﻿{"id":447,"date":"2015-04-16T10:17:26","date_gmt":"2015-04-16T01:17:26","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=447"},"modified":"2015-04-16T10:17:26","modified_gmt":"2015-04-16T01:17:26","slug":"%e7%ac%ac10%e5%9b%9e%e3%80%80csa%e5%8b%89%e5%bc%b7%e4%bc%9a-%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=447","title":{"rendered":"\u7b2c10\u56de\u3000CSA\u52c9\u5f37\u4f1a \u8cc7\u6599"},"content":{"rendered":"<h2 class=\"dt_headLine\"><span style=\"color: #000000;\"><span style=\"color: #330000; font-size: x-large;\">\u7b2c10\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e743\u670824\u65e5(\u706b)\u3000\u5b9f\u65bd<\/span>\u00a0 \uff20\u30d1\u30ba\u30eb\u4e00\u756a\u753a<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 class=\"dt_headLine\">\u30c6\u30fc\u30de\u30fb\u30a2\u30b8\u30a7\u30f3\u30c0<\/h2>\n<pre>\u30c6\u30fc\u30de\uff1a\u3000ISO\/IEC27001:2013\u3068ISO\/IEC27017\u306e\u91cd\u8981\u306a\u30dd\u30a4\u30f3\u30c8\u306e\u89e3\u8aac<\/pre>\n<pre>\u30a2\u30b8\u30a7\u30f3\u30c0\uff1a\u3000\u00a0\uff11\uff0eISO\/IEC27001\u306e\u6539\u8a02\u306e\u4e3b\u65e8\u3068\u4e3b\u8981\u306a\u6539\u8a02\u70b9\n\u00a0\u3000\u3000\u3000\u3000\u3000\u3000\u3000\uff12\uff0e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u56fd\u969b\u6a19\u6e96\u5316\u306e\u7d4c\u7def\n\u00a0\u3000\u3000\u3000\u3000\u3000\u3000\u3000\uff13\uff0e\u5b89\u5168\u306a\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u305f\u3081\u306eISO\/IEC27017\u306e\u679c\u305f\u3059\u5f79\u5272\n\u00a0\u3000\u3000\u3000\u3000\u3000\u3000\u3000\uff14\uff0eISO\/IEC27017\u306e\u8ffd\u52a0\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u7b56\u3068\u5b9f\u65bd\u306e\u624b\u5f15\u304d\uff08\u4e8b\u4f8b\uff09<\/pre>\n<pre>\u8b1b\u5e2b\uff1a\u3000\u5c71\u5d0e\u3000\u54f2\u6c0f\n\u00a0\u00a0\u00a0 \u3000\u3000\u5de5\u5b66\u9662\u5927\u5b66\u60c5\u5831\u5b66\u90e8\u3000\u5ba2\u54e1\u7814\u7a76\u54e1\u3000\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ISO\/IEC SC27\/WG1\u4e3b\u67fb\u3000ISO\/IEC27017\u56fd\u969b\u7de8\u96c6\u59d4\u54e1\u4f1aLead Editor<\/pre>\n<p>&nbsp;<\/p>\n<pre><span style=\"font-size: small;\">\u8b1b\u6f14\u8cc7\u6599\uff1a\u3000\u3053\u3061\u3089\u304b\u3089\u3054\u5229\u7528\u304f\u3060\u3055\u3044<\/span><\/pre>\n<p><span style=\"font-family: MS Gothic;\">\u3000\u3000\u3000\u3000<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Benkyokai\/20150324\/CloudSecurityStandards20150324V01rev.pdf\" target=\"_blank\">http:\/\/www.cloudsecurityalliance.jp\/Benkyokai\/20150324\/<span style=\"color: #045eb4; font-family: MS PGothic;\">CloudSecurityStandards20150324V01rev.pdf<\/span><\/a><\/span><\/p>\n<pre><\/pre>\n<h2 class=\"dt_headLine\">\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6<\/h2>\n<ul>\n<li>\n<div class=\"dt_headLine\">CSA\u52c9\u5f37\u4f1a\u306b\u53c2\u52a0\u3059\u308b\u306b\u969b\u3057\u3066\u306e\u53c2\u8003\u3068\u3057\u3066\u5229\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c10\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e743\u670824\u65e5(\u706b) <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=447\" title=\"\u7b2c10\u56de\u3000CSA\u52c9\u5f37\u4f1a \u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":444,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-447","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=447"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/447\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}