﻿{"id":6613,"date":"2019-06-12T12:14:24","date_gmt":"2019-06-12T03:14:24","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6613"},"modified":"2023-12-05T16:22:32","modified_gmt":"2023-12-05T07:22:32","slug":"%e3%82%b3%e3%83%b3%e3%83%86%e3%83%8a%e3%83%bb%e3%83%9e%e3%82%a4%e3%82%af%e3%83%ad%e3%82%b5%e3%83%bc%e3%83%93%e3%82%b9-wg","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6613","title":{"rendered":"DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9 WG"},"content":{"rendered":"<h2>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9 \u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\uff08\u7565\u79f0\uff1aDevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9 WG\uff09\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<h3><strong>\u6d3b\u52d5\u8981\u65e8<\/strong><\/h3>\n<p>2021\u5e7410\u6708\u3088\u308a\u3001CSA\u672c\u90e8\u306eApplication Containers &amp; Microservice WG\u306f\u3001DevSecOps WG\u306e\u30b5\u30d6\u30b0\u30eb\u30fc\u30d7\u3068\u3057\u3066\u6d3b\u52d5\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u5408\u308f\u305b\u3066\u3001\u672cWG\u306f\u3001CSA\u672c\u90e8\u306eDevSecOps WG\u304a\u3088\u3073Serverless\u00a0 WG\u3068\u9023\u643a\u3057\u3066\u6d3b\u52d5\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff06\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG\u306e\u65b0\u6d3b\u52d5\u65b9\u91dd\u3092\u4f5c\u6210\u3057\u307e\u3057\u305f\u3002<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/06\/CSA-JC-ACM-WG-Charter-V1_20190520.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002\uff082019\u5e746\u67084\u65e5\uff09<\/p>\n<h3>\u8cc7\u6599<\/h3>\n<ul>\n<li>\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/04\/icon4newpink.gif\" alt=\"\" width=\"36\" height=\"15\" \/>\u300c\u5b89\u5168\u306a\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u8a2d\u8a08\u3059\u308b\u306b\u306f\uff08Updated 2023 Version\uff09\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff082023\u5e7412\u67085\u65e5\uff09\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cHow to Design a Secure Serverless Architecture Updated 2023 Version\u300d\u306e\u7ffb\u8a33\u7248\u3067\u30012022\u5e741\u670829\u65e5\u306b\u516c\u958b\u3057\u305f\u300c\u5b89\u5168\u306a\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u8a2d\u8a08\u3059\u308b\u306b\u306f\u300d\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/12\/How-to-Design-a-Secure-Serverless-Architecture_2023_J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u300cDevSecOps\u306e6\u3064\u306e\u67f1\ufe13\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u958b\u767a\u3001\u904b\u2f64\u306e\u7d71\u5408\u306b\u3088\u308b\u518d\u5e30\u7684\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5b9f\u73fe\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff082023\u5e7411\u670815\u65e5\u66f4\u65b0\u3000\u65e5\u672c\u8a9e\u7248V1.0\uff09\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cThe Six Pillars of DevSecOps: Achieving Reflexive Security Through Integration of Security, Development, and<br \/>\nOperations\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/11\/The-Six-Pillars-of-DevSecOps-Achieving-Reflexive-Security-Through-en_us-ja.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u00a0\u300cDevSecOps\u306e6\u3064\u306e\u67f1\uff1a\u81ea\u52d5\u5316\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff082023\u5e744\u67083\u65e5\u66f4\u65b0\u3000\u65e5\u672c\u8a9e\u7248V1.1\uff09\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cThe Six Pillars of DevSecOps: Automation\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/04\/DevSecOps-Automatio-ja.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u300c\u5b89\u5168\u306a\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u8a2d\u8a08\u3059\u308b\u306b\u306f\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff082022\u5e741\u670829\u65e5\uff09\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cHow to Design a Secure Serverless Architecture\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2022\/01\/How-to-Design-a-Secure-Serverless-Architecture-091321-J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u300c\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u306e\u6700\u3082\u91cd\u5927\u306a12\u306e\u30ea\u30b9\u30af\uff082019\u5e74\uff09\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff082021\u5e741\u670812\u65e5\uff09\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cThe 12 Most Critical Risks for Serverless Applications 2019\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2021\/01\/The-12-Most-Critical-Risks-for-Serverless-Applications_J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u300c\u5b89\u5168\u306a\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5b9f\u88c5\u306e\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\uff082020\u5e7411\u670817\u65e5\uff09\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cBest Practices in Implementing a Secure Microservices Architecture\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/11\/best-practices-in-implementing-a-secure-microservices-architecture-J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u300c\u5b89\u5168\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5b9f\u88c5\u306e\u305f\u3081\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\uff082020\u5e742\u670827\u65e5\uff09\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cBest Practices for Implementing a Secure Application Container Architecture\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/bestpractices_container_architecture_J_V10.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>2021\u5e749\u670814\u65e5\u516c\u958b<br \/>\nCloud Security Alliance Serverless-WG<br \/>\n&#8220;<strong><em>How to Design a Secure Serverless Architecture<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/serverless-computing-security-in-2021\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/serverless-computing-security-in-2021\/<\/a><\/li>\n<li>2021\u5e748\u670831\u65e5\u516c\u958b<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<strong><em>Microservices Architecture Pattern<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/microservices-architecture-pattern\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/microservices-architecture-pattern\/<\/a><\/li>\n<li>2020\u5e742\u670824\u65e5\u516c\u958b<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<strong><em>Best Practices in Implementing a Secure Microservices Architecture<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/<\/a><\/li>\n<li>2019\u5e747\u670826\u65e5 \u516c\u958b<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<em><strong>Best Practices for Implementing a Secure Application Container Architecture<\/strong><\/em>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-for-implementing-a-secure-application-container-architecture\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-for-implementing-a-secure-application-container-architecture\/<\/a><\/li>\n<li>2019\u5e747\u670816\u65e5 \u516c\u958b<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<em><strong>Challenges in Securing Application Containers and Microservices<\/strong><\/em>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/challenges-in-securing-application-containers-and-microservices\">https:\/\/cloudsecurityalliance.org\/artifacts\/challenges-in-securing-application-containers-and-microservices<\/a><\/li>\n<li>2021\u5e746\u670830\u65e5 \u516c\u958b<br \/>\n\u3010\u95a2\u897f\u3011\u53c2\u8003\u8cc7\u6599<br \/>\n\u300cNISTIR 8320A \u30cf\u30fc\u30c9\u30a6\u30a7\u30a2\u5bfe\u5fdc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff1a\u30b3\u30f3\u30c6\u30ca\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d7\u30ed\u30c8\u30bf\u30a4\u30d7\u300d\u6982\u8aac<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/nistir-8320a\/\">https:\/\/www.slideshare.net\/esasahara\/nistir-8320a\/<\/a><\/li>\n<li>2020\u5e746\u670815\u65e5 \u516c\u958b<br \/>\n\u3010\u95a2\u897f\u3011Kansai Cloud DevSec Meetup \u7528\u52c9\u5f37\u4f1a\u8cc7\u6599<br \/>\n\u300cNIST SP 800-240A \u30b5\u30fc\u30d3\u30b9\u30fb\u30e1\u30c3\u30b7\u30e5\u30fb\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u5229\u7528\u3057\u305f\u30bb\u30ad\u30e5\u30a2\u306a\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30d9\u30fc\u30b9\u30fb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u69cb\u7bc9\u306e\u6982\u8aac\u300d<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/nist-sp-800240a\">https:\/\/www.slideshare.net\/esasahara\/nist-sp-800240a<\/a><\/li>\n<li>2020\u5e741\u670810\u65e5\uff08\u91d1\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #4<br \/>\n\u4e16\u754c\u306e\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u6280\u8853\u52d5\u5411\u304b\u3089\u4fef\u77b0\u3059\u308b\u95a2\u897f\u306e2025\u5e74<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/2025-218028551\/\">https:\/\/www.slideshare.net\/esasahara\/2025-218028551<\/a><\/li>\n<li>2019\u5e7411\u670812\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #3<br \/>\n\u5317\u6b27\u306e\u30ea\u30d3\u30f3\u30b0\u30e9\u30dc\u304b\u3089\u4fef\u77b0\u3059\u308b\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3ICT\u306e\u73fe\u72b6\u3068\u8ab2\u984c<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-192484055\">https:\/\/www.slideshare.net\/esasahara\/ss-192484055<\/a><\/li>\n<li>2019\u5e749\u670817\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #2<br \/>\n\u30a8\u30c3\u30b8\uff0f\u30d5\u30a9\u30b0\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306b\u304a\u3051\u308b\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30e1\u30ea\u30c3\u30c8\u3068\u30ea\u30b9\u30af<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-168275894\">https:\/\/www.slideshare.net\/esasahara\/ss-168275894<\/a><\/li>\n<li>2019\u5e747\u670816\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #1<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6982\u8aac<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-154569626\">https:\/\/www.slideshare.net\/esasahara\/ss-154569626<\/a><\/li>\n<\/ul>\n<h3>\u6d3b\u52d5\u5185\u5bb9<\/h3>\n<ul>\n<li><strong>2021\u5e7410\u670829\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance Serverless-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>The document discussed on today&#8217;s call: Serverless for Execs<br \/>\n-Eiji-san will review sections 1 and 2<br \/>\n-Section 2.5 needs to be reviewed<br \/>\n-Section 3.4 expected to be written<br \/>\n-Updates and timelines needed for sections &#8211; 3.1, 3.2, 3.3, 4<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e749\u670823\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong><strong>Cloud Security Alliance Serverless-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/strong><\/p>\n<ul>\n<li>Defined Table of Content for new Serverless WG paper for Execs<\/li>\n<li>Assigned sections to authors<\/li>\n<li>Each author to provide a first draft of their respective section by next WG call in 2 weeks<\/li>\n<li>Paper no-longer than 5 pages long<\/li>\n<\/ul>\n<\/li>\n<li><strong>2021\u5e749\u670810\u65e5\uff08\u91d1\uff0900:00am &#8211; 01:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance DevSecOps-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>Open Peer Review: Open Until: 11\/05\/2021<br \/>\n&#8220;<em><strong>DevSecOps &#8211; Pillar 4 Bridging Compliance and Development<\/strong><\/em>&#8221; &#8211;\u00a0This document provides guidance to ensure the gap between compliance and development is addressed by recognizing compliance objectives, translating them to appropriate security measures, and identifying inflection points within the software development lifecycle where these controls can be embedded, automated, measured, and tested in a transparent and easily understood way.<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/devsecops-pillar-4-bridging-compliance-and-development\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/devsecops-pillar-4-bridging-compliance-and-development\/<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>2021\u5e747\u670823\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance Serverless-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>Discussed comments made from the peer review process on the &#8216;<strong>Serverless Computing in 202<\/strong><strong>1<\/strong>&#8216; paper<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e747\u670816\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance DevSecOps-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>CSA Announcements:\n<ul type=\"circle\">\n<li>Recent document releases:<\/li>\n<li>Opportunities to participate in reviews and surveys<\/li>\n<\/ul>\n<ul type=\"disc\">\n<li>Recap from the Kick-off Call\n<ul type=\"disc\">\n<li>Reviewed the work done so far<\/li>\n<li>Defined the new direction<\/li>\n<li>Discussed next steps and near term documents (e.g. finishing the pillars documents)<\/li>\n<li>View the recording of the kick-off call here:<\/li>\n<\/ul>\n<\/li>\n<li>Documents\n<ul type=\"disc\">\n<li>Review:\n<ul type=\"disc\">\n<li>Pillar 4 &#8211; Bridge Compliance and Development document<\/li>\n<\/ul>\n<\/li>\n<li>Write:\n<ul type=\"disc\">\n<li>Pillar 2 &#8211; Training &amp; Process Integration<\/li>\n<li>Pillar 3 &#8211; Pragmatic Implementation<\/li>\n<li>Pillar 6 &#8211; Measure, Monitor, Report &amp; Action<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Best Practices for Writing\n<ul type=\"disc\">\n<li>Establish a quorum of key writers and establish methods of communication (e.g. weekly calls, email, slack, Circle thread)<\/li>\n<li>Start with an outline so you have a roadmap, you can always go back an edit<\/li>\n<li>Keep in mind the audience\n<ul type=\"disc\">\n<li>For the pillars\n<ul type=\"disc\">\n<li>Keep it broader than just those who write code<\/li>\n<li>But still needs to be technical enough that it&#8217;s applicable<\/li>\n<\/ul>\n<\/li>\n<li>Applied topics &#8211; will be more technical and narrow audience<\/li>\n<\/ul>\n<\/li>\n<li>Assign sections of the outline to each of writers<\/li>\n<li>Add visuals when words fail &#8211; CSA graphic designers at CSA can help!<\/li>\n<li>Length of the document &#8211; see what&#8217;s already been published<\/li>\n<\/ul>\n<\/li>\n<li>Ideas for future projects\n<ul type=\"circle\">\n<li>Code (open source) and demos instructions for more hands on opportunities<\/li>\n<li>Reference Architecture specifically around security<\/li>\n<li>Internal roadmap<\/li>\n<\/ul>\n<\/li>\n<li>Calls to Action\n<ul type=\"circle\">\n<li>Introduce yourself on\u00a0this discussion thread\u00a0and let us know what your areas of interest or expertise are<\/li>\n<li>Participate in this survey!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e747\u670816\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security DevSecsOps-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>CSA Announcements:<br \/>\n-Recent document releases:<br \/>\n-Opportunities to participate in reviews and surveys<\/li>\n<li>Recap from the Kick-off Call<br \/>\n-Reviewed the work done so far<br \/>\n-Defined the new direction<br \/>\n-Discussed next steps and near term documents (e.g. finishing the pillars documents)<\/li>\n<li>Documents<br \/>\n-Review:<br \/>\nPillar 4 &#8211; Bridge Compliance and Development document<br \/>\n-Write:<br \/>\nPillar 2 &#8211; Training &amp; Process Integration<br \/>\n-Pillar 3 &#8211; Pragmatic Implementation<br \/>\n-Pillar 6 &#8211; Measure, Monitor, Report &amp; Action<\/li>\n<li>Best Practices for Writing<br \/>\n-Establish a quorum of key writers and establish methods of communication (e.g. weekly calls, email, slack, Circle thread)<br \/>\n-Start with an outline so you have a roadmap, you can always go back an edit<br \/>\n-Keep in mind the audience<br \/>\n&lt;For the pillars&gt;<br \/>\n*Keep it broader than just those who write code<br \/>\n*But still needs to be technical enough that it&#8217;s applicable<br \/>\n&lt;Applied topics &gt;- will be more technical and narrow audience<br \/>\n-Assign sections of the outline to each of writers<br \/>\n-Add visuals when words fail &#8211; CSA graphic designers at CSA can help!<br \/>\n-Length of the document &#8211; see what&#8217;s already been published<\/li>\n<li>Ideas for future projects<br \/>\n-Code (open source) and demos instructions for more hands on opportunities<br \/>\n-Reference Architecture specifically around security<br \/>\n-Internal roadmap<\/li>\n<li>Calls to Action<br \/>\n-Introduce yourself on this discussion thread and let us know what your areas of interest or expertise are<br \/>\n-Participate in this survey!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e747\u67082\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance Serverless-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/p>\n<ul>\n<li>Discussed comments made from the peer review process on the &#8216;<strong>Serverless Computing in 202<\/strong><strong>1<\/strong>&#8216; paper<\/li>\n<\/ul>\n<\/li>\n<li><strong><span style=\"font-size: 16px;\">2020\u5e746\u670823\u65e5\uff08\u6c34\uff0914:55\uff5e15:25<\/span><\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<br \/>\n<\/span>\u3010\u6771\u4eac\u30fb\u30aa\u30f3\u30e9\u30a4\u30f3\u3011ZDNet Japan\u00a0Thales Crypto Summit Japan<br \/>\n<a href=\"https:\/\/japan.zdnet.com\/info\/event\/thales\/202106\/\">https:\/\/japan.zdnet.com\/info\/event\/thales\/202106\/<\/a><br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\n\u300c\u30cb\u30e5\u30fc\u30ce\u30fc\u30de\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff5e\u9032\u5316\u3059\u308b\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306b\u304a\u3051\u308b\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u52d8\u6240\u300d<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>\u4f01\u696d\u306e\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff08DX\uff09\u57fa\u76e4\u3068\u3057\u3066\u3001\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u4e0a\u306b\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3092\u65b0\u8a2d\u30fb\u79fb\u690d\u3057\u305f\u308a\u3001\u904b\u7528\u7ba1\u7406\u52b9\u7387\u5316\u306e\u305f\u3081\u306b\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3001\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u3092\u5c0e\u5165\u3057\u305f\u308a\u3059\u308b\u30b1\u30fc\u30b9\u304c\u5897\u3048\u3066\u3044\u307e\u3059\u3002\u305d\u308c\u306b\u5408\u308f\u305b\u3066\u3001\u5f93\u6765\u306e\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\u578b\u3092\u524d\u63d0\u3068\u3059\u308b\u8a8d\u8a3c\uff0f\u8a8d\u53ef\u3001\u6697\u53f7\u5316\u30fb\u9375\u7ba1\u7406\u3001\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u7ba1\u7406\u3068\u3044\u3063\u305f\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306e\u5185\u5bb9\u3082\u5909\u308f\u308a\u3064\u3064\u3042\u308a\u307e\u3059\u3002\u672c\u8b1b\u6f14\u3067\u306f\u3001\u30c7\u30fc\u30bf\u4fdd\u8b77\u306b\u95a2\u308f\u308b\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u4e8b\u4f8b\u3092\u7d39\u4ecb\u3057\u306a\u304c\u3089\u3001\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u30e6\u30fc\u30b6\u30fc\u304c\u6700\u65b0\u306e\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u57fa\u76e4\u3092\u5229\u7528\u3059\u308b\u5834\u5408\u306e\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u306e\u52d8\u6240\u306b\u3064\u3044\u3066\u6982\u8aac\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type: none;\"><a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-249506456\">https:\/\/www.slideshare.net\/esasahara\/ss-249506456<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e746\u670818\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance Serverless-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li>was discussed and created the\u00a0<em>Table of Contents<\/em>\u00a0on a\u00a0<em>new paper<\/em>\u00a0aiming at\u00a0<em>execs<\/em>.<\/li>\n<li>Discussed comments made from the peer review process on the &#8216;<strong>Serverless Computing in 202<\/strong><strong>1<\/strong>&#8216; paper<\/li>\n<\/ul>\n<p>Next steps:<\/p>\n<ul>\n<li>Marina to create the template\u00a0for the new execs paper<\/li>\n<li>Chairs, (Aradhna and Vishwas), to address comments made from the peer review process on the &#8216;<strong>Serverless Computing in 2021<\/strong>&#8216; paper<\/li>\n<li>Address all comments of peer review in order to send paper for proof reading before design and publication.<\/li>\n<\/ul>\n<\/li>\n<li><strong>2021\u5e746\u67084\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Discussion]<\/p>\n<ul>\n<li>Working on addressing\/paying homage to\u00a0 GRC in the prior sections of the document in a shift left manner.<\/li>\n<li>Authors of relevant sections have been emailed about incorporating GRC by Mark.\n<ul>\n<li>Marina and Mark to work together on rearranging content<\/li>\n<\/ul>\n<ul>\n<li>Authors to incorporate the GRC pieces for next sections<\/li>\n<li>Mark developed a new document to outline the GRC collapse recommendations<\/li>\n<\/ul>\n<\/li>\n<li>Review 6.1.4 new content based on previous feedback<\/li>\n<li>Leadership to meet for review of content<\/li>\n<\/ul>\n<p>[Timeline]<\/p>\n<ul>\n<li>Author&#8217;s to finalize sections by June 9<\/li>\n<li>Leadership to review content June 10<\/li>\n<li>Next Step: Public peer review with CSA<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e74\u5ea6\uff082021\u5e746\u67081\u65e5\uff5e2022\u5e745\u670831\u65e5\uff09\u6d3b\u52d5\u8a08\u753b<\/strong>\n<ul type=\"disc\">\n<li>\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u76ee\u7684<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff06\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff08ACM\uff09\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u30b0\u30ed\u30fc\u30d0\u30eb\u30ec\u30d9\u30eb\u3067\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u57fa\u672c\u7684\u306a\u8abf\u67fb\u7814\u7a76\u3092\u884c\u3044\u3001\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u5229\u7528\u306e\u305f\u3081\u306e\u30ac\u30a4\u30c0\u30f3\u30b9\u3084\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u767a\u884c\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u65e5\u672c\u56fd\u5185\u30ec\u30d9\u30eb\u3067\u306f\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u30e6\u30fc\u30b6\u30fc\uff0f\u30b3\u30f3\u30b7\u30e5\u30fc\u30de\u30fc\u5411\u3051\u306b\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5553\u767a\u6d3b\u52d5\u3092\u884c\u3046\u3053\u3068\u3092\u76ee\u7684\u3068\u3059\u308b\u3002<\/li>\n<li>2021\u5e74\u5ea6\u6d3b\u52d5\u8a08\u753b<br \/>\n[\u56fd\u5185\u6d3b\u52d5]<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul type=\"disc\">\n<li style=\"list-style-type: none;\">\n<ol>\n<li>\u672c\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u30a4\u30f3\u30c7\u30a3\u30d3\u30b8\u30e5\u30a2\u30eb\uff0f\u30b3\u30fc\u30dd\u30ec\u30fc\u30c8\uff0f\u30a2\u30d5\u30a3\u30ea\u30a8\u30fc\u30c8\u30e1\u30f3\u30d0\u30fc\u304b\u3089\u306e\u30dc\u30e9\u30f3\u30c6\u30a3\u30a2\u306b\u3088\u3063\u3066\u69cb\u6210\u3055\u308c\u308b\u3002<\/li>\n<li>\u672c\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u904b\u55b6\u59d4\u54e1\u4f1a\u306e\u4e0b\u3067\u3001\u4e3b\u8981\u306a\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30d7\u30ec\u30a4\u30b9\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30e9\u30a4\u30c6\u30a3\u30f3\u30b0\u652f\u63f4\u3001\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u7406\u4e8b\u4f1a\u3078\u306e\u5831\u544a\u3092\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30c8\u3059\u308b\u3002<\/li>\n<li>\u3053\u308c\u3089\u306b\u95a2\u9023\u3059\u308b\u5468\u77e5\u3001\u8a8d\u77e5\u3001\u7814\u7a76\u306e\u6a5f\u4f1a\u3092\u8a08\u753b\uff0f\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u3001\u95a2\u897f\u652f\u90e8\u3084\u3001\u4ed6\u306eWG\u3001\u5404\u7a2e\u56e3\u4f53\u30fb\u30e1\u30c7\u30a3\u30a2\u3068\u306e\u9023\u643a\u6d3b\u52d5\u3092\u5f37\u5316\u3059\u308b\u3002<\/li>\n<\/ol>\n<p>[\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5]<\/p>\n<ol>\n<li>CSA ACM-WG\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u3078\u306e\u7a4d\u6975\u7684\u30b3\u30df\u30c3\u30c8\u30e1\u30f3\u30c8<\/li>\n<li>Serverless WG\u3001Health Information Management WG\u3001IoT WG\u3001DevOps WG\u7b49\u3001\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u5171\u901a\u57fa\u76e4\u3068\u3059\u308b\u4ed6\u306eWG\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316<\/li>\n<li>CSA\u6d77\u5916\u30c1\u30e3\u30d7\u30bf\u30fc\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316\uff08\u4f8b\uff1a\u4e2d\u56fd\u3001\u6771\u5357\u30a2\u30b8\u30a2\u3001\u30a4\u30f3\u30c9\u3001EMEA\uff09<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>2021\u5e745\u67087\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<br \/>\nDiscussion &#8211; Chapter 6<\/p>\n<ul>\n<li>Mark provided comments directly in the papers and via email.<\/li>\n<li>Talked to contributors about the feedback. All need to incorporate the feedback.\n<ul>\n<li>6.1.1 &#8211; Contributor to notify when changes are ready for review<\/li>\n<li>6.1.3 &#8211; Needs help reviewing the table for clarity.\u00a0 Author unsure about what is unclear. Use the comment feature<\/li>\n<li>6.1.4 &#8211; Author to provide content by end of weekend. May combine 4 and 10.<\/li>\n<li>6.1.5 &#8211; Leads need to provide an answer.<\/li>\n<li>6.1.7 &#8211; New content, Author to finish and notify leadership when it&#8217;s ready to be reviewed<\/li>\n<li>6.1.9 &#8211; Author to add contribution soon<\/li>\n<li>6.1.10 &#8211; Incorporate into 6.1.4<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Next Steps<\/p>\n<ul>\n<li>Provide all updates by early next week.<\/li>\n<li>Goal a first version of the draft of Chapter 6 then we can start the conclusion portion<\/li>\n<li>Leads will check calendars for Thursday next week meeting with just Chapter 6 authors.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e744\u670823\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<br \/>\nReviewed recent contributions to Chapter 6<\/p>\n<ul type=\"disc\">\n<li>Email Mark to discuss any challenges or issues between this meeting and next<\/li>\n<\/ul>\n<p>Timeline<\/p>\n<ul type=\"disc\">\n<li>Finish up a draft of the patterns by next meeting. If collaborating please create plan with team (emails are at the beginning of the document).<\/li>\n<li>Refine patterns for the following meeting.<\/li>\n<li>Public review through May and publish in June<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e744\u67088\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<br \/>\nComment from Mark regarding the sections<\/p>\n<ul type=\"disc\">\n<li>&#8220;The positioning is not enterprise, and not enterprise inheritable (except for QAQC reporting post-pull requests after branch merge but that is deliberately out of scope here). Shift-left control state is a means to control the scope and keep SDLC is as an overlay as long as its DEV scoped with Enterprise plane mentioned. If you can Map the OWASP top 10 API threats to NIST v5 controls, it solves this dilemma. I wager that you will winder up with 3 or 4 control families and about a dozen specific controls for low baseline &#8211; the rest is policy as code.\u00a0\u00a0<a href=\"https:\/\/owasp.org\/www-project-api-security\/\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-project-api-security\/<\/a><\/li>\n<li>Review sections 6.1.5, 6.1.6, 6.1.3.\u00a0 6.1.3 is a good reference for layout<\/li>\n<li>Reminder to reference Chapter 5 when writing Chapter 6 to remain consistent<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e743\u670831\u65e5\uff08\u6c34\uff0906:30pm &#8211; 08:00pm\uff08\u7d42\u4e86\uff09<br \/>\nISACA\u6771\u4eac\u652f\u90e8 2021\u5e743\u2f49\u4f8b\u4f1a\u30aa\u30f3\u30e9\u30a4\u30f3\u30bb\u30df\u30ca\u30fc<\/strong><br \/>\n\u300c\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u76e3\u67fb\u300d<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-245875972\">https:\/\/www.slideshare.net\/esasahara\/ss-245875972<\/a><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>EU\u306e\u63a5\u89e6\u8ffd\u8de1\u30a2\u30d7\u30ea\u8d8a\u5883\u9023\u643a\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\u306a\u3069\u3001COVID-19\u7dca\u6025\u5bfe\u5fdc\u4e0b\u3067\u6025\u901f\u306b\u5c0e\u2f0a\u304c\u9032\u3080\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u76e3\u67fb\u306b\u3064\u3044\u3066\u3001 IT\u5168\u822c\u7d71\u5236\u304a\u3088\u3073IT\u696d\u52d9\u51e6\u7406\u7d71\u5236\u53cc\u2f45\u306e\u8996\u70b9\u304b\u3089\u6982\u8aac\u3057\u307e\u3059\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e743\u670812\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\nToday&#8217;s meeting was dedicated to presenting the work instructions for Chapter 6 authors.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Security Overlay Work Instruction HOWTO Presentation:\n<div>The primary goal of the work instruction is to provide guidance and standardize the approach to developing the security control overlay for the architectural patterns found in the ACM MAP (Micro-services Application Pattern) paper. Although the content can aid any number of roles, it is tailored to security architecture, the MAP paper specifically, and the architect\u2019s point of view.\u00a0The\u00a0secondary\u00a0work instruction goal is to create a non-statistical\u00a0decomposition\/re-composition\u00a0approach to security architecture that remains economical and lightweight without sacrificing the basics of control selection in the design process. The method seeks to avoid the abstract and sometimes esoteric risk conversation that occur in control conversations.<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e742\u670825\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/li>\n<li>\n<div>Chapter 6 Patterns Review<\/div>\n<ul>\n<li>Introduction\n<ul>\n<li>Mark wrote up an introductory paragraph to transition from chapter 5 to 6.<\/li>\n<li>Please comment\/review<\/li>\n<\/ul>\n<\/li>\n<li>Instructions for contributors in the documents under the intro paragraph\n<ul>\n<li>Mark to build lecture of the\u00a0 instructions on our next meeting. (we will record)<\/li>\n<li>Overlay patterns will be bound to NIST SP 800.53<\/li>\n<\/ul>\n<\/li>\n<li>Authors needed for 6.1.8 and 6.2 6.2.2 &#8211; just name on document if interested\n<ul>\n<li>Mark to provide additional details for 6.2.2 author<\/li>\n<li>Authors welcome to collaborate on sections!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e742\u670819\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[Update for Microservices Architecture Pattern (MAP) ]<\/li>\n<li>\n<div>\n<p>Today we finalized the review and marked as &#8216;<strong>Complete&#8217;<\/strong>\u00a0the following patterns:<\/p>\n<ul>\n<li>5.1.6 &#8211; Where diagram was updated as suggested on the previous call<\/li>\n<li>5.1.7 &#8211; Vani updated the &#8216;Behavior Description&#8217; with a note for the case that Authorization fails.<\/li>\n<li>5.1.8 &#8211; The Cryptography component shown in the diagram here, will be addressed\/expanded in Chapter 6 (6.6) later.<\/li>\n<li>5.1.9 &#8211; Alex is to add the recommendation he had suggested here in a comment, plus an additional line referring to the work factor mentioned (i.e. the amount of work needed for this pattern)<\/li>\n<li>5.1.10 &#8211; Anil added under intro paragraph that this particular pattern applies to the microservices level and not to the system level.<\/li>\n<li>5.1.11 &#8211; After specifying that this pattern could be used in 2 different ways, that&#8217;s why it includes 2 diagrams, it was marked as Complete.<\/li>\n<\/ul>\n<p><strong>Anil<\/strong>\u00a0to\u00a0<strong>contact Mark<\/strong>\u00a0Y. in request for a\u00a0<strong>template<\/strong>\u00a0for\u00a0<strong>Chapter 6<\/strong>\u00a0for the group&#8217;s\u00a0<strong>next meeting<\/strong><\/p>\n<\/div>\n<\/li>\n<li><strong>2021\u5e742\u670812\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/li>\n<li>\n<div>Chapter 5 Patterns Review<\/div>\n<ul type=\"disc\">\n<li>\n<div>\n<p>Patterns finalized<\/p>\n<ul type=\"circle\">\n<li>Aggregation<\/li>\n<li>Cache Pattern &#8211; Removed &#8220;high availability of the software plane&#8221;<\/li>\n<li>AuthN &#8211; Change arrow direction and alter text slightly and then will be final<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>A bit more work needed\n<ul type=\"circle\">\n<li>AuthZ<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Meeting Next Week! Lock in patterns\u00a0<em>next Thursday<\/em>\u00a0to finalize the remaining bits of Chapter 5 and assign Chapter 6.<\/li>\n<\/ul>\n<ul>\n<li><strong>2021\u5e741\u670829\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/li>\n<li>Review new pattern entries in chapter 5\n<ul>\n<li>5.1.5 Proxy &#8211; Small fix, but otherwise done<\/li>\n<li>5.1.6 AuthN &#8211; changed the image a bit, but has a few questions for Mark before reviewing on next call. John and Michael to pattern with Kevin to polish section up<\/li>\n<li>5.1.7 AuthZ &#8211; Adding Michael to team to assist<\/li>\n<li>5.1.3 &#8211; Needs some assistance to be ready by next call.\u00a0 Vani to make a first pass Michael and John to review. Other reviewers and contributors welcome.<\/li>\n<li>5.1.4 &#8211; Just needs a quick polish<\/li>\n<li>5.1.8 &#8211; Vani and Michael to support<\/li>\n<li>5.1.9 &#8211; Alex to assist with polishing up<\/li>\n<li>5.1.10 &#8211; Vinod will add work that&#8217;s been done offline<\/li>\n<li>Etc\u2026.<\/li>\n<\/ul>\n<\/li>\n<li>Action:\n<ul>\n<li>Complete patterns by next call so we can move on to Chapter 6: security control overlays. Secondary authors please use Suggestion mode. Primary authors for patterns will accept and make final edits.<\/li>\n<\/ul>\n<\/li>\n<li>Next all we&#8217;ll review and the next call we&#8217;ll assign authors for Chapter 6<\/li>\n<li><strong style=\"font-size: 16px;\">2021\u5e741\u670815\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<br \/>\n<\/strong><strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><\/li>\n<\/ul>\n<p>[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/p>\n<ul>\n<li>Overview of document for new members\/authors.\u00a0 Work instructions for Chapter 5 patterns is on page 16<\/li>\n<li>Reviewed Patterns &#8211; done\n<ul>\n<li>Routing Pattern (page 19) &#8211; done\n<ul>\n<li>Added generalized for composite status<\/li>\n<li>Move to up stream and down stream of things rather than other abstractions\n<ul>\n<li>e.g. Repository (down stream) IAM Platform (up stream)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>AuthN\n<ul>\n<li>Started and suggestions provided.\u00a0 Kevin will make adjustments before next meeting.<\/li>\n<li>Mark to review further offline<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>Need to review Fa\u00e7ade Pattern &#8211; page 30<\/li>\n<li>New volunteers for sections\n<ul>\n<li>Aggregation &#8211; Mubasher<\/li>\n<li>Circuit Breaker Pattern &#8211; Vinod B. V.<\/li>\n<li>Proxy &#8211; Michael H.<\/li>\n<li>AuthZ &#8211; Vani Murthy \/ John Jiang<\/li>\n<\/ul>\n<\/li>\n<li><strong>2020\u5e7412\u670818\u65e5\uff08\u91d1\uff0903:00am &#8211; 04:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/p>\n<ul>\n<li>Authors needed\n<ul>\n<li>Patterns in need of authors\n<ul>\n<li>Route (routing) pattern &#8211; page 19<\/li>\n<li>Aggregation pattern &#8211; page 21<\/li>\n<li>Proxy pattern &#8211; page 25<\/li>\n<li>Circuit breaker pattern &#8211; page 35<\/li>\n<\/ul>\n<\/li>\n<li>Hillary to make announcement to the DevSecOps and Serverless working groups after Jan 1<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"font-size: 16px;\">2020\u5e7412\u670810\u65e5\uff08\u6728\uff09<\/span><\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<br \/>\n<\/span>\u3010\u6771\u4eac\u30fb\u30aa\u30f3\u30e9\u30a4\u30f3\u3011ITmedia Security Week 2020\u51ac<br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\n\u300c\u30a2\u30fc\u30ad\u30c6\u30af\u30c8\u304c\u4e3b\u5c0e\u3059\u308b\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n<a href=\"https:\/\/www.itmedia.co.jp\/enterprise\/special\/et201298\/index.html\">https:\/\/www.itmedia.co.jp\/enterprise\/special\/et201298\/index.html<\/a><br \/>\n\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff08DX\uff09\u3092\u5951\u6a5f\u306b\u3001\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3001\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u6280\u8853\u306e\u5c0e\u5165\u304c\u672c\u683c\u5316\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u30e6\u30fc\u30b6\u30fc\u3068\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u30fc\u3068\u306e\u9593\u3067\u8abf\u6574\u5f79\u3092\u62c5\u3046\u30a2\u30fc\u30ad\u30c6\u30af\u30c8\u306b\u6ce8\u76ee\u304c\u96c6\u307e\u3063\u3066\u3044\u307e\u3059\u3002\u672c\u8b1b\u6f14\u3067\u306f\u3001\u30d3\u30b8\u30cd\u30b9\u30cb\u30fc\u30ba\u306b\u5373\u5fdc\u3059\u308b\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u958b\u767a(Dev)\u3068\u3001\u5b89\u5b9a\u7684\u306a\u30a4\u30f3\u30d5\u30e9\u904b\u7528\uff08Ops\uff09\u306e\u89b3\u70b9\u304b\u3089\u3001\u30a2\u30fc\u30ad\u30c6\u30af\u30c8\u304c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306e\u5b9f\u88c5\u306b\u679c\u305f\u3059\u5f79\u5272\u306b\u3064\u3044\u3066\u3001\u4e8b\u4f8b\u3092\u4ea4\u3048\u306a\u304c\u3089\u7d39\u4ecb\u3057\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-239545917\">https:\/\/www.slideshare.net\/esasahara\/ss-239545917<\/a><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"font-size: 16px;\">2020\u5e7412\u67088\u65e5\uff08\u706b\uff09<\/span><\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<br \/>\n<\/span>\u3010\u6771\u4eac\u30fb\u30aa\u30f3\u30e9\u30a4\u30f3\u3011ZDNet Japan Security Trend 2020 Winter<br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\n\u300cDX\u3067\u52a0\u901f\u3059\u308b\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u5c0e\u5165\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n<a href=\"https:\/\/japan.zdnet.com\/info\/event\/security\/202012\/\">https:\/\/japan.zdnet.com\/info\/event\/security\/202012\/<\/a><br \/>\n\u30b0\u30ed\u30fc\u30d0\u30eb\u4f01\u696d\u306e\u9593\u3067\u306f\u3001\u6b21\u4e16\u4ee3\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff08DX\uff09\u57fa\u76e4\u3068\u3057\u3066\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3001\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u3092\u5c0e\u5165\u3059\u308b\u52d5\u304d\u304c\u672c\u683c\u5316\u3057\u3001\u5883\u754c\u9632\u5fa1\u306e\u67a0\u3092\u8d85\u3048\u305f\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u300d\u306b\u57fa\u3065\u304f\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u69cb\u7bc9\u3084\u3001\u300cDocker\u300d\u306b\u3088\u308b\u958b\u767a\u30d5\u30ed\u30fc\u306e\u81ea\u52d5\u5316\u3001\u300cKubernetes\u300d\u306b\u3088\u308b\u904b\u7528\u7ba1\u7406\u306e\u6a19\u6e96\u5316\u3001\u300cFaaS\uff08Function as a Service\uff09\u300d\u306b\u3088\u308b\u904b\u7528\u8ca0\u8377\u306e\u8efd\u6e1b\u306a\u3069\u304c\u9032\u3093\u3067\u3044\u307e\u3059\u3002\u672c\u8b1b\u6f14\u3067\u306f\u3001\u6d77\u5916\u4e8b\u4f8b\u3092\u984c\u6750\u306b\u3001\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u30e6\u30fc\u30b6\u30fc\u304c\u6700\u65b0\u306e\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u57fa\u76e4\u3092\u5229\u7528\u3059\u308b\u5834\u5408\u306e\u30ea\u30b9\u30af\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u306b\u3064\u3044\u3066\u6982\u8aac\u3057\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www2.slideshare.net\/esasahara\/dx-239232318\">https:\/\/www2.slideshare.net\/esasahara\/dx-239232318<\/a><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"font-size: 16px;\">2020\u5e7411\u670818\u65e5\uff08\u6c34\uff09-20\u65e5\uff08\u91d1\uff09<\/span><\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<br \/>\n<\/span>\u3010\u6a2a\u6d5c\u30fb\u30aa\u30f3\u30e9\u30a4\u30f3\u3011ET &amp; IoT Digital 2020<br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\n\u300c\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306b\u304a\u3051\u308b\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0f\u30ea\u30b9\u30af\u7ba1\u7406\u300d<br \/>\n<a href=\"https:\/\/www.jasa.or.jp\/expo\/conference2020\/edge_security.html\">https:\/\/www.jasa.or.jp\/expo\/conference2020\/edge_security.html<\/a><br \/>\nIoT\u30c7\u30d0\u30a4\u30b9\u3068\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u9593\u306b\u3042\u308b\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u3067\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u3001\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3001DevOps\uff0fDevSecOps\u3068\u3044\u3063\u305f\u30af\u30e9\u30a6\u30c9\u30fb\u30cd\u30a4\u30c6\u30a3\u30d6\u306e\u6280\u8853\u3092\u5229\u7528\u3059\u308b\u5834\u5408\u3001IT\u304a\u3088\u3073OT\u53cc\u65b9\u306e\u89b3\u70b9\u304b\u3089\u8981\u6c42\u3055\u308c\u308b\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0f\u30ea\u30b9\u30af\u7ba1\u7406\u7b56\u306b\u3064\u3044\u3066\u8003\u5bdf\u3057\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www2.slideshare.net\/esasahara\/ss-239232218\">https:\/\/www2.slideshare.net\/esasahara\/ss-239232218<\/a><\/li>\n<li><strong>2020\u5e7411\u67086\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Refine 5.2 to make less prescriptive and repeatable.\u00a0 Talk with Mark.<\/li>\n<li>5.7 still needs more time to work on the controls<\/li>\n<li>Integrate with regulations in multiple chapters<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>2020\u5e7410\u670823\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Update for Microservices Architecture Pattern (MAP) ]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Integration with Implementation Example (from Tasos, Vrettos, and Marina)\n<ul>\n<li>See comments in the intro for proposed integration<\/li>\n<li>Comments were accepted and will be added to the intro<\/li>\n<\/ul>\n<\/li>\n<li>Reviewed 5.7- Caching, 5.1 Proxy Diagram, 5.6 &#8211; Inter-mediation updates<\/li>\n<li>Next steps:\n<ul>\n<li>Need volunteers for the unassigned patterns in Chapter 5 &#8211; reach out to Mark Y.<\/li>\n<li>Next call &#8211; Nov 5 (in 2 weeks)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-size: 16px;\">2020\u5e7410\u67087\u65e5\uff08\u6c34\uff09<\/span><strong style=\"font-size: 16px;\">04:20pm &#8211; 05:00pm<\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<\/span>\u3010\u6771\u4eac\u30fb\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u3011Security Days Fall 2020<br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\n\u300cAPI\u30a8\u30b3\u30ce\u30df\u30fc\u3092\u652f\u3048\u308b\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n<a href=\"https:\/\/f2ff.jp\/introduction\/4002?event_id=secd-2020-02-tokyo\">https:\/\/f2ff.jp\/introduction\/4002?event_id=secd-2020-02-tokyo<\/a><br \/>\nAPI\u30a8\u30b3\u30ce\u30df\u30fc\u3092\u8ef8\u3068\u3059\u308bFintech\u3084\u30e2\u30d0\u30a4\u30eb\u30d8\u30eb\u30b9\u3067\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u5c0e\u5165\u3059\u308b\u52d5\u304d\u304c\u672c\u683c\u5316\u3057\u3001\u300cDocker\u300d\u306b\u3088\u308b\u958b\u767a\u30d5\u30ed\u30fc\u306e\u81ea\u52d5\u5316\u3084\u3001\u300cKubernetes\u300d\u306b\u3088\u308b\u904b\u7528\u7ba1\u7406\u306e\u6a19\u6e96\u5316\u304c\u9032\u3093\u3067\u3044\u307e\u3059\u3002\u672c\u8b1b\u6f14\u3067\u306f\u3001\u6d77\u5916\u4e8b\u4f8b\u3092\u984c\u6750\u306b\u3001\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3084API\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u3064\u3044\u3066\u6982\u8aac\u3057\u307e\u3059\u3002<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/api-238482036\">https:\/\/www.slideshare.net\/esasahara\/api-238482036<\/a><\/li>\n<li><strong>2020\u5e749\u670825\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Microservices Architecture Pattern (MAP) Updates and Discussion]<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Contact Mark with any questions<\/li>\n<li>Aligned overlap and reference architecture\n<ul>\n<li>Craig has updated his portion and ready to review with Mark\n<ul>\n<li>Anil will reach out to Mark<\/li>\n<\/ul>\n<\/li>\n<li>Other volunteers still need to align their sections still<\/li>\n<\/ul>\n<\/li>\n<li>Waiting for Chapter 5 to finish before Chapter 6 starts<\/li>\n<li>New volunteers\/contributors &#8211;\n<ul>\n<li>Send email to Anil or comment on the meeting minutes to get started<\/li>\n<li>Look through the document<\/li>\n<li>Utilize guide to contribute to Chapter 5<\/li>\n<li>No comments wanted at this time<\/li>\n<\/ul>\n<\/li>\n<li>Need to create a way to link this MAP document with the MAP document Tasos and Vrettos have been working on\n<ul>\n<li>Anil will reach out to Mark<\/li>\n<li>Set up meeting between Mark, Tasos, and Vrettos to develop plan.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-size: 16px;\">2020\u5e749\u670824\u65e5\uff08\u6728\uff09<\/span><strong style=\"font-size: 16px;\">01:45pm &#8211; 02:00pm<\/strong><span style=\"font-size: 16px;\">\uff08\u7d42\u4e86\uff09<\/span>\u3010\u30a4\u30f3\u30c9\u30fb\u30aa\u30f3\u30e9\u30a4\u30f3\u3011CSA India Virtual Summit 2020<br \/>\n\uff1c\u6982\u8981\uff1e<br \/>\nPanel Discussion : Impact of COVID-19 on Cloud Adoption &amp; Security<br \/>\n<a href=\"https:\/\/www.csaapac.org\/indiavsummit2020.html\">https:\/\/www.csaapac.org\/indiavsummit2020.html<\/a><br \/>\nThe lockdown has been an inflexion point in the adoption of cloud computing; we have observed increased usage and adoption. The increased usage as well as new cloud adoption during the current crisis is a positive outcome of the lockdown. The distinguished panel from APAC &amp; India will offer their views and perspectives.<br \/>\n-Moderator:\u00a0<strong>Vandana VERMA<\/strong>\u00a0(Global Board of Directors at OWASP and President at InfosecGirls)<br \/>\n-Panelists:<br \/>\n<strong>Satyavathi DIVADRI\u00a0<\/strong>(Chairman, CSA Bangalore Chapter)<br \/>\n<strong>Dr. Eiji SASAHARA<\/strong>\u00a0(ED, CSA Japan Chapter)<br \/>\n<strong>Dr. Hing-Yan LEE<\/strong>\u00a0(EVP APAC, CSA)<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e749\u670811\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Microservices Architecture Pattern (MAP) Updates and Discussion]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Added some instructions for patterns in Chapter 5\n<ul>\n<li>If you have questions about the instructions reach out to Mark<\/li>\n<\/ul>\n<\/li>\n<li>Careful not to mistake controls for configurations in the patterns<\/li>\n<li>Refer to other patterns to ensure consistent look and feel<\/li>\n<li>Anyone welcome to fill out the form on a pattern in Chapter 5 that hasn&#8217;t already been claimed<\/li>\n<li>Struggling to link MAPs documents together leads of the documents may need to meet and discuss how this can best be done\n<ul>\n<li>Interoperability issues in the industry were discussed<\/li>\n<li>Reference document that may be helpful: NIST OSCAL<br \/>\n<a href=\"https:\/\/pages.nist.gov\/OSCAL\/\">https:\/\/pages.nist.gov\/OSCAL\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e748\u670828\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Review changes to the MAPs document made]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Mark provided an update on Chapters 5 reworks<\/li>\n<li>Discussed gaps in the content flow and changes to improve document further<\/li>\n<li>Holding off on development of Chapter 6 temporarily, current developments to be annexed<\/li>\n<li>Current comments to be addressed before next meeting<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e747\u670818\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n<\/strong>[MAP Document Discussion]<\/p>\n<ul type=\"disc\">\n<li>Vinay updated on 5.5 Strangler Application\u00a0Pattern<\/li>\n<li>Craig\u00a0updated on the material he had added on the 5.6 Intermediation Pattern<\/li>\n<li>Namrata gave an update and description on the content she had added on 5.7 Cache<\/li>\n<li>Anil underlined the need to have\u00a02 planes: From the\u00a0Software\u00a0perspective\u00a0and\u00a0from the\u00a0Platform\u00a0perspective.<\/li>\n<li>Gustavo reviewed\u00a0his section\u00a0he had added under 6.1 Information Control.<\/li>\n<li>\n<div>Action points:<\/div>\n<div>\n<ul>\n<li>The working group will\u00a0review\u00a0Craig&#8217;s\u00a0section 5.8 Utility\u00a0on the next meeting<\/li>\n<li>Craig\u00a0and\u00a0Alex\u00a0to address the comments they have received on this section.<\/li>\n<li>Namrata\u00a0is to create a separate platform from a template and describe the plane software and platform plane from the Cache perspective,<\/li>\n<li>Namrata\u00a0to follow up with Anil in order to get editor rights on the document.<\/li>\n<li>Alex and Craig\u00a0are to communicate offline regarding the comments their section has.<\/li>\n<li>The\u00a0leads\u00a0are to provide a template for Control Overlay<\/li>\n<li>Marinato circulate an email bringing all 4 leads in touch.<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e747\u67083\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n<\/strong>[CSA Announcements]<\/p>\n<ul type=\"disc\">\n<li>Upcoming Events<\/li>\n<li>Open Peer Reviews<\/li>\n<li>Open Survey: QSS Awareness Survey 2020<\/li>\n<li>Recent releases<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[MAP Document Discussion]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul type=\"disc\">\n<li>Guidelines for contribution will be written up shortly for authors to reference<\/li>\n<li>Chapter 5 contributions\n<ul type=\"circle\">\n<li>Use NIST control families<\/li>\n<li>Important to understand what you&#8217;re attempting to solve for independent of the technology that will potentially solve the issue.<\/li>\n<\/ul>\n<\/li>\n<li>Will start recording meetings with the permission of everyone on the call.<\/li>\n<li>Action items:\n<ul type=\"circle\">\n<li>Offline conversation to develop a guideline paper for Chapters 5 and 6<\/li>\n<li>Continue contributing to Chapter 5 and 6 (for finished patterns) after guideline paper has been developed<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e746\u670819\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n<\/strong>[Discussion on the Microservices Architecture Pattern document.]<\/p>\n<ul type=\"disc\">\n<li>Chapter 5 is going to be the pattern itself.<\/li>\n<li>The outline of Chapter 5 is for providing directions to contributors on what to work<\/li>\n<li>Craig Ellrod went through his latest contribution to the document. He has &#8220;laid&#8221; a pattern for an inner API.<\/li>\n<li>The &#8216;Major Dependencies&#8217; featured in chapter 5, will be linked to one another in Chapter 6.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Action Points]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul type=\"disc\">\n<li>Mark pointed out to use the 53 NIST controls family for starters<\/li>\n<li>Anil would like to first lock contributors for chapter 5 and reach it to a level where work on chapter 6 can begin.<\/li>\n<li>Kevin Keane will make a tentative for 5.2 and if he confronts any difficulties or concerns, can reach out to Mark or M. Roza.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e746\u67085\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n<\/strong>[CSA Announcements]<\/li>\n<li>Open peer reviews<\/li>\n<li>Open Survey:\n<ul type=\"disc\">\n<li>Quantum-Safe Security Awareness Survey<\/li>\n<li>Cloud IAM Survey\u00a0 &#8211; Looking for architects from large organizations in particular! Lots of prizes<\/li>\n<\/ul>\n<\/li>\n<li>Recent releases<\/li>\n<li>Upcoming events\u00a0&#8211;\n<ul type=\"disc\">\n<li>CFP for SECtemer\u00a0open until June 26th<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Discussion of MAP document]\u00a0&#8211;<\/p>\n<ul type=\"disc\">\n<li>Mark presented background Chapter 1-4<\/li>\n<li>Contribution template in Chapter 5, reviewed examples\n<ul type=\"disc\">\n<li>Quantum-Looking for contributors for this section!<br \/>\nReach out to Hillary via email<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e74\u5ea6 (2020\u5e746\u6708\uff5e2021\u5e745\u6708) \u6d3b\u52d5\u8a08\u753b<\/strong><\/li>\n<li>\u56fd\u5185\u6d3b\u52d5<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff06\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff08ACM\uff09\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u57fa\u672c\u7684\u306a\u8abf\u67fb\u7814\u7a76\u3092\u884c\u3044\u3001\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u5229\u7528\u306e\u305f\u3081\u306e\u30ac\u30a4\u30c0\u30f3\u30b9\u3084\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u767a\u884c\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u304a\u3088\u3073\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5553\u767a\u6d3b\u52d5\u3092\u884c\u3046\u3053\u3068\u3092\u76ee\u7684\u3068\u3059\u308b\u3002<\/p>\n<ol>\n<li>\u672c\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u30a4\u30f3\u30c7\u30a3\u30d3\u30b8\u30e5\u30a2\u30eb\uff0f\u30b3\u30fc\u30dd\u30ec\u30fc\u30c8\uff0f\u30a2\u30d5\u30a3\u30ea\u30a8\u30fc\u30c8\u30e1\u30f3\u30d0\u30fc\u304b\u3089\u306e\u30dc\u30e9\u30f3\u30c6\u30a3\u30a2\u306b\u3088\u3063\u3066\u69cb\u6210\u3055\u308c\u308b\u3002<\/li>\n<li>\u672c\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001\u904b\u55b6\u59d4\u54e1\u4f1a\u304a\u3088\u3073\u5171\u540c\u5ea7\u9577\u306e\u4e0b\u3067\u3001\u4e3b\u8981\u306a\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u30ef\u30fc\u30af\u30d7\u30ec\u30a4\u30b9\u3001\u30c6\u30af\u30cb\u30ab\u30eb\u30e9\u30a4\u30c6\u30a3\u30f3\u30b0\u652f\u63f4\u3001\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u7406\u4e8b\u4f1a\u3078\u306e\u5831\u544a\u3092\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30c8\u3059\u308b\u3002<\/li>\n<li>\u3053\u308c\u3089\u306b\u95a2\u9023\u3059\u308b\u5468\u77e5\u3001\u8a8d\u77e5\u3001\u7814\u7a76\u306e\u6a5f\u4f1a\u3092\u8a08\u753b\uff0f\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u3001\u95a2\u6771\u5206\u79d1\u4f1a\u304a\u3088\u3073\u95a2\u897f\u5206\u79d1\u4f1a\u3092\u8a2d\u7f6e\u3059\u308b\u3002<\/li>\n<\/ol>\n<\/li>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\n<ol>\n<li>CSA ACM-WG\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u3078\u306e\u7a4d\u6975\u7684\u30b3\u30df\u30c3\u30c8\u30e1\u30f3\u30c8<\/li>\n<li>Health Information Management WG\u3001IoT EG\u3001DevOps WG\u7b49\u3001\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u5171\u901a\u57fa\u76e4\u3068\u3059\u308b\u4ed6\u306eWG\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316<\/li>\n<li>CSA\u6d77\u5916\u30c1\u30e3\u30d7\u30bf\u30fc\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316\uff08\u4f8b\uff1a\u4e2d\u56fd\u3001\u6771\u5357\u30a2\u30b8\u30a2\u3001\u30a4\u30f3\u30c9\u3001EMEA\uff09<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e745\u670822\u65e5\uff08\u91d1\uff0902:00am &#8211; 03:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Open peer reviews<br \/>\n&#8211;\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/contribute\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/research\/contribute\/<\/a><\/li>\n<li>Open Survey:\n<ul>\n<li>Qunatum-Safe Security<\/li>\n<\/ul>\n<\/li>\n<li>Recent releases\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/artifacts\/\" target=\"_blank\" rel=\"noopener\">cloudsecurityalliance.org\/research\/artifacts\/<\/a><\/li>\n<li>Upcoming events &#8211;\u00a0<a href=\"https:\/\/csacongress.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/csacongress.org\/<\/a>\n<ul>\n<li>CFP for SECtemer open until June 26th<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Discussion\u00a0of Current Papers]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Mark presented latest additions to the document in section 1-4. This structure will set up the main part of the document (section 5).<\/li>\n<li>Will be moving onto section 5 shortly<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e744\u670829\u65e5\uff08\u6c34\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Open peer reviews\n<ul>\n<li>Qunatum-Safe Security Awareness<\/li>\n<li>Expectation and Evolution of CASBs<\/li>\n<\/ul>\n<ul>\n<li>Surveys<\/li>\n<\/ul>\n<\/li>\n<li>Recent releases &#8211;\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/artifacts\/\" target=\"_blank\" rel=\"noopener\">cloudsecurityalliance.org\/research\/artifacts\/<\/a><\/li>\n<li>Upcoming events &#8211;\u00a0<a href=\"https:\/\/csacongress.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/csacongress.org\/<\/a>\n<ul>\n<li>CFP for SECtemer open until May 1st<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Discussion]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Began discussion surrounding the introduction of the document<\/li>\n<li>Section 2. &#8211; Make sure there are appropriate tie ins to make the two paragraphs flow into each other.<\/li>\n<li>Place diagram images within section 3. Offer explanation to push into mappings.<\/li>\n<li>ICCS group to include certain alignments into this document for application security. Reach out for additional guidance to compare.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>2020\u5e744\u670810\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09<\/strong><br \/>\n<strong>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<\/strong><br \/>\n[CSA Announcements]<\/p>\n<ul>\n<li>Open peer reviews\n<ul>\n<li>Qunatum-Safe Security Awareness<\/li>\n<li>Expectation and Evolution of CASBs<\/li>\n<\/ul>\n<ul>\n<li>Surveys<\/li>\n<\/ul>\n<\/li>\n<li>Recent releases &#8211;\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/artifacts\/\" target=\"_blank\" rel=\"noopener\">cloudsecurityalliance.org\/research\/artifacts\/<\/a><\/li>\n<li>Upcoming events &#8211;\u00a0<a href=\"https:\/\/csacongress.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/csacongress.org\/<\/a>\n<ul>\n<li>CFP for SECtemer open until May 1st<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[Discussion of Current Papers]<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Paper 2<br \/>\n<strong><em>&#8220;Microservices Architecture Pattern &#8211;\u00a0A Proposed Architectural Pattern to Engineer Trustworthy Secure Systems&#8221;<\/em><\/strong><\/p>\n<ul>\n<li>Added note for a footnote about threat modeling<\/li>\n<li>Alex &#8211; To start glossary portion of document<\/li>\n<li>Mark and Anil &#8211; Writing end editing Chapters 1<\/li>\n<li>Volunteers needed for writing Chapter 2 and 3<br \/>\n-Reach out to Anil to be added to lists<\/li>\n<li>Discussed outline and scope of the document written by Mark<\/li>\n<li>Outline finalized!<\/li>\n<li>Action Items<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Paper 3\n<ul>\n<li>Split into Guide and Framework<\/li>\n<li>Want to work off of CCM v4 coming out later this year<\/li>\n<li>Michael &#8211; Post links to Circle<\/li>\n<li>Reviewed approach proposed by Michael<\/li>\n<li>Action Items:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Paper 1<br \/>\n<em><strong>&#8220;Microservices Architecture Pattern&#8221;<\/strong><\/em><\/p>\n<ul>\n<li>Needs inputs and revisions from the working group<\/li>\n<li>Move away from JSON specific to make a bit higher level<\/li>\n<li>Reviewed proposed approach<\/li>\n<li>Action Items<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e743\u670810\u65e5\uff08\u706b\uff09\uff08\u516c\u958b\uff09<br \/>\nCloud Security Alliance ACM-WG<br \/>\n\u7c73\u56fdNIST\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u985e\u3068CSA\u767a\u884c\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u306e\u6982\u8981\u306b\u3064\u3044\u3066\u6574\u7406\u3057\u307e\u3057\u305f\u3002<br \/>\n\u300c\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6982\u8aac\u300d<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-229725299\">https:\/\/www.slideshare.net\/esasahara\/ss-229725299<\/a><br \/>\n\u300c\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6982\u8aac\u300d<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-229982514\">https:\/\/www.slideshare.net\/esasahara\/ss-229982514<\/a><\/li>\n<li>2020\u5e742\u670827\u65e5\uff08\u91d1\uff09\uff08\u516c\u958b\uff09<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<strong><em>Best Practices for Implementing a Secure Application Container Architecture &#8211; Japanese Translation<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-for-implementing-a-secure-application-container-architecture-japanese-translation\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-for-implementing-a-secure-application-container-architecture-japanese-translation\/<\/a><\/li>\n<li>2020\u5e742\u670824\u65e5\uff08\u6708\uff09\uff08\u516c\u958b\uff09<br \/>\nCloud Security Alliance ACM-WG<br \/>\n&#8220;<strong><em>Best Practices in Implementing a Secure Microservices Architecture<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/best-practices-in-implementing-a-secure-microservices-architecture\/<\/a><\/li>\n<li>2020\u5e741\u670810\u65e5\uff08\u91d1\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #4<br \/>\n\u4e16\u754c\u306e\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u6280\u8853\u52d5\u5411\u304b\u3089\u4fef\u77b0\u3059\u308b\u95a2\u897f\u306e2025\u5e74<br \/>\n<a href=\"https:\/\/20200110-cloud-devsec-gvh-osaka-umeda.peatix.com\/\">https:\/\/20200110-cloud-devsec-gvh-osaka-umeda.peatix.com\/<\/a><br \/>\n&lt;\u6982\u8981 Overview&gt;<br \/>\n\u7d4c\u6e08\u7523\u696d\u7701\u306eDX\uff08\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\uff09\u30ec\u30dd\u30fc\u30c8\u306f\u300c2025\u5e74\u306e\u58c1\u300d\u3092\u8b66\u544a\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u4e00\u65b9\u3001\u95a2\u897f\u30a8\u30ea\u30a2\u3067\u306f\u30012021\u5e74\u306e\u30ef\u30fc\u30eb\u30c9\u30de\u30b9\u30bf\u30fc\u30ba\u30b2\u30fc\u30e0\u30ba\u30012023\u5e74\u306e\u4e2d\u4e4b\u5cf6\u672a\u6765\u533b\u7642\u62e0\u70b9\u30012024\u5e74\u306e\u3046\u3081\u304d\u305f2\u671f\u307f\u3069\u308a\u3068\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u306e\u878d\u5408\u62e0\u70b9\u30012025\u5e74\u306e\u5927\u962a\u30fb\u95a2\u897f\u4e07\u56fd\u535a\u89a7\u4f1a\u3068\u30d3\u30c3\u30b0\u30a4\u30d9\u30f3\u30c8\u304c\u7d9a\u304d\u307e\u3059\u3002\u4e3b\u8981\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u306e\u30ea\u30fc\u30b8\u30e7\u30f3\u30bb\u30f3\u30bf\u30fc\u304c\u95a2\u897f\u306b\u51fa\u63c3\u3063\u305f2020\u5e74\u3001\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u57fa\u76e4\u306e\u4e2d\u6838\u3092\u62c5\u3046\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u304c\u30012025\u5e74\u306b\u5411\u3051\u3066\u3069\u306e\u3088\u3046\u306b\u9032\u5316\u3057\u3066\u3044\u304f\u306e\u304b\u3001\u4e3b\u8981\u6280\u8853\u5225\u30fb\u7523\u696d\u5206\u91ce\u5225\u306b\u4fef\u77b0\u3057\u307e\u3059\u3002<br \/>\n\uff1c\u6280\u8853\u5225\uff1e<br \/>\n\u30fb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30fb\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u7ba1\u7406\u306e\u6280\u8853\u52d5\u5411<br \/>\n\u30fb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u6280\u8853\u52d5\u5411<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6AI\u306e\u6280\u8853\u52d5\u5411<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6IoT\u306e\u6280\u8853\u52d5\u5411<br \/>\n\uff1c\u7523\u696d\u5206\u91ce\u5225\uff1e<br \/>\n\u30fb\u91d1\u878d\u30fb\u6c7a\u6e08\u30b5\u30fc\u30d3\u30b9ICT\u5e02\u5834\u52d5\u5411\u3068\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9<br \/>\n\u30fb\u30db\u30b9\u30d4\u30bf\u30ea\u30c6\u30a3\u30fb\u30c0\u30a4\u30cb\u30f3\u30b0\u30fb\u65c5\u884cICT\u5e02\u5834\u3068\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9<br \/>\n\u30fb\u88fd\u9020\u696dICT\u5e02\u5834\u52d5\u5411\u3068\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9<br \/>\n\u30fb\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u30fb\u5065\u5eb7\u533b\u7642ICT\u5e02\u5834\u52d5\u5411\u3068\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9&lt;\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb Timetable&gt;<br \/>\n18:30 \u53d7\u4ed8\u958b\u59cb<br \/>\n19:00 \u30b9\u30bf\u30fc\u30c8\u30fb\u958b\u4f1a\u306e\u3054\u6328\u62f6<br \/>\n19:05-19:30 \u300c2020-2025\u5e74\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u304a\u3088\u3073\u95a2\u9023\u6280\u8853\u306e\u5c55\u671b\u300d<br \/>\n19:30-20:00 \u300c2020-2025\u5e74\u7523\u696d\u5206\u91ce\u5225ICT\u5e02\u5834\u3068\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u5c55\u671b\u300d<br \/>\n20:00-20:10 \u4f11\u61a9\uff0810\u5206\u9593\uff09<br \/>\n20:10-20:30 \u300cCSA\u30b8\u30e3\u30d1\u30f3\u95a2\u897f\u652f\u90e8\u306e2020\u5e74\u6d3b\u52d5\u8a08\u753b\u3054\u7d39\u4ecb\u300d<br \/>\n20:30-21:00 \u30d5\u30ea\u30fc\u30c8\u30fc\u30af\uff06\u30cd\u30c3\u30c8\u30ef\u30fc\u30ad\u30f3\u30b0\u306e\u6642\u9593<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/2025-218028551\/1\">https:\/\/www.slideshare.net\/esasahara\/2025-218028551\/1<\/a><br \/>\n&lt;\u4e3b\u50ac\u8005 Organizer&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7<br \/>\n&lt;\u5171\u50ac Cosponsored&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u516c\u76ca\u8ca1\u56e3\u6cd5\u4eba\u90fd\u5e02\u6d3b\u529b\u7814\u7a76\u6240&lt;\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc Coordinator&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u30ea\u30fc\u30c0\u30fc\u3000\u7b39\u539f \u82f1\u53f8<br \/>\n&lt;\u4f1a\u5834 Place&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u5927\u962a\u5e9c\u5927\u962a\u5e02\u5317\u533a\u5927\u6df1\u753a3\u756a1\u53f7 \u30b0\u30e9\u30f3\u30d5\u30ed\u30f3\u30c8\u5927\u962a\u5317\u9928\u30bf\u30ef\u30fcC 7\u968e<br \/>\n\u30fbJR\u5927\u962a\u99c5\u3088\u308a\u5f92\u6b697\u5206<br \/>\n\u30fb\u5730\u4e0b\u9244\u5fa1\u5802\u7b4b\u7dda\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<br \/>\n\u30fb\u962a\u6025\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<\/li>\n<\/ul>\n<ul>\n<li>2019\u5e7411\u670812\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #3<br \/>\n<a href=\"https:\/\/gvh-osaka-tech-lab.connpass.com\/event\/151984\/\">https:\/\/gvh-osaka-tech-lab.connpass.com\/event\/151984\/<\/a><br \/>\n\u672c\u30df\u30fc\u30c8\u30a2\u30c3\u30d7\u3067\u306f\u3001\u5317\u7c73\u3001\u6b27\u5dde\u3001\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306a\u3069\u3001\u7279\u306b\u95a2\u897f\u3068\u95a2\u4fc2\u306e\u6df1\u3044\u6d77\u5916\u90fd\u5e02\u306e\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u4e8b\u4f8b\u3092\u3001ICT\u3068\u30d3\u30b8\u30cd\u30b9\u306e\u4e21\u9762\u304b\u3089\u7d39\u4ecb\u3057\u306a\u304c\u3089\u3001\u30fb\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6\u306a\u6280\u8853\u306e\u5c0e\u5165\u306b\u3088\u3063\u3066\u3001\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306e\u4f55\u304c\u5909\u308f\u308b\uff1f<br \/>\n\u30fb\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306b\u304a\u3051\u308b\u4e2d\u5c0f\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7\u4f01\u696d\u306a\u3089\u3067\u306f\u306e\u5f37\u307f\u3068\u306f\uff1f<br \/>\n\u30fb\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u3092\u652f\u3048\u308bIT\u3068OT\u306e\u95a2\u4fc2<br \/>\n\u30fb\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306e\u30af\u30e9\u30a6\u30c9\u30a4\u30f3\u30d5\u30e9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u8cac\u4efb\u5206\u754c\u70b9<br \/>\n\u30fb\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306e\u30af\u30e9\u30a6\u30c9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u307e\u3061\u3065\u304f\u308a\u30c7\u30b6\u30a4\u30f3<br \/>\n\u30fb\u793e\u4f1a\u30a4\u30f3\u30d5\u30e9\u3092\u652f\u3048\u308b\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306e\u502b\u7406\u3068\u30a8\u30f3\u30b8\u30cb\u30a2\u306e\u8cac\u4efb<br \/>\n\u3068\u3044\u3063\u305f\u30b5\u30d6\u30c6\u30fc\u30de\u306b\u3064\u3044\u3066\u8003\u3048\u3001\u6a5f\u4f1a\u3068\u30ea\u30b9\u30af\u306b\u5bfe\u3059\u308b\u8996\u70b9\u3092\u5171\u6709\u3059\u308b\u5834\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u76ee\u6a19\u3068\u3057\u3066\u3044\u307e\u3059\u3002[\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb]<br \/>\n18:30 \u53d7\u4ed8\u958b\u59cb<br \/>\n19:00 \u30b9\u30bf\u30fc\u30c8\u30fb\u958b\u4f1a\u306e\u3054\u6328\u62f6<br \/>\n19:05-19:30 \u300c\u5317\u6b27\u306e\u30ea\u30d3\u30f3\u30b0\u30e9\u30dc\u304b\u3089\u4fef\u77b0\u3059\u308b\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3ICT\u306e\u73fe\u72b6\u3068\u8ab2\u984c\u300d<br \/>\n19:30-20:00 \u300c\u30b9\u30de\u30fc\u30c8\u30fb\u30e2\u30d3\u30ea\u30c6\u30a3\u306b\u5b66\u3076\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u5229\u6d3b\u7528\u300d<br \/>\n20:00-20:10 \u4f11\u61a9\uff0810\u5206\u9593\uff09<br \/>\n20:10-20:35 \u300c\u30b9\u30de\u30fc\u30c8\u30b7\u30c6\u30a3\u306e\u502b\u7406\u3068\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\uff0f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n20:30 \u30d5\u30ea\u30fc\u30c8\u30fc\u30af\uff06\u30cd\u30c3\u30c8\u30ef\u30fc\u30ad\u30f3\u30b0\u306e\u6642\u9593<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-192484055\">https:\/\/www.slideshare.net\/esasahara\/ss-192484055<\/a><\/li>\n<\/ul>\n<ul>\n<li class=\"dt_headLine\">\u00a02019\u5e7411\u67081\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n[Best Practices for Secure Microservices Implementation &#8211; Status Update]<br \/>\n-Current status: Peer Review has concluded. The leads are addressing the comments.<br \/>\n-Next steps: Send the document for copy edit, graphic design, and PR<br \/>\n-Anticipated release is at CSA EMEA Congress 2018 in mid Nov<br \/>\n-ALL CONTRIBUTORS &#8211; Please check that your name is included in the acknowledgements section of this document if you have contributed. We want to make sure everyone gets credit for their hard work especially the authors!<br \/>\n[\u00a0Next Meeting ]<br \/>\nWe will resume meeting sometime after Jan 1st, 2020. Calendar invites will be sent out later in the year.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2019\u5e749\u670814\u65e5\uff08\u571f\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u30a4\u30f3\u30c9\u30fb\u30cf\u30a4\u30c7\u30e9\u30d0\u30fc\u30c9\u3011<br \/>\nCloud Security Alliance Hyderabad Summit 2019<br \/>\n<a href=\"https:\/\/www.csaapac.org\/csahyderabadsummit2019.html\">https:\/\/www.csaapac.org\/csahyderabadsummit2019.html<\/a><br \/>\n&lt;\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb Timetable&gt;<br \/>\n1540 &#8211; 1600<br \/>\nOpportunities of Cross-Asia Collaboration on Secure Containers &amp; Microservices<br \/>\n&lt;\u6f14\u8005 Speaker&gt;\u00a0Dr. Eiji SASAHARA<br \/>\nExecutive Director, CSA Japan Chapter \u200b<br \/>\n&lt;\u4f1a\u5834 Place&gt;Lemon Tree Premier, HITEC City<br \/>\nPlot No. 2, Survey No. 64, HITEC City, Madhapur, Hyderabad \u2013 500081, Telangana, India<\/li>\n<li>2019\u5e749\u670817\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #2<br \/>\n<a href=\"https:\/\/20190917-cloud-devsec-gvh-osaka-umeda.peatix.com\/\">https:\/\/20190917-cloud-devsec-gvh-osaka-umeda.peatix.com\/<\/a><br \/>\n&lt;\u6982\u8981 Overview&gt;<br \/>\n\u4eca\u3001\u30c7\u30fc\u30bf\u3092\u751f\u6210\u3059\u308bIoT\u30c7\u30d0\u30a4\u30b9\u3068\u9ad8\u901f\u51e6\u7406\u3092\u62c5\u3046\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u9593\u306e\u30ec\u30a4\u30e4\u3067\u3001\u30d5\u30a9\u30b0\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\uff0f\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u6280\u8853\u304c\u6ce8\u76ee\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u308c\u306b\u5408\u308f\u305b\u3066\u3001\u30c7\u30fc\u30bf\u30fb\u30de\u30cd\u30bf\u30a4\u30bc\u30fc\u30b7\u30e7\u30f3\u3001\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3\u3001API\u30a8\u30b3\u30ce\u30df\u30fc\u3068\u3044\u3063\u305f\u65b0\u3057\u3044\u30d3\u30b8\u30cd\u30b9\u30e2\u30c7\u30eb\u3092\u5b9f\u73fe\u3059\u308b\u305f\u3081\u306b\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff08\u4f8b\uff0eDocker\u3001Kubernetes\u306a\u3069\uff09\u3001\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff08\u4f8b\uff0eAPI\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4\u3001\u30b5\u30fc\u30d3\u30b9\u30fb\u30e1\u30c3\u30b7\u30e5\u306a\u3069\uff09\u3001DevOps\uff0fDevSecOps\uff08\u4f8b\uff0eCI\uff0fCD\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u306a\u3069\uff09\u3068\u3044\u3063\u305f\u30af\u30e9\u30a6\u30c9\u30fb\u30cd\u30a4\u30c6\u30a3\u30d6\u306e\u6280\u8853\u3092\u3069\u3046\u6d3b\u7528\u3059\u308b\u304b\u304c\u3001\u5927\u304d\u306a\u8ab2\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u7c73\u56fd\u30ef\u30b7\u30f3\u30c8\u30f3\u5dde\u30b7\u30a2\u30c8\u30eb\u306b\u672c\u90e8\u3092\u7f6e\u304f\u975e\u55b6\u5229\u56e3\u4f53\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff08CSA\uff09\u3067\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\uff08ACM-WG\uff09\u304c\u3001\u7c73\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u306a\u3069\u3068\u9023\u643a\u3057\u306a\u304c\u3089\u3001\u65b0\u6280\u8853\u3092\u53d6\u308a\u5dfb\u304f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u95a2\u3059\u308b\u56fd\u969b\u6a19\u6e96\u5316\u30fb\u5553\u767a\u6d3b\u52d5\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002<br \/>\n\u672c\u30df\u30fc\u30c8\u30a2\u30c3\u30d7\u306f\u3001\u95a2\u897f\u306e\u958b\u767a\u8005\u3084\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u3092\u5bfe\u8c61\u306b\u3001\u7523\u696d\u5206\u91ce\u306b\u304a\u3051\u308b\u5177\u4f53\u7684\u306a\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3092\u7d39\u4ecb\u3057\u306a\u304c\u3089\u3001<br \/>\n\u30fbIoT\u3068\u30af\u30e9\u30a6\u30c9\u306e\u9593\u306b\u4f4d\u7f6e\u3059\u308b\u30d5\u30a9\u30b0\uff0f\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u3067\u3001\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u5229\u7528\u3057\u305f\u30b5\u30fc\u30d3\u30b9\u3092\u65b0\u898f\u958b\u767a\u30fb\u904b\u7528\u3059\u308b\u5834\u5408\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u3069\u3046\u8b1b\u3058\u305f\u3089\u3044\u3044\u306e\u304b<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u3068\u3001IoT\u30c7\u30d0\u30a4\u30b9\u3084\u30d5\u30a9\u30b0\uff0f\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u30b5\u30fc\u30d3\u30b9\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u9593\u306b\u304a\u3051\u308b\u8cac\u4efb\u5206\u754c\u70b9\u3092\u3069\u3046\u8a2d\u5b9a\u3057\u305f\u3089\u3044\u3044\u306e\u304b<br \/>\n\u30fbIoT\u306e\u5236\u5fa1\u6280\u8853\uff08OT\uff09\u3092\u62c5\u3046\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u306b\u3001\u30d5\u30a9\u30b0\uff0f\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306b\u304a\u3051\u308b\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8ab2\u984c\u3068\u5bfe\u7b56\u3092\u3069\u3046\u8aac\u660e\u3057\u305f\u3089\u3044\u3044\u304b<br \/>\n\u30fb\u30d5\u30a9\u30b0\uff0f\u30a8\u30c3\u30b8\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u30bb\u30ad\u30e5\u30a2\u306b\u69cb\u7bc9\u30fb\u904b\u7528\u3067\u304d\u308b\u30a8\u30f3\u30b8\u30cb\u30a2\u3092\u3069\u3046\u80b2\u3066\u3066\u3044\u3051\u3070\u3088\u3044\u304b<br \/>\n\u3068\u3044\u3063\u305f\u5171\u901a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u306e\u89e3\u6c7a\u7b56\u306b\u3064\u3044\u3066\u8003\u3048\u3001\u5171\u6709\u3059\u308b\u5834\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u76ee\u6a19\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u6700\u5f8c\u306b\u3001\u4e2d\u56fd\u3084\u30a4\u30f3\u30c9\u306b\u304a\u3051\u308bCSA\u306e\u6d3b\u52d5\u72b6\u6cc1\u3092\u7d39\u4ecb\u3055\u305b\u3066\u3044\u305f\u3060\u304d\u307e\u3059\u3002&lt;\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb Timetable&gt;<br \/>\n18:30 \u53d7\u4ed8\u958b\u59cb<br \/>\n19:00 \u30b9\u30bf\u30fc\u30c8\u30fb\u958b\u4f1a\u306e\u3054\u6328\u62f6<br \/>\n19:05-20:00 \u300c\u30a8\u30c3\u30b8\uff0f\u30d5\u30a9\u30b0\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u74b0\u5883\u306b\u304a\u3051\u308b\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30e1\u30ea\u30c3\u30c8\u3068\u30ea\u30b9\u30af\u300d<br \/>\n\u30fb\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306b\u5b66\u3076\u30a8\u30c3\u30b8\uff0f\u30d5\u30a9\u30b0\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u5229\u70b9\u3068\u8105\u5a01<br \/>\n\uff5e\u30a8\u30c3\u30b8\u5c64 Vs. \u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5c64 Vs. \u30af\u30e9\u30a6\u30c9\u5c64\uff5e<br \/>\n\u30fb\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306b\u5b66\u3076\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u306e\u5229\u70b9\u3068\u8105\u5a01<br \/>\n\uff5e\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u5c64 Vs. \u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u5c64\uff5e<br \/>\n\u30fb\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u306b\u5b66\u3076\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u5229\u70b9\u3068\u8105\u5a01<br \/>\n\uff5eAPI\u30b2\u30fc\u30c8\u30a6\u30a7\u30a4 Vs. \u30b5\u30fc\u30d3\u30b9\u30fb\u30e1\u30c3\u30b7\u30e5\uff5e<br \/>\n\u30fb\u30a8\u30c3\u30b8\uff0f\u30d5\u30a9\u30b0\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0 \u00d7 \u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3067\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u4eba\u6750\u50cf<br \/>\n\uff5e\u60c5\u5831\u901a\u4fe1\u6280\u8853\uff08IT\uff09 Vs. \u96fb\u5b50\u5236\u5fa1\u6280\u8853\uff08OT\uff09\uff5e<br \/>\n\u30fbQ&amp;A<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-168275894\">https:\/\/www.slideshare.net\/esasahara\/ss-168275894<\/a><br \/>\n20:00-20:10 \u4f11\u61a9\uff0810\u5206\u9593\uff09<br \/>\n20:10-20:30 \u300c\u4e2d\u56fd\u30fb\u30a4\u30f3\u30c9\u306b\u304a\u3051\u308bCSA\u306e\u6d3b\u52d5\u306e\u3054\u7d39\u4ecb\u300d<br \/>\n20:30-21:00 \u30d5\u30ea\u30fc\u30c8\u30fc\u30af\uff06\u30cd\u30c3\u30c8\u30ef\u30fc\u30ad\u30f3\u30b0\u306e\u6642\u9593&lt;\u4e3b\u50ac\u8005 Organizer&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7<br \/>\n&lt;\u5171\u50ac Cosponsored&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u516c\u76ca\u8ca1\u56e3\u6cd5\u4eba\u90fd\u5e02\u6d3b\u529b\u7814\u7a76\u6240&lt;\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc Coordinator&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u30ea\u30fc\u30c0\u30fc\u3000\u7b39\u539f \u82f1\u53f8&lt;\u4f1a\u5834 Place&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u5927\u962a\u5e9c\u5927\u962a\u5e02\u5317\u533a\u5927\u6df1\u753a3\u756a1\u53f7 \u30b0\u30e9\u30f3\u30d5\u30ed\u30f3\u30c8\u5927\u962a\u5317\u9928\u30bf\u30ef\u30fcC 7\u968e<br \/>\n\u30fbJR\u5927\u962a\u99c5\u3088\u308a\u5f92\u6b697\u5206<br \/>\n\u30fb\u5730\u4e0b\u9244\u5fa1\u5802\u7b4b\u7dda\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<br \/>\n\u30fb\u962a\u6025\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<\/li>\n<\/ul>\n<ul>\n<li class=\"dt_headLine\">\u00a02019\u5e748\u670823\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n[CSA Announcements]<br \/>\nNew website! &#8211; cloudsecurityalliance.org\/<br \/>\nCurrent open peer reviews &#8211; https:\/\/cloudsecurityalliance.org\/research\/contribute\/<br \/>\nRecent releases &#8211; cloudsecurityalliance.org\/research\/artifacts\/<br \/>\nUpcoming events &#8211; https:\/\/csacongress.org\/<br \/>\n[\u00a0Best Practices for Microservices Part 1 ]<br \/>\nCurrent Status &#8211; Finalizing content<br \/>\n-Authors addressing the current comments<br \/>\n-No authors, content, or comments needed<br \/>\nNext Steps &#8211; Peer review<br \/>\n-Going to peer review in 2 weeks time<br \/>\n-Everyone is welcome to participate<br \/>\n-Focus should be on the content and not grammar, syntax, etc.<br \/>\n[Microservices Architectural Pattern (Part 2 &#8211; Best Practice for Microservices)]<br \/>\n-Current status<br \/>\nAddressing the current comments<br \/>\nFocus comments on improving content.<br \/>\n-If you are an contributor or would like to contribute, please add your name and email to the contributor list.<br \/>\n-Predicted release is March 2020<\/li>\n<li>NO MEETING IN SEPT. Next meeting will be Oct 31st at 9am PT\/5pm CET<\/li>\n<\/ul>\n<\/li>\n<li class=\"dt_headLine\">\u00a02019\u5e747\u670826\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n[CSA Announcements]<br \/>\n-New website! &#8211; cloudsecurityalliance.org\/<br \/>\n-Current open peer review &#8211; CAIQ v3.1<br \/>\n-Recent releases<br \/>\n-Upcoming events &#8211; <a href=\"https:\/\/csacongress.org\/\">https:\/\/csacongress.org\/<\/a><br \/>\n[First set of documents have been published. Congratulations!]<br \/>\n-Challenges in Securing Application Containers and Microservices &#8211; out now!<br \/>\n-Best Practices for Application Containers &#8211; coming soon!<br \/>\n[Current initiatives]<br \/>\n-Best Practices for Microservices Part 1<br \/>\n*Work on editing and revising Chapters 1, 2, and 3<br \/>\n-Best Practices for Microservices Part 2 &#8211; Unified Standard<br \/>\n*Currently reviewing and addressing comments<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li class=\"dt_headLine\">\u00a02019\u5e747\u670816\u65e5\uff08\u706b\uff09\uff08\u516c\u958b\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u00a0 &#8220;<strong><em>Cloud Security Alliance Releases New Research Identifying Challenges in Securing Application Containers and Microservices<\/em><\/strong>&#8221;<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/articles\/csa-releases-new-research-indentifying-challenges-in-securing-application-containers-and-microservices\/\">https:\/\/cloudsecurityalliance.org\/articles\/csa-releases-new-research-indentifying-challenges-in-securing-application-containers-and-microservices\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2019\u5e747\u670816\u65e5\uff08\u706b\uff09\uff08\u7d42\u4e86\uff09<br \/>\n\u3010\u5927\u962a\u30fb\u6885\u7530\uff08GVH Osaka\uff09\u3011Kansai Cloud DevSec Meetup #1<br \/>\n<a href=\"https:\/\/20190716-cloud-devsec-gvh-osaka-umeda.peatix.com\/\">https:\/\/20190716-cloud-devsec-gvh-osaka-umeda.peatix.com\/<\/a><br \/>\n&lt;\u6982\u8981 Overview&gt;<br \/>\n2025\u5e74\u4e07\u535a\u306b\u5411\u3051\u3066\u3001\u95a2\u897f\u3067\u306f\u3001\u30e1\u30ac\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u4e8b\u696d\u8005\u306e\u30af\u30e9\u30a6\u30c9\u30c7\u30fc\u30bf\u30bb\u30f3\u30bf\u30fc\u8a2d\u7f6e\u30fb\u5897\u5f37\u304c\u672c\u683c\u5316\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u308c\u306b\u5408\u308f\u305b\u3066\u3001\u30af\u30e9\u30a6\u30c9\u30fb\u30cd\u30a4\u30c6\u30a3\u30d6\u306e\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u74b0\u5883\u3092\u30d9\u30fc\u30b9\u3068\u3059\u308b\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u3001\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3001\u30aa\u30fc\u30d7\u30f3API\u3001DevOps\uff0fDevSecOps\u3068\u3044\u3063\u305f\u65b0\u6280\u8853\u306e\u5c0e\u5165\u304c\u9032\u307f\u3001\u30b7\u30b9\u30c6\u30e0\u958b\u767a\u30fb\u904b\u7528\u306e\u73fe\u5834\u3092\u5927\u304d\u304f\u5909\u3048\u3088\u3046\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u7c73\u56fd\u30ef\u30b7\u30f3\u30c8\u30f3\u5dde\u30b7\u30a2\u30c8\u30eb\u306b\u672c\u90e8\u3092\u7f6e\u304f\u975e\u55b6\u5229\u56e3\u4f53\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff08CSA\uff09\u3067\u306f\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\uff08ACM-WG\uff09\u304c\u3001\u7c73\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u306a\u3069\u3068\u9023\u643a\u3057\u306a\u304c\u3089\u3001\u65b0\u6280\u8853\u3092\u53d6\u308a\u5dfb\u304f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u95a2\u3059\u308b\u56fd\u969b\u6a19\u6e96\u5316\u30fb\u5553\u767a\u6d3b\u52d5\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002\u672c\u30df\u30fc\u30c8\u30a2\u30c3\u30d7\u306f\u3001\u95a2\u897f\u306e\u958b\u767a\u8005\u3084\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u3092\u5bfe\u8c61\u306b\u3001\u300cFintech\u300d\u306a\u3069\u306e\u5177\u4f53\u7684\u5c0e\u5165\u4e8b\u4f8b\u3092\u7d39\u4ecb\u3057\u306a\u304c\u3089\u3001<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u3068\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\u304c\u6df7\u5728\u3059\u308b\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u74b0\u5883\u3067\u3001\u30b3\u30f3\u30c6\u30ca\u3084\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u5229\u7528\u3057\u305f\u30b5\u30fc\u30d3\u30b9\u3092\u65b0\u898f\u958b\u767a\u30fb\u904b\u7528\u3059\u308b\u5834\u5408\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u3069\u3046\u8b1b\u3058\u305f\u3089\u3044\u3044\u306e\u304b<br \/>\n\u30fb\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u3068\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u306e\u8cac\u4efb\u5206\u754c\u70b9\u3092\u3069\u3046\u8a2d\u5b9a\u3057\u305f\u3089\u3044\u3044\u306e\u304b<br \/>\n\u30fb\u5c02\u9580\u77e5\u8b58\u306e\u306a\u3044\u7d4c\u55b6\u5c64\u5411\u3051\u306b\u3001\u65b0\u305f\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8ab2\u984c\u3068\u5bfe\u7b56\u3092\u3069\u3046\u8aac\u660e\u3057\u305f\u3089\u3044\u3044\u304b<br \/>\n\u30fb\u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u3092\u69cb\u7bc9\u30fb\u904b\u7528\u3067\u304d\u308b\u30a8\u30f3\u30b8\u30cb\u30a2\u3092\u3069\u3046\u80b2\u3066\u3066\u3044\u3051\u3070\u3088\u3044\u304b<br \/>\n\u3068\u3044\u3063\u305f\u5171\u901a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u306e\u89e3\u6c7a\u7b56\u306b\u3064\u3044\u3066\u8003\u3048\u3001\u5171\u6709\u3059\u308b\u5834\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u76ee\u6a19\u3068\u3057\u3066\u3044\u307e\u3059\u3002&lt;\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb Timetable&gt;<br \/>\n18:30 \u53d7\u4ed8\u958b\u59cb<br \/>\n19:00 \u30b9\u30bf\u30fc\u30c8\u30fb\u958b\u4f1a\u306e\u3054\u6328\u62f6<br \/>\n19:05-20:00 \u300c\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6982\u8aac\u300d<br \/>\n\u30fb\u300cFintech\u300d\u4e8b\u4f8b\u306b\u5b66\u3076\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9<br \/>\n\u30fb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u3068\u30a4\u30f3\u30d5\u30e9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n\u30fb\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8105\u5a01\u3068API\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n\u30fb\u4e3b\u8981\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u30b7\u30d5\u30c8\u30ec\u30d5\u30c8\u652f\u63f4\u7b56<br \/>\n\u30fbQ&amp;A<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-154569626\">https:\/\/www.slideshare.net\/esasahara\/ss-154569626<\/a><br \/>\n20:00-20:10 \u4f11\u61a9\uff0810\u5206\u9593\uff09<br \/>\n20:10-20:30 CSA\u30b8\u30e3\u30d1\u30f3\u95a2\u897f\u652f\u90e8\u306e\u6d3b\u52d5\u306e\u3054\u7d39\u4ecb<br \/>\n20:30-21:00 \u30d5\u30ea\u30fc\u30c8\u30fc\u30af\uff06\u30cd\u30c3\u30c8\u30ef\u30fc\u30ad\u30f3\u30b0\u306e\u6642\u9593&lt;\u4e3b\u50ac\u8005 Organizer&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7&lt;\u5171\u50ac Cosponsored&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u516c\u76ca\u8ca1\u56e3\u6cd5\u4eba\u90fd\u5e02\u6d3b\u529b\u7814\u7a76\u6240&lt;\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc Coordinator&gt;<br \/>\n\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u30ea\u30fc\u30c0\u30fc\u3000\u7b39\u539f \u82f1\u53f8&lt;\u4f1a\u5834 Place&gt;<br \/>\nGVH Osaka\uff08\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30f3\u30c1\u30e3\u30fc\u30cf\u30d3\u30bf\u30c3\u30c8\u5927\u962a)<br \/>\n\u5927\u962a\u5e9c\u5927\u962a\u5e02\u5317\u533a\u5927\u6df1\u753a3\u756a1\u53f7 \u30b0\u30e9\u30f3\u30d5\u30ed\u30f3\u30c8\u5927\u962a\u5317\u9928\u30bf\u30ef\u30fcC 7\u968e<br \/>\n\u30fbJR\u5927\u962a\u99c5\u3088\u308a\u5f92\u6b697\u5206<br \/>\n\u30fb\u5730\u4e0b\u9244\u5fa1\u5802\u7b4b\u7dda\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<br \/>\n\u30fb\u962a\u6025\u6885\u7530\u99c5\u3088\u308a\u5f92\u6b6910\u5206<\/li>\n<li class=\"dt_headLine\">\u00a02019\u5e746\u670828\u65e5\uff08\u91d1\uff0901:00am &#8211; 02:00am\uff08\u7d42\u4e86\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n[\u6982\u8981]<br \/>\n-First two documents (Challenges and Best Practices for Best Practices) will be release in mid July (July 10th and the following week)<br \/>\n-Anil and Andrew to review Part 1 of the Microservices Best Practice document. They will follow up with the leads regarding their feedback\/suggestions<br \/>\n-New version of chapter 5 doc\/a unified standard \/ part 2 &#8211; link has been replaced in the docs and files section<br \/>\n-Next calls will be on July 25th and Aug 22nd &#8211; Be on the look out for those invites<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li class=\"dt_headLine\">\u00a02019\u5e746\u67084\u65e5\uff08\u706b\uff09\n<ul>\n<li>CSA\u30b8\u30e3\u30d1\u30f3\u306b\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\uff08ACM-WG\uff09\u3092\u8a2d\u7acb\u3044\u305f\u3057\u307e\u3057\u305f\u3002<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li class=\"dt_headLine\">\u00a02019\u5e745\u670817\u65e5\uff08\u91d1\uff09 01:00am &#8211; 02:00am (\u7d42\u4e86\uff09\n<ul>\n<li>Cloud Security Alliance ACM-WG\u30b0\u30ed\u30fc\u30d0\u30eb\u30df\u30fc\u30c6\u30a3\u30f3\u30b0<br \/>\n[Action Items]<br \/>\n-Anil Karmel &#8211; address tech edits for Challenges for Implementing Application Containers and Microservices and the Best Practices for Containers document by beginning of June<br \/>\n-Authors for Microservices Best Practices &#8211; document to close comments and revise down their sections<br \/>\n[Meeting Minutes]<br \/>\n-Anil is finalizing the edits that have been made, looking to publish first set of documents in June.<br \/>\n-Best Practices Document is closed for content\/comments &#8211; authors should now focus on pruning down and finalizing all of sections.<br \/>\n-Partitioning the work to different working group members.<br \/>\n-Vrettos will continuing to write the Unified Standard for Microservices document upon the finalization of the Best Practices for Microservices document.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9 \u30fb\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6613\" title=\"DevSecOps\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9 WG\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-6613","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6613"}],"version-history":[{"count":121,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6613\/revisions"}],"predecessor-version":[{"id":31010,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/6613\/revisions\/31010"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1155"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}