﻿{"id":27596,"date":"2023-04-13T17:00:58","date_gmt":"2023-04-13T08:00:58","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=27596"},"modified":"2026-04-01T17:56:35","modified_gmt":"2026-04-01T08:56:35","slug":"%e6%96%b0%e6%97%a5%e6%9c%ac%e8%aa%9e%e8%b3%87%e6%96%99%e9%9b%86","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=27596","title":{"rendered":"\u65e5\u672c\u8a9e\u8cc7\u6599\u96c6"},"content":{"rendered":"<p><strong><span style=\"color: #ff0000;\"><span style=\"color: #000000;\">\u3053\u3053\u306b\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u3055\u307e\u3056\u307e\u306a\u8cc7\u6599\u306e\u7d22\u5f15\u3092\u63b2\u8f09\u3057\u3066\u3044\u307e\u3059\uff08\u3042\u3044\u3046\u3048\u304a\u9806\uff09\u3002\u306a\u304a\u3001\u8a73\u7d30\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1155\">\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30a6\u30a8\u30d6\u30da\u30fc\u30b8\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/span><br \/>\n<\/span><\/strong><\/p>\n<ol>\n<li>\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u95a2\u9023\u8cc7\u6599\n<ol>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/IQCKUnufCNudR4xq2YiEIt4kAWwecEiVhpuyMWaP6P_lnXE?e=71bvp0\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u30d5\u30a1\u30fc\u30b9\u30c8\u6642\u4ee3\u306b\u304a\u3051\u308b\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406<\/a><\/li>\n<\/ol>\n<\/li>\n<li><strong>\u6697\u53f7\u5316\u30fb\u9375\u7ba1\u7406\u95a2\u9023\u8cc7\u6599<\/strong>\n<ol>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2025\/02\/Fully-Homomorphic-Encryption_-A-Comprehensive-Guide-for-Cybersecurity-Professionals-20250128_J.pdf\">\u5b8c\u5168\u6e96\u540c\u578b\u6697\u53f7\uff1a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u9580\u5bb6\u306e\u305f\u3081\u306e\u5305\u62ec\u7684\u30ac\u30a4\u30c9<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/02\/09\/%e3%83%87%e3%83%bc%e3%82%bf%e3%81%ae%e6%9a%97%e5%8f%b7%e5%8c%96%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e5%88%a9%e7%94%a8%e8%80%85%e9%8d%b5%e7%ae%a1%e7%90%86%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6\/\">\u30c7\u30fc\u30bf\u306e\u6697\u53f7\u5316\u306b\u304a\u3051\u308b\u5229\u7528\u8005\u9375\u7ba1\u7406\u306b\u3064\u3044\u3066<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/02\/05\/%e3%82%b3%e3%83%b3%e3%83%95%e3%82%a3%e3%83%87%e3%83%b3%e3%82%b7%e3%83%a3%e3%83%ab%e3%82%b3%e3%83%b3%e3%83%94%e3%83%a5%e3%83%bc%e3%83%86%e3%82%a3%e3%83%b3%e3%82%b0%e3%81%a8%e3%82%af%e3%83%a9%e3%82%a6\/\">\u30b3\u30f3\u30d5\u30a3\u30c7\u30f3\u30b7\u30e3\u30eb\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30af\u30e9\u30a6\u30c9\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2015\/09\/17\/%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e7%92%b0%e5%a2%83%e3%81%a7%e3%81%ae%e6%9a%97%e5%8f%b7%e5%8c%96%ef%bc%8f%e9%8d%b5%e7%ae%a1%e7%90%86%e3%80%80%ef%bc%8d%e3%80%80salesforce-com%e3%81%ae%e3%82%a2\/\">\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u3067\u306e\u6697\u53f7\u5316\uff0f\u9375\u7ba1\u7406\u3000\uff0d\u3000Salesforce.com\u306e\u30a2\u30d7\u30ed\u30fc\u30c1<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<li><strong>IoT\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EdUfXeW4Z-RNvszi7T4jYToBFLewZI5VSjRIJy1GEAJiNQ?e=YI1edT\" target=\"_blank\" rel=\"noopener\">\u300cIoT\u306e\u305f\u3081\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30ac\u30a4\u30c0\u30f3\u30b9\u3000\u52b9\u679c\u7684\u306aZT\u5b9f\u65bd\u306e\u305f\u3081\u306e\u5b9f\u8df5\u30ac\u30a4\u30c0\u30f3\u30b9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/06\/CSA-IoT-Controls-Matrix-v3_J.xlsx\">\u300cCSA IoT Controls Matrix V3\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/06\/Guide-to-the-CSA-IoT-Controls-Matrix-v3_J.pdf\">\u300cCSA IoT Controls Matrix v3\u30ac\u30a4\u30c9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/IoT_WG\/scenario.pdf\">\u300cIoT\u3078\u306e\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u4eee\u60f3\u30b9\u30c8\u30fc\u30ea\u30fc\u96c6\uff08\u7b2c\u4e00\u7248\uff09\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/IoT_WG\/future-proofing-the-connected-world_J_20170520.pdf\">\u300c\u3064\u306a\u304c\u308b\u4e16\u754c\u300d\u3092\u7834\u7dbb\u3055\u305b\u306a\u3044\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30a2\u306aIoT\u88fd\u54c1\u958b\u767a\u300013\u306e\u30b9\u30c6\u30c3\u30d7<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/IoT_WG\/IoT_incident_evaluation_V11.pdf\">\u300cInternet of Things (IoT)\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u5f71\u97ff\u8a55\u4fa1\u306b\u95a2\u3059\u308b\u8003\u5bdf\u300d\u7b2c1.1\u7248<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/IoT_WG\/identity-and-access-management-for-the-iot_J_V1.pdf\">\u300cIoT\u306b\u304a\u3051\u308bID\/\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3000\u8981\u70b9\u30ac\u30a4\u30c0\u30f3\u30b9\u300d<\/a><\/li>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/IoT_WG\/Threats-IoTCloud%20Service-final%20(%20Reviewed).pdf\">IoT\u3000(M2M\u3000\u3082\u3057\u304f\u306f\u30b9\u30de\u30fc\u30c8\u5bb6\u96fb\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b5\u30fc\u30d3\u30b9\u7b49\uff09\u3078\u306e\u4e3b\u306a\u8105\u5a01\u5019\u88dc<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2018\/02\/16\/%e7%ac%ac9%e5%9b%9e%e3%80%80%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e4%bc%9a%e8%ad%b0%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88\/\">\u7b2c9\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300cIoT\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>AI\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/IQD8mLDY9d0lR4H7PCT8Pe7sAbIXgr0OQ7k1JsMeY8SR5dg?e=T2cz6o\" target=\"_blank\" rel=\"noopener\">AI\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u30de\u30c8\u30ea\u30c3\u30af\u30b9(AICM)\u3078\u306e\u5c0e\u5165\u30ac\u30a4\u30c0\u30f3\u30b9<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:x:\/s\/CSAJapanMaterial\/EYpPqpzt9rNHualilH-g2eEBmMdrkug_ollo_gIrdrxbVQ?e=Lxrfas\" target=\"_blank\" rel=\"noopener\">AICM\uff08AI Controls Matrix\uff09 V1.0<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EbBR_prYlQRMn8lVuyw_uCUBTwOy9Q7b_aJzgP3pJxKbgw?e=HPKff8\" target=\"_blank\" rel=\"noopener\">\u30a8\u30fc\u30b8\u30a7\u30f3\u30c6\u30a3\u30c3\u30afAI\u306e\u30ec\u30c3\u30c9\u30c1\u30fc\u30df\u30f3\u30b0\u30ac\u30a4\u30c9<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EQxcFdAk0g1Hs5kJ5fl8uJ0B30b2w856xoCv8X5wudu_NA?e=527A7N\">\u539f\u5247\u304b\u3089\u5b9f\u8df5\u3078\uff1a\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u306a\u898f\u5236\u74b0\u5883\u306b\u304a\u3051\u308b\u8cac\u4efb\u3042\u308bAI<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EcIISKCxAEJFpKRulhVwBy8Bbp37xnxkFkiJpEYesViRjw?e=xhjerX\" target=\"_blank\" rel=\"noopener\">AI\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\uff1aAI\u306e\u5b89\u5168\u6027\u306b\u95a2\u3059\u308b\u9769\u547d\u7684\u306a\u30d9\u30f3\u30c1\u30de\u30fc\u30af\u30e2\u30c7\u30eb<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EbBJWU1eeQVIhl4W7GMbFmcB74TpIPQyVH_Jleh4zAswhg?e=NFDdex\" target=\"_blank\" rel=\"noopener\">AI\u7d44\u7e54\u306e\u8cac\u4efb\uff1a\u30b3\u30a2\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8cac\u4efb<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/Eeitqo-6TBNPhStfIKF7kvwBHlPsHI68xnclJUOGTESUvg?e=9qtSSh\" target=\"_blank\" rel=\"noopener\">ChatGPT\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3078\u306e\u5f71\u97ff\uff08full Release\u7248\uff09<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>SDN\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/05\/SDNuseguidance_20200525.pdf\">\u300cSDN\u5229\u7528\u30ac\u30a4\u30c0\u30f3\u30b9(V1.0)\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>CAIQ-Lite\/CCM-Lite\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/10\/CCMLitev4.0.9_Generated-at_2023-08-14_J.xlsx\">CCMLite V4.0.9<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/10\/CAIQLitev4.0.3_STAR-Security-Questionnaire_Generated-at_2023-08-14_J.xlsx\">CAIQLiteV4.0.3<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>CASB\/SaaS\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li>\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/08\/SaaS-Security-Survey-Report-2024-2_J.pdf\" target=\"_blank\" rel=\"noopener\">SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5e74\u6b21\u8abf\u67fb\u5831\u544a\u66f8<\/a>\u300d<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/05\/SaaSGovernanceBestPracticesforCloudCustomers_J_v1.1.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u306e\u305f\u3081\u306eSaaS\u30ac\u30d0\u30ca\u30f3\u30b9\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u300dV1.1<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/CASB_WP_20170302_v1.0.pdf\">\u300cCASB (Cloud Access Security Broker)\uff5e\u3000\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ae\u30e3\u30c3\u30d7\u306e\u89e3\u6d88\u3068\u6d3b\u7528\u4e8b\u4f8b\u3000\uff5e\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/CSA-Skyhigh-Repor-Flier.pdf\">\u30af\u30e9\u30a6\u30c9\u306b\u95a2\u3059\u308b\u8abf\u67fb\u30ec\u30dd\u30fc\u30c8\u300c\u30d0\u30e9\u30f3\u30b9\u306e\u3068\u308c\u305f\u30af\u30e9\u30a6\u30c9\u3067IT\u3092\u5b9f\u73fe\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/02\/20\/%e8%aa%8d%e8%a8%bc%e5%9f%ba%e7%9b%a4%e3%81%ae%e3%83%a2%e3%83%80%e3%83%b3%e5%8c%96%e3%81%a8casb%e3%81%aevalue\/\">\u8a8d\u8a3c\u57fa\u76e4\u306e\u30e2\u30c0\u30f3\u5316\u3068CASB\u306eValue<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2020\/11\/09\/sase%e3%81%ae%e7%99%bb%e5%a0%b4%e3%81%a8%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e3%82%92%e5%ae%9f%e7%8f%be%e3%81%99%e3%82%8bcasb%e3%81%ae%e3%82%ab%e3%83%90%e3%83%ac%e3%83%83%e3%82%b8\/\">SASE\u306e\u767b\u5834\u3068\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3092\u5b9f\u73fe\u3059\u308bCASB\u306e\u30ab\u30d0\u30ec\u30c3\u30b8<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2017\/08\/30\/%e7%ac%ac8%e5%9b%9e%e3%80%80%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e4%bc%9a%e8%ad%b0%e3%80%80%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88\/\">\u7b2c8\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300cCASB\u306f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u6551\u3048\u308b\u304b\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casb-wg-%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%E5%A7%8B%E3%82%81%E3%81%BE%E3%81%99%EF%BC%81\/\">CASBWG\u3000\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0\u306e\u3054\u6848\u5185<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u7b2c1\u56de\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0\u300c\u65e5\u672c\u4f01\u696d\u304cCASB\u306b\u6c42\u3081\u308b\u3082\u306e\u3068\u306f\uff1f\u3000- CASB\u304c\u30d0\u30ba\u30ef\u30fc\u30c9\u3067\u7d42\u308f\u3089\u306a\u3044\u7406\u7531-\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/03\/16\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac2%e5%9b%9e%ef%bc%89%e3%80%8ccasb-v-s-swg-%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa\/\">\u7b2c2\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/03\/16\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac2%e5%9b%9e%ef%bc%89%e3%80%8ccasb-v-s-swg-%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa\/\">\u300cCASB v.s. SWG \u2013 \u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff1f\u305d\u308c\u3068\u3082\u30a6\u30a7\u30d6\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff1f \u2013\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/03\/24\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC3%E5%9B%9E%EF%BC%89%E3%80%8Cgdpr%E3%81%A8casb%E3%80%8D\/\">\u7b2c3\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/03\/24\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC3%E5%9B%9E%EF%BC%89%E3%80%8Cgdpr%E3%81%A8casb%E3%80%8D\/\">\u300cGDPR\u3068CASB\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/04\/10\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac4%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%a2%e3%83%b3%e3%82%b1%e3%83%bc%e3%83%88%e8%aa%bf%e6%9f%bb%e3%81%a7%e6%98%8e%e3%82%89\/\">\u7b2c4\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/04\/10\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac4%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%a2%e3%83%b3%e3%82%b1%e3%83%bc%e3%83%88%e8%aa%bf%e6%9f%bb%e3%81%a7%e6%98%8e%e3%82%89\/\">\u300c\u30a2\u30f3\u30b1\u30fc\u30c8\u8abf\u67fb\u3067\u660e\u3089\u304b\u306b\u306a\u3063\u305f\u3001\u65e5\u672c\u306e\u30b7\u30e3\u30c9\u30fcIT\u610f\u8b58\u306e\u5b9f\u614b\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/05\/07\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac5%e5%9b%9e%ef%bc%89%e3%80%8c%e5%8e%9f%e5%89%87%e3%81%a8%e7%8f%be%e7%8a%b6%e3%81%ae%e3%81%af%e3%81%96%e3%81%be%e3%80%8d\/\">\u7b2c5\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/05\/07\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac5%e5%9b%9e%ef%bc%89%e3%80%8c%e5%8e%9f%e5%89%87%e3%81%a8%e7%8f%be%e7%8a%b6%e3%81%ae%e3%81%af%e3%81%96%e3%81%be%e3%80%8d\/\">\u300c\u300c\u539f\u5247\u3068\u73fe\u72b6\u306e\u306f\u3056\u307e\u300d\u3092CASB\u3067\u5bfe\u7b56\u3067\u304d\u306a\u3044\u304b\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/06\/06\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac6%e5%9b%9e%ef%bc%89%e3%80%8cit%e8%a6%8f%e5%88%b6%e6%94%b9%e9%9d%a9%e3%82%92%e6%94%af%e3%81%88%e3%82%8bcasb%e3%80%8d\/\">\u7b2c6\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/06\/06\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac6%e5%9b%9e%ef%bc%89%e3%80%8cit%e8%a6%8f%e5%88%b6%e6%94%b9%e9%9d%a9%e3%82%92%e6%94%af%e3%81%88%e3%82%8bcasb%e3%80%8d\/\">\u300cIT\u898f\u5236\u6539\u9769\u3092\u652f\u3048\u308bCASB\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/06\/17\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac7%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%a4%e3%83%b3%e3%83%86%e3%83%aa%e3%82%b8%e3%82%a7%e3%83%b3%e3%82%b9%e3%81%a8%e3%81%97\/\">\u7b2c7\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/06\/17\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac7%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%a4%e3%83%b3%e3%83%86%e3%83%aa%e3%82%b8%e3%82%a7%e3%83%b3%e3%82%b9%e3%81%a8%e3%81%97\/\">\u300c\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u3068\u3057\u3066\u306eCASB\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/09\/08\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac8%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%b5%e3%83%bc%e3%83%93%e3%82%b9%e5%88%a9%e7%94%a8\/\">\u7b2c8\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/09\/08\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%ef%bc%88%e7%ac%ac8%e5%9b%9e%ef%bc%89%e3%80%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%b5%e3%83%bc%e3%83%93%e3%82%b9%e5%88%a9%e7%94%a8\/\">\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u5229\u7528\u306e\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3068\u30e9\u30d9\u30ea\u30f3\u30b0\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/10\/30\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%e7%ac%ac9%e5%9b%9e%e3%80%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e3%81%a8%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89\/\">\u7b2c9\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/10\/30\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%e7%ac%ac9%e5%9b%9e%e3%80%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e3%81%a8%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89\/\">\u300c\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u3068\u30af\u30e9\u30a6\u30c9\u30d7\u30ed\u30d0\u30a4\u30c0\uff1a\u53cc\u65b9\u306e\u8a00\u3044\u5206\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2018\/12\/06\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%e7%ac%ac10%e5%9b%9e%e3%80%8c%e3%80%8d\/\">\u7b2c10\u56de<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/newblog\/2018\/02\/27\/casbwg%E3%83%AA%E3%83%AC%E3%83%BC%E3%82%B3%E3%83%A9%E3%83%A0%EF%BC%88%E7%AC%AC1%E5%9B%9E%EF%BC%89%E3%80%8C%E6%97%A5%E6%9C%AC%E4%BC%81%E6%A5%AD%E3%81%8Ccasb%E3%81%AB%E6%B1%82%E3%82%81%E3%82%8B%E3%82%82\/\">\u30ea\u30ec\u30fc\u30b3\u30e9\u30e0<\/a><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2018\/12\/06\/casbwg%e3%83%aa%e3%83%ac%e3%83%bc%e3%82%b3%e3%83%a9%e3%83%a0%e7%ac%ac10%e5%9b%9e%e3%80%8c%e3%80%8d\/\">\u300cCASB\u306f\u30c7\u30fc\u30bf\u30ac\u30d0\u30ca\u30f3\u30b9\u306e\u767b\u7adc\u9580\u3068\u306a\u308b\uff1f\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30ac\u30a4\u30c0\u30f3\u30b9\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EcjbcWowYelOj69kEVxaZ-UBl0skZcWw9QfWK-qmjjD7lQ?e=Qo2Yk5\" target=\"_blank\" rel=\"noopener\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9 V5\u2015\u8981\u7d04\u7248\u2015\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EUlZKxZvdmhKs4QdQW0_EmYB4Er0V0-LFPRxr1iSZ2XshQ?e=H1rEvi\" target=\"_blank\" rel=\"noopener\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u300d\u30d0\u30fc\u30b8\u30e7\u30f35.0<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/Ec4ciJpZ8WpHuL48Lftl_dQB9cUXFaTBohEqrpBPnLLFjw?e=6KuuGE\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u300d\u30d0\u30fc\u30b8\u30e7\u30f34.0<\/a><\/li>\n<li>\u52c9\u5f37\u4f1a\uff08\u8cc7\u6599\u3001\u30d3\u30c7\u30aa\u9332\u753b\uff09\n<ul>\n<li>\u300c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9 V5 \uff06 CCSK V5 \u89e3\u8aac\u300d\uff082025\u5e743\u670812\u65e5\u958b\u50ac\uff09<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EXkx1lqNTgdDkmOhmaqi-RcBwr66phchy8V8GruNGhvFXA?e=mDCU1K\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599<\/a>\u3001<a href=\"https:\/\/csajc1.sharepoint.com\/:v:\/s\/CSAJapanMaterial\/EcYeEqxXkZVBofZQi582AH8BkYmv2sFp-KwIg2kIrh7jVQ?e=uremDI\" target=\"_blank\" rel=\"noopener\">\u30d3\u30c7\u30aa\u9332\u753b<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u89e3\u8aac\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li>\u300c<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EXpVEyEft85PsbJUfUOz4LgBzVOlo-JFftXGo2zxgous7A?e=8ZHpdv\" target=\"_blank\" rel=\"noopener\">SaaS\u6642\u4ee3\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\uff1a\u5229\u4fbf\u6027\u3068\u30ea\u30b9\u30af\u7ba1\u7406\u306e\u6700\u9069\u89e3<\/a>\u300d<\/li>\n<li>\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2025\/05\/The-State-of-SaaS-Security-Survey-Report-20250416_J.pdf\" target=\"_blank\" rel=\"noopener\">SaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u73fe\u72b6\u30ec\u30dd\u30fc\u30c8 2025\u5e74\uff5e2026\u5e74\u306e\u52d5\u5411\u3068\u6d1e\u5bdf<\/a>\u300d<\/li>\n<li>\u300c<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EeX7Vlj3G3dCtI48jTpGfH8BgT1tWFXCWfnO60PvO7CMrg?e=uVOLPz\" target=\"_blank\" rel=\"noopener\">\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 2024\u2015\u8981\u7d04\u7248\u2015<\/a>\u300d<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2025\/02\/Cloud-Security-for-Startups-20241218_J.pdf\" target=\"_blank\" rel=\"noopener\">\u300c\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u306e\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 2024\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2024\/04\/Defining-Shadow-Access-The-Emerging-IAM-Security-Challenge_J.pdf\" target=\"_blank\" rel=\"noopener\">\u300c\u30b7\u30e3\u30c9\u30fc\u30a2\u30af\u30bb\u30b9\u306e\u5b9a\u7fa9\uff1a \u65b0\u305f\u306aIAM\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8ab2\u984c\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/12\/secure_architecting_point_20231226.pdf\">\u300c\u73fe\u5834\u3067\u5f79\u7acb\u3064\u30bb\u30ad\u30e5\u30a2\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c6\u30a3\u30f3\u30b0\u30fb\u30ec\u30d3\u30e5\u30fc\u306e\u30dd\u30a4\u30f3\u30c8 \u2015 AWS Well Architected Framework \u2015\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/10\/Usecases_for_DevSecOps_20211025.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u91cd\u5927\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u5bfe\u7b56 \u2013 DevSecOps\u306e\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9 \u2013\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/cloudsecurity_WG\/CSAguidance_mapping_20190226.pdf\">\u300cCSA \u30ac\u30a4\u30c0\u30f3\u30b9version 4.0 \u3092\u7528\u3044\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30d5\u30a1\u30ec\u30f3\u30b9\uff08OSS \u30de\u30c3\u30d4\u30f3\u30b02019\uff09\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/10\/07\/ms%e3%80%81%e3%82%a2%e3%83%9e%e3%82%be%e3%83%b3%e3%80%81%e3%82%b0%e3%83%bc%e3%82%b0%e3%83%ab%e3%82%89%e3%81%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%83%87%e3%83%bc%e3%82%bf%e3%81%ae%e4%bf%9d%e8%ad%b7\/\">MS\u3001\u30a2\u30de\u30be\u30f3\u3001\u30b0\u30fc\u30b0\u30eb\u3089\u304c\u30af\u30e9\u30a6\u30c9\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u306a\u3069\u76ee\u6307\u3059\u300cTrusted Cloud Principles\u300d\u306b\u3064\u3044\u3066<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2017\/07\/12\/%e7%ac%ac7%e5%9b%9e%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e4%bc%9a%e8%ad%b0%e3%80%80%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88\/\">\u7b2c7\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u5bfe\u3059\u308b\u65e5\u672c\u306e\u8a8d\u8a3c\u898f\u683c\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2017\/04\/27\/aws%e3%81%ae%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e5%bc%b7%e5%8c%96%e6%a9%9f%e8%83%bd%e3%81%8a%e3%82%88%e3%81%b3jaws%e3%81%ae%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3\/\">\u7b2c6\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300cAWS\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u6a5f\u80fd\u304a\u3088\u3073JAWS\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u90e8\u4f1a\u306e\u6d3b\u52d5\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2017\/02\/22\/%e4%bb%8a%e5%be%8c%e3%81%ae%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%81%ae%e5%8b%95%e5%90%91%e3%80%80%ef%bd%9e%e3%80%80%e7%ac%ac5%e5%9b%9e%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85\/\">\u7b2c5\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300c\u4eca\u5f8c\u306e\u30af\u30e9\u30a6\u30c9\u306e\u52d5\u5411\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2016\/12\/25\/%e3%82%bb%e3%83%bc%e3%83%ab%e3%82%b9%e3%83%95%e3%82%a9%e3%83%bc%e3%82%b9%e3%80%81saaspaas%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%80%80%ef%bd%9e%e3%80%80%e7%ac%ac4%e5%9b%9e%e3%82%af\/\">\u7b2c4\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300c\u30bb\u30fc\u30eb\u30b9\u30d5\u30a9\u30fc\u30b9\u3001SaaS\/PaaS\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2016\/11\/11\/aws%e5%b0%8e%e5%85%a5%e4%ba%8b%e4%be%8b%e3%81%8b%e3%82%89%e3%81%bf%e3%82%8b%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%81%ae%e5%88%a9%e7%94%a8%e6%96%b9%e6%b3%95%e5%86%85%e5%ae%b9-%e7%ac%ac3%e5%9b%9e\/\">\u7b2c3\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300cAWS\u30af\u30e9\u30a6\u30c9\u306e\u9032\u5316\u3068\u771f\u4fa1\u3000\uff5e\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306e\u65b0\u3057\u3044\u6bb5\u968e\uff5e\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2016\/08\/22\/%e6%97%a5%e6%9c%ac%e5%9e%8b%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6%e3%80%80%ef%bd%9e%e3%80%80%e7%ac%ac2%e5%9b%9e%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89\/\">\u7b2c2\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300c\u65e5\u672c\u578b\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306b\u3064\u3044\u3066\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2016\/08\/11\/%e3%80%8c%e3%83%97%e3%83%ad%e3%83%90%e3%82%a4%e3%83%80%e3%81%ae%e9%80%8f%e6%98%8e%e6%80%a7%e3%81%a8%e5%88%a9%e7%94%a8%e8%80%85%e3%81%ae%e3%83%aa%e3%82%b9%e3%82%af%e3%82%a2%e3%82%bb%e3%82%b9%e3%83%a1\/\">\u7b2c1\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300c\u30d7\u30ed\u30d0\u30a4\u30c0\u306e\u900f\u660e\u6027\u3068\u5229\u7528\u8005\u306e\u30ea\u30b9\u30af\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/03\/21\/it_grc_healthcare\/\">\u533b\u7642\u306b\u304a\u3051\u308bIT\u30ac\u30d0\u30ca\u30f3\u30b9\u30fb\u30ea\u30b9\u30af\u30fb\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9(IT-GRC)\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/02\/10\/healthcare-interoperability_2\/\">\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30c7\u30fc\u30bf\u306e\u76f8\u4e92\u904b\u7528\u6027\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6280\u8853\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/01\/18\/healthcare-interoperability\/\">\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30c7\u30fc\u30bf\u306e\u76f8\u4e92\u904b\u7528\u6027\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u6280\u8853\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/11\/15\/third-party-vendor-risk-management_2\/\">\u533b\u7642\u306e\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30d9\u30f3\u30c0\u30fc\u30ea\u30b9\u30af\u7ba1\u7406\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/10\/30\/third-party-vendor-risk-management\/\">\u533b\u7642\u306e\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30d9\u30f3\u30c0\u30fc\u30ea\u30b9\u30af\u7ba1\u7406\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/09\/03\/healthcare-supply-chain-cybersecurity-risk-management_2\/\">\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u7ba1\u7406\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/08\/17\/healthcare-supply-chain-cybersecurity-risk-management\/\">\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u7ba1\u7406\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/05\/07\/artificial_intelligence_in_healthcare_2\/\">\u533b\u7642\u306b\u304a\u3051\u308bAI\u5229\u7528\u3068\u30af\u30e9\u30a6\u30c9\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/04\/25\/artificial_intelligence_in_healthcare_1\/\">\u533b\u7642\u306b\u304a\u3051\u308bAI\u5229\u7528\u3068\u30af\u30e9\u30a6\u30c9\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/02\/26\/ransomware-in-the-healthcare-industry_2\/\">\u533b\u7642\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u4e88\u9632\u5bfe\u7b56\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/02\/26\/ransomware-in-the-healthcare-industry\/\">\u533b\u7642\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u653b\u6483\u4e88\u9632\u5bfe\u7b56\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/12\/27\/telehealth-data-in-the-cloud\/\">\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u9060\u9694\u533b\u7642\u306e\u30c7\u30fc\u30bf\u30ea\u30b9\u30af\u7ba1\u7406<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/11\/01\/the-use-of-blockchain-in-healthcare\/\">\u533b\u7642\u306b\u304a\u3051\u308b\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u5229\u7528<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/23\/healthcare-big-data-in-the-cloud_2\/\">\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\uff08\u5f8c\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/15\/healthcare-big-data-in-the-cloud\/\">\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\uff08\u524d\u7de8\uff09<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/06\/22\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/\">\u30af\u30e9\u30a6\u30c9\u63a5\u7d9a\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30b3\u30f3\u30c6\u30ca\/\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/12\/How-to-Design-a-Secure-Serverless-Architecture_2023_J.pdf\">\u300c\u5b89\u5168\u306a\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u8a2d\u8a08\u3059\u308b\u306b\u306f\uff08Updated 2023 Version\uff09\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/01\/The-12-Most-Critical-Risks-for-Serverless-Applications_J.pdf\">\u300c\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u306e\u6700\u3082\u91cd\u5927\u306a12\u306e\u30ea\u30b9\u30af\uff082019\u5e74\uff09\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/11\/best-practices-in-implementing-a-secure-microservices-architecture-J.pdf\">\u300c\u5b89\u5168\u306a\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5b9f\u88c5\u306e\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/bestpractices_container_architecture_J_V10.pdf\">\u300c\u5b89\u5168\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5b9f\u88c5\u306e\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/03\/29\/%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%83%8d%e3%82%a4%e3%83%86%e3%82%a3%e3%83%96%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e6%96%b0%e3%81%97%e3%81%84%e8%b2%ac%e4%bb%bb%e5%85%b1%e6%9c%89%e3%83%a2%e3%83%87\/\">\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u306b\u304a\u3051\u308b\u65b0\u3057\u3044\u8cac\u4efb\u5171\u6709\u30e2\u30c7\u30eb\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8003\u3048\u65b9<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/02\/09\/%E3%82%AF%E3%83%A9%E3%82%A6%E3%83%89%E3%82%B3%E3%83%B3%E3%83%94%E3%83%A5%E3%83%BC%E3%83%86%E3%82%A3%E3%83%B3%E3%82%B0%E3%81%AE%E9%80%B2%E5%8C%96%E3%81%A8%E6%96%B0%E3%81%9F%E3%81%AA%E8%B2%AC%E4%BB%BB\/\">\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u9032\u5316\u3068\u65b0\u305f\u306a\u8cac\u4efb\u5171\u6709\u30e2\u30c7\u30eb<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u81ea\u52d5\u5316\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2025\/06\/16\/validaited\/\" target=\"_blank\" rel=\"noopener\">ValidAIted\u3000\u30fc\u3000CSA\u306e\u6700\u65b0STAR\u30ec\u30d9\u30eb1\u30bb\u30eb\u30d5\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u30c4\u30fc\u30eb<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2025\/02\/11\/%e7%b6%99%e7%b6%9a%e7%9a%84%e3%81%aa%e4%bf%9d%e8%a8%bc%e3%81%a8%e3%82%b3%e3%83%b3%e3%83%97%e3%83%a9%e3%82%a4%e3%82%a2%e3%83%b3%e3%82%b9%e8%87%aa%e5%8b%95%e5%8c%96%e3%81%af%e3%81%aa%e3%81%9c%e5%bf%85\/\">\u7d99\u7d9a\u7684\u306a\u4fdd\u8a3c\u3068\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u81ea\u52d5\u5316\u306f\u306a\u305c\u5fc5\u8981\u306a\u306e\u304b<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2025\/01\/31\/%e3%82%b3%e3%83%b3%e3%83%97%e3%83%a9%e3%82%a4%e3%82%a2%e3%83%b3%e3%82%b9%e8%87%aa%e5%8b%95%e5%8c%96%e9%9d%a9%e5%91%bd%ef%bc%9a-%e7%9c%9f%e3%81%ae%e5%a4%89%e9%9d%a9%e3%81%ae%e6%99%82\/\">\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u81ea\u52d5\u5316\u9769\u547d\uff1a \u771f\u306e\u5909\u9769\u306e\u6642<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>CCM\/CAIQ\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:x:\/s\/CSAJapanMaterial\/ETEQBwapZaVEgnNGGCLStEMBWRJYEPjPxU6zyejd49wP3Q?e=aR0xlL\" target=\"_blank\" rel=\"noopener\">CCM V4.0.13<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:x:\/s\/CSAJapanMaterial\/EVYm_OBaAVJJnNzMa-zugRQBEZXug6p_OJ2UqyvT7gk4xw?e=lHsCNu\" target=\"_blank\" rel=\"noopener\">CAIQV4.0.3\u65e5\u672c\u8a9e\u7248<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/Ed7I4XzaY2NFpPBV0qRU6JQBOTrAbiXErO7vDGFFDD8ezg?e=RPENAn\" target=\"_blank\" rel=\"noopener\">CCM v4.0\u5b9f\u65bd\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8cac\u4efb\u5171\u6709\u30e2\u30c7\u30eb\u306b\u3088\u308b\u30af\u30e9\u30a6\u30c9\u306e\u4fdd\u8b77<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/11\/CCMv4.0.10_Generated-at_2023-09-18_J.xlsx\">CCM V4.0.10\u304a\u3088\u3073Implementation Guidelines\/Auditing Guidelinaces\u306e\u65e5\u672c\u8a9e\u7248<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/10\/CCMv4.0_ISMAP_Mapping_20221006.xlsx\">CCM V4\u3068ISMAP\u306e\u30de\u30c3\u30d4\u30f3\u30b0<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/05\/CSA-Japan-Summit-2022_morozumi.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u306e\u8aac\u660e\u8cac\u4efb\u3068\u30d7\u30ed\u30d0\u30a4\u30c0\u306e\u900f\u660e\u6027~CSA\u304c\u63d0\u4f9b\u3059\u308bCCM\/CAIQ\u7b49\u306e\u6709\u52b9\u6d3b\u7528~\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/08\/cloud-controls-matrix-v3.0.1-080319_J_ISMAP_20210809.xlsx\">CCMV3.0.1\u3068\u300c\u653f\u5e9c\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u5236\u5ea6(ISMAP)\u300d\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/07\/CAIQ_v3.1_Final_J.xlsx\">CAIQV3.1\u65e5\u672c\u8a9e\u7248<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/ccm-translation-in-10-languages\/\">CCMV3.0.1\u30de\u30eb\u30c1\u8a00\u8a9e\u7248<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/caiq-translation-in-10-languages\/\">CAIQV3.0.1\u30de\u30eb\u30c1\u8a00\u8a9e\u7248<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/01\/CCM-ISO_Reverse_Mapping_and_Gap_Analysis_FINAL_J.xlsx\">\u300cCCM-ISO_Reverse_Mapping_and_Gap_Analysis\u300d\u306e\u65e5\u672c\u8a9e\u8a33<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u91cd\u5927\u8105\u5a01\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EbQE9M-KuMZKtuHiXCDL0BQBhamZMsM-qCQqe5-OO28SYg?e=GVX3Te\" target=\"_blank\" rel=\"noopener\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5bfe\u3059\u308b\u91cd\u5927\u306a\u8105\u5a012024\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/11\/top-threats-to-cloud-computing-pandemic-eleven-060622-en_us-ja.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u91cd\u5927\u8105\u5a01\u3000\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u30a4\u30ec\u30d6\u30f3\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/10\/Cloud-Threat-Modeling_J.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EbxF-TGTCCxGhePdUA-_HJABA-dj2OXYdJ0Pt6jCZAssAg?e=PjtSK3\">\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u91cd\u5927\u8105\u5a01: 11\u306e\u60aa\u8cea\u306a\u8105\u5a01 \u30c7\u30a3\u30fc\u30d7\u30c0\u30a4\u30d6\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EUDVfzeE2S9Egq0g5bW4Jl4BG2JZB-r6e0S0i9uDU-T9lQ?e=6rG1ux\">\u300c\u30af\u30e9\u30a6\u30c9\u306e\u91cd\u5927\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u300011\u306e\u60aa\u8cea\u306a\u8105\u5a01\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EabsAAuz5bJPhfXEmgfTcyoBy3lwIpLqdMzEcJB8ibxWwQ?e=hxZqRr\">\u5371\u967a\u306a12 \u306e\u843d\u3068\u3057\u7a74 \u30af\u30e9\u30a6\u30c9\u306e\u91cd\u5927\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01 \uff0b 2017 \u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u4e8b\u4f8b\u96c6<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>STAR\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/IQCKkFdmBhFDTLx4PbyuuHAdAcC0D-tHCrmVzp39fp-zmnI?e=hh5vUr\" target=\"_blank\" rel=\"noopener\">\u7d99\u7d9a\u7684\u76e3\u67fb\u30e1\u30c8\u30ea\u30af\u30b9\u30ab\u30bf\u30ed\u30b0<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/12\/STAR-Attestation-Value-Proposition-20231002_J.pdf\">\u300cSTAR Attestation\u306e\u30d0\u30ea\u30e5\u30fc\u30d7\u30ed\u30dd\u30b8\u30b7\u30e7\u30f3\u300d<\/a><\/li>\n<li>\u00a0\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/10\/07\/csa%e3%81%ae%e8%aa%8d%e8%a8%bc%e5%88%b6%e5%ba%a6%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6\/\">CSA\u306e\u8a8d\u8a3c\u5236\u5ea6\uff1aSTAR\u8a8d\u8a3c\u306b\u3064\u3044\u3066<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/10\/20\/%e6%97%a5%e6%9c%ac%e8%aa%9e%e3%81%a7%e3%81%ae%e8%a9%95%e4%be%a1%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88%e3%81%ae%e5%85%ac%e9%96%8b%e6%96%b9%e6%b3%95%e3%81%8a%e3%82%88%e3%81%b3level1%e3%82%bb%e3%83%ab\/\">\u65e5\u672c\u8a9e\u3067\u306e\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u306e\u516c\u958b\u65b9\u6cd5\u304a\u3088\u3073Level1\u30bb\u30eb\u30d5\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u306e\u91cd\u8981\u6027\u306b\u3064\u3044\u3066<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/04\/03\/%e3%82%b0%e3%83%ad%e3%83%bc%e3%83%90%e3%83%ab%e3%83%97%e3%83%ad%e3%83%90%e3%82%a4%e3%83%80%e3%81%8c%e6%97%a5%e6%9c%ac%e8%aa%9ecaiq%e8%a9%95%e4%be%a1%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88\/\">\u30b0\u30ed\u30fc\u30d0\u30eb\u30d7\u30ed\u30d0\u30a4\u30c0\u304c\u65e5\u672c\u8a9eCAIQ\u8a55\u4fa1\u30ec\u30dd\u30fc\u30c8\u3092\u767b\u9332\u3059\u308b\u65b9\u6cd5<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/06\/STAR-Continuous-Increasing-Trust-and-Integrity-Brochure_J_20190626.pdf\">\u300cSTAR\u7d99\u7d9a\u578b\u3000\u4fe1\u983c\u3068\u4e00\u8cab\u6027\u306e\u5897\u9032\u3078\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/06\/STAR-Continuous-Technical-Guidance_J_20190626.pdf\">\u300cSTAR\u7d99\u7d9a\u578b\u6280\u8853\u6587\u66f8\u3000\u8a8d\u8a3c\u3092\u53d6\u5f97\u3059\u308b\u306b\u306f\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/CSA-STAR-PROGRAM-OPEN-CERTIFICATION-FRAMEWORK-IN_-2016-AND-BEYOND_J.pdf\">\u300cCSA STAR\u30d7\u30ed\u30b0\u30e9\u30e0\u3068OPEN CERTIFICATION FRAMEWORK (OCF) 2016\u5e74\u3068\u305d\u306e\u5f8c\u306e\u5c55\u671b\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/STAR\/STAR_Overview_July_2014_J_20140924.pdf\">Security, Trust and Assurance Registry (STAR)\u306e\u6982\u8981<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/STAR\/OCF_Vision_Statement_Final_J_20140924.pdf\">Open Certification Framework\u3000\u30d3\u30b8\u30e7\u30f3\u30b9\u30c6\u30fc\u30c8\u30e1\u30f3\u30c8<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/STAR\/Publicizing_STAR_Certification_J_20140924.pdf\">STAR\u8a8d\u8a3c\u3092\u516c\u958b\u3059\u308b\u306b\u306f<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/site\/STAR\/STAR_Cert_Auditing_the_CCM-v2_J_20150417.pdf\">Cloud Controls Matrix\u306b\u3088\u308b\u76e3\u67fb\uff08\u30ea\u30ea\u30fc\u30b92.0\uff09<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/STAR\/Requirements_for_Bodies_Providing_STAR_Certification_J_20140924.pdf\">STAR\u8a8d\u8a3c\u3092\u63d0\u4f9b\u3059\u308b\u4f01\u696d\u306b\u5bfe\u3059\u308b\u8981\u6c42\u4e8b\u9805<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/STAR\/Guidelines_for_CPAs_Providing_CSA_STAR2Att_J_20140924.pdf\">STAR\u5b9f\u8df5\u8a8d\u8a3c\u3092CSA\u306b\u63d0\u4f9b\u3059\u308b\u7c73\u56fd\u516c\u8a8d\u4f1a\u8a08\u58eb\u306e\u305f\u3081\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\/\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2024\/02\/Beyond-Passwords-The-Role-of-Passkeys-in-Modern-Web-Security-20231207_J.pdf\" target=\"_blank\" rel=\"noopener\">\u300c\u30d1\u30b9\u30ef\u30fc\u30c9\u306e\u305d\u306e\u5148\u3078 \u73fe\u5728\u306eWeb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u30d1\u30b9\u30ad\u30fc(Passkeys)\u306e\u5f79\u5272\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/12\/The-State-of-Cloud-Security_J.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3001\u8a2d\u5b9a\u30df\u30b9\u306e\u72b6\u6cc1\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/06\/Cloud-Incident-Response-Framework-4_30_21_J.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\uff08CIR\uff09\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/06\/Secure-Connection-Requirements-of-Hybrid-Cloud-110421_J.pdf\" target=\"_blank\" rel=\"noopener\">\u300c\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30af\u30e9\u30a6\u30c9\u306e\u30bb\u30ad\u30e5\u30a2\u306a\u63a5\u7d9a\u8981\u4ef6\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/07\/Salesforce-Critical-Controls-Implementation_J.pdf\">\u300c\u30bb\u30fc\u30eb\u30b9\u30d5\u30a9\u30fc\u30b9\u306e\u305f\u3081\u306e\u91cd\u8981\u306a\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u306e\u5b9f\u88c5\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/09\/Guideline-on-Effectively-Managing-Security-Service-in-the-Cloud-06_02_19_J_FINAL.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u306e\u52b9\u679c\u7684\u306a\u7ba1\u7406\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\/SDP\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/IQB0Nfw_fVTSR5SPNplqCbOWAT5CebTUUXjxW5Uz5Q1hO0Q?e=InNJes\" target=\"_blank\" rel=\"noopener\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u305f\u3081\u306e\u30c8\u30e9\u30f3\u30b6\u30af\u30b7\u30e7\u30f3\u30d5\u30ed\u30fc\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVEsZ_6z4zNPqY0mbcP-EigBII0WMCqMocTVYp8MGflKfg?e=ox48hN\" target=\"_blank\" rel=\"noopener\">\u300c\u4e2d\u5c0f\u4f01\u696d\u5411\u3051\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30ac\u30a4\u30c0\u30f3\u30b9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVBlmHCovOlLoqhux1voWbIB3SCcEGCnOulLDx0D1trUfQ?e=thc9fD\" target=\"_blank\" rel=\"noopener\">\u300c\u91cd\u8981\u30a4\u30f3\u30d5\u30e9\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30fb\u30ac\u30a4\u30c0\u30f3\u30b9\u300d<\/a><\/li>\n<li>\u300c<a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EaI7c4c1-slMpYaDPitZACMB6ItUP66CtcRLE3AsM67p8Q?e=2SvSbE\" target=\"_blank\" rel=\"noopener\">\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u305f\u3081\u306e\u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1<\/a>\u300d<\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/IQD5SXrFT57oQYjcta9Orm_oAQ6m0dfjZ7NDpHp_DzbsWxo?e=frVpwR\" target=\"_blank\" rel=\"noopener\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30fb\u30d7\u30ed\u30c6\u30af\u30c8\u30b5\u30fc\u30d5\u30a7\u30b9\u306e\u5b9a\u7fa9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVBlmHCovOlLoqhux1voWbIB3SCcEGCnOulLDx0D1trUfQ?e=thc9fD\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\uff082024\/9\/3\u66f4\u65b0<\/a><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2024\/10\/Zero-Trust-Guiding-Principles-20240903-J.pdf\" target=\"_blank\" rel=\"noopener\">\u7248\uff09<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/Ed6XsOZb4ONNv0Sca_eI3qkB676bRkZ-xk6IshWMYxFsnQ?e=IDZDt1\" target=\"_blank\" rel=\"noopener\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u304a\u3051\u308b\u533b\u7642\u6a5f\u5668\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/05\/SDP-Specification-v2_0-030922-J.pdf\">\u300cSoftware-Defined Perimeter (SDP) \u4ed5\u69d8\u66f8 v2.0\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/02\/Toward-a-Zero-Trust-Architecture-J.pdf\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306b\u5411\u3051\u3066\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EZJaNMEnHFlKt4TX56LK_QQB0nNCPZBAA4pz8GH1OHLQCw?e=p8FOWr\">\u300cSDP\u306b\u3088\u308b\u771f\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u5b9f\u88c5\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EaCJHOCPRDBIuo1VdcfaB1IB1Ao4rFLBUSvtIzCwZcuB-Q?e=gKuUOq\">\u300cInfrastructure as a Service\u306e\u305f\u3081\u306eSoftware De\ufb01ned Perimeter\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/Ea_dyFtNYCZBjhAJeZ4FSDgBBbys_swlNMwR48fVd-6UCQ?e=aPSE7H\">\u300cSoftware-Defined Perimeter\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30ac\u30a4\u30c9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EVPWReuHeupEjqS5ao520u4BWYcaizSra-VOB100RnTDhw?e=N5tMs6\">\u300cSDP\u5229\u7528\u30b7\u30ca\u30ea\u30aa\u96c6\u300d<\/a><\/li>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/ERNk5X5oC4dNitj8ojy20jsB6C_SE7NQ6FDZ-A4JnsW5Qw?e=XjZfg9\">\u300c\u30af\u30e9\u30a6\u30c9\u6642\u4ee3\u306b\u6c42\u3081\u3089\u308c\u308b\u6700\u65b0\u306e\u8a8d\u8a3c\u65b9\u5f0f\u3000\u30bd\u30d5\u30c8\u30a6\u30a8\u30a2\u30fb\u30c7\u30d5\u30a1\u30a4\u30f3\u30c9\u30fb\u30da\u30ea\u30e1\u30bf(Software Defined Perimeter\uff1aSDP) \u306e\u6d3b\u7528\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/06\/01\/%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e3%81%ae2%e3%81%a4%e3%81%ae%e6%88%90%e7%86%9f%e5%ba%a6%e3%83%a2%e3%83%87%e3%83%ab%e3%82%92%e7%90%86%e8%a7%a3%e3%81%99%e3%82%8b\/\" target=\"_blank\" rel=\"noopener\">\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e2\u3064\u306e\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3092\u7406\u89e3\u3059\u308b\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/01\/26\/log4shell%e3%81%a8%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88\/\">\u300cLog4Shell\u3068\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2019\/07\/23\/%e6%9c%ac%e5%bd%93%e3%81%aesdp%e3%82%88%e7%ab%8b%e3%81%a1%e4%b8%8a%e3%81%8c%e3%82%8c%ef%bc%81-will-the-real-sdp-please-stand-up\/\">\u672c\u5f53\u306eSDP\u3088\u7acb\u3061\u4e0a\u304c\u308c\uff01<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2019\/08\/27\/448\/\">SPA \uff08Single Packet Authorization\uff09\u89e3\u8aac<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u8010\u91cf\u5b50\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/j-docs\/quantum\/quantum-safe-security-glossary_J_V1.0.pdf\">\u8010\u91cf\u5b50\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7528\u8a9e\u96c6<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/j-docs\/quantum\/applied-quantum-safe-security_J.pdf\">\u5fdc\u7528\u8010\u91cf\u5b50\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/08\/Cloud_Data_Protection2_V10.pdf\">\u300cCloud Data Protection\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/02\/Key-Management-in-Cloud-Services_J.pdf\">\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u9375\u7ba1\u7406\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/02\/09\/%e3%83%87%e3%83%bc%e3%82%bf%e3%81%ae%e6%9a%97%e5%8f%b7%e5%8c%96%e3%81%ab%e3%81%8a%e3%81%91%e3%82%8b%e5%88%a9%e7%94%a8%e8%80%85%e9%8d%b5%e7%ae%a1%e7%90%86%e3%81%ab%e3%81%a4%e3%81%84%e3%81%a6\/\">\u300c\u30c7\u30fc\u30bf\u306e\u6697\u53f7\u5316\u306b\u304a\u3051\u308b\u5229\u7528\u8005\u9375\u7ba1\u7406\u306b\u3064\u3044\u3066\u300d<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/02\/05\/%e3%82%b3%e3%83%b3%e3%83%95%e3%82%a3%e3%83%87%e3%83%b3%e3%82%b7%e3%83%a3%e3%83%ab%e3%82%b3%e3%83%b3%e3%83%94%e3%83%a5%e3%83%bc%e3%83%86%e3%82%a3%e3%83%b3%e3%82%b0%e3%81%a8%e3%82%af%e3%83%a9%e3%82%a6\/\">\u30b3\u30f3\u30d5\u30a3\u30c7\u30f3\u30b7\u30e3\u30eb\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u3068\u30af\u30e9\u30a6\u30c9\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>DevSecOps\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/04\/DevSecOps-Automatio-ja.pdf\">\u300cDevSecOps\u306e6\u3064\u306e\u67f1\uff1a\u81ea\u52d5\u5316\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/Big_Data_Taxonomy_J_141216.pdf\">\u300c\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u5206\u985e\u300d<\/a><\/li>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/CSA-JC%20BDUWG%20Top%2010%20Challenges%20v1.pdf\">\u300c\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\/\u30d7\u30e9\u30a4\u30d0\u30b7\u306b\u304a\u3051\u308b\u5341\u5927\u8105\u5a01\u300d<\/a><\/li>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/CSA-JC_BDUWG_Expanded_Top10_Big_Data_Security_and_Privacy_Challenges_V1.pdf\">\u300c\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0f\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u306b\u304a\u3051\u308b\u5341\u5927\u8105\u5a01 \u62e1\u5f35\u7248\u300d<\/a><\/li>\n<li><a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/CSA-JC_BDUWG_Comment_on_Big_Data_and_the_Future_of_Privacy_V1.pdf\">\u300c\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u306e\u5c06\u6765\u306b\u95a2\u3059\u308b\u30b3\u30e1\u30f3\u30c8\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Blockchain\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/11\/Using_BlockChain_Technology_to_Secure_the_Internet_of_Things_J_V11.pdf\">\u300cIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u6280\u8853\u306e\u6d3b\u7528\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/csajc1.sharepoint.com\/:b:\/s\/CSAJapanMaterial\/EY_PWgicHgNHt3xdaTUI6BwBX3Rqls-JvrZUEDoHC4nZSA?e=WMsVPl\" target=\"_blank\" rel=\"noopener\">\u300c\u500b\u4eba\u60c5\u5831\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u6cd5\u5f8b\u6e96\u62e0\u306e\u70ba\u306e\u884c\u52d5\u898f\u7bc4\uff08CoC JP\uff09\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/pla-final-word_J_180801_FINAL.pdf\">\u300cGDPR \u6e96\u62e0\u306e\u70ba\u306e\u884c\u52d5\u898f\u7bc4\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>RPA\u95a2\u9023\u8cc7\u6599<\/strong>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/CSA_RPA_Report_20200304.pdf\">\u300cRPA\u30ea\u30b9\u30af\u30b7\u30ca\u30ea\u30aa\u306b\u57fa\u3065\u304f\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u300d<\/a><\/li>\n<li>\u30d6\u30ed\u30b0\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2018\/08\/12\/%e7%ac%ac10%e5%9b%9e%e3%80%80%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e5%88%a9%e7%94%a8%e8%80%85%e4%bc%9a%e8%ad%b0%e3%83%ac%e3%83%9d%e3%83%bc%e3%83%88\/\">\u7b2c10\u56de\u30af\u30e9\u30a6\u30c9\u5229\u7528\u8005\u4f1a\u8b70\u300cRPA\u3068\u6cd5\u5f8b\u7684\u306a\u554f\u984c\u70b9\u300d<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>\u4ee5\u4e0a<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u3053\u3053\u306b\u306f\u3001CSA\u30b8\u30e3\u30d1\u30f3\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u3055\u307e\u3056\u307e\u306a\u8cc7 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=27596\" title=\"\u65e5\u672c\u8a9e\u8cc7\u6599\u96c6\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-27596","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/27596","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=27596"}],"version-history":[{"count":84,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/27596\/revisions"}],"predecessor-version":[{"id":42422,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/27596\/revisions\/42422"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=27596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}