﻿{"id":16386,"date":"2021-01-12T08:35:19","date_gmt":"2021-01-11T23:35:19","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=16386"},"modified":"2021-01-12T08:35:19","modified_gmt":"2021-01-11T23:35:19","slug":"%e3%80%8c%e3%82%b5%e3%83%bc%e3%83%90%e3%83%ac%e3%82%b9%e3%82%a2%e3%83%97%e3%83%aa%e3%82%b1%e3%83%bc%e3%82%b7%e3%83%a7%e3%83%b3%e3%81%ae%e3%81%9f%e3%82%81%e3%81%ae%e6%9c%80%e3%82%82%e9%87%8d%e5%a4%a7","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=16386","title":{"rendered":"\u300c\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u306e\u6700\u3082\u91cd\u5927\u306a12\u306e\u30ea\u30b9\u30af\uff082019\u5e74\uff09\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f"},"content":{"rendered":"<p>\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cBest Practices in Implementing a Secure Microservices Architecture\u300d\u306e\u7ffb\u8a33\u7248\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=6613\" target=\"_blank\" rel=\"noopener\">\u300c\u30b3\u30f3\u30c6\u30ca\u30fb\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9WG\u300d\u306e\u30a6\u30a8\u30d6\u30da\u30fc\u30b8<\/a>\u306e\u300c\u8cc7\u6599\u300d\u3088\u308a\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cBest Practices <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=16386\" title=\"\u300c\u30b5\u30fc\u30d0\u30ec\u30b9\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u305f\u3081\u306e\u6700\u3082\u91cd\u5927\u306a12\u306e\u30ea\u30b9\u30af\uff082019\u5e74\uff09\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[150,16,17,43,44,97,203,204,47,197],"class_list":{"0":"post-16386","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-2","7":"tag-container","8":"tag-csa","10":"tag-43","11":"tag-44","12":"tag-97","13":"tag-203","14":"tag-204","15":"tag-47","16":"tag-197"},"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/16386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16386"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/16386\/revisions"}],"predecessor-version":[{"id":16387,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/16386\/revisions\/16387"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}