﻿{"id":712,"date":"2015-04-29T16:41:38","date_gmt":"2015-04-29T07:41:38","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=712"},"modified":"2015-04-29T16:41:38","modified_gmt":"2015-04-29T07:41:38","slug":"%e7%ac%ac11%e5%9b%9e%e3%80%80csa%e5%8b%89%e5%bc%b7%e4%bc%9a%e3%80%80%e8%b3%87%e6%96%99","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=712","title":{"rendered":"\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u8cc7\u6599"},"content":{"rendered":"<h2 class=\"dt_headLine\"><span style=\"color: #000000;\"><span style=\"color: #330000; font-size: x-large;\">\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e744\u670828\u65e5(\u706b)\u3000\u5b9f\u65bd<\/span>\u00a0 \uff20BSI\u30b8\u30e3\u30d1\u30f3<\/span><\/h2>\n<h2 class=\"dt_headLine\">\u30c6\u30fc\u30de\u30fb\u30a2\u30b8\u30a7\u30f3\u30c0<\/h2>\n<pre>\u30c6\u30fc\u30de\uff1a\u3000NIST draft SP800-125a\n\u3000\u3000\u3000\u3000\u3000Security Recommendations for Hypervisor Deployment\u306e\u89e3\u8aad<\/pre>\n<pre>\u8b1b\u5e2b\uff1a\u3000\u5916\u5c71\u6625\u5f66\u6c0f\n\u3000\u3000\u3000\u3000\u682a\u5f0f\u4f1a\u793e \u6771\u829d\u3000\u30a4\u30f3\u30c0\u30b9\u30c8\u30ea\u30a2\u30eb\uff29\uff23\uff34\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u793e\n\u3000\u3000\u3000\u3000\u5546\u54c1\u7d71\u62ec\u90e8\u00a0 \u6b21\u4e16\u4ee3\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u5546\u54c1\u6280\u8853\u90e8\u3000\u53c2\u4e8b<\/pre>\n<pre><span style=\"font-size: small;\">\u8b1b\u6f14\u8cc7\u6599\uff1a\u3000\u3053\u3061\u3089\u304b\u3089\u3054\u5229\u7528\u304f\u3060\u3055\u3044<\/span><\/pre>\n<p><span style=\"font-family: MS Gothic;\">\u3000\u3000\u3000\u3000<a href=\"http:\/\/www.cloudsecurityalliance.jp\/Benkyokai\/20150428\/CSA_WS_20150428r2_NIST-SP800-125a.pdf\" target=\"_blank\">http:\/\/www.cloudsecurityalliance.jp\/Benkyokai\/20150428\/<span style=\"color: #000000; font-family: MS PGothic;\">CSA_WS_20150428r2_NIST-SP800-125a.pdf<\/span><\/a><\/span><\/p>\n<p>\u53c2\u8003\u8cc7\u6599\uff1a\u3000<span style=\"font-family: Courier New;\">\u4eca\u56de\u306e\u52c9\u5f37\u4f1a\u306e\u53c2\u8003\u60c5\u5831\u3068\u3057\u3066\u3001NIST SP800-125a\u306e\u30b5\u30a4\u30c8\u3092\u304a\u77e5\u3089\u305b\u3057\u307e\u3059\u3002<\/span><span style=\"font-family: Courier New;\"><br \/>\n<\/span>\u3000\u3000\u3000\u3000\u3000\u3000<a href=\"http:\/\/csrc.nist.gov\/publications\/drafts\/800-125a\/sp800-125a_draft.pdf\" target=\"_blank\"><span style=\"color: #0066cc; font-family: Courier New;\">http:\/\/csrc.nist.gov\/publications\/drafts\/800-125a\/sp800-125a_draft.pdf<\/span><\/a><\/p>\n<h2 class=\"dt_headLine\">\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6<\/h2>\n<ul>\n<li>\n<div class=\"dt_headLine\">CSA\u52c9\u5f37\u4f1a\u306b\u53c2\u52a0\u3059\u308b\u306b\u969b\u3057\u3066\u306e\u53c2\u8003\u3068\u3057\u3066\u5229\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<\/div>\n<\/li>\n<li>\n<div class=\"dt_headLine\">\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u30002015\u5e744\u670828\u65e5(\u706b) <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=712\" title=\"\u7b2c11\u56de\u3000CSA\u52c9\u5f37\u4f1a\u3000\u8cc7\u6599\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":444,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-712","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=712"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/712\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/444"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}