﻿{"id":444,"date":"2015-04-16T09:45:37","date_gmt":"2015-04-16T00:45:37","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=444"},"modified":"2026-02-02T16:31:57","modified_gmt":"2026-02-02T07:31:57","slug":"%e4%bb%8a%e3%81%be%e3%81%a7%e3%81%ae%e5%8b%89%e5%bc%b7%e4%bc%9a","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=444","title":{"rendered":"\u4eca\u307e\u3067\u306e\u52c9\u5f37\u4f1a\u3068\u8cc7\u6599"},"content":{"rendered":"<p>\u904e\u53bb\u306e\u52c9\u5f37\u4f1a\u306e\u30a2\u30fc\u30ab\u30a4\u30d6\u3067\u3059\u3002<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=41881\" target=\"_blank\" rel=\"noopener\">\u7b2c122\u56de\u300c\u500b\u4eba\u60c5\u5831\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u6cd5\u5f8b\u6e96\u62e0\u306e\u70ba\u306e\u884c\u52d5\u898f\u7bc4 V1.2 \u306e\u8aac\u660e\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=41608\" target=\"_blank\" rel=\"noopener\">\u7b2c121\u56de\u300c\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u306e\u6d3b\u7528\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=40743\" target=\"_blank\" rel=\"noopener\">\u7b2c120\u56de\u300c\u7279\u6a29ID\u7ba1\u7406\u304b\u3089\u7279\u6a29\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3078\uff1aNHI\uff08Non-Human Identity\uff09\u3078\u306e\u5bfe\u5fdc\u3068\u306f\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=40049\" target=\"_blank\" rel=\"noopener\">\u7b2c119\u56de\u300c\u307f\u305a\u307b\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5168\u4f53\u50cf\u3068\u3001\u3042\u308b\u793e\u54e1\u306e\u4e8b\u4f8b\u306e\u7d39\u4ecb\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=39546\" target=\"_blank\" rel=\"noopener\">\u7b2c118\u56de\u300cOracle Alloy\u3092\u6d3b\u7528\u3057\u305f\u30bd\u30d6\u30ea\u30f3\u30c6\u30a3\u5bfe\u5fdc\u306b\u3064\u3044\u3066\u3001\u30c7\u30b8\u30bf\u30eb\u30ec\u30b8\u30ea\u30a8\u30f3\u30b9\u3092\u5b9f\u73fe\u3059\u308b\u305f\u3081\u306e\u30af\u30e9\u30a6\u30c9\u57fa\u76e4\u3068\u306f\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=39063\">\u7b2c117\u56de\u300cCRA\u5bfe\u5fdc\u3068SBOM\u306e\u91cd\u8981\u6027\/SCA\u30c4\u30fc\u30eb\u306e\u6d3b\u7528\u65b9\u6cd5\u306b\u3064\u3044\u3066\u89e3\u8aac\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=38319\">\u7b2c116\u56de\u300c\u201c\u4eba\u3068AI\u306e\u5354\u50cd\u201d\u3067\u5909\u308f\u308bSOC\u904b\u7528\u306e\u6700\u524d\u7dda\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=36397\">\u7b2c114\u56de\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9V5\uff06CCSK V5\u306e\u89e3\u8aac\u300d<\/a>\n<ul>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2025\/03\/guidanceV5_ccskV5_202503_morozumi.pdf\" target=\"_blank\" rel=\"noopener\">\u8cc7\u6599\u306f\u3053\u3061\u3089<\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=O_Kg_sNRYbE&amp;t=5s\" target=\"_blank\" rel=\"noopener\">\u30d3\u30c7\u30aa\u9332\u753b\u306f\u3053\u3061\u3089<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=36240\">\u7b2c113\u56de\u300cAWS re:Invent 2024 \u5831\u544a\u4f1a \uff0b\u6109\u3057\u307f\u65b9\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=35965\" target=\"_blank\" rel=\"noopener\">\u7b2c112\u56de\u300c\u751f\u6210\uff21\uff29\u3092\u6d3b\u7528\u3057\u305f\u30e2\u30c0\u30ca\u30a4\u30ba\uff0f\u30a2\u30c3\u30d7\u30b0\u30ec\u30fc\u30c9\u3001\u304a\u3088\u3073\u30b7\u30d5\u30c8\u30ec\u30d5\u30c8\u63a8\u9032\u306b\u3064\u3044\u3066\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=35676\" target=\"_blank\" rel=\"noopener\">\u7b2c111\u56de\u300c\u751f\u6210AI\u306e\u30ac\u30d0\u30ca\u30f3\u30b9 ~ \u305d\u306e\u73fe\u5728\u5730\u3068\u3053\u308c\u304b\u3089 ~\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=35046\">\u7b2c110\u56de\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30af\u30e9\u30a6\u30c9\u904b\u55b6\u4f01\u696d\u306e\u30c7\u30fc\u30bf\u30bb\u30f3\u30bf\u30fc\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=34813\" target=\"_blank\" rel=\"noopener\">\u7b2c109\u56de\u300c\u30bb\u30ad\u30e5\u30a2\u306a\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30af\u30e9\u30a6\u30c9\u5229\u7528\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306e\u52b9\u7387\u5316(AI\u3082\u6dfb\u3048\u3066)\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=34457\" target=\"_blank\" rel=\"noopener\">\u7b2c108\u56de\u300c\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u304b\u3089\u65e9\u671f\u306b\u30d3\u30b8\u30cd\u30b9\u3092\u5fa9\u65e7\u3055\u305b\u308b\u305f\u3081\u306b\u5fc5\u8981\u306a\u8981\u4ef6\u3068\u306f\uff1f\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=34029\" target=\"_blank\" rel=\"noopener\">\u7b2c107\u56de\u300c\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306b\u304a\u3051\u308b\u30ea\u30b9\u30af\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=33692\" target=\"_blank\" rel=\"noopener\">\u7b2c106\u56de\u300c<span lang=\"EN-US\">RSA Conference 2024\/CSA AI Summit<\/span>\u5831\u544a\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=32579\" target=\"_blank\" rel=\"noopener\">\u7b2c105\u56de\u300cAI\uff06\u30c7\u30fc\u30bf\u4e2d\u5fc3\u6642\u4ee3\u306e\u30d3\u30b8\u30cd\u30b9\u5909\u9769\u306b\u6c42\u3081\u3089\u308c\u308b3\u3064\u306e\u67f1\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=32167\" target=\"_blank\" rel=\"noopener\">\u7b2c104\u56de\u300c\u751f\u6210AI\u5c0e\u5165\u4f01\u696d\u304c\u77e5\u3063\u3066\u304a\u304f\u3079\u304d\uff01\u30c7\u30fc\u30bf\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u5f37\u5316\u3092\u5b9f\u73fe\u3059\u308b\u300ePrivate AI\u300f\u300d<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=31683\" target=\"_blank\" rel=\"noopener\">\u7b2c103\u56de\u300cAWS re:Invent 2023 \u5831\u544a\u4f1a \uff0b\u30af\u30e9\u30a6\u30c9\u696d\u754c\u8a71\u984c\u300d\uff082024\u5e742\u670821\u65e5\uff09<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=31171\" target=\"_blank\" rel=\"noopener\">\u7b2c102\u56de\u300c\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30ef\u30fc\u30af\u6642\u4ee3\u306b\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5b9f\u88c5\u3068\u306f\u3000\u3000\u301c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u751f\u7523\u6027\u306e\u4e21\u7acb\u3092\u76ee\u6307\u3057\u3066\u301c\u300d\uff082024\u5e741\u670829\u65e5\uff09<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=30883\" target=\"_blank\" rel=\"noopener\">\u7b2c101\u56de\u300cIT\u30e2\u30c0\u30ca\u30a4\u30bc\u30fc\u30b7\u30e7\u30f3\uff0fDX\u3067\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u306f\u300d\uff082023\u5e7412\u670814\u65e5\uff09<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=29910\" target=\"_blank\" rel=\"noopener\">\u7b2c100\u56de\u300c\u30af\u30e9\u30a6\u30c9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u304c\u62b1\u3048\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u7acb\u3061\u5411\u304b\u3046 \uff5e\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u6a5f\u80fd\u3068AI\u3092\u6d3b\u7528\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u7b56\u3092\u89e3\u8aac\uff5e\u300d<\/a>\uff082023\u5e7410\u670826\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=29517\" target=\"_blank\" rel=\"noopener\">\u7b2c99\u56de\u300c\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u5c0e\u5165\u300d NIST SP 1800 -35 \u306e\u8aad\u307f\u89e3\u304d-\u300d<\/a>\uff082023\u5e749\u670821\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=29076\" target=\"_blank\" rel=\"noopener\">\u7b2c98\u56de\u300c\u653b\u6483\u8005\u304c\u8003\u3048\u308b\u30af\u30e9\u30a6\u30c9\u306e\u653b\u3081\u65b9 \u2013 Posture Management\u304c\u5bfe\u5fdc\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u3068\u306f -\u300d<\/a>\uff082023\u5e74\uff18\u670824\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=28813\" target=\"_blank\" rel=\"noopener\">\u7b2c97\u56de\u300cAchieving Cyber Resilience in an Evolving Threat Environment \u201cA Global Perspective on Cyber Resilience\u201d\u300d<\/a>\uff082023\u5e747\u670819\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=28038\">\u7b2c96\u56de\u300cVMware\u304c\u63d0\u5531\u3059\u308b\u30de\u30eb\u30c1\u30af\u30e9\u30a6\u30c9\u5411\u3051\u6b21\u4e16\u4ee3\u30e9\u30c6\u30e9\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/a>\uff082023\u5e746\u670829\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=27287\">\u7b2c95\u56de\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30af\u30ea\u30a2\u30e9\u30f3\u30b9\uff1a\u7c73\u56fd\u3092\u306f\u3058\u3081\u3068\u3057\u305f\u8af8\u5916\u56fd\u306e\u5236\u5ea6\u306e\u3054\u7d39\u4ecb\u3068\u65e5\u672c\u5c0e\u5165\u306b\u3042\u305f\u3063\u3066\u306e\u8af8\u8ad6\u70b9\u306e\u8003\u5bdf\u300d<\/a>\uff082023\u5e744\u670820\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=26831\">\u7b2c94\u56de\u300c\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306b\u4fc2\u308b\u7af6\u4e89\u306e\u4eca\u3068\u3053\u308c\u304b\u3089 \uff5e\u30af\u30e9\u30a6\u30c9\u30d9\u30f3\u30c0\u30fc\u3068\u30e6\u30fc\u30b6\u30fc\u306b\u6c42\u3081\u3089\u308c\u308b\u3053\u3068\uff5e\u300d<\/a>\uff082023\u5e743\u670823\u65e5\uff09<\/li>\n<li>\u7b2c93\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=26590\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u6700\u65b0\u52d5\u5411\u304b\u3089\u3000\uff5eAWS reInvent 2022 \u304c\u793a\u3059\u30af\u30e9\u30a6\u30c9\u306e\u65b0\u305f\u306a\u6bb5\u968e\uff5e\u30af\u30e9\u30a6\u30c9\u304c\u4e16\u754c\u306e\u6c11\u4e3b\u4e3b\u7fa9\u3092\u5b88\u308b<\/a>\u300d\uff082023\u5e742\u670827\u65e5\uff09<\/li>\n<li>\u7b2c92\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=25936\" target=\"_blank\" rel=\"noopener\">\uff33\uff2d\uff22\uff23\u30b0\u30eb\u30fc\u30d7\u306e\u30af\u30e9\u30a6\u30c9\u6d3b\u7528\u306b\u304a\u3051\u308b\uff23\uff23\uff4f\uff25\u306e\u5f79\u5272\u3068\u30bb\u30ad\u30e5\u30ea\u30a3\u30c6\u30a3\u7ba1\u7406\u30fb\u7d71\u5236<\/a>\u300d\uff082023\u5e741\u670824\u65e5\uff09<\/li>\n<li>\u7b2c91\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=25689\" target=\"_blank\" rel=\"noopener\">\u7523\u696d\u306b\u304a\u3051\u308bICT\/IoT\u304a\u3088\u3073\u30af\u30e9\u30a6\u30c9\u306e\u6d3b\u7528\u4e8b\u4f8b\u3068\u990a\u6b96DX<\/a>\u300d\uff082022\u5e7412\u670815\u65e5\uff09<\/li>\n<li>\u7b2c90\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=24904\" target=\"_blank\" rel=\"noopener\">\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30c8\u30e9\u30b9\u30c8\u306b\u95a2\u3059\u308b\u52d5\u5411\u3068\u6d77\u5916\u4e8b\u4f8b\u7d39\u4ecb<\/a>\u300d\uff082022\u5e7410\u670826\u65e5\uff09<\/li>\n<li>\u7b2c89\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=24224\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a55\u4fa1\u306e\u4ed5\u65b9 \uff5e\u30c1\u30a7\u30c3\u30af\u30b7\u30fc\u30c8\u3092\u3069\u3046\u3059\u308c\u3070\u6709\u52b9\u306b\u4f5c\u6210\u3067\u304d\u308b\u304b\uff5e<\/a>\u300d\uff082022\u5e749\u670820\u65e5\uff09<\/li>\n<li>\u7b2c88\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=23910\" target=\"_blank\" rel=\"noopener\">CSPM\u3000\u301cCSPM\u306e\u5fc5\u8981\u6027\u3001\u53ca\u3073\u3001\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u301c<\/a>\u300d\uff082022\u5e748\u670818\u65e5\uff09<\/li>\n<li>\u7b2c87\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=23256\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306b\u304a\u3051\u308b\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u30ec\u30b9\u30dd\u30f3\u30b9\u306e\u4e8b\u4f8b\u5171\u6709<\/a>\u300d\uff082022\u5e747\u670822\u65e5\uff09<\/li>\n<li>\u7b2c86\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=22798\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u30ea\u30b9\u30af\u8a55\u4fa1\u306e\u672a\u6765\u3068\u6d77\u5916\u3067\u4e3b\u6d41\u3068\u306a\u308a\u3064\u3064\u3042\u308bVRM\/TPRM\u3068\u3044\u3046\u89e3\u6c7a\u7b56<\/a>\u300d\uff082022\u5e746\u670821\u65e5\uff09<\/li>\n<li>\u7b2c85\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21816\" target=\"_blank\" rel=\"noopener\">\u300c\u30af\u30e9\u30a6\u30c9\u306e\u30c7\u30fc\u30bf\u6d88\u53bb\u306e\u305f\u3081\u306e\u6697\u53f7\u5316\u6d88\u53bb\u30ac\u30a4\u30c9\u30d6\u30c3\u30af\u306e\u3054\u8aac\u660e\u300d<\/a>\uff082022\u5e744\u670820\u65e5\uff09<\/li>\n<li>\u7b2c84\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21533\" target=\"_blank\" rel=\"noopener\">\u300c\u4e2d\u9280\u30c7\u30b8\u30bf\u30eb\u901a\u8ca8\uff08CBDC\uff09\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30ebID\u306e\u91cd\u8981\u6027\u300d<\/a>\uff082022\u5e743\u670824\u65e5\uff09<\/li>\n<li>\u7b2c83\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=21297\" target=\"_blank\" rel=\"noopener\">\u300cAWS reInvent2021\u304c\u793a\u3059IT\u306e\u672a\u6765 \uff5e \u30af\u30e9\u30a6\u30c9\u306e\u5728\u308a\u65b9\u304c\u66f4\u306b\u5909\u308f\u308b \uff5e\u300d<\/a>\uff082022\u5e742\u670825\u65e5\uff09<\/li>\n<li>\u7b2c82\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=20817\" target=\"_blank\" rel=\"noopener\">\u300c\u30af\u30e9\u30a6\u30c9\u76e3\u67fb\u4eba\u5411\u3051\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u5b9a\u8cc7\u683c CCAK(Certificate of Cloud Auditing Knowledge)\u3000\u89e3\u8aac\u300d<\/a>\uff082022\u5e741\u670824\u65e5\uff09<\/li>\n<li>\u7b2c81\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=20515\" target=\"_blank\" rel=\"noopener\">\u300c2021\u5e74\u4e0a\u534a\u671f\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30e9\u30a6\u30f3\u30c9\u30a2\u30c3\u30d7\u3000\u73fe\u5728\u306e\u8105\u5a01\u52d5\u5411\u3092\u5b66\u3076\u300d<\/a>\uff082021\u5e7412\u670816\u65e5\uff09<\/li>\n<li>\u7b2c80\u56de<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=19754\" target=\"_blank\" rel=\"noopener\">\u300cMM\u7dcf\u7814\u5927\u8cde2021\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5206\u91ce\u3067\u5927\u8cde\u53d7\u8cde!! NEC\u300cDigital KYC\u300d\u958b\u767a\u79d8\u8a71\u300d<\/a>\uff082021\u5e7410\u670820\u65e5\uff09<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=19376\">\u7b2c79\u56de\u300c\u30c7\u30fc\u30bf\u6d3b\u7528\u30fbAI\u3092\u652f\u3048\u308b\u300c\u79d8\u5bc6\u8a08\u7b97\u300d\u3068\u793e\u4f1a\u306b\u3082\u305f\u3089\u3059\u5909\u9769\u300d<\/a>\uff082021\u5e749\u670822\u65e5\uff09<\/li>\n<li>\u7b2c78\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=18802\">\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30e2\u30c7\u30eb\u306b\u57fa\u3065\u3044\u305f\u30af\u30e9\u30a6\u30c9\u30a2\u30af\u30bb\u30b9\u57fa\u76e4\u69cb\u7bc9\u3068\u904b\u7528\u3000\uff5e\u30b1\u30fc\u30b9\u30b9\u30bf\u30c7\u30a3\uff1aNTT-AT\u793e\uff5e<\/a>\u300d\uff082021\u5e748\u670826\u65e5\uff09<\/li>\n<li>\u7b2c77\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=18336\">\u30b5\u30a4\u30d0\u30fc\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u52d5\u5411\u3068\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u73fe\u72b6<\/a>\u300d\uff082021\u5e747\u670820\u65e5\uff09<\/li>\n<li>\u7b2c76\u56de\u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=17980\">SaaS\u306e\u8a2d\u5b9a\u3092\u53ef\u8996\u5316\u3001\u76e3\u67fb\u3059\u308bSSPM\u3068\u306f\uff1f<\/a>\u300d\uff082021\u5e746\u670825\u65e5\uff09<\/li>\n<li>\u7b2c75\u56de \u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=17124\" target=\"_blank\" rel=\"noopener\">Sophos Cloud Optix \u7d39\u4ecb<\/a>\u300d\uff082021\u5e744\u670822\u65e5\uff09<\/li>\n<li>\u7b2c74\u56de \u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=16496\" target=\"_blank\" rel=\"noopener\">\u30a2\u30e1\u30ea\u30ab\u9078\u6319\u306e\u5206\u65ad\u304b\u3089\u898b\u305fSNS\/\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u5728\u308a\u65b9<\/a>\u300d\uff082021\u5e743\u670823\u65e5\uff09<\/li>\n<li>\u7b2c73\u56de \u300c<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=16496\" target=\"_blank\" rel=\"noopener\">AWS re:Invent 2020 \u3067\u8a9e\u3089\u308c\u305f\u3053\u3068\u3000\uff5e \u30af\u30e9\u30a6\u30c9\u304c\u5f15\u304d\u8d77\u3053\u3059 Game Changer \uff5e<\/a>\u300d\uff082021\u5e742\u670822\u65e5\uff09<\/li>\n<li>\u7b2c72\u56de C<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=16152\" target=\"_blank\" rel=\"noopener\">SA\u52c9\u5f37\u4f1a \u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u91cd\u5927\u8105\u5a01: 11\u306e\u60aa\u8cea\u306a\u8105\u5a01 \u89e3\u8aac\u300d<\/a> (2021\u5e741\u670827\u65e5)<\/li>\n<li>\u7b2c71\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=15822\" target=\"_blank\" rel=\"noopener\">\u696d\u52d9\u57f7\u884c\u3068\u3057\u3066\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 ~ CISO\u30cf\u30f3\u30c9\u30d6\u30c3\u30af\u306e\u3054\u7d39\u4ecb~<\/a>\u3000\uff082020\u5e7412\u670815\u65e5\uff09<\/li>\n<li>\u7b2c70\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=14901\" target=\"_blank\" rel=\"noopener\">\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u6700\u65b0\u52d5\u5411\u3068\u5bfe\u7b56\uff1a2020\u5e7410\u6708<\/a>\uff082020\u5e7410\u670822\u65e5\uff09<\/li>\n<li>\u7b2c69\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=14191\" target=\"_blank\" rel=\"noopener\">\u30b3\u30ed\u30ca\u798d\u3067\u52a0\u901f\u3059\u308b\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3<\/a>\uff08DX\uff09(2020\u5e749\u670827\u65e5)<\/li>\n<li>\u7b2c68\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=13519\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u8105\u5a01\u30ec\u30dd\u30fc\u30c8<\/a> 2019\uff082020\u5e748\u670827\u65e5\uff09<\/li>\n<li>\u7b2c67\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=12819\">\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306b\u95a2\u9023\u3059\u308b\u56fd\u5185\u5916\u306e\u5236\u5ea6\u30fb\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u3064\u3044\u3066<\/a>\uff082020\u5e748\u67083\u65e5\uff09<\/li>\n<li>\u7b2c66\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=12633\">\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u6697\u53f7\u9375\u7ba1\u7406 \u2013 \u4ed5\u7d44\u307f\u3084BYOK\u306a\u3069<\/a>\uff082020\u5e747\u670830\u65e5\uff09<\/li>\n<li>\u7b2c65\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=12378\">SDN\u306e\u3055\u3089\u306a\u308b\u7406\u89e3\u3068\u3053\u308c\u304b\u3089<\/a>\uff082020\u5e747\u670814\u65e5\uff09<\/li>\n<li>\u7b2c64\u56de <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=11633\">Red Hat\u304c\u8003\u3048\u308b\u30bb\u30ad\u30e5\u30a2\u306a\u30b3\u30f3\u30c6\u30ca\u74b0\u5883\u3068\u306f<\/a>\uff082020\u5e746\u670825\u65e5\uff09<\/li>\n<li>\u7b2c63\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=10073\">\u30de\u30eb\u30c1\u30af\u30e9\u30a6\u30c9\u7ba1\u7406\u306e\u305f\u3081\u306eCloud Management Platform\u6d3b\u7528<\/a>(2020\u5e745\u670819\u65e5)<\/li>\n<li>\u7b2c62\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=9693\">GRC\u3068\u305d\u306e\u8ab2\u984c\u3068\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306e\u30e1\u30ea\u30c3\u30c8<\/a> (2020\u5e744\u670815\u65e5)<\/li>\n<li>\u7b2c61\u56de\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8856\">CCSP\uff08Certified Cloud Security Professional\uff09\u306e\u6982\u8981\u3001CSA\u3068\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066<\/a>\uff082020\u5e743\u670818\u65e5\uff09<\/li>\n<li>\u7279\u5225\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=9106\">\u8a73\u89e3\uff01\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30d5\u30a1\u30ec\u30f3\u30b9\uff08OSS \u30de\u30c3\u30d4\u30f3\u30b02019\uff09\uff01<\/a>\uff082020\u5e743\u67089\u65e5\uff09<\/li>\n<li>\u7279\u5225\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8879\">AWS re:Invent \u304c\u793a\u3057\u305f\u3082\u306e<\/a> (2020\u5e742\u670827\u65e5)<\/li>\n<li>\u7b2c60\u56de <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8582\">\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u601d\u60f3\u3067\u30c7\u30b6\u30a4\u30f3\u3055\u308c\u305fZscaler\uff1aZ\u89e3\u4f53\u771f\u66f8<\/a> (\u30a6\u30a8\u30d6\u4f1a\u8b70\u958b\u50ac)<\/li>\n<li>\u7b2c59\u56de <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8321\">\u79d8\u5bc6\u5206\u6563\u6cd5\u306e\u57fa\u790e\u3068\u5e83\u304c\u308a<\/a><\/li>\n<li>\u7b2c58\u56de <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7992\">2019\u5e74\u5ea6 \u30c7\u30fc\u30bf\u6f0f\u6d29\/\u4fb5\u5bb3 \u8abf\u67fb\u5831\u544a\u66f8\u300d\u306b\u57fa\u3065\u3044\u305f\u6ce8\u76ee\u3059\u3079\u304d\u30b0\u30ed\u30fc\u30d0\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u52d5\u5411<\/a><\/li>\n<li>\u7b2c57\u56de <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7445\">IAST(Interactive Application Security Testing)\u3067\u5b9f\u73fe\u3059\u308bDevSecOps<\/a><\/li>\n<li>\u7b2c56\u56de\u3000CSA\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7206\">\u8aac\u660e\u53ef\u80fd\u306a\uff21\uff29\uff08\uff38\uff21\uff29\uff09<\/a><\/li>\n<li><span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u7b2c55\u56de\u3000CSA\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6949\">\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u306b\u3088\u308bIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u306e\u6700\u9069\u89e3<\/a><\/span><\/li>\n<li>\u7b2c54\u56de\u3000CSA\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6758\">\u30b3\u30f3\u30c6\u30ca\u74b0\u5883\u306e\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8003\u3048\u65b9 \u30fc\u30fc DevOps\u304b\u3089DevSecOps\u3078<\/a><\/li>\n<li>\u7b2c53\u56de\u3000CSA\u52c9\u5f37\u4f1a\u00a0<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6473\" target=\"_blank\" rel=\"noopener\">SDP(Software Defined Perimeter): \u30af\u30e9\u30a6\u30c9\u6642\u4ee3\u306b\u6c42\u3081\u3089\u308c\u308b\u6700\u65b0\u306e\u8a8d\u8a3c\u65b9\u5f0f<\/a><\/li>\n<li>\u7b2c52\u56de\u3000CSA\u52c9\u5f37\u4f1a <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=5073\" target=\"_blank\" rel=\"noopener\">\u30c8\u30e9\u30b9\u30c8\u30b5\u30fc\u30d3\u30b9\u306e\u610f\u7fa9\u3068\u6cd5\u7684\u5bfe\u5fdc\u306e\u3042\u308a\u65b9<\/a><\/li>\n<li>\u7b2c51\u56de\u3000CSA\u52c9\u5f37\u4f1a <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4906\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9\u3092\u5b88\u308b\u30fb\u30af\u30e9\u30a6\u30c9\u3067\u5b88\u308b\uff01\u3000\u30b9\u30de\u30db\u6d3b\u7528\u30fb\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u8a8d\u8a3c\u306e\u3054\u7d39\u4ecb<\/a><\/li>\n<li>\u7b2c50\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4760\">AWS re:Invent 2018 \u3067\u4f55\u304c\u8a9e\u3089\u308c\u305f\u304b\u3000\uff5eIT\u304c\u5909\u308f\u308b\u3002\u91d1\u878d\u30fb\u516c\u5171\u30fb\u5c0f\u58f2\u306e\u8a71\u984c\u3092\u63a2\u308b\uff5e<\/a><\/li>\n<li>\u7b2c49\u56de\u3000CSA\u52c9\u5f37\u4f1a <a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4596\" target=\"_blank\" rel=\"noopener\">Dev Sec Ops Tonight\uff5e\u4eca\u3059\u3050\u8d77\u3053\u305b\u3088\u30e0\u30fc\u30d6\u30e1\u30f3\u30c8\uff5e<\/a><\/li>\n<li>\u7b2c48\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4049\" target=\"_blank\" rel=\"noopener\">\u500b\u4eba\u30c7\u30fc\u30bf\u306e\u5229\u6d3b\u7528\u306b\u304a\u3051\u308b\u60c5\u5831\u9280\u884c\u30fbPDS\u306e\u6700\u65b0\u52d5\u5411\u304a\u3088\u3073\u305d\u306e\u9069\u7528\u6280\u8853\u306e\u89e3\u8aac<\/a><\/li>\n<li>\u7b2c47\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3903\" target=\"_blank\" rel=\"noopener\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u304a\u3051\u308b\u30bb\u30eb\u30d5\u30c7\u30a3\u30b9\u30e9\u30d7\u30b7\u30e7\u30f3\u3068\u9032\u5316\u3000\uff5e\u30af\u30e9\u30a6\u30c9\u30bb\u30f3\u30c8\u30ea\u30c3\u30af\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u5411\u3051\u3066\uff5e<\/a><\/li>\n<li>\u7b2c46\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3822\">CCSP\u6982\u8981\u3001CCSK V4\u6982\u8981<\/a><\/li>\n<li>\u7b2c45\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3788\" target=\"_blank\" rel=\"noopener\">2018\u5e74\u5ea6\u30c7\u30fc\u30bf\u6f0f\u6d29\u30fb\u4fb5\u5bb3\u8abf\u67fb\u5831\u544a\u66f8\u306e\u7d39\u4ecb<\/a><\/li>\n<li>\u7b2c44\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3734\" target=\"_blank\" rel=\"noopener\">\u6539\u6b63\u5272\u8ce6\u8ca9\u58f2\u6cd5\u3001\u30af\u30ec\u30b8\u30c3\u30c8\u30ab\u30fc\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u57fa\u6e96(PCI DSS)\u3001\u305d\u3057\u3066\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9<\/a><\/li>\n<li>\u7b2c43\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3675\" target=\"_blank\" rel=\"noopener\">\u4f01\u696d\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u304a\u3051\u308bSDN\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6d3b\u7528\u4e8b\u4f8b<\/a><\/li>\n<li>\u7b2c42\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3500\" target=\"_blank\" rel=\"noopener\">\u30af\u30e9\u30a6\u30c9HUB\u30b5\u30fc\u30d3\u30b9\uff1a\u30de\u30eb\u30c1\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u8ab2\u984c\u306e\u89e3\u6c7a\u7b56<\/a><\/li>\n<li>\u7b2c41\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3445\" target=\"_blank\" rel=\"noopener\">\u975e\u91d1\u878d\u5206\u91ce\u306e\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\uff0f\u5206\u6563\u53f0\u5e33\u6280\u8853\u3068IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li>\u7b2c40\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3393\" target=\"_blank\" rel=\"noopener\">IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u8a8d\u8a3c\u30fbPKI\u306e\u5fc5\u8981\u6027\u3000\uff08\u306a\u305cIoT\u306b\u8a8d\u8a3c\u30fbPKI\u304c\u5fc5\u8981\u306a\u306e\u304b\uff1f\uff09<\/a><\/li>\n<li><span style=\"display: inline !important; float: none; background-color: transparent; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">\u7b2c39\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3320\" target=\"_blank\" rel=\"noopener\">AWS\u30a4\u30d9\u30f3\u30c8\u3000re:Invent\u3000\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af<\/a><\/span><\/li>\n<li>\u7b2c38\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3224\">IoT\u74b0\u5883\u3092\u652f\u3048\u308b\u30a4\u30d9\u30f3\u30c8\u30fb\u30c9\u30ea\u30d6\u30f3\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\uff08EDA)\u3068\u305d\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li>\u7b2c37\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3146\" target=\"_blank\" rel=\"noopener\">\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u306e\u73fe\u72b6\u3068\u4eca\u5f8c\u3000-Ethrereum\u3092\u4e2d\u5fc3\u306b-<\/a><\/li>\n<li>\u7b2c36\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3076\">Office 365 \u3067\u5b9f\u73fe\u3059\u308b\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li>\u7b2c35\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=3038\">\u9ad8\u4fe1\u983c\u30c7\u30a3\u30b6\u30b9\u30bf\u30ea\u30ab\u30d0\u30ea\u6280\u8853\u306e\u5b9f\u7528\u5316\u3068\u5fdc\u7528<\/a><\/li>\n<li>\u7b2c34\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2924\">\u793e\u5185\u306eIdentity\u3067AWS\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u7ba1\u7406\u3092\u52b9\u7387\u5316<\/a><\/li>\n<li>\u7b2c33\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2895\">\u30af\u30e9\u30a6\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u79d8\u5bc6\u5206\u6563\u6280\u8853\u306e\u6d3b\u7528<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2755\">\u7b2c32\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000PDS(\u30d1\u30fc\u30bd\u30ca\u30eb\u30c7\u30fc\u30bf\u30b9\u30c8\u30a2)\u3068\u91d1\u878dAPI\u306e\u52d5\u5411<\/a><\/li>\n<li>\u7b2c31\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2623\" target=\"_blank\" rel=\"noopener noreferrer\">\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u306b\u304a\u3051\u308b\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u95a2\u9023\u6280\u8853\u306e\u30c8\u30ec\u30f3\u30c9<\/a><\/li>\n<li>\u7b2c30\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2538\" target=\"_blank\" rel=\"noopener noreferrer\">AWS\u6700\u5927\u306e\u30a4\u30d9\u30f3\u30c8re:Invent\u3067\u8a9e\u3089\u308c\u305f\u3053\u3068<\/a><\/li>\n<li>\u7b2c29\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2467\" target=\"_blank\" rel=\"noopener noreferrer\">SDP\uff08Software Defined Perimeter\uff09\u306e\u6d3b\u7528\u306b\u3064\u3044\u3066<\/a><\/li>\n<li>\u7b2c28\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2414\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u30ac\u30fc\u30c8\u30ca\u30fc\u3082\u6ce8\u76ee\u3057\u3066\u3044\u308b\u6700\u65b0\u30de\u30eb\u30a6\u30a7\u30a2\u5bfe\u7b56\u3001EDR\u306e\u6280\u8853\u7d39\u4ecb<\/a><\/li>\n<li>\u7b2c27\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2282\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u5b89\u5168\u30fb\u5b89\u5fc3\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30c7\u30b8\u30bf\u30eb\u793e\u4f1a\u3068\u30af\u30e9\u30a6\u30c9\u3001\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u304a\u3055\u3089\u3044<\/a><\/li>\n<li>\u7b2c26\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2234\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000FinTech\u306e\u6280\u8853\u3068\u30af\u30e9\u30a6\u30c9\u306e\u95a2\u4fc2<\/a><\/li>\n<li>\u7b2c25\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2191\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a8d\u5b9a\u8a66\u9a13\uff08CCSP,CCSK)\u306e\u7d39\u4ecb<\/a><\/li>\n<li>\u7b2c24\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2154\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u672a\u77e5\u306e\u8105\u5a01\u3078\u306e\u5207\u308a\u672d:\u3000\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u6700\u524d\u7dda<\/a><\/li>\n<li>\u7b2c23\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=2118\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u5927\u898f\u6a21\u30b7\u30b9\u30c6\u30e0\u306e\u30a4\u30f3\u30d5\u30e9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u904b\u7528\u306b\u3064\u3044\u3066<\/a><\/li>\n<li>\u7b2c22\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1938\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u306e\u88ab\u5bb3\u304b\u3089\u898b\u308b\u30af\u30e9\u30a6\u30c9\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u306e\u6709\u52b9\u6027<\/a><\/li>\n<li>\u7b2c21\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1712\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000Box\u3092\u6d3b\u7528\u3057\u305f\u30bb\u30ad\u30e5\u30a2\u30fb\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3<\/a><\/li>\n<li>\u7b2c20\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1647\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u7d99\u7d9a\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30e2\u30cb\u30bf\u30ea\u30f3\u30b0\u3092\u5b9f\u73fe\u3059\u308bCDM\u3068\u53ef\u7528\u6027\u306b\u3064\u3044\u3066<\/a><\/li>\n<li>\u7b2c19\u56de\u3000<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1609\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u3000\u6b27\u5dde\u306e\u793e\u4f1a\u8ab2\u984c\u89e3\u6c7a\u578b\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3068\u500b\u4eba\u30c7\u30fc\u30bf\u4fdd\u8b77<\/a><\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1501\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c18\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000SaaS\u74b0\u5883\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1572\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u4e0b\u3055\u3044\u3002<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1226\">\u7b2c17\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u30c7\u30fc\u30bf\u30bb\u30f3\u30bf\u30fc\u3000\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c9\u30d6\u30c3\u30af\u89e3\u8aac<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1549\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u4e0b\u3055\u3044\u3002<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1076\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c16\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000IAM\u7ba1\u7406\u306e\u6700\u65b0\u52d5\u5411\u3068JNSA \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u7ba1\u7406WG\u306e\u6d3b\u52d5\u72b6\u6cc1<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1201\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li><a title=\"\u7b2c15\u56deCSA\u52c9\u5f37\u4f1a \u300c\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76e3\u67fb\u57fa\u6e96\u3068ISO27001\u3068\u306e\u95a2\u4fc2\u306b\u3064\u3044\u3066\u3001STAR\/CCM\u6982\u8aac\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1132\">\u7b2c15\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76e3\u67fb\u57fa\u6e96\u3068ISO27001\u3068\u306e\u95a2\u4fc2\u3001STAR\/CCM\u6982\u8aac<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a title=\"\u7b2c15\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1097\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li><a title=\"\u7b2c14\u56deCSA\u52c9\u5f37\u4f1a \u300cCASB (Cloud Access Security Broker)\u6982\u8981\u3001\u30b1\u30fc\u30b9\u30b9\u30bf\u30c7\u30a3\u30fc\u300d\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=964\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c14\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000CASB (Cloud Access Security Broker)\u6982\u8981\u3001\u30b1\u30fc\u30b9\u30b9\u30bf\u30c7\u30a3\u30fc<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a title=\"\u7b2c14\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1056\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li><a title=\"\u7b2c13\u56deCSA\u52c9\u5f37\u4f1a \u300cSDP\u304a\u3088\u3073\u8abf\u67fb\u5831\u544a\u66f8\u306e\u89e3\u8aac\u300d\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=891\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c13\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000SDP\u304a\u3088\u3073\u8abf\u67fb\u5831\u544a\u66f8\u306e\u89e3\u8aac<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a title=\"\u7b2c13\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=925\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=767\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c12\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000CSA Summit 2015&amp;RSA conference\u5831\u544a\u4f1a<\/a><br \/>\n\u8cc7\u6599\u306f\u3001<a title=\"\u7b2c12\u56de\u52c9\u5f37\u4f1a\u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=861\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u300cNIST draft SP800-125a\u3000Security Recommendations for Hypervisor Deployment\u306e\u89e3\u8aad\u300d\u306e\u8cc7\u6599\u306f\u3001<a title=\"\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=712\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u7b2c10\u56deCSA\u52c9\u5f37\u4f1a\u3000\u300cISO\/IEC27001:2013\u3068ISO\/IEC27017\u306e\u91cd\u8981\u306a\u30dd\u30a4\u30f3\u30c8\u306e\u89e3\u8aac\u300d\u306e\u8cc7\u6599\u306f<a title=\"\u7b2c10\u56de\u3000CSA\u52c9\u5f37\u4f1a \u8cc7\u6599\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=447\" target=\"_blank\" rel=\"noopener noreferrer\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li><a title=\"CSA\u52c9\u5f37\u4f1a\u7279\u5225\u7248\u30002015\u5e743\u670817\u65e5(\u706b)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=452\" target=\"_blank\" rel=\"noopener noreferrer\">CSA\u52c9\u5f37\u4f1a\u7279\u5225\u7248<\/a><\/li>\n<li><a title=\"\u7b2c8\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e742\u670825\u65e5(\u6c34)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=455\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c8\u56de\u3000CSA\u52c9\u5f37\u4f1a \u91d1\u878d\u5411\u3051\u30af\u30e9\u30a6\u30c9\u306e\u6700\u65b0\u52d5\u5411\u3000\uff5e\u4e8b\u4f8b\u3001FISC\u3001\u30d9\u30f3\u30c0\u306e\u52d5\u304d<\/a><\/li>\n<li><a title=\"\u7b2c7\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e741\u670828\u65e5(\u6c34)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=459\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c7\u56de\u3000CSA\u52c9\u5f37\u4f1a \u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a><\/li>\n<li><a title=\"\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7411\u670825\u65e5(\u706b)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=463\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a CSA\u30ac\u30a4\u30c9\u7b49\u306b\u57fa\u3065\u3044\u305f\u65e5\u7acb\u30b7\u30b9\u30c6\u30e0\u30ba\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u53d6\u7d44\u307f <\/a><\/li>\n<li><a title=\"\u7b2c5\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7410\u670828\u65e5(\u706b)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=465\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c5\u56de\u3000CSA\u52c9\u5f37\u4f1a CSA Congress 2014 (2014.9.18-19 @San Jose, CA) \u53c2\u52a0\u5831\u544a<\/a><\/li>\n<li><a title=\"\u7b2c4\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e749\u670829\u65e5(\u6708)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=467\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c4\u56de\u3000CSA\u52c9\u5f37\u4f1a CSA\u3000STAR\u8a8d\u8a3c\u3092\u8003\u3048\u308b\u3000\uff0d\u305d\u306e\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3068\u306f\uff0d<\/a><\/li>\n<li><a title=\"\u7b2c3\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e748\u670827\u65e5(\u6c34)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=469\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c3\u56de\u3000CSA\u52c9\u5f37\u4f1a \u30d1\u30cd\u30eb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3 \u30c6\u30fc\u30de\uff1a\u3000\u300c\u60c5\u5831\u6f0f\u3048\u3044\u4e8b\u4ef6\u304b\u3089\u7d10\u3068\u304f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<\/a><\/li>\n<li><a title=\"\u7b2c\uff12\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e747\u670830\u65e5(\u6c34)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=471\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c2\u56de\u3000CSA\u52c9\u5f37\u4f1a \u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8cc7\u683cCCSK\u3078\u306e\u30c1\u30e3\u30ec\u30f3\u30b8<\/a><\/li>\n<li><a title=\"\u7b2c\uff11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e746\u670826\u65e5(\u6728)\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=475\" target=\"_blank\" rel=\"noopener noreferrer\">\u7b2c1\u56de\u3000CSA\u52c9\u5f37\u4f1a Internet of Things\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u8003\u3048\u308b<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u904e\u53bb\u306e\u52c9\u5f37\u4f1a\u306e\u30a2\u30fc\u30ab\u30a4\u30d6\u3067\u3059\u3002 \u7b2c122\u56de\u300c\u500b\u4eba\u60c5 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=444\" title=\"\u4eca\u307e\u3067\u306e\u52c9\u5f37\u4f1a\u3068\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":206,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-444","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=444"}],"version-history":[{"count":45,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444\/revisions"}],"predecessor-version":[{"id":42102,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444\/revisions\/42102"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/206"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}