5b9f\u65bd\u3002\u5b9a\u671f\u7684\u306b\u8f2a\u8b1b\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<li>Guide to IoT Controls Matrix V3 \u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>IoTControl Matrix V3\u306e\u7ffb\u8a33\u3082\u8fd1\u3005\u958b\u59cb\u4e88\u5b9a\u3002\u7ffb\u8a33\u30dc\u30e9\u30f3\u30c6\u30a3\u30a2\u3092\u52df\u3063\u3066\u884c\u3046\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u30021\u30f6\u6708\u5f8c\u306b\u306f\u7ffb\u8a33WG\u3078\u6e21\u305b\u308b\u898b\u8fbc\u307f\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002\n<ul>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u8abf\u67fb\n<ul>\n<li>Cloud Octagon Model<\/li>\n<li>CSA SaaS Governance \u300cSaaS Governance Best Practice for SaaS Customers\u300d\uff08US\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>SaaS\u306e\u904b\u7528\u72b6\u6cc1\u306e\u8abf\u67fb\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u4f01\u753b\uff09\n<ul>\n<li>\u4e8b\u524d\u306e\u611f\u89e6\u3092\u3064\u304b\u3080\u305f\u3081\u306eBlog\uff08SaaS\u3068CCM\u3084CAIQ\u306b\u95a2\u3059\u308b\u5185\u5bb9\uff09\u3092\u4f5c\u6210\u4e88\u5b9a<\/li>\n<li>CSC\/CSP\/CASB\u30d9\u30f3\u30c0\u30fc\u3068\u5206\u3051\u3066\u30d2\u30a2\u30ea\u30f3\u30b0\u3092\u304b\u3051\u308b\u4e88\u5b9a<\/li>\n<li>SaaS Security and Misconfigurations Report\u3000-&gt;\u3000CASBWG\u3067\u7ffb\u8a33\u8a08\u753b\u4e2d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30025\/6\u6708\u304b\u3089\u539f\u7a3f\u6848\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<br \/>\n\u500b\u4eba\u95a2\u9023\u60c5\u5831\u306e\u7b2c\u4e09\u8005\u63d0\u4f9b\u3001\u6d77\u5916\u79fb\u8ee2\u306e\u78ba\u8a8d\u3002\u4fdd\u8b77\u59d4\u54e1\u4f1a\u306b\u554f\u3044\u5408\u308f\u305b\u4e2d\u3002\u57f7\u7b46\u306f\u3001\u305d\u308c\u304c\u660e\u78ba\u306b\u306a\u308a\u6b21\u7b2c\u7740\u624b\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30d6\u30ed\u30b0\uff1a\u533b\u7642\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u4e88\u9632\u5bfe\u7b56\u3000\u516c\u958b\u6e08\u3002<\/li>\n<li>\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u516c\u958b\u6e08\u3002\u7ffb\u8a33\u3092\u3069\u3046\u3059\u308b\u304b\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>DevSecOps\u3000WG\u3068\u306e\u5354\u8abf\u3067\u3001\u968f\u6642\u8cc7\u6599\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u3002\u30a6\u30a8\u30d6\u306e\u5909\u66f4\u7b49\u5fc5\u8981\uff08\u8af8\u89d2\uff09<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3092\u30b9\u30bf\u30fc\u30c8\u3002<\/li>\n<li>C-Level Guidance to Securing Serverless Architectures\u3000\u7ffb\u8a33\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e744\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u30026\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u30025\/9\u306b\u6700\u7d42\u8abf\u6574\u30fb\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>SDP Specification v2_0\u3000\u7ffb\u8a33\u30ec\u30d3\u30e5\u30fc\u4e2d\u3002<\/li>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>\u7ffb\u8a33\u30c4\u30fc\u30eb(Memsource\uff09\u3067\u65b0\u3057\u3044\u6a5f\u80fd\u3002DeepL\u304c\u7d44\u307f\u8fbc\u307e\u308c\u3066\u3044\u308b\u306e\u3067\u3053\u3061\u3089\u3067\u9032\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>Secure Connection Requirements of Hybrid Cloud\u3000\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c2\u56de\u4f1a\u8b70\uff1a3\/2\u5b9f\u65bd\u3002\u5b9a\u671f\u7684\u306b\u8f2a\u8b1b\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u3002\u6570\u540d\u304c\u7d42\u4e86\u30021\u30f6\u6708\u5f8c\u306b\u306f\u7ffb\u8a33WG\u3078\u6e21\u305b\u308b\u898b\u8fbc\u307f\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002\n<ul>\n<li>\u7ffb\u8a33\u8cc7\u6599\u306e\u8abf\u67fb<\/li>\n<li>Cloud Octagon Model<\/li>\n<li>CSA SaaS Governance \u300cSaaS Governance Best Practice for SaaS Customers\u300d\uff08US\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<\/li>\n<\/ul>\n<\/li>\n<li>SaaS\u306e\u904b\u7528\u72b6\u6cc1\u306e\u8abf\u67fb\uff08\u30a2\u30f3\u30b1\u30fc\u30c8\u4f01\u753b\uff09\n<ul>\n<li>\u4e8b\u524d\u306e\u611f\u89e6\u3092\u3064\u304b\u3080\u305f\u3081\u306eBlog\uff08SaaS\u3068CCM\u3084CAIQ\u306b\u95a2\u3059\u308b\u5185\u5bb9\uff09\u3092\u4f5c\u6210\u4e88\u5b9a<\/li>\n<li>CSC\/CSP\/CASB\u30d9\u30f3\u30c0\u30fc\u3068\u5206\u3051\u3066\u30d2\u30a2\u30ea\u30f3\u30b0\u3092\u304b\u3051\u308b\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3000\u5206\u62c5\u3092\u6c7a\u3081\u305f\u3002\u7406\u89e3\u3092\u6df1\u3081\u3066\u3044\u308b\u30025\/6\u6708\u304b\u3089\u539f\u7a3f\u6848\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>PMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d74\u670812\u65e5\u7d42\u4e86\u3002\u30c6\u30fc\u30de\u306f\u3001\u533b\u7642\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a8\u30a2\u3002<\/li>\n<li>\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001peer review \u4e2d\u3002<\/li>\n<li>\u30d5\u30a1\u30fc\u30e0IT\uff06Digital EXPO\u30014\/20\u306bCSA\u3068\u3057\u3066\u30d7\u30ec\u30bc\u30f3\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>CSA\u672c\u90e8\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u306eexecutive\u5411\u3051\u3002\u30ea\u30ea\u30fc\u30b9\u6e08\u3002<\/li>\n<li>DevSecOps\u3000WG\u3068\u306e\u5354\u8abf\u3067\u3001\u968f\u6642\u8cc7\u6599\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u3002<\/li>\n<li>NIST SP800-204C \u30b5\u30fc\u30d3\u30b9\u30e1\u30c3\u30b7\u30e5\u3092\u5229\u7528\u3057\u305f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u7528\u306eDevSecOps\u3002\u6982\u8aac\u66f8\u3092\u4f5c\u6210\u4e2d\u3002 \u516c\u958b\u6e08\u3002<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e743\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u30025\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Authenticate Before Connect Consortium \u201cABCC\u201d\uff08\u63a5\u7d9a\u524d\u8a8d\u8a3c\u63a8\u9032\u5354\u8b70\u4f1a\uff09\u8a2d\u7acb\u6e96\u5099\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>How to Design a Secure Serverless Architecture\u3000\u306e\u7ffb\u8a33\u3001\u30ea\u30ea\u30fc\u30b9\u6e08\u3002<\/li>\n<li>\u7ffb\u8a33\u30c4\u30fc\u30eb(Memsource\uff09\u3067\u65b0\u3057\u3044\u6a5f\u80fd\u3002DeepL\u304c\u7d44\u307f\u8fbc\u307e\u308c\u3066\u3044\u308b\u306e\u3067\u3053\u3061\u3089\u3067\u9032\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u6b21\u306e\u7ffb\u8a33\u306b\u3064\u3044\u3066\u7ffb\u8a33\u5019\u88dc\u306e\u9078\u5b9a\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c2\u56de\u4f1a\u8b70\uff1a3\/2\u5b9f\u65bd\u3002\u5b9a\u671f\u7684\u306b\u8f2a\u8b1b\u3092\u5b9f\u65bd\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306f\u30bf\u30a4\u30df\u30f3\u30b0\u306f7\uff5e8\u6708\u3002AWS:4\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u9032\u3081\u3066\u3044\u304f\u3002\u5168\u90e8\u305d\u308d\u3063\u3066\u304b\u3089\u516c\u958b\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>WG\u30e1\u30f3\u30d0\u30fc\u6574\u7406\u6e08\u3002ML\u3082\u6574\u7406\u5b8c\u4e86\u3002<\/li>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u306b\u3064\u3044\u3066\u8abf\u6574\u4e2d\uff08\u6765\u6708\u958b\u59cb\u4e88\u5b9a\uff09\u3002\u9032\u3081\u65b9\u306b\u3064\u3044\u3066\u306f\u3001\u7ffb\u8a33WG\u677e\u6d66\u3055\u3093\u3068\u8abf\u6574\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002\u4f1a\u54e1\u4f01\u696d\u306b\u30d2\u30a2\u30ea\u30f3\u30b0\u4e2d\u3002<br \/>\n\u307e\u305f\u3001\u4ee5\u4e0b\u306b\u95a2\u3057\u3066\u3001\u60c5\u5831\u4ea4\u63db\u3084\u691c\u8a0e\u3092\u884c\u3044\u3001\u307e\u3068\u3081\u308b\u5f62\u3067SaaS\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u306b\u95a2\u3059\u308b\u30d6\u30ed\u30b0\u7b49\u306e\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u304c\u51fa\u305b\u306a\u3044\u304b\u3001\u82f1\u8a9e\u306e\u8cc7\u6599\u306b\u3064\u3044\u3066\u306f\u7ffb\u8a33\u304c\u3067\u304d\u306a\u3044\u304b\u691c\u8a0e\u3092\u7d99\u7d9a\u3057\u3066\u9032\u3081\u3066\u3044\u307e\u3059<\/p>\n<ul>\n<li>Cloud Octagon Model<\/li>\n<li>CSA SaaS Governance \u300cSaaS Governance Best Practice for SaaS Customers\u300d<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9 \u63d0\u4f9b\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\uff08\u7b2c3\u7248\uff09<\/li>\n<li>\u6700\u65b0\u306eSaaS\u304b\u3089\u306e\u60c5\u5831\u6f0f\u6d29\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8<\/li>\n<li>\u00a0SaaS\u306e\u5229\u7528\u5b9f\u614b\u306b\u5bfe\u3059\u308bSurvey\u306e\u5b9f\u65bd\u3082\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3092\u4f5c\u6210\u4e2d\u3002<br \/>\nPMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d74\u670812\u65e5\u958b\u50ac\u3002\u30c6\u30fc\u30de\u306f\u3001\u533b\u7642\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a8\u30a2\u3002<\/li>\n<li>\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001peer review \u4e2d\u3002<\/li>\n<li>\u30d5\u30a1\u30fc\u30e0IT\u30014\/20\u306bCSA\u3068\u3057\u3066\u30d7\u30ec\u30bc\u30f3\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>CSA\u672c\u90e8\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u306eexecutive\u5411\u3051\u3002\u3082\u3046\u3059\u3050\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u3000WG\u3068\u306e\u5354\u8abf\u3067\u3001\u968f\u6642\u8cc7\u6599\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u3002<\/li>\n<li>NIST SP800-204C \u30b5\u30fc\u30d0\u30e1\u30c3\u30b7\u30e5\u3092\u5229\u7528\u3057\u305f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u7528\u306eDevSecOps\u3002\u6982\u8aac\u66f8\u3092\u4f5c\u6210\u4e2d\u3002<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u3068NIST SP800-53\u3068\u306e\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e742\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002\u4f5c\u696d\u4ee3\u66ff\u8005\u3092\u30a2\u30b5\u30a4\u30f3\u3057\u3001\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3092\u7dad\u6301\u3059\u308b\u65b9\u5411\u3067\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>&#8220;toward a zero trust architecture&#8221;\u3001SDPWG\u3067\u7ffb\u8a33\u3001\u30ea\u30ea\u30fc\u30b9\u6e08\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>How to Design a Secure Serverless Architecture\u3000\u306e\u7ffb\u8a33\u3001\u30ea\u30ea\u30fc\u30b9\u6e08\u3002<\/li>\n<li>\u7ffb\u8a33\u30c4\u30fc\u30eb(Memsource\uff09\u306e\u65b0\u3057\u3044\u6a5f\u80fd\u3067\u3001DeepL\u304c\u7d44\u307f\u8fbc\u307e\u308c\u3066\u3044\u308b\u3088\u3046\u306b\u306a\u3063\u305f\u3002\u6a5f\u80fd\u306b\u3064\u3044\u3066\u8abf\u67fb\u3092\u9032\u3081\u308b\u3002\u5951\u7d04\u306b\u3064\u3044\u3066\u306f\u3001\u4e00\u65e6\u6b62\u3081\u3066\u3001\u518d\u5ea6\u5951\u7d04\u3057\u306a\u304a\u3059\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c1\u56de\u4f1a\u8b70\uff1a2\/2\u5b9f\u65bd\u3002\u4eca\u5f8c\u3001\u5b9a\u671f\u7684\u306b\u8f2a\u8b1b\u3092\u5b9f\u65bd\u3059\u308b\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002\u30ea\u30ea\u30fc\u30b9\u306e\u30bf\u30a4\u30df\u30f3\u30b0\u306f6\uff5e7\u6708\u3002AWS:\uff13\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c1\uff5e\uff12\u304b\u6708\u3067\u5185\u5bb9\u3092\u307e\u3068\u3081\u308b\u4f5c\u696d\u3092\u9032\u3081\u3066\u3044\u304f\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>WG\u30e1\u30f3\u30d0\u30fc\u6574\u7406\u6e08\u3002ML\u3082\u6574\u7406\u5b8c\u4e86\u3002<\/li>\n<li>\u201cSecure DevOps and Misconfigurations\u201d\u306e\u7ffb\u8a33\u306b\u3064\u3044\u3066\u8abf\u6574\u4e2d\uff08\u6765\u6708\u958b\u59cb\u4e88\u5b9a\uff09\u3002\u9032\u3081\u65b9\u306b\u3064\u3044\u3066\u306f\u3001\u7ffb\u8a33WG\u677e\u6d66\u3055\u3093\u3068\u8abf\u6574\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002\u4f1a\u54e1\u4f01\u696d\u306b\u30d2\u30a2\u30ea\u30f3\u30b0\u4e2d\u3002<br \/>\n\u307e\u305f\u3001\u4ee5\u4e0b\u306b\u95a2\u3057\u3066\u3001\u60c5\u5831\u4ea4\u63db\u3084\u691c\u8a0e\u3092\u884c\u3044\u3001\u307e\u3068\u3081\u308b\u5f62\u3067SaaS\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u306b\u95a2\u3059\u308b\u30d6\u30ed\u30b0\u7b49\u306e\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u304c\u51fa\u305b\u306a\u3044\u304b\u3001\u82f1\u8a9e\u306e\u8cc7\u6599\u306b\u3064\u3044\u3066\u306f\u7ffb\u8a33\u304c\u3067\u304d\u306a\u3044\u304b\u691c\u8a0e\u3092\u7d99\u7d9a\u3057\u3066\u9032\u3081\u3066\u3044\u307e\u3059<\/p>\n<ul>\n<li>Cloud Octagon Model<\/li>\n<li>CSA SaaS Governance \u300cSaaS Governance Best Practice for SaaS Customers\u300d<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9 \u63d0\u4f9b\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\uff08\u7b2c3\u7248\uff09<\/li>\n<li>\u6700\u65b0\u306eSaaS\u304b\u3089\u306e\u60c5\u5831\u6f0f\u6d29\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8<\/li>\n<li>\u00a0SaaS\u306e\u5229\u7528\u5b9f\u614b\u306b\u5bfe\u3059\u308bSurvey\u306e\u5b9f\u65bd\u3082\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u30e1\u30f3\u30d0\u30fc\u306e\u30ea\u30d5\u30ec\u30c3\u30b7\u30e5\u7d42\u4e86\u3002<\/li>\n<li>2\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3092\u4f5c\u6210\u958b\u59cb\u3002<br \/>\nPMark\u306e\u904b\u7528\u57fa\u6e96\u304cJIPDEC\u304b\u3089\u516c\u958b\u3055\u308c\u305f\u306e\u3067\u3001\u3053\u308c\u306e\u30b9\u30bf\u30c7\u30a3\u30fc\u3092\u884c\u3044\u3001V1.1\u306b\u53cd\u6620\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d73\u6708\u4e88\u5b9a\u3002\u3053\u308c\u304b\u3089\u30a2\u30ca\u30a6\u30f3\u30b9\u3002\u30c6\u30fc\u30de\u306f\u3001\u533b\u7642\u306e\u30e9\u30f3\u30b5\u30e0\u30a6\u30a8\u30a2\u3002<\/li>\n<li>CSA\u672c\u90e8\u306e\u533b\u7642\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001peer review \u4e2d\u3002<\/li>\n<li>\u30d5\u30a1\u30fc\u30e0IT\u30014\/20\u306bCSA\u3068\u3057\u3066\u30d7\u30ec\u30bc\u30f3\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>How to Design a Secure Serverless Architecture\u3000\u306e\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u304b\u3089\u30ea\u30ea\u30fc\u30b9\u3002<\/li>\n<li>CSA\u672c\u90e8\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u306eexecutive\u5411\u3051\u3002\u3082\u3046\u3059\u3050\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u3000WG\u3068\u306e\u5354\u8abf\u3067\u3001CSA\u672c\u90e8\u304b\u3089\u968f\u6642\u8cc7\u6599\u304c\u51fa\u3066\u304f\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2022\u5e741\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002\u4f5c\u696d\u4ee3\u66ff\u8005\u3092\u30a2\u30b5\u30a4\u30f3\u3057\u3001\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3092\u7dad\u6301\u3059\u308b\u65b9\u5411\u3067\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u00a0&#8220;toward a zero trust architecture&#8221;\u3001SDPWG\u3067\u7ffb\u8a33\u4e2d\u30022\/4\u306e\u4f1a\u8b70\u3067\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u3092\u884c\u3044\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>How to Design a Secure Serverless Architecture\u3000\u306e\u7ffb\u8a33\u4e2d\u3002\u6700\u7d42\u6821\u6b63\u5b8c\u30021\u6708\u4e2d\u306e\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u00a0IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002\u7b2c1\u56de\u4f1a\u8b70\u306f\u5ef6\u671f\u3002\u30ea\u30b9\u30b12\/2\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002AWS:2\uff5e3\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c3\u304b\u6708\u3054\u3068\u3092\u4e88\u5b9a\u3002\u516c\u958b\u306b\u3064\u3044\u3066\u306f\u3001\u4eca\u5f8c\u691c\u8a0e\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>WG\u30e1\u30f3\u30d0\u30fc\u6574\u7406\u6e08\u3002ML\u306e\u65b9\u3082\u6574\u7406\u3059\u308b-&gt;\u8af8\u89d2\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>\u301012\u670822\u65e5 6\u56de\u76ee\u306e\u5b9a\u4f8b\u3092\u5b9f\u65bd\u3011\n<ul>\n<li>SaaS \u3092\u3088\u308a\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u7528\u30fb\u904b\u7528\u3059\u308b\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3092\u9032\u884c\u4e2d\u3002<br \/>\n\u4ee5\u4e0b\u306b\u95a2\u3057\u3066\u3001\u60c5\u5831\u4ea4\u63db\u3084\u691c\u8a0e\u3092\u884c\u3044\u3001\u307e\u3068\u3081\u308b\u5f62\u3067SaaS\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u306b\u95a2\u3059\u308b\u30d6\u30ed\u30b0\u7b49\u306e\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u304c\u51fa\u305b\u306a\u3044\u304b\u3001\u82f1\u8a9e\u306e\u8cc7\u6599\u306b\u3064\u3044\u3066\u306f\u7ffb\u8a33\u304c\u3067\u304d\u306a\u3044\u304b\u691c\u8a0e\u3092\u7d99\u7d9a\u3057\u3066\u9032\u3081\u3066\u3044\u307e\u3059\u3002<\/p>\n<ul>\n<li>Cloud Octagon Model<\/li>\n<li>CSA SaaS Governance \u300cSaaS Governance Best Practice for SaaS Customers\u300d\uff08\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9 \u63d0\u4f9b\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\uff08\u7b2c3\u7248\uff09<\/li>\n<li>\u6700\u65b0\u306eSaaS\u304b\u3089\u306e\u60c5\u5831\u6f0f\u6d29\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8<\/li>\n<li>SaaS\u306e\u5229\u7528\u5b9f\u614b\u306b\u5bfe\u3059\u308bSurvey\u306e\u5b9f\u65bd\u3082\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u30e1\u30f3\u30d0\u30fc\u306e\u30ea\u30d5\u30ec\u30c3\u30b7\u30e5\u4e2d\u30021\u6708\u672b\u3092\u3081\u3069\u3002<\/li>\n<li>1\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3092\u4f5c\u6210\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u5b9f\u65bd\u3002\u9060\u9694\u533b\u7642\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d6\u30ed\u30b0\u309212\u6708\u516c\u958b\u30021\u670826\u65e5\u306b\u9060\u9694\u533b\u7642\u306e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u5b9f\u65bd\u3059\u308b\u3002<\/li>\n<li>CSA\u672c\u90e8\u304b\u3089\u3001\u6765\u5e746\u672c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u533b\u7642\u6a5f\u5668\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5354\u8b70\u4f1a\u3068\u306e\u9023\u643a\u3002\u52c9\u5f37\u4f1a\u3001\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u884c\u3046\u65b9\u5411\u3067\u8abf\u6574\u4e2d\u3002\u9023\u643a\u56e3\u4f53\u3092\u76ee\u6307\u3059\u3002\uff08\u95a2\u897f\u652f\u90e8\u30c9\u30e9\u30a4\u30d6\uff09<\/li>\n<li>CSA\u672c\u90e8\u3001ZTA\u3092\u75c5\u9662\u306b\u5c0e\u5165\u3059\u308b\u3053\u3068\u306b\u3064\u3044\u3066\u30ea\u30b5\u30fc\u30c1\u304c\u884c\u308f\u308c\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u3067\u4f5c\u696d\u4e2d\uff08serverless architecture\uff09\u3002<\/li>\n<li>CSA\u672c\u90e8\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u306eexecutive\u5411\u3051\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u4f5c\u6210\u4e2d\u3002\u73fe\u5728\u3001Peer Review\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e7412\u6708\u3000\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>\u00a00.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002\u4f5c\u696d\u4ee3\u66ff\u8005\u3092\u30a2\u30b5\u30a4\u30f3\u3057\u3001\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3092\u7dad\u6301\u3059\u308b\u65b9\u5411\u3067\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>SDP Spec v2\u3000\u6765\u5e742\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>\u00a0&#8220;toward a zero trust architecture&#8221;\u304cCSA Washington chapter\u3088\u308a\u30ea\u30ea\u30fc\u30b9\u3002SDPWG\u3067\u7ffb\u8a33\u3092\u884c\u3046\u3053\u3068\u306b\u6c7a\u5b9a\u3002\u4f5c\u696d\u958b\u59cb\u30021\u6708\u524d\u534a\u516c\u958b\u3092\u76ee\u6307\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The-State-of-Cloud-Security\u300212\u670814\u65e5\u516c\u958b\u6e08\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u4f5c\u696d\u4e2d\u3002<\/li>\n<li>How to Design a Secure Serverless Architecture\u3000\u306e\u7ffb\u8a33\u4f5c\u696d\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u4f1a\u958b\u59cb\u3002IoT Control Matrix\u306eV3\u3092\u6765\u5e74RSA\u306b\u5408\u308f\u305b\u3066\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002\uff70&gt;\u3000\u8981\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002AWS:2\uff5e3\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c3\u304b\u6708\u3054\u3068\u3092\u4e88\u5b9a\u3002\u516c\u958b\u306b\u3064\u3044\u3066\u306f\u3001\u4eca\u5f8c\u691c\u8a0e\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>WG\u30e1\u30f3\u30d0\u30fc\u6574\u7406\u6e08\u3002ML\u306e\u65b9\u3082\u6574\u7406\u3059\u308b-&gt;\u8af8\u89d2\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>SaaS\u3092\u30bb\u30ad\u30e5\u30a2\u306b\u6d3b\u7528\u3059\u308b\u305f\u3081\u306e\u3001\u6307\u6a19\u3084\u5404\u7a2e\u53c2\u8003\u8cc7\u6599\u306e\u60c5\u5831\u5171\u6709\u3092\u5b9f\u65bd<\/li>\n<li>12\/22\u5b9a\u4f8b\u4f1a\u3067\u4ee5\u4e0b\u306e\u691c\u8a0e\u3092\u9032\u3081\u308b\u3002<\/li>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u63d0\u4f9b\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\uff08\u7b2c\uff13\u7248\uff09\u300d(\u7dcf\u52d9\u7701)<\/li>\n<li>Cloud Octagon Model(SaaS Governamce WG)<\/li>\n<li>CSA SaaS Governance Best Practices For Cloud Customers<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u300c\u500b\u4eba\u60c5\u5831\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u6cd5\u5f8b\u6e96\u62e0\u306e\u70ba\u306e\u884c\u52d5\u898f\u7bc4\u300d\u516c\u958b\u6e08\uff0812\u67082\u65e5\uff09\u3002<\/li>\n<li>\u30e1\u30f3\u30d0\u30fc\u306e\u66f4\u65b0\u306b\u3064\u3044\u3066\u3001\u6b21\u56de\u4f1a\u8b70\u3067\u78ba\u8a8d\u3092\u9032\u3081\u3066\u5b9f\u65bd\u3059\u308b\u3002<\/li>\n<li>1\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305fV1.1\u3092\u4f5c\u6210\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u9060\u9694\u533b\u7642\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d6\u30ed\u30b0\u309212\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>1\u670826\u65e5\u306b\u9060\u9694\u533b\u7642\u306e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u5b9f\u65bd\u3059\u308b\u3002<\/li>\n<li>CSA\u672c\u90e8\u304b\u3089\u3001\u6765\u5e746\u672c\u306e\u8cc7\u6599\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u3067\u4f5c\u696d\u4e2d\uff08serverless architecture\uff09\u3002<\/li>\n<li>CSA\u672c\u90e8\u3067\u3001\u30b5\u30fc\u30d0\u30ec\u30b9\u306eexecutive\u5411\u3051\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u4f5c\u6210\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e7411\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\u4e00\u6642\u30ec\u30d3\u30e5\u30fc\u304c\u534a\u5206\u7d42\u4e86\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002\u9032\u6357\u304c\u9032\u3093\u3067\u3044\u306a\u3044\u306e\u3067\u3001\u4f5c\u696d\u4ee3\u66ff\u8005\u3092\u30a2\u30b5\u30a4\u30f3\u3057\u3001\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3092\u7dad\u6301\u3059\u308b\u65b9\u5411\u3067\u9032\u3081\u308b\u3002<\/li>\n<li>CCM\/STAR\u63a8\u9032\u30b5\u30d6WG\u3092\u8a2d\u7acb\u6e96\u5099\u3002\u6e21\u9089\u3055\u3093\u30b5\u30d6\u30ea\u30fc\u30c0\u30fc\u300211\/30\u3001\u6253\u5408\u305b\u3092\u884c\u3046\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>ISDP Spec v2\u3000\u6765\u5e741\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<li>&#8220;toward a zero trust architecture&#8221;\u304cCSA Washington chapter\u3088\u308a\u30ea\u30ea\u30fc\u30b9\u3002\u5168\u54e1\u3067\u8aad\u3093\u3067\u3001\u6b21\u56de\u4f1a\u8b70\u3067\u65b9\u91dd\u3092\u691c\u8a0e\u3059\u308b\uff08\u7ffb\u8a33\u3059\u308b\u304b\u3069\u3046\u304b\u3082\u542b\u3081\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>The-State-of-Cloud-Security\u306e\u7ffb\u8a33\u4e2d\u300212\u6708\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u306b\u7740\u624b\u3002<\/li>\n<li>\u6b21\u306e\u7ffb\u8a33\u306b\u3064\u3044\u3066\u3082\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>IoT Control Matrix V2\u3092\u8f2a\u8b1b\u5f62\u5f0f\u3067WG\u5185\u3067\u52c9\u5f37\u3059\u308b\u3002\u30e1\u30f3\u30d0\u30fc\u52df\u96c6\u4e2d\u3001\u307e\u3082\u306a\u304f\u958b\u59cb\u4e88\u5b9a\u3002<\/li>\n<li>IoT Control Matrix\u306eV3\u3092\u6765\u5e74RSA\u306b\u5408\u308f\u305b\u3066\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002\uff70&gt;\u3000\u8981\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>AWS\/Azure\/GCP\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ec\u30d3\u30e5\u30fc\u3092\u4f5c\u6210\u4e2d\u3002AWS:1\uff5e2\u6708\u3001Azure\/GCP:\u305d\u306e\u5f8c3\u304b\u6708\u3054\u3068\u3092\u4e88\u5b9a\u3002\u516c\u958b\u306b\u3064\u3044\u3066\u306f\u3001\u4eca\u5f8c\u691c\u8a0e\u3002<\/li>\n<li>DevSecOps\u89e3\u8aac\u30bb\u30df\u30ca\u30fc\uff1a\u3000\u30d6\u30ed\u30b0\u3001\u30bb\u30df\u30ca\u30fc\u306e\u65b9\u5411\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>WG\u30e1\u30f3\u30d0\u30fc\u6574\u7406\u4e2d\u300211\u6708\u307e\u3067\u306b\u8fd4\u4e8b\u304c\u306a\u3044\u5834\u5408\u306b\u306f\u524a\u9664\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>2\u56deCASBWG\u306e\u5b9a\u4f8b\u3092\u958b\u50ac\u3057\u307e\u3057\u305f\u3002\n<ul>\n<li>10\u670826\u65e5\uff1a\u3000\u5404\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u6398\u308a\u4e0b\u3052\u3001\u4eca\u5f8c\u306e\u6d3b\u52d5\u65b9\u91dd\u3092\u8b70\u8ad6<br \/>\n\u6d3b\u52d5\u3092\u3088\u308aSaaS\u3092\u30bb\u30ad\u30e5\u30a2\u306b\u5229\u6d3b\u7528\u3059\u308b\u305f\u3081\u306e\u3001\u60c5\u5831\u5171\u6709\u3068\u63d0\u4f9b\u8005\u3001\u5229\u7528\u8005\u306b\u5bfe\u3059\u308b\u5553\u8499\u6d3b\u52d5\u306b\u7d5e\u308b<\/li>\n<li>11\u670824\u65e5\uff1a\u3000SaaS\u3092\u30bb\u30ad\u30e5\u30a2\u306b\u6d3b\u7528\u3059\u308b\u305f\u3081\u306e\u3001\u6307\u6a19\u3084\u5404\u7a2e\u53c2\u8003\u8cc7\u6599\u306e\u60c5\u5831\u5171\u6709\u3092\u5b9f\u65bd<\/li>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u63d0\u4f9b\u306b\u304a\u3051\u308b\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\uff08\u7b2c\uff13\u7248\uff09\u300d(\u7dcf\u52d9\u7701)<\/li>\n<li>Cloud Octagon Model(SaaS Governance WG)<\/li>\n<li>CSA SaaS Governance Best Practices For Cloud Customers \uff082022\u306e2\u6708\u306b\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\uff09<br \/>\n\u305d\u308c\u305e\u308c\u306e\u7279\u5fb4\u3084ISMAP\u306a\u3069\u4ed6\u306e\u8a55\u4fa1\u5236\u5ea6\u306a\u3069\u3068\u306e\u95a2\u9023\u6027\u3092\u307e\u3068\u3081\u3066\u3001WG\u304b\u3089\u30d6\u30ed\u30b0\u7b49\u3067\u4f55\u304b\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u3067\u304d\u306a\u3044\u304b\u3092\u691c\u8a0e\u4e2d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoCJP\u30000\u300011\/29\u5b8c\u6210\u3002<\/li>\n<li>\u30e1\u30f3\u30d0\u30fc\u306e\u66f4\u65b0\u309212\u6708\u306b\u884c\u3046\u3002<\/li>\n<li>1\u6708\u304b\u3089CoCJP\u306e2022\u5e74\u7248\u306e\u5dee\u5206\u3092\u5165\u308c\u305f1\u3092\u4f5c\u6210\u958b\u59cb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u5b9f\u65bd\u3002\u9060\u9694\u533b\u7642\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d6\u30ed\u30b0\u309212\u6708\u516c\u958b\u4e88\u5b9a\u30021\u6708\u306b\u9060\u9694\u533b\u7642\u306e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u5b9f\u65bd\u3002<\/li>\n<li>CSA\u672c\u90e8\u304b\u3089\u3001\u533b\u7642\u6a5f\u5668\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9playbook\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u3002\u539a\u751f\u52b4\u50cd\u7701\u306b\u53c2\u8003\u8cc7\u6599\u3068\u3057\u3066\u63d0\u51fa\u3057\u305f\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u6982\u8aac\u3092PPT\u3067\u4f5c\u6210\u3002\u7ffb\u8a33\u3092\u7ffb\u8a33WG\u306b\u304a\u9858\u3044\u3057\u305f\u3044\uff08serverless architecture\uff09\u3002-&gt;\u3000\u7ffb\u8a33WG\u3067\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e7410\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMv4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\u4e00\u6642\u30ec\u30d3\u30e5\u30fc\u304c\u534a\u5206\u7d42\u4e86\u3002\u6765\u5e745\u6708\u30ea\u30ea\u30fc\u30b9\u76ee\u6a19\u3002<\/li>\n<li>STAR\u8a8d\u8a3c\u306b\u95a2\u3059\u308b\u30d6\u30ed\u30b02\u672c\u516c\u958b\u3002\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement\u201d\u306e\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u53c2\u52a0<\/li>\n<li>SDP Spec v2\u306eWorking Group Session\u306b\u53c2\u52a0\uff08\u3069\u3061\u3089\u3082\u5c0f\u91ce\u3055\u3093\uff09<\/li>\n<li>SDP\u306e\u73fe\u72b6\u3001ZScaler\u7b49\u3068\u306e\u95a2\u9023\u306b\u3064\u3044\u3066\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3092\u5b9f\u65bd\uff08\u30c6\u30af\u30de\u30c8\u30ea\u30c3\u30af\u30b9\u592a\u7530\u3055\u3093\uff09<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>Threat Modeling Framework\u306e\u7ffb\u8a33\u4e2d\u3002\u307e\u3082\u306a\u304f\u516c\u958b\u4e88\u5b9a\u3002<\/li>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9V4\u306e\u898b\u76f4\u3057\u306b\u7740\u624b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>\u6d3b\u52d5\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG\n<ul>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u91cd\u5927\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u5bfe\u7b56 \u2013 DevSecOps\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9 \u2013\u300d\u516c\u958b\u3002<\/li>\n<li>\u73fe\u5728\u3001Well Architected framework \u3092\u6398\u308a\u4e0b\u3052\u3066\u3044\u308b\u3002\u30c9\u30e9\u30d5\u30c8\u5b8c\u4e86\u300212\uff5e1\u6708\u516c\u958b\u4e88\u5b9a\u3067\u9032\u3081\u3066\u3044\u308b\u3002\u3055\u3089\u306b\u3001Azure\u7b49\u306b\u30d5\u30a9\u30fc\u30ab\u30b9\u3059\u308b\u304b\u3092\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>9\/29\u52c9\u5f37\u4f1a\u5b9f\u65bd\u3002\u65e2\u5b58\u306eCASB\u30e6\u30fc\u30b6\u306e\u72b6\u6cc1\u306e\u691c\u8a0e\u3002State of Cloud Security Risk, Compliance, and Misconfigurations\u3092\u4f7f\u3063\u305f\u52c9\u5f37\u4f1a\u3092\u5b9f\u65bd\u300210\/26\u4f1a\u8b70\uff1a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u8a3c\u3092\u6398\u308a\u4e0b\u3052\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\uff08\u6821\u6b63\u30ec\u30d9\u30eb\uff09\u309211\u67085\u65e5\u4e88\u5b9a\u3002Congress\u524d\u306b\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3067\u9032\u3081\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u533b\u7642Blockchain\u306e\u30d6\u30ed\u30b0\u4f5c\u6210\u4e2d\u3002\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306f11\/22\u4e88\u5b9a\uff08\u5927\u548c\u3055\u3093\u3092\u62db\u5f85\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u30b5\u30fc\u30d0\u30ec\u30b9\u306e\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u89e3\u8aac\u7248\u3092\u4f5c\u6210\u4e2d\u3002\u8cc7\u6599\u3068\u3057\u3066\u4f5c\u6210\u3059\u308b\u300211\u6708\u4e2d\u65ec\u4e88\u5b9a\u3002<\/li>\n<li>\u7ffb\u8a33\u306b\u3064\u3044\u3066\u306f\u3001\u89e3\u8aac\u7248\u4f5c\u6210\u5f8c\u3001\u7ffb\u8a33WG\u306b\u4f9d\u983c\u3059\u308b\u3053\u3068\u306b\u306a\u308a\u305d\u3046\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e749\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u4e2d\u3002\n<ul>\n<li>FedRAMP\u306e\u898f\u683c\u3082\u8ffd\u52a0\u3057\u3066\u8a55\u4fa1\u3059\u308b\u3002<\/li>\n<li>3\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u201cIntegrating SDP and DNS: Enhanced Zero Trust Policy Enforcement\u201d\u306e\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u53c2\u52a0\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u7ffb\u8a33\u4f5c\u696d\u3092\u30ad\u30c3\u30af\u3059\u308b\u4e88\u5b9a\uff08\u6765\u9031\u306e\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\uff09<\/li>\n<li>CSA\u672c\u90e8\u516c\u958b\u8cc7\u6599\u306e\u3069\u308c\u3092\u7ffb\u8a33\u3059\u308b\u304b\u306e\u8a08\u753b\u3092\u884c\u3046\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>8\u6708\u6d3b\u52d5\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>9\/29\u52c9\u5f37\u4f1a\u5b9f\u65bd\u4e88\u5b9a\u3002\u6700\u65b0\u306eCASB\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u72b6\u6cc1\u3001CSA\u672c\u90e8\u72b6\u6cc1\u306a\u3069\u306b\u3064\u3044\u3066\u60c5\u5831\u5171\u6709\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoC for\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\n<ul>\n<li>\u30ec\u30d3\u30e5\u30fc\u5b8c\u4e86<\/li>\n<li>\u5e8f\u6587\u4f5c\u6210\u4e2d\u3002\u500b\u4eba\u60c5\u5831\u4fdd\u8b77\u6cd5\u306e\u52d5\u304d\u304c\u901f\u3044\u306e\u3067\u3001\u305d\u308c\u3092\u542b\u3081\u3066\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u305d\u306e\u5f8c\u4f53\u88c1\u3092\u6574\u3048\u308b\u4f5c\u696d\u306b\u5165\u308b\u3002<\/li>\n<li>11\u6708\u30ea\u30ea\u30fc\u30b9\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u95a2\u897f\u652f\u90e8\u3067\u3001\u5927\u962a\u5546\u5de5\u4f1a\u8b70\u6240\u306e\u6771\u69d8\u3088\u308a\u9023\u7d61\u3042\u308a\u3002\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u30fc\u306b\u304a\u3051\u308b\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u306e\u691c\u8a0e\u3092\u884c\u3046\u3002\u5927\u962a\u5546\u5de5\u4f1a\u8b70\u6240\u3067\u518d\u5efa\u3068\u304c\u5165\u3063\u3066\u3044\u3066\u30da\u30f3\u30c7\u30a3\u30f3\u30b0\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>CSA\u672c\u90e8\u304b\u3089\u516c\u958b\u3055\u308c\u305fMicroService\u304a\u3088\u3073Serverless\u306e\u8cc7\u6599\u306e\u89e3\u8aac\u7248\u3092\u4f5c\u6210\u4e88\u5b9a\u3002\u7ffb\u8a33\u306b\u3064\u3044\u3066\u306f\u3001\u305d\u306e\u5f8c\u691c\u8a0e\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e748\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>ISMAP\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9:\n<ul>\n<li>CMV3.0.1\u3068\u300c\u653f\u5e9c\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u5236\u5ea6(ISMAP)\u300d\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u516c\u958b\u3000\uff082021\/8\/9\uff09<\/li>\n<li>\u4eca\u5f8c\u306f\u3001CCM\/STAR WG\u3067\u6d3b\u52d5\u7d99\u7d9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCMV4.0.2\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u4f5c\u696d\u958b\u59cb\u3002\n<ul>\n<li>\u30ea\u30ea\u30fc\u30b9\u76ee\u7684\u306e\u660e\u78ba\u5316\u3002\n<ul>\n<li>\u30b8\u30e3\u30d1\u30f3\u5411\u3051\uff1a\u3000ISO\u3068ISMAP\u306e\u30ae\u30e3\u30c3\u30d7\u3082\u8a18\u8f09\u3002<\/li>\n<li>\u672c\u90e8\u5411\u3051\uff1a\u3000CCM\u3068ISMAP\u306e\u30ae\u30e3\u30c3\u30d7\u5206\u6790\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>ISMAP\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\u3092\u53d6\u308a\u8fbc\u307f\u5f62\u3067\u65b0\u305f\u306b\u6d3b\u52d5\u958b\u59cb\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>\u6d3b\u52d5\u518d\u958b\u306b\u5411\u3051\u4f1a\u8b70\u5b9f\u65bd\uff082021\/8\/20\uff09\u3002\u4ee5\u4e0b\u306e\u9818\u57df\u3067\u6d3b\u52d5\u3092\u9032\u3081\u308b\uff1a\n<ul>\n<li>SDP V2\u306e\u7406\u89e3\u3002\u5fc5\u8981\u306b\u5fdc\u3058\u3066\u7ffb\u8a33\u3002<\/li>\n<li>LAB\u74b0\u5883\u3092\u7528\u3044\u305f\u691c\u8a0e\u4f1a\u7b49\u3092WG\u3067\u5b9f\u65bd\u3002<\/li>\n<li>\u5343\u8449\u5de5\u696d\u5927\u5b66\u3068\u306e\u9023\u643a<\/li>\n<li>CSA\u672c\u90e8\u304c\u4f5c\u308d\u3046\u3068\u3057\u3066\u3044\u308b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068SDP\u306e\u6559\u80b2\u30b3\u30fc\u30b9\u306e\u8abf\u67fb\u30fb\u691c\u8a0e\u3002<\/li>\n<li>SASE\u3068SDP\u306e\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\uff1a\n<ul>\n<li>CCMV4.0.2, CAIQV4.0.2\u306e\u65e5\u672c\u8a9e\u7248\u516c\u958b\u3000(2021\/8\/20)<\/li>\n<li>\u4eca\u5f8c\u306f\u7ffb\u8a33WG\u3068\u3057\u3066\u9032\u3081\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33WG\uff1a\n<ul>\n<li>\u7ffb\u8a33\u306b\u3064\u3044\u3066\u306f\u3001\u4eca\u307e\u3067\u306e\u9032\u3081\u65b9\u3092\u8e0f\u8972\u3059\u308b\u3002WG\u3068\u3057\u3066\u306f\u3001\u7ffb\u8a33\u7ba1\u7406\u3092\u884c\u3044\u3001\u7ffb\u8a33\u306f\u30dc\u30e9\u30f3\u30c6\u30a3\u30a2\u3092\u96c6\u3081\u3066\u884c\u3046\u3002<\/li>\n<li>\u65b0\u305f\u306a\u6d3b\u52d5\u3068\u3057\u3066\u3001\u8a33\u8a9e\u96c6\u306e\u4f5c\u6210\u3001\u65e2\u5b58\u6587\u66f8\u306e\u898b\u76f4\u3057\u3001\u6a5f\u68b0\u7ffb\u8a33\u3001\u7ffb\u8a33\u5dee\u5206\u7ba1\u7406\u306e\u691c\u8a0e\u7b49\u3092\u884c\u3046\u3002<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>7\u6708\u6d3b\u52d5\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>7\u6708\u306e\u5b9a\u4f8b\u4f1a\u306b\u3066\u3001CASB\u5468\u8fba\u306e\u72b6\u6cc1\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3068\u3001\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6574\u7406\u3001\u672c\u56fd\u306eCSA\u30d6\u30ed\u30b0\u5185\u5bb9\u306e\u30b7\u30a7\u30a2\u3092\u5b9f\u65bd\u3002\u6b21\u56de\u306f9\u6708\u4e2d\u65ec\uff5e\u672b\u9803\u306b\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<li>\u53c2\u52a0\u4eba\u6570\u304c\u5c11\u306a\u3044\u306e\u304c\u8ab2\u984c\u3068\u306a\u3063\u3066\u304a\u308a\u3001\u3082\u3046\u6570\u56de\u5b9f\u65bd\u3057\u3066\u307f\u3066\u3001\u305d\u306e\u7d50\u679c\u6b21\u7b2c\u3067\u306f\u3001\u5225WG\u3078\u306e\u7d71\u5408\u3082\u691c\u8a0e\u3057\u305f\u3044\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u30ec\u30d3\u30e5\u30fc\u5b8c\u4e86\u3002\u6821\u6b63\u3092\u958b\u59cb\u3059\u308b\uff08\u30a2\u30a6\u30c8\u30bd\u30fc\u30b9\u306e\u53ef\u80fd\u6027\u3082\u3042\u308a\uff09\u300211\u6708\u30ea\u30ea\u30fc\u30b9\u3092\u76ee\u6a19\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>\u95a2\u897f\u652f\u90e8\u3067\u3001\u5927\u962a\u5546\u5de5\u4f1a\u8b70\u6240\u306e\u6771\u69d8\u3088\u308a\u9023\u7d61\u3042\u308a\u3002\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u30fc\u306b\u304a\u3051\u308b\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u306e\u691c\u8a0e\u3092\u884c\u3046\u3002\u30aa\u30f3\u30e9\u30a4\u30f3\u4f1a\u8b70\u3092\u5b9f\u65bd\u3002<\/li>\n<li>\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3WG\u306eDID\u306a\u3069\u3068\u306e\u9023\u643a\u304c\u5fc5\u8981\u304b\u3082\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>CSA\u672c\u90e8\u304b\u3089\u306e\u65b0\u3057\u3044\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u516c\u958b\u5f85\u3061\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e747\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCM\u3000V4\u7ffb\u8a33\u7248\u516c\u958b\uff082021\u5e747\u670819\u65e5\uff09\uff08\u7ffb\u8a33\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\u306e\u5354\u529b\u306e\u3082\u3068\uff09\u3002<\/li>\n<li>0.2, CAIQV4.0.2\u7ffb\u8a33\u4f5c\u696d\u958b\u59cb<\/li>\n<\/ul>\n<\/li>\n<li>SDP WG:\n<ul>\n<li>SDP\u3000Specification V2\u3078\u306e\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u3002<\/li>\n<li>\u4eca\u5f8c\u306e\u6d3b\u52d5\u65b9\u91dd\u306b\u3064\u3044\u3066\u3001\uff37\uff27\u30e1\u30f3\u30d0\u30fc\u3067\u5354\u8b70\u3092\u9032\u3081\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u7ffb\u8a33\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\uff1a\n<ul>\n<li>CCM\u3000V4\u7ffb\u8a33\u516c\u958b\uff082021\u5e747\u670819\u65e5\uff09<\/li>\n<li>Critical-Controls-Salesforce\u7ffb\u8a33\u516c\u958b\uff082021\u5e747\u67089\u65e5\uff09<\/li>\n<\/ul>\n<\/li>\n<li>IoT WG:\n<ul>\n<li>7\u6708\u6d3b\u52d5\u7121\u3057\u3002<\/li>\n<\/ul>\n<\/li>\n<li>CASB WG:\n<ul>\n<li>WG\u4f1a\u8b70\u30927\u670829\u65e5\u306b\u958b\u50ac\u3002\u30d6\u30ed\u30b0\u306e\u4ef6\u3092\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>\u6587\u8a00\u306e\u7d71\u4e00\u3001\u901a\u3057\u30ec\u30d3\u30e5\u30fc\u4e2d\u30022\u56de\u76ee\u306e\u30ec\u30d3\u30e5\u30fc\u30928\u6708\u4e88\u5b9a\u30023\u56de\u304f\u3089\u3044\u306e\u30ec\u30d3\u30e5\u30fc\u3067\u7d42\u4e86\u3059\u308b\u4e88\u5b9a\u3002Informative Marketing\u3092\u8ffd\u8a18\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>CoC for California(?) \u306e\u72b6\u6cc1\u3092\u8abf\u3079\u3066\u30d7\u30e9\u30a4\u30d0\u30b7WG\u306b\u9023\u7d61\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406 WG\uff1a\n<ul>\n<li>CSA\u672c\u90e8\u3067Peer Review 3\u672c\u3042\u308a\u3002\u3055\u3089\u306b\u8ffd\u52a0\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u4f5c\u6210\u4e88\u5b9a\u3002<br \/>\nCSA\u30b8\u30e3\u30d1\u30f3\u95a2\u897f\u652f\u90e8\u306e\u30d6\u30ed\u30b0\u3067\u6982\u8981\u3092\u7d39\u4ecb\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>HealthcareWG \u3068IoTWG\u304b\u3089\u3001\u533b\u7642\u6a5f\u5668\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u306e\u30d7\u30ec\u30a4\u30d6\u30c3\u30af\u304c\u307e\u3082\u306a\u304fPeer Review.<\/li>\n<\/ul>\n<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c8\u306e\u8cc7\u6599\u304cCSA\u672c\u90e8\u304b\u3089\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002WG\u3068\u3057\u3066\u6982\u8981\u8aac\u660e\u8cc7\u6599\u3092\u4f5c\u6210\u3059\u308b\u4e88\u5b9a\u3002<\/li>\n<li>&#8220;serverless framework&#8221; \u304cpeer review\u4e2d\u3002\u307e\u3082\u306a\u304f\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002\u3002<\/li>\n<li>DevSecOps\u3068\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u8cc7\u6599\u3092CSA\u672c\u90e8\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<li>ISMAP\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9:\n<ul>\n<li>7\u670826\u65e5ISMAPV3\u306e\u30af\u30ed\u30fc\u30b8\u30f3\u30b0\u3002\u6765\u9031\u306e\u904b\u55b6\u59d4\u54e1\u4f1a\u3067\u7d42\u4e86\u5831\u544a\u3068\u30ea\u30ea\u30fc\u30b9\u306b\u3064\u3044\u3066\u9023\u7d61\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>2021\u5e746\u6708\u6d3b\u52d5\u72b6\u6cc1<\/h3>\n<ul>\n<li>CCM\/STAR\u3000WG:\n<ul>\n<li>CCM\u3000V4\u7ffb\u8a33\u4e2d\uff08\u7ffb\u8a33\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\u306e\u5354\u529b\u306e\u3082\u3068\uff09\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>SDP WG:\n<ul>\n<li>\u5343\u8449\u5de5\u696d\u5927\u5b66\u3068\u306e\u30b3\u30e9\u30dc\u306b\u5411\u3051\u3066\u3001\u60c5\u5831\u4ea4\u63db\u3002<\/li>\n<li>SDP Specification V2\u3078\u306e\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u5b9f\u65bd\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u7ffb\u8a33\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\uff1a\n<ul>\n<li>\u30af\u30e9\u30a6\u30c9\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\uff08CIR\uff09\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u7ffb\u8a33\u516c\u958b\uff082021\/6\/3)<\/li>\n<li>CCM\u3000V4\u7ffb\u8a33\u4e2d<\/li>\n<li>Critical-Controls-Salesforce\u7ffb\u8a33\u4e2d<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>IoT WG:\n<ul>\n<li>IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3000V2\u3000\u7ffb\u8a33\u516c\u958b\uff082021\/5\/30\uff09<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>CASB WG:\n<ul>\n<li>\u52c9\u5f37\u4f1a\u300cSaaS\u306e\u8a2d\u5b9a\u3092\u53ef\u8996\u5316\u3001\u76e3\u67fb\u3059\u308bSSPM\u3068\u306f\uff1f\u300d\uff082021\/6\/25\u5b9f\u65bd\u4e88\u5b9a\uff09<\/li>\n<li>7\u6708\u5b9a\u4f8b\u4f1a\u5b9f\u65bd\u4e88\u5b9a<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30d7\u30e9\u30a4\u30d0\u30b7WG:\n<ul>\n<li>CoCJP\u4f5c\u6210\u306f\u3001\u5404\u7ae0\u306f\u57f7\u7b46\u304c\u307b\u307c\u5b8c\u4e86\u3002\u901a\u3057\u3067\u30ec\u30d3\u30e5\u30fc\u3092\u5b9f\u65bd\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Health WG\uff1a\n<ul>\n<li>6\u6708\u30d6\u30ed\u30b0\u30a2\u30c3\u30d7\u30027\u6708\u306b\u3053\u306e\u5185\u5bb9\u3067\u52c9\u5f37\u4f1a\u3092\u884c\u3046\u4e88\u5b9a\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG:\n<ul>\n<li>\u30b5\u30fc\u30d0\u30ec\u30b9\u306e\u8cc7\u6599\u304c7\u6708\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u8cc7\u6599\u306f\u305d\u306e\u5f8c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u4e88\u5b9a\u3002<\/li>\n<li>DevSecOps\u3068\u30b3\u30f3\u30c6\u30ca\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u8cc7\u6599\u3092CSA\u672c\u90e8\u3067\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>ISMAP\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9:\n<ul>\n<li>7\/26\u30af\u30ed\u30fc\u30b8\u30f3\u30b0\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u4e88\u5b9a\u3002CCM\u30000.1\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u6e08\u30028\u6708\u904b\u55b6\u59d4\u54e1\u4f1a\u3067\u30ea\u30ea\u30fc\u30b9\u306b\u5411\u3051\u3066\u627f\u8a8d\u3092\u5f97\u308b\u4e88\u5b9a\u3002<\/li>\n<li>CCMV4\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u30928\u6708\u958b\u59cb\u4e88\u5b9a\u3002<\/li>\n<li>ISMAP\u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\u3068CCM\/STAR WG\u306e\u5408\u4f53\u3092\u542b\u3081\u3066\u691c\u8a0e\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG:\n<ul>\n<li>\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3092\u4f7f\u3063\u305f\u691c\u8a0e\u3002\u4eca\u5f8c\u3069\u3046\u9032\u3081\u3066\u3044\u304f\u304b\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u306e\u6bd4\u8f03\u3092\u884c\u3046\u304b\u3069\u3046\u304b\u3092\u691c\u8a0e\u4e2d\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3WG:\n<ul>\n<li>\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u304c\u307e\u3068\u307e\u308a\u3064\u3064\u3042\u308b\u30026\/28\u306b\u5b8c\u7d50\u78ba\u8a8d\u3002\u516c\u958b\u306b\u9032\u3081\u308b\u4e88\u5b9a\u3002<\/li>\n<li>\u60c5\u5831\u4ea4\u63db\u306e\u5834\u3068\u3057\u3066WG\u306f\u7d99\u7d9a\u3059\u308b\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u904e\u53bb\u306eWG\u6708\u4f8b\u6d3b\u52d5\u5831\u544a\u306f\u3001\u3053\u3061\u3089\u306b\u30a2\u30fc\u30ab\u30a4\u30d6\u3057\u307e\u3059 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=18910\" title=\"WG\u6708\u6b21\u6d3b\u52d5\u5831\u544a\u30a2\u30fc\u30ab\u30a4\u30d6\u30b9\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-18910","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/18910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18910"}],"version-history":[{"count":54,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/18910\/revisions"}],"predecessor-version":[{"id":42463,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/18910\/revisions\/42463"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1155"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}