﻿{"id":4084,"date":"2018-11-29T16:54:47","date_gmt":"2018-11-29T07:54:47","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=4084"},"modified":"2020-01-14T17:16:37","modified_gmt":"2020-01-14T08:16:37","slug":"%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%80%80wg-3-2","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4084","title":{"rendered":"mobile WG"},"content":{"rendered":"<h2>\u30e2\u30d0\u30a4\u30eb\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p>CSA-JC \u30e2\u30d0\u30a4\u30eb\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001CSA\u30b0\u30ed\u30fc\u30d0\u30eb\u306eMobile Working Group\u306e\u6d3b\u52d5\u306b\u6e96\u3058\u3066\u3001\u30af\u30e9\u30a6\u30c9\u4e2d\u5fc3\u306e\u8996\u70b9\u304b\u3089\u3001\u30a8\u30f3\u30c9\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u306b\u30bb\u30ad\u30e5\u30a2\u306a\u30e2\u30d0\u30a4\u30eb\u30c7\u30d0\u30a4\u30b9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u3092\u652f\u63f4\u3059\u308b\u305f\u3081\u306e\u57fa\u672c\u7684\u306a\u8abf\u67fb\u7814\u7a76\u3092\u63d0\u4f9b\u3057\u3001\u30e2\u30d0\u30a4\u30eb\u74b0\u5883\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5553\u767a\u6d3b\u52d5\u3092\u63a8\u9032\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u307e\u3059\u3002<\/p>\n<h3><strong>\u6d3b\u52d5\u8981\u65e8<\/strong><\/h3>\n<p>CSA-JC \u30e2\u30d0\u30a4\u30eb\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u8a2d\u7f6e\u4f01\u753b\u66f8\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/CSA-JC%20BDUWG_plan_v1.1.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044<strong>\u3002<\/strong><\/p>\n<h3>\u516c\u958b\u60c5\u5831<\/h3>\n<h3><strong>\u6d3b\u52d5\u5185\u5bb9<\/strong><\/h3>\n<h3><\/h3>\n<p>[2019\u5e7412\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e7412\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<li><u>1.\u00a0 CSA Mobile Working Group<\/u><br \/>\n2-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e7412\u670813\u65e5\uff08\u91d1\uff09\u300003:00am \u2013 04:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<\/p>\n<ul>\n<li style=\"text-align: left;\">CSA Announcements\n<ul>\n<li>NEW PLATFORM IS REPLACING BASECAMP &#8211; details to follow shortly.<\/li>\n<li>Current open peer reviews &#8211;\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/contribute\/\">https:\/\/cloudsecurityalliance.org\/research\/contribute\/<\/a><\/li>\n<li>Recent releases &#8211;\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/artifacts\/\">cloudsecurityalliance.org\/research\/artifacts\/<\/a><\/li>\n<li>Upcoming events &#8211;\u00a0<a href=\"https:\/\/csacongress.org\/\">https:\/\/csacongress.org\/<\/a><\/li>\n<\/ul>\n<p>IoT in the News<\/p>\n<p>CSA UL Collab &#8211; Update<\/p>\n<ul>\n<li>White paper about survey results, discussion, and call to action<\/li>\n<li>Webinar in Jan with Brian and UL&#8217;s Gonda about the survey\n<ul>\n<li>Slides will be posted after the webinar is done so anyone from the working group interested in presenting can do so<\/li>\n<\/ul>\n<\/li>\n<li>NEED VOLUNTEERS\n<ul>\n<li>Help finalize whitepaper<\/li>\n<li>Supporting the proof of concept<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>CSA IoT Controls Matrix v2<\/p>\n<ul>\n<li>Brian and Michael will work on developing a plan for steps to complete this version<\/li>\n<li>Feedback: Content is great, but it&#8217;s not as approachable to use within their environment\n<ul>\n<li>App (i.e. turbo tax style &#8211; series of questions leads to controls)<\/li>\n<li>Inquire with graphics professional (Umesh)<\/li>\n<li>Discussion further on next call<\/li>\n<\/ul>\n<\/li>\n<li>Upcoming global privacy regulations and laws that apply to IoT on Jan 9th (Raj)<\/li>\n<\/ul>\n<p>IDAM for IoT v2<\/p>\n<ul>\n<li>Next Steps: Select protocols .<\/li>\n<li>Are there others to include?<\/li>\n<\/ul>\n<p>Other<\/li>\n<li>Revive webinar series and start with Mark (end of CIA triad and what it is now)<\/li>\n<li>Hillary reach out after beginning of the year<\/li>\n<li>Event: NIST\u2019s Identity Management &amp; Access Control in Multi-clouds Workshop and Conference, Jan 22-24, 2020.\u00a0 Join a day early for hands-on sessions and lightning talks.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2019\u5e7411\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e7411\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<li><u>2.\u00a0 CSA IoT Working Group<br \/>\n<\/u>2-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e7411\u67081\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n[UL Collab]<br \/>\n-Pfizer\/Cheryl working with UL to figure out what the POC will look like. Make some adjustments<br \/>\n[V2 IoT Security Controls &#8211; Update]<br \/>\n-Looking at vendor architecture and comparing that to the shared responsibility model (application and device plane) &#8211; Mark, Umesh, and Michael<br \/>\n-Discussed the adjustments to shared responsibilities model for IoT<br \/>\n[NIST IR Comments]<br \/>\n-Comment period ends tomorrow<br \/>\n-Add any comments here and CSA will submit them together<br \/>\n[Other]<br \/>\n-Aaron\/OWASP will be releasing a document on IoT Firmware Security Testing Methodology tomorrow &#8211; Nov 1st<br \/>\n-Aaron\/OWASP will also be releasing a sandbox to find, test, and fix IoT vulnerabilities &#8211; will announce when it is released.<\/p>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2019\u5e7410\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e7410\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><u><br \/>\n<\/u><\/li>\n<li>2.\u00a0<u>CSA IoT Working Group<br \/>\n<\/u>\u00a0 \u00a0 \u00a0<strong>2019<\/strong><strong>\u5e7410\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<\/ul>\n<p>[2019\u5e749\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e749\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><u><br \/>\n<\/u><\/li>\n<li>2.\u00a0<u>CSA IoT Working Group<br \/>\n<\/u>2-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e749\u67086\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n[Action Items]<br \/>\n-Continue work on the IoT Matrix. Contact leadership to sign-up for a set of controls<br \/>\n[Discussions]<br \/>\n-IoT Matrix: Discussion of what\u2019s been worked on and the references that are being pulled from.<br \/>\n-Defining an IoT Shared Responsibility Model for Version 2 of the IoT Controls Matrix<br \/>\n[Other]<br \/>\n-If anyone is interested in presenting on the IoT Framework at an upcoming conference, please reach out to the leadership team. We can provide a slide deck, abstract, and additional support for your effort.<\/li>\n<\/ul>\n<p>[2019\u5e748\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e748\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><u><br \/>\n<\/u><\/li>\n<li>2.\u00a0<u>CSA IoT Working Group<br \/>\n<\/u>2-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e748\u670823\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n[CSA Announcements]<br \/>\n-New website! &#8211; cloudsecurityalliance.org\/<br \/>\n-Current open peer reviews &#8211; https:\/\/cloudsecurityalliance.org\/research\/contribute\/<br \/>\n-Recent releases &#8211; cloudsecurityalliance.org\/research\/artifacts\/<br \/>\n-Upcoming events &#8211; https:\/\/csacongress.org\/<br \/>\n[Update on CSA\/UL &#8211; volunteers needed for each of the below Tasks]<br \/>\n-List of Controls- Compile comprehensive list of manufacturer-scope security, privacy and safety controls<br \/>\n-Graphic &#8211; High level graphic to depict the relationship between manufacturer-scoped controls and IoT controls matrix<br \/>\n-Mapping &#8211; Map IoT Framework with manufacturer controls<br \/>\nProof of concept &#8211; employ as proof of concept in their organization<br \/>\n[Review Azure&#8217;s IoT Security Services &#8211; complied by Umesh]<br \/>\n[IoT Control Matrix Updates: (touching base with Michael Roza &#8211; discussion revolving issues\/control methodologies)]<br \/>\n-Secure Connections<br \/>\n-Vulnerability Management<br \/>\n-Volunteers go to domain assignments tab and add your name to your domain they&#8217;d like to cover<br \/>\n[Action Items]<br \/>\n-Brian &#8211; Intro meeting with UL\/Cheryl for proof of concept portion<br \/>\n-Michael &#8211; Post list of manufacturer scope controls when ready<br \/>\n-Brian\/Umesh &#8211; post Umesh&#8217;s document with azure iot security services<\/li>\n<\/ul>\n<p>[2019\u5e747\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>1.\u00a0 <u>CSA Mobile Working Group<\/u><strong><br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a02019<\/strong><strong>\u5e747\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><u><br \/>\n<\/u><\/li>\n<li>2.\u00a0<u>CSA IoT Working Group<br \/>\n<\/u>2-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e747\u670826\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n[Welcome new co-chair: Aaron Guzman]<br \/>\n-Aaron has been a member of the IoT Working Group since its inception and we&#8217;re excited to have him join the IoT Leadership Team.<br \/>\n[IoT Security Controls Framework]<br \/>\n-Adding indicators of compromise (IOC) section<br \/>\n-Need volunteers for reviewing sections of controls<br \/>\n[Collaboration with UL]<br \/>\n-Hillary to send leadership team information about the CFP for the upcoming U.S. Chapter Summits.<br \/>\n[Other]<br \/>\n-Eric presented on the IoT Controls Framework recently at a conference in VA<\/li>\n<\/ul>\n<p>[2019\u5e746\u6708]<\/p>\n<ul>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><strong><br \/>\n<\/strong><strong>2019<\/strong><strong>\u5e746\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<\/ul>\n<p>[2019\u5e745\u6708]<\/p>\n<ul>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<br \/>\n<\/strong><strong>2019<\/strong><strong>\u5e745\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>2-1.\u00a0 <u>CSA Mobile Working Group<br \/>\n<\/u>2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/li>\n<li>2-2.\u00a0\u00a0 <u>CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n<\/u>\u00a02019\u5e745\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<li>2-3.\u00a0\u00a0 <u>CSA IoT Working Group<\/u><\/li>\n<li>2-3-1. IoT Working WG Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e745\u670817\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\nAction Items:<br \/>\nGathering volunteers for the Identity Management\/ Identity Access Management for IoT Devices v2 document.<br \/>\nReviewing of the Version 2 of the CSA IoT Controls Matrix.\u00a0 Comments only for now.Meeting Minutes:<br \/>\n1.CSA Announcements<br \/>\n-Upcoming Events<br \/>\n-Share IoT Survey<br \/>\n-Open peer review<br \/>\nReviewed and discussed initial UL\/CSA Survey Results<br \/>\n2.Call for participation: Identity and Access Management for the IoT<br \/>\nTaking a lead on certain sections within the paper.<br \/>\n3.Next Steps: Version 2 of the CSA IoT Controls Matrix &#8211;<br \/>\n-Beginning to review and update current version for second release<br \/>\n-Participants wanted to work on sections of the document, more formal announcements regarding the strategy\/work will be coming soon.<br \/>\n-Currently looking for comments only<\/li>\n<\/ul>\n<p>[2019\u5e744\u6708]<\/p>\n<ul>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<br \/>\n<\/strong><strong>2019<\/strong><strong>\u5e743\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/li>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>2-1.\u00a0 <u>CSA Mobile Working Group<br \/>\n<\/u>2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/li>\n<li>2-2.\u00a0\u00a0 <u>CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n<\/u>\u00a02019\u5e744\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<li>2-3.\u00a0\u00a0 <u>CSA IoT Working Group<\/u><\/li>\n<li>2-3-1. <u>IoT Working WG<\/u><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u>\u65e5\u6642\uff1a2019\u5e745\u67083\u65e5\uff08\u91d1\uff09\u300002:00am \u2013 03:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\nAGENDA: Guest Speaker<br \/>\nThe Sweetness of Low Hanging Fruit: GDPR, Brute-Forcing, &amp; Default and Weak Credentials.<br \/>\nCyber is putting billions of dollars into research and defense but we&#8217;ve failed to detect and fix the basics. Learn new methods of brute-force detection scanning that overcomes the traditional limitations.<\/li>\n<\/ul>\n<p>[2019\u5e743\u6708]<\/p>\n<ul>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<br \/>\n<\/strong><strong>2019<\/strong><strong><strong>\u5e743\u6708\u306f\u7279\u306b\u6d3b\u52d5\u306a\u3057<\/strong><\/strong><\/li>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<li>2-1.\u00a0 <u>CSA Mobile Working Group<br \/>\n<\/u>2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/li>\n<li>2-2.\u00a0\u00a0 <u>CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n<\/u>\u00a02019\u5e743\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<li>2-3.\u00a0\u00a0 <u>CSA IoT Working Group<\/u><\/li>\n<li>2-3-2. <u>IoT Working WG\/Blockchain WG Presentation<\/u><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u>\u65e5\u6642\uff1a2019\u5e743\u670827\u65e5\uff08\u91d1\uff09\u300001:00am \u2013 02:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aJohn Yeoh (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n&#8221; OpenCPE: Giving back control of your certifications, continuing education and identity&#8221; ; presented by our very own Mr.Kurt.Seifried , who serves as Director of IT\u00a0 at the CSA, Edmonton, Canada.Kurt will present the CSA\u2019s OpenCPE (Open Continuing Professional Education) Service, a blockchain based solution using new and innovative techniques to allow for the secure and controlled sharing of PII (Personally Identifiable Information) data, by the data owners. OpenCPE runs on top of an Open Cybersecurity Ledger (a public blockchain) which allows for the secure sharing and validation of identity, certification, continuing education credits, and project participation claims without having to store any PII within a public blockchain.We will cover how the CSA Labs has implemented Open Cybersecurity Ledgers to manage PII and other forms of sensitive data in ways that are secure, private, GDPR compliant and quantum crypto safe. Learn how Zero Knowledge Proofs and Merkle trees can be used to prove claims about identities, such as possessing a valid certification, without having to store or control the data itself.<\/li>\n<\/ul>\n<p>[2019\u5e742\u6708]<\/p>\n<ol>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>Japan Azure User Group <\/u><\/strong><strong><u>\u300c\u7b2c17\u56de Tokyo Jazug Night\u300d\uff08\u7d42\u4e86\uff09<\/u><\/strong><\/li>\n<\/ul>\n<p>\u65e5\u6642\uff1a2019\u5e742\u670827\u65e5\uff08\u6728\uff09\u5348\u5f8c7\u6642\uff5e9\u6642<\/p>\n<p>\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<p>2-1.\u00a0 <u>CSA Mobile Working Group<\/u><\/p>\n<p>2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/p>\n<p>2-2.\u00a0\u00a0 <u>CSA Mobile Application Security Testing(MAST) Working Group<\/u><\/p>\n<p>2019\u5e742\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/p>\n<p>2-3.\u00a0\u00a0 <u>CSA IoT Working Group<\/u><\/p>\n<p>2-3-2. <u>IoT Working Group Call<\/u><\/p>\n<p>\u65e5\u6642\uff1a2019\u5e742\u670822\u65e5\uff08\u91d1\uff09\u300003:00am \u2013 04:00am<\/p>\n<p>\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<\/p>\n<p>\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aJohn Yeoh (CSA)<\/p>\n<p>\u6982\u8981\uff1a<\/p>\n<p>\u201cAn Examination of the Evolution of IoT Attacks\u201d<\/p>\n<p>Speaker: Alon Levin, VP Product Management, VDOO.<\/p>\n<p>Alon is the VP Product Management at VDOO. Prior to his current role, Alon led product management and technical field operations at Cyvera, until it was acquired by Palo Alto Networks. After the acquisition, he recruited and technically led the sales engineer specialists team in Palo Alto Networks\u2019 endpoint business.<\/p>\n<p>The year 2018 saw increased IoT adoption and a leap in regulation. IoT products were faced with multiple IoT attack variants: Wicked, OMG Mirai, ADB.Miner, DoubleDoor, Hide &#8216;N Seek and even a Mirai-Variant IoT Botnet used to target the Financial Sector. The major attack in 2018 was VPNFilter, infecting over a half a million devices from a wide range of known vendors. In 2016 the same size attack, by the infamous Mirai, was major news and caused havoc on the Internet. Today, while such an attack is relatively big, it is not uncommon or unexpected.<\/p>\n<p>Alon will examine why the 2018 attacks are more advanced that what we&#8217;ve seen in the past. He will explore today&#8217;s new emerging attack types and their impacts on the future of IoT. Finally, Alon will talk about different types of security solutions that could have easily mitigated most of the attacks in 2018 and will make it difficult for attackers to successfully target embedded devices in the future.<\/p>\n<p>[2019\u5e741\u6708]<\/p>\n<p>1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<p>1-1. Facebook Developer Circle Tokyo Launch Event\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670827\u65e5\uff08\u65e5\uff09\u5348\u5f8c2\u664230\u5206\uff5e6\u6642<br \/>\n\u4f1a\u5834\uff1a\u4f4f\u53cb\u4e0d\u52d5\u7523\u5927\u5d0e\u30ac\u30fc\u30c7\u30f3\u30bf\u30ef\u30fc<br \/>\n* Facebook Developer Circle Osaka\u3068\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u9023\u643a\u3092\u9032\u3081\u308b\u4e88\u5b9a<br \/>\n1-2. Alibaba Cloud InternetChap Japan Kick-off Meeting\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670829\u65e5\uff08\u706b\uff09\u5348\u5f8c2\u6642\uff5e5\u6642<br \/>\n\u4f1a\u5834\uff1a\u30df\u30c3\u30c9\u30bf\u30a6\u30f3\u65e5\u6bd4\u8c37<br \/>\n\u30c6\u30fc\u30de\uff1aAlibaba Cloud\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066<br \/>\n\uff0aSTAR\u8a8d\u8a3c\u53d6\u5f97\u4f01\u696d\u3067\u3001CCM\u306b\u6e96\u62e0\u3057\u305f\u7ba1\u7406\u7b56\u3092\u8b1b\u3058\u3066\u3044\u308b<br \/>\n\uff0aCSA China\u3068\u9023\u643a\u3057\u306a\u304c\u3089\u3001\u65e5\u672c\u56fd\u5185\u3067\u306e\u958b\u767a\u8005\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3068\u306e\u9023\u643a\u3092\u9032\u3081\u308b\u4e88\u5b9a<br \/>\n1-3. Japan Azure User Group \u300c\u7b2c16\u56de Tokyo Jazug Night\u300d\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670830\u65e5\uff08\u6728\uff09\u5348\u5f8c7\u6642\uff5e9\u6642<br \/>\n\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<br \/>\n1-4. Japan Azure User Group \u300c\u7b2c17\u56de Tokyo Jazug Night\u300d\uff08\u4e88\u5b9a\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e742\u670827\u65e5\uff08\u6728\uff09\u5348\u5f8c7\u6642\uff5e9\u6642<br \/>\n\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<\/p>\n<p>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/p>\n<p>2-1. CSA Mobile Working Group<br \/>\n2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/p>\n<p>2-2. CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n2019\u5e741\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/p>\n<p>2-3. CSA IoT Working Group<br \/>\n2-3-1. OWASP\u3068\u306e\u9023\u643a\u6d3b\u52d5<br \/>\nOWASP SAMM V2.0 BETA\u30ea\u30ea\u30fc\u30b9<br \/>\n2-3-2. IoT Working Group Call<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670825\u65e5\uff08\u91d1\uff09\u300003:00am \u2013 04:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n\u2022 Kicked off the call with Introductions for new and returning volunteers.<br \/>\n\u2022 Discussed latest IoT Security Items of Interest.<br \/>\n\u2022 Discussed creation of CSA IoTWG roadmap for 2019 \u2013 2020<br \/>\n\u2022 Key areas of interest:<br \/>\n\u2022 Lee Szilagyi mentioned zero-trust and Michael Roza briefed the group on various SDP efforts:<br \/>\n\u2022 Brian Russell mentioned autonomy as a focus area<br \/>\n\u2022 Reviewed Joint Survey between CSA IoTWG and Underwriters Lab (UL)<br \/>\n\u2022 Finalizing CSA IoT Controls Matrix<br \/>\n\u2022 Discussed RSA 2019<br \/>\no Brian to be onsite for CSA IoTWG In-person meeting on Tuesday March 5, 2019<br \/>\no Will host WG members to review and update 2019-2020 roadmap<\/p>\n<p>[2018\u5e7412\u6708]<\/p>\n<p>1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<p>1-1. Japan Azure User Group \u300c\u7b2c15\u56de Tokyo Jazug Night\u300d\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2018\u5e7412\u67086\u65e5\uff08\u6728\uff09\u5348\u5f8c7\u6642\uff5e9\u6642<br \/>\n\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<\/p>\n<p>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/p>\n<p>2-1. CSA Mobile Working Group<br \/>\n2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/p>\n<p>2-2. CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n2018\u5e7412\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/p>\n<p>2-3. CSA IoT Working Group<br \/>\n2-3-1. OWASP\u3068\u306e\u9023\u643a\u6d3b\u52d5<br \/>\nOWASP IoT Top 10 for 2018\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u7248\u30ea\u30ea\u30fc\u30b9<br \/>\nhttps:\/\/www.owasp.org\/index.php\/OWASP_Internet_of_Things_Project<\/p>\n<p>2018\u5e7411\u6708<\/p>\n<p>1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<p>1-1. Japan Azure User Group \u300cAzure DevOps Tokyo\u300d\uff08\u7d42\u4e86\uff09<br \/>\n\u65e5\u6642\uff1a2018\u5e7411\u670824\u65e5\uff08\u571f\uff09\u5348\u5f8c1\u6642\uff5e6\u6642<br \/>\n\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<br \/>\nLT\uff1a\u300cDevOps\u3068\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/p>\n<p>1-2. Japan Azure User Group \u300c\u7b2c15\u56de Tokyo Jazug Night\u300d\uff08\u4e88\u5b9a\uff09<br \/>\n\u65e5\u6642\uff1a2018\u5e7412\u67086\u65e5\uff08\u6728\uff09\u5348\u5f8c7\u6642\uff5e9\u6642<br \/>\n\u4f1a\u5834\uff1a\u65e5\u672c\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u682a\u5f0f\u4f1a\u793e<br \/>\nhttps:\/\/jazug.connpass.com\/event\/109350\/<\/p>\n<p>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/p>\n<p>2-1. CSA Mobile Working Group<br \/>\n2018\u5e743\u670814\u65e5\u3092\u3082\u3063\u3066\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u306eWG\u6d3b\u52d5\u3092\u6b63\u5f0f\u306b\u4f11\u6b62<\/p>\n<p>2-2. CSA Mobile Application Security Testing(MAST) Working Group<br \/>\n2018\u5e7411\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/p>\n<p>2-3. CSA IoT Working Group<\/p>\n<ul>\n<li>2-3-1. IoT Working Group Call<br \/>\n\u65e5\u6642\uff1a2018\u5e7411\u670830\u65e5\uff08\u91d1\uff09\u300003:00am \u2013 04:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aHillary Baron (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n\u30fbIoT Framework Document<\/p>\n<ul>\n<li>Discussed remaining comments on the controls<\/li>\n<li>NETWORK0013: Michael to work with SDP working group to write up something. Projected to be done by Sunday.<\/li>\n<li>NETWORK0011: Any suggestions would be appreciated. Brian willing to assist SME with writing control<\/li>\n<li>DATA0002: Remain with NIST or ENISA guidelines regarding this. Eric to find.<\/li>\n<li>COMMS0002: Eric Palmer to address<\/li>\n<li>AQUIRE0001: Reference OWASP Medical Device v2 document. Indicate that different sets of standards will need to be met depending on their circumstances. Will include a few different examples.<\/li>\n<li>MONITOR0005: Brian has been sent several items to address this control.<\/li>\n<li>DEVELOP0007: Aaron to look into.<\/li>\n<li>Additional comments: Response Column needs to be edited to reflect multiple lines in each control. Will be edited after\/during the peer review process<\/li>\n<li>IoT Framework will go to peer review Dec 4th<\/li>\n<\/ul>\n<p>\u30fbReview collaborative survey with UL<\/li>\n<li>2018\u5e7410\u6708<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/mobile_health_1810.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e749\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201809.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e748\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201808.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e747\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201807.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e746\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201806.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e745\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201805.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e744\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201804.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e743\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201803.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e742\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201802.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e741\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201801.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7412\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201712.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7411\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201711.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7410\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201710.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e749\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201709.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e748\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20178.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e747\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20177.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e746\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20176.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e745\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20175.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e744\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20174.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e743\u6708\u4ee5\u524d\u306e\u6d3b\u52d5\u5831\u544a\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/mobile_katsudou.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u30e2\u30d0\u30a4\u30eb\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002  <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4084\" title=\"mobile WG\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4084","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4084"}],"version-history":[{"count":16,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4084\/revisions"}],"predecessor-version":[{"id":8588,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4084\/revisions\/8588"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1155"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}