﻿{"id":24478,"date":"2022-09-03T16:44:36","date_gmt":"2022-09-03T07:44:36","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=24478"},"modified":"2022-10-04T16:26:18","modified_gmt":"2022-10-04T07:26:18","slug":"%e3%83%96%e3%83%ad%e3%82%b0%ef%bc%9a%e3%80%8c%e3%83%90%e3%82%a4%e3%82%aa%ef%bc%8f%e5%8c%bb%e7%99%82%e3%82%b5%e3%83%97%e3%83%a9%e3%82%a4%e3%83%81%e3%82%a7%e3%83%bc%e3%83%b3%e3%81%ae%e3%82%b5%e3%82%a4","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=24478","title":{"rendered":"\u30d6\u30ed\u30b0\uff1a\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u7ba1\u7406\u300d"},"content":{"rendered":"<p>CSA\u95a2\u897f\u304c\u30d6\u30ed\u30b0\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u7ba1\u7406\uff08<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/08\/17\/healthcare-supply-chain-cybersecurity-risk-management\/\">\u524d\u7de8<\/a>\u30fb<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2022\/09\/03\/healthcare-supply-chain-cybersecurity-risk-management_2\/\">\u5f8c\u7de8<\/a>\uff09\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>CSA\u95a2\u897f\u304c\u30d6\u30ed\u30b0\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=24478\" title=\"\u30d6\u30ed\u30b0\uff1a\u300c\u30d0\u30a4\u30aa\uff0f\u533b\u7642\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u7ba1\u7406\u300d\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[237],"tags":[],"class_list":["post-24478","post","type-post","status-publish","format-standard","hentry","category-237"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/24478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=24478"}],"version-history":[{"count":3,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/24478\/revisions"}],"predecessor-version":[{"id":25098,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/24478\/revisions\/25098"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=24478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=24478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=24478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}