﻿{"id":7445,"date":"2019-09-29T09:39:45","date_gmt":"2019-09-29T00:39:45","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7445"},"modified":"2019-10-23T12:54:12","modified_gmt":"2019-10-23T03:54:12","slug":"%e7%ac%ac57%e5%9b%9ecsa%e5%8b%89%e5%bc%b7%e4%bc%9a-%e3%80%8ciastinteractive-application-security-testing%e3%81%a7%e5%ae%9f%e7%8f%be%e3%81%99%e3%82%8bdevsecops%e3%80%8d","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7445","title":{"rendered":"\u7b2c57\u56deCSA\u52c9\u5f37\u4f1a \u300cIAST(Interactive Application Security Testing)\u3067\u5b9f\u73fe\u3059\u308bDevSecOps\u300d"},"content":{"rendered":"<h2>\u7b2c57\u56deCSA\u52c9\u5f37\u4f1a\u3092\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u958b\u50ac\u3044\u305f\u3057\u307e\u3059\u3002<\/h2>\n<p><strong>\u30c6\u30fc\u30de\uff1a\u3000IAST(Interactive Application Security Testing)\u3067\u5b9f\u73fe\u3059\u308bDevSecOps<br \/>\n<\/strong><\/p>\n<p><strong>\u6982\u8981<\/strong>\uff1a<\/p>\n<p>Web\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u306e\u4e0d\u5177\u5408\u306f\u3001\u5229\u7528\u8005\u3078\u306e\u88ab\u5bb3\u304a\u3088\u3073\u4f01\u696d\u7d4c\u55b6\u3078\u306e\u5f71\u97ff\u307e\u3067\u306b\u53ca\u3076\u3053\u3068\u304c\u3042\u308a\u307e\u3059\u3002\u73fe\u5728\u306f\u3001Web\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u8a3a\u65ad\u3092\u5b9a\u671f\u7684\u306b\u884c\u3046\u7b49\u306e\u5bfe\u7b56\u3092\u8b1b\u3058\u3066\u3044\u307e\u3059\u304c\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u5b8c\u6210\u3057\u305f\u5f8c\u306e\u5bfe\u5fdc\u306f\u3001\u8907\u96d1\u5316\u3059\u308b\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u4fee\u6b63\u3084\u518d\u30c6\u30b9\u30c8\u306f\u958b\u767a\u8005\u306b\u3068\u3063\u3066\u306e\u8ca0\u8377\u304c\u5927\u304d\u304f\u306a\u308a\u307e\u3059\u3002<br \/>\n\u958b\u767a\u8005\u304c\u30d3\u30b8\u30cd\u30b9\u30ed\u30b8\u30c3\u30af\u306b\u96c6\u4e2d\u3067\u304d\u308b\u3088\u3046\u306b\u958b\u767a\u6642\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c6\u30b9\u30c8\u3092\u52b9\u7387\u5316\u3059\u308bIAST\uff08Interactive Application Security Testing\uff09\u3068\u3001IAST\u3092\u5229\u7528\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c6\u30b9\u30c8\u306e\u81ea\u52d5\u5316\u304a\u3088\u3073DevSecOps\u306e\u5b9f\u73fe\u65b9\u6cd5\u306b\u3064\u3044\u3066\u30c7\u30e2\u3092\u4ea4\u3048\u3066\u3054\u7d39\u4ecb\u3057\u3066\u3044\u305f\u3060\u304d\u307e\u3059\u3002<\/p>\n<p><strong>\u8b1b\u5e2b<\/strong>\uff1a<\/p>\n<p>\u5409\u4e95\u96c5\u4eba\u6c0f\u3000\u65e5\u672c\u30b7\u30ce\u30d7\u30b7\u30b9\u5408\u540c\u4f1a\u793e\u3000\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2 \u30a4\u30f3\u30c6\u30b0\u30ea\u30c6\u30a3\u30b0\u30eb\u30fc\u30d7\u3000\u30b7\u30cb\u30a2\u30bb\u30fc\u30eb\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2<\/p>\n<p><strong>\u65e5\u306b\u3061<\/strong><\/p>\n<p>10\u670825\u65e5(\u91d1)<\/p>\n<p><strong>\u5834\u6240<br \/>\n<\/strong><\/p>\n<p>\u65e5\u672c\u30b7\u30ce\u30d7\u30b7\u30b9\u5408\u540c\u4f1a\u793e\u69d8\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u30eb\u30fc\u30e0<br \/>\n<a href=\"https:\/\/www.synopsys.com\/ja-jp\/japan\/company\/company-profile.html\">https:\/\/www.synopsys.com\/ja-jp\/japan\/company\/company-profile.html<\/a><\/p>\n<p><strong><span style=\"color: #ff0000;\">\u53c2\u52a0\u8cbb\uff1a\u30001,000\u5186<\/span><\/strong><br \/>\n<strong><span style=\"color: #ff0000;\">\u3000\u3000\u3000\u3000\u3000\u6ce8\uff09CSA\u30b8\u30e3\u30d1\u30f3\u4f01\u696d\u4f1a\u54e1\u3001\u500b\u4eba\u4f1a\u54e1\u306f\u7121\u6599\u3001CSA\u30b8\u30e3\u30d1\u30f3\u9023\u643a\u4f1a\u54e1\u306f\u6709\u6599\u3068\u306a\u308a\u307e\u3059\u3002<\/span><\/strong><\/p>\n<p><strong>\u30b9\u30b1\u30b8\u30e5\u30fc\u30eb<\/strong><\/p>\n<p>\u53d7\u3051\u4ed8\u3051\uff1a\u300018:15<br \/>\n\u52c9\u5f37\u4f1a\uff1a 18:30-19:30<br \/>\nQ&amp;A\u3001\u540d\u523a\u4ea4\u63db\u306a\u3069\uff1a\u300019:30-20:00<\/p>\n<p><strong>\u52df\u96c6\u4eba\u6570<\/strong><\/p>\n<p>60\u540d<\/p>\n<p><span style=\"color: #000000;\"><strong>\u8cc7\u6599\u306b\u3064\u3044\u3066<\/strong><\/span><\/p>\n<p>\u8cc7\u6599\u306f\u3001\u4f1a\u5834\u306b\u3066\u53c2\u52a0\u8005\u306b\u30a2\u30af\u30bb\u30b9\u65b9\u6cd5\u3092\u304a\u77e5\u3089\u305b\u3057\u307e\u3059\u3002\u306a\u304a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u4f1a\u54e1\u306e\u65b9\u306b\u306f\u3001\u4f1a\u54e1\u30da\u30fc\u30b8\u306b\u8cc7\u6599\u3092\u4e8b\u524d\u516c\u958b\u3044\u305f\u3057\u307e\u3059\u306e\u3067\u3001\u305d\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p>\u8cc7\u6599\u306e\u5229\u7528\u6761\u4ef6\u306f\u4ee5\u4e0b\u306b\u306a\u308a\u307e\u3059\u306e\u3067\u6ce8\u610f\u3057\u3066\u304f\u3060\u3055\u3044\uff1a<br \/>\n\u2022CSA\u52c9\u5f37\u4f1a\u306b\u53c2\u52a0\u3059\u308b\u306b\u969b\u3057\u3066\u306e\u53c2\u8003\u3068\u3057\u3066\u306e\u307f\u5229\u7528\u3057\u3066\u304f\u3060\u3055\u3044\u3002<br \/>\n\u2022\u8907\u88fd\u30fb\u8ee2\u8f09\u7b49\u3092\u5e0c\u671b\u3055\u308c\u308b\u5834\u5408\u306f\u3001\u304a\u554f\u5408\u305b\u30da\u30fc\u30b8\u3088\u308a\u3001CSA\u30b8\u30e3\u30d1\u30f3\u307e\u3067\u304a\u554f\u3044\u5408\u308f\u305b\u304f\u3060\u3055\u3044\u3002<br \/>\n\u2022\u672c\u8cc7\u6599\u306b\u95a2\u3059\u308b\u4e00\u5207\u306e\u8457\u4f5c\u6a29\u306f\u3001\u7b46\u8005\u304a\u3088\u3073\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u5e30\u5c5e\u3057\u307e\u3059\u3002<\/p>\n<p><strong>\uff23\uff30\uff25\u306b\u3064\u3044\u3066<\/strong><\/p>\n<p>CPE\uff08\u7d99\u7d9a\u7684\u6559\u80b2\u30d7\u30ed\u30b0\u30e9\u30e0\uff09\u306e\u53d7\u8b1b\u8a3c\u660e\u66f8\u3092\u5e0c\u671b\u3055\u308c\u308b\u65b9\u306f\u3001\u5f53\u65e5\u53d7\u4ed8\u306b\u3066\u304a\u53d7\u53d6\u308a\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><strong>\u304a\u7533\u3057\u8fbc\u307f<\/strong><\/p>\n<p>\u7533\u8fbc\u53d7\u4ed8\u306f\u7d42\u4e86\u3044\u305f\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7b2c57\u56deCSA\u52c9\u5f37\u4f1a\u3092\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u958b\u50ac\u3044\u305f\u3057\u307e\u3059\u3002 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=7445\" title=\"\u7b2c57\u56deCSA\u52c9\u5f37\u4f1a \u300cIAST(Interactive Application Security Testing)\u3067\u5b9f\u73fe\u3059\u308bDevSecOps\u300d\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":206,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7445","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/7445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7445"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/7445\/revisions"}],"predecessor-version":[{"id":7865,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/7445\/revisions\/7865"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/206"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}