﻿{"id":463,"date":"2015-04-16T10:29:12","date_gmt":"2015-04-16T01:29:12","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=463"},"modified":"2015-04-16T10:29:12","modified_gmt":"2015-04-16T01:29:12","slug":"%e7%ac%ac6%e5%9b%9e%e3%80%80csa%e5%8b%89%e5%bc%b7%e4%bc%9a%e3%80%802014%e5%b9%b411%e6%9c%8825%e6%97%a5%e7%81%ab","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=463","title":{"rendered":"\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7411\u670825\u65e5(\u706b)"},"content":{"rendered":"<h2 class=\"dt_headLine\"><span style=\"color: #000000;\"><span style=\"color: #330000; font-size: x-large;\">\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7411\u670825\u65e5(\u706b)\u3000\u5b9f\u65bd<\/span>\u00a0<\/span><\/h2>\n<p>&nbsp;<\/p>\n<h2 class=\"dt_headLine\">\u30c6\u30fc\u30de\u30fb\u30a2\u30b8\u30a7\u30f3\u30c0<\/h2>\n<p>\uff11\uff0eCSA\u30ac\u30a4\u30c9\u7b49\u306b\u57fa\u3065\u3044\u305f\u65e5\u7acb\u30b7\u30b9\u30c6\u30e0\u30ba\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u53d6\u7d44\u307f<br \/>\n(\u682a)\u65e5\u7acb\u30b7\u30b9\u30c6\u30e0\u30ba\u7814\u7a76\u958b\u767a\u672c\u90e8\u7814\u7a76\u958b\u767a\u30bb\u30f3\u30bf\u3000\u85e4\u4e95\u5eb7\u5e83\u6c0f<\/p>\n<p>\u8cc7\u6599\uff1a\u3000<a href=\"http:\/\/cloudsecurityalliance.jp\/Benkyokai\/20141125\/Hi-Sol%20Adoption%20of%20CSA%20Guide.pdf\" target=\"_blank\">CSA\u30ac\u30a4\u30c9\u7b49\u306b\u57fa\u3065\u3044\u305f\u65e5\u7acb\u30b7\u30b9\u30c6\u30e0\u30ba\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u53d6\u7d44\u307f<\/a><\/p>\n<p>\u203b\u30d7\u30ec\u30bc\u30f3\u306e\u30da\u30fc\u30b9\u3068\u306a\u308b\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u306f\u3053\u3061\u3089\u306b\u3042\u308a\u307e\u3059\u3002<br \/>\n<span style=\"color: #0066cc;\"><a href=\"http:\/\/www.hitachi-systems.com\/cloud\/whitepapers\/index.html\" target=\"_blank\">http:\/\/www.hitachi-systems.com\/cloud\/whitepapers\/index.html<\/a><\/span><\/p>\n<pre>\uff12\uff0eCSA APAC Summit 2014\/CloudAsia\u53c2\u52a0\u5831\u544a\n\u3000\u3000\u3000\u3000CSA\u30b8\u30e3\u30d1\u30f3\u4ee3\u8868\u7406\u4e8b\u3000\u4e8c\u6728\u771f\u660e\u6c0f\n\n   \u8cc7\u6599\uff1a\u3000<a href=\"http:\/\/cloudsecurityalliance.jp\/Benkyokai\/20141125\/CSA%20APAC%20Summit%202014%20Report.pdf\" target=\"_blank\">CSA APAC Summit 2014 \u53c2\u52a0\u5831\u544a\n<\/a><\/pre>\n<h2 class=\"dt_headLine\">\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6<\/h2>\n<ul>\n<li>\n<div class=\"dt_headLine\">CSA\u52c9\u5f37\u4f1a\u306b\u53c2\u52a0\u3059\u308b\u306b\u969b\u3057\u3066\u306e\u53c2\u8003\u3068\u3057\u3066\u5229\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7411\u670825\u65e5(\u706b) <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=463\" title=\"\u7b2c6\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002014\u5e7411\u670825\u65e5(\u706b)\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":444,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-463","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=463"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/463\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}