﻿{"id":22319,"date":"2022-05-04T09:49:36","date_gmt":"2022-05-04T00:49:36","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=22319"},"modified":"2022-05-04T09:49:36","modified_gmt":"2022-05-04T00:49:36","slug":"sdpwg%e3%81%8c%e3%80%81%e3%80%8csoftware-defined-perimeter-sdp-%e4%bb%95%e6%a7%98%e6%9b%b8-v2-0%e3%80%8d%e3%82%92%e5%85%ac%e9%96%8b%e3%81%97%e3%81%be%e3%81%97%e3%81%9f%ef%bc%81","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=22319","title":{"rendered":"SDPWG\u304c\u3001\u300cSoftware-Defined Perimeter (SDP) \u4ed5\u69d8\u66f8 v2.0\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01"},"content":{"rendered":"<p>\u300cSoftware-Defined Perimeter (SDP) \u4ed5\u69d8\u66f8 v2.0\u300d\u306f\u3001CSA\u672c\u90e8\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u300cSoftware-Defined Perimeter (SDP) Specification v2.0\u300d\u306e\u65e5\u672c\u8a9e\u7248\u306b\u306a\u308a\u307e\u3059\u3002<br \/>\n\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30d0\u30a4\u30d6\u30eb\u3068\u3082\u3044\u3046\u3079\u304dSDP\u4ed5\u69d8\u66f8\u306e\u66f4\u65b0\u7248\u3067\u3059\u3002SDP\u306f\u3001NIST SP800-207\u3067\u3082\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u5b9f\u88c5\u65b9\u6cd5\u3068\u3057\u3066\u53c2\u7167\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=1167\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u306eSDP\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30a6\u30a8\u30d6\u30da\u30fc\u30b8<\/a>\u306e\u3001\u516c\u958b\u8cc7\u6599\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u300cSoftware-Defined Perimet <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=22319\" title=\"SDPWG\u304c\u3001\u300cSoftware-Defined Perimeter (SDP) \u4ed5\u69d8\u66f8 v2.0\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[16,17,273,33,43,44,121,59],"class_list":{"0":"post-22319","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-2","7":"tag-csa","9":"tag-nist-sp800-207","10":"tag-sdp","11":"tag-43","12":"tag-44","13":"tag-zero-trust","14":"tag-59"},"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/22319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=22319"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/22319\/revisions"}],"predecessor-version":[{"id":22320,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/22319\/revisions\/22320"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=22319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=22319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=22319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}