﻿{"id":21498,"date":"2022-02-27T11:41:51","date_gmt":"2022-02-27T02:41:51","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21498"},"modified":"2023-09-18T15:24:26","modified_gmt":"2023-09-18T06:24:26","slug":"ccak","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21498","title":{"rendered":"CCAK"},"content":{"rendered":"<p>\u3053\u306e\u30a6\u30a8\u30d6\u30da\u30fc\u30b8\u306b\u306f\u3001CCAK(Certificate of Cloud Auditing Knowledge)\u306e\u60c5\u5831\u3092\u8f09\u305b\u307e\u3059\u3002<\/p>\n<ol>\n<li>CCAK\u3068\u306f\n<ul>\n<li>CCAK is the first-ever, technical, vendor-neutral credential for cloud auditing. This certificate fills a gap in the industry for competent technical professionals who can help organizations mitigate risks and optimize ROI in the cloud.<br \/>\nCCAK\u306f\u3001\u30af\u30e9\u30a6\u30c9\u76e3\u67fb\u306e\u305f\u3081\u306e\u3001\u6280\u8853\u7684\u3067\u30d9\u30f3\u30c0\u30fc\u30cb\u30e5\u30fc\u30c8\u30e9\u30eb\u306a\u521d\u306e\u8cc7\u683c\u3067\u3059\u3002\u3053\u306e\u8cc7\u683c\u306f\u3001\u4f01\u696d\u304c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30ea\u30b9\u30af\u3092\u8efd\u6e1b\u3057\u3001ROI\u3092\u6700\u9069\u5316\u3059\u308b\u3053\u3068\u3092\u652f\u63f4\u3067\u304d\u308b\u6709\u80fd\u306a\u6280\u8853\u5c02\u9580\u5bb6\u3092\u6c42\u3081\u3066\u3044\u308b\u696d\u754c\u306e\u30ae\u30e3\u30c3\u30d7\u3092\u57cb\u3081\u308b\u3082\u306e\u3067\u3059\u3002<\/li>\n<li>CCAK prepares IT professionals to address the unique challenges of auditing the cloud, ensuring the right controls for confidentiality, integrity and accessibility and mitigating risks and costs of audit management and non-compliance.<br \/>\nCCAK\u306f\u3001\u30af\u30e9\u30a6\u30c9\u306e\u76e3\u67fb\u3001\u6a5f\u5bc6\u6027\u3001\u5b8c\u5168\u6027\u3001\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u9069\u5207\u306a\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u306e\u78ba\u4fdd\u3001\u76e3\u67fb\u7ba1\u7406\u3084\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u9055\u53cd\u306e\u30ea\u30b9\u30af\u3068\u30b3\u30b9\u30c8\u306e\u8efd\u6e1b\u3068\u3044\u3063\u305f\u72ec\u81ea\u306e\u8ab2\u984c\u306b\u5bfe\u51e6\u3059\u308b\u305f\u3081\u306eIT\u30d7\u30ed\u30d5\u30a7\u30c3\u30b7\u30e7\u30ca\u30eb\u3092\u80b2\u6210\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li>\u95a2\u9023\u60c5\u5831\uff08\u82f1\u8a9e\uff09\n<ul>\n<li>CSA\u672c\u90e8\u306eCCAK\u7d39\u4ecb\u30b5\u30a4\u30c8<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/education\/ccak\/\">https:\/\/cloudsecurityalliance.org\/education\/ccak\/<\/a><\/li>\n<li>ISACA\u306eCCAK\u7d39\u4ecb\u30b5\u30a4\u30c8<br \/>\n<a href=\"https:\/\/www.isaca.org\/credentialing\/certificate-of-cloud-auditing-knowledge\">https:\/\/www.isaca.org\/credentialing\/certificate-of-cloud-auditing-knowledge<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u95a2\u9023\u60c5\u5831\uff08\u65e5\u672c\u8a9e\uff09<br \/>\n<span style=\"color: #000000;\">\u73fe\u5728\u3001\u65e5\u672c\u8a9e\u3067\u516c\u958b\u3067\u304d\u308b\u8cc7\u6599\u304c\u63c3\u3063\u3066\u3044\u306a\u3044\u72b6\u6cc1\u3067\u3059\u3002\u305d\u3053\u3067\u3001\u4ee5\u4e0b\u306e\u8cc7\u6599\u3092\u53c2\u8003\u8cc7\u6599\u3068\u3057\u3066\u63b2\u8f09\u3057\u307e\u3059\u3002CCAK\u306e\u8a66\u9a13\u6982\u8981\u3001CCAK\u306e\u5185\u5bb9\u7b49\u8a18\u8f09\u3057\u3066\u3042\u308a\u307e\u3059\u306e\u3067\u3001\u3054\u53c2\u7167\u304f\u3060\u3055\u3044\u3002<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">2022\u5e741\u6708\u306b\u884c\u3063\u305f\u52c9\u5f37\u4f1a\u306e\u8cc7\u6599<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/03\/CCAK_20220124.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/03\/CCAK_20220124.pdf<\/a><\/span><\/li>\n<li>2022\u5e7412\u6708 \u7b2c9\u56de ISACA\u6771\u4eac\u652f\u90e8\u30ab\u30f3\u30d5\u30a1\u30ec\u30f3\u30b9<br \/>\nISACA\u6771\u4eac\u652f\u90e8 \u4f1a\u54e1\u9650\u5b9a\u30da\u30fc\u30b8\u5185\u306e\u300c\u30d3\u30c7\u30aa\u30bb\u30df\u30ca\u30fc\u306e\u4e00\u89a7\u300d\u304b\u3089\u95b2\u89a7\u3067\u304d\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u3053\u306e\u30a6\u30a8\u30d6\u30da\u30fc\u30b8\u306b\u306f\u3001CCAK(Certifica <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21498\" title=\"CCAK\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":109,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-21498","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/21498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21498"}],"version-history":[{"count":7,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/21498\/revisions"}],"predecessor-version":[{"id":29858,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/21498\/revisions\/29858"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/109"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}