﻿{"id":8590,"date":"2020-01-14T22:37:00","date_gmt":"2020-01-14T13:37:00","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8590"},"modified":"2021-07-15T14:44:19","modified_gmt":"2021-07-15T05:44:19","slug":"sdn_wg","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8590","title":{"rendered":"SDN_WG"},"content":{"rendered":"<h2>SDN\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<h1><span style=\"color: #ff0000;\"><strong>\u6d3b\u52d5\u4f11\u6b62\u4e2d<\/strong><\/span><\/h1>\n<h3><strong>\u516c\u958b\u8cc7\u6599<\/strong><\/h3>\n<ol>\n<li><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2019\/04\/icon4newpink.gif\" alt=\"\" width=\"36\" height=\"15\" \/>\u300c<strong>SDN\u5229\u7528\u30ac\u30a4\u30c0\u30f3\u30b9(V1.0<\/strong>)\u300d\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/05\/SDNuseguidance_20200525.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<br \/>\n\u672c\u66f8\u306f\u3001\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306e\u305f\u3081\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u3000v4.0\u300d\u306e\u8a18\u8f09\u5185\u5bb9\u3092\u30d9\u30fc\u30b9\u306b\u3001\u95a2\u9023\u3059\u308b\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3084\u5229\u7528\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3092\u76db\u308a\u8fbc\u3093\u3060\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u306e\u89e3\u8aac\u66f8\u3067\u3059\u3002<br \/>\nSDN\u306e\u6982\u8981\u3092\u628a\u63e1\u3059\u308b\u3068\u540c\u6642\u306b\u3001\u73fe\u5b58\u3059\u308b\u30c4\u30fc\u30eb\/\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3068\u305d\u306e\u5229\u7528\u30b1\u30fc\u30b9\u3092\u30a4\u30e1\u30fc\u30b8\u3057\u3084\u3059\u3044\u3088\u3046\u306b\u3001\u5177\u4f53\u7684\u306b\u8aac\u660e\u3057\u3066\u3044\u307e\u3059\u3002\u307e\u305f\u3001SDN\u3092\u3088\u308a\u5e83\u7bc4\u306b\u6349\u3048\u308b\u305f\u3081\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u306b\u306f\u89e6\u308c\u3089\u308c\u3066\u3044\u306a\u30443\u3064\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\uff08SD-WAN\u3001NFV\u3001IBN\uff09\u306b\u3064\u3044\u3066\u3082\u8aac\u660e\u3057\u3066\u3044\u307e\u3059\u3002\u5229\u7528\u30b1\u30fc\u30b9\u306b\u3064\u3044\u3066\u306f\u3001\u30e1\u30f3\u30d0\u30fc\u306e\u7d4c\u9a13\u306b\u57fa\u3065\u304d\u3001\u5b9f\u969b\u306e\u304a\u5ba2\u69d8\u306e\u72b6\u6cc1\u3092\u53cd\u6620\u3055\u305b\u308b\u3053\u3068\u306b\u6ce8\u529b\u3057\u3066\u3044\u307e\u3059\u3002<\/li>\n<\/ol>\n<h3><strong>\u6d3b\u52d5\u8981\u65e8<\/strong><\/h3>\n<p>SDN\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u6d3b\u52d5\u65b9\u91dd\u7b49\u306b\u3064\u304d\u307e\u3057\u3066\u306f\u3001<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/01\/SDN_WG_\u8a2d\u7acb\u4f01\u753b\u66f8_20191226.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3><strong>\u6d3b\u52d5\u5185\u5bb9<\/strong><\/h3>\n<ul>\n<li>2020\u5e7410\u6708\n<ul>\n<li>\u7b2c9\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a10\u670828\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>ZScaler\u306b\u95a2\u3059\u308b\u88fd\u54c1\u8aac\u660e\u53ca\u3073\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30fbSASE\u306e\u8003\u3048\u65b9\u306b\u3064\u3044\u3066<\/li>\n<li>SDNWG\u3068CASBWB\u9593\u3067\u306e\u610f\u898b\u4ea4\u63db\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u6b21\u56de\u306e\u984c\u6750\u7b49\u306f\u3001\u5225\u9014\u691c\u8a0e<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e749\u6708\n<ul>\n<li>\u7b2c8\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a9\u670817\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>CSA Japan Congress 2020\u306e\u958b\u50ac\u306b\u95a2\u3059\u308b\u30a2\u30ca\u30a6\u30f3\u30b9(11\u670818\u65e5\u306b\u5b9f\u65bd\u4e88\u5b9a)<\/li>\n<li>SDP\u52c9\u5f37\u4f1a\n<ul>\n<li>\u672c\u52c9\u5f37\u4f1a\u3067\u5229\u7528\u3057\u305f\u8cc7\u6599\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001\u4e00\u90e8\u30d9\u30fc\u30b9\u3068\u306a\u308b\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/07\/Software-Defined-Perimeter-and-Zero-Trust_J.pdf\">\u3053\u3061\u3089<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u6b21\u56de\u4ee5\u964d\u306e\u53d6\u308a\u7d44\u307f\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u6b21\u56de\u306f\u3001Zscaler(SDP\u5b9f\u88c5\u7b49)\u3092\u984c\u6750\u3068\u3057\u3066\u52c9\u5f37\u4f1a\u309210\/23\u5b9f\u65bd\u4e88\u5b9a<\/li>\n<li>\u672c\u65e5\u306e\u6253\u3061\u5408\u308f\u305b\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/09\/632054f79f97ae96e00a9c9eb8e55dc6.pdf\">\u3053\u3061\u3089<\/a>\u3092\u53c2\u7167<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e747\u6708\n<ul>\n<li>\u7b2c7\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a7\u670831\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>\u7b2c65\u56deCSA\u52c9\u5f37\u4f1a\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\n<ul>\n<li>\u30a2\u30f3\u30b1\u30fc\u30c8\u306e\u7d50\u679c\u9ad8\u8a55\u4fa1\u3002<\/li>\n<\/ul>\n<\/li>\n<li>SASE\u52c9\u5f37\u4f1a<\/li>\n<li>\u6b21\u56de\u4ee5\u964d\u306e\u53d6\u308a\u7d44\u307f\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u6b21\u56de\u306f\u3001SDP\u3092\u984c\u6750\u3068\u3057\u3066\u52c9\u5f37\u4f1a\u5b9f\u65bd\u4e88\u5b9a<\/li>\n<li>\u672c\u65e5\u306e\u6253\u3061\u5408\u308f\u305b\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/07\/2bc39518a2ac33b4b635e0b7b239e066.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e746\u6708\n<ul>\n<li>\u7b2c6\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a6\u670826\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>SDN\u5229\u7528\u30ac\u30a4\u30c0\u30f3\u30b9(V1.0)\u516c\u958b\u5f8c\u306e\u53cd\u97ff\u306b\u3064\u3044\u3066\n<ul>\n<li>\u30ac\u30a4\u30c0\u30f3\u30b9\u516c\u958b\u30da\u30fc\u30b8\u306e\u95b2\u89a7\u6570\u306f\u3001\u516c\u958b\u304b\u3089\u7d041\u304b\u6708\u3067\u7d04600\u4ee5\u4e0a<\/li>\n<\/ul>\n<\/li>\n<li>SDN\u52c9\u5f37\u4f1a(SDN\u306e\u3055\u3089\u306a\u308b\u7406\u89e3\u3068\u3053\u308c\u304b\u3089)\u5b9f\u65bd\u306b\u3064\u3044\u3066\n<ul>\n<li>\u52c9\u5f37\u4f1a\u958b\u50ac\u30da\u30fc\u30b8\u2193<\/li>\n<li><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=12378\">https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=12378<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u6b21\u56de\u4ee5\u964d\u306e\u53d6\u308a\u7d44\u307f\u5185\u5bb9\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u6b21\u56de\u306f\u3001SASE\u3092\u984c\u6750\u3068\u3057\u3066\u52c9\u5f37\u4f1a\u5b9f\u65bd\u4e88\u5b9a<\/li>\n<li>\u6253\u3061\u5408\u308f\u305b\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/06\/745123bbcfbf4e0d3865eec5329f8df9.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e745\u6708\n<ul>\n<li>\u7b2c5\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a5\u670822\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>SDN\u89e3\u8aac\u66f8\u6700\u7d42\u30ec\u30d3\u30e5\u30fc<\/li>\n<li>SDN-WG\u6b21\u5e74\u5ea6\u6d3b\u52d5\u306b\u3064\u3044\u3066\n<ul>\n<li>\u767a\u8868\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/05\/23eb8b67f15e4f13c384f465fde0c3cb.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e744\u6708\n<ul>\n<li>\u7b2c4\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a4\u670824\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>\u6210\u679c\u7269\u3067\u3042\u308b\u89e3\u8aac\u66f8\u306e\u30c9\u30e9\u30d5\u30c8\u7248\u30ec\u30d3\u30e5\u30fc\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<\/li>\n<li>\u672cWG\u95a2\u9023\u30c6\u30af\u30ce\u30ed\u30b8\u30fc(Intent-Based Network)\u306e\u5e02\u5834\u52d5\u5411\u767a\u8868\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>2020\u5e743\u6708\n<ul>\n<li>\u7b2c3\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a3\u670827\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>\u6210\u679c\u7269\u3067\u3042\u308b\u89e3\u8aac\u66f8\u306e\u30c9\u30e9\u30d5\u30c8\u7248\u30ec\u30d3\u30e5\u30fc\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<\/li>\n<li>\u672cWG\u95a2\u9023\u30c6\u30af\u30ce\u30ed\u30b8\u30fc(NFV)\u306e\u5e02\u5834\u52d5\u5411\u767a\u8868\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u767a\u8868\u8cc7\u6599\u306f\u3053\u3061\u3089<a href=\"https:\/\/www.netone.co.jp\/knowledge-center\/blog-column\/knowledge_takumi_038\/index.html\">\u2460<\/a><a href=\"https:\/\/www.netone.co.jp\/knowledge-center\/blog-column\/knowledge_takumi_051\/index.html\">\u2461<\/a>\u3092\u53c2\u7167<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>2020\u5e742\u6708\n<ul>\n<li>\u7b2c2\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a2\u670828\u65e5\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>\u6210\u679c\u7269\u3067\u3042\u308b\u89e3\u8aac\u66f8\u306e\u69cb\u6210\u3068\u5f79\u5272\u5206\u62c5\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u78ba\u8a8d\u306b\u7528\u3044\u305f\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/b675c66134e7455ff2da7e14ec26a998.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u672cWG\u95a2\u9023\u30c6\u30af\u30ce\u30ed\u30b8\u30fc(SD-WAN)\u306e\u5e02\u5834\u52d5\u5411\u767a\u8868\u3068\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\n<ul>\n<li>\u767a\u8868\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/f03b30a92d7751f3b44becf682ac06f2.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>2020\u5e741\u6708\n<ul>\n<li>SDNWG\u30b9\u30bf\u30fc\u30c8\u3002<\/li>\n<li>\u7b2c1\u56deWG\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u5b9f\u65bd\uff1a1\u670827\u65e5\uff08\u30ad\u30c3\u30af\u30aa\u30d5\uff09\n<ul>\n<li>\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\u3067\u306e\u5b9f\u65bd\u5185\u5bb9\n<ol>\n<li>WG\u8a2d\u7acb\u306e\u8da3\u65e8<\/li>\n<li>WG\u53d6\u308a\u7d44\u307f\u4f01\u696d\u7d39\u4ecb<\/li>\n<li>\u4eca\u5f8c\u306e\u9032\u3081\u65b9\n<ul>\n<li>\u30ad\u30c3\u30af\u30aa\u30d5\u8cc7\u6599\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2020\/03\/affbb3f82e12243f273bb0eb1054a2e3.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>SDN\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002 \u6d3b\u52d5\u4f11\u6b62\u4e2d <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=8590\" title=\"SDN_WG\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":0,"parent":1155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8590","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/8590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8590"}],"version-history":[{"count":38,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/8590\/revisions"}],"predecessor-version":[{"id":18648,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/8590\/revisions\/18648"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1155"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}