﻿{"id":28577,"date":"2023-06-01T09:36:16","date_gmt":"2023-06-01T00:36:16","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=28577"},"modified":"2023-06-01T09:37:10","modified_gmt":"2023-06-01T00:37:10","slug":"%e3%83%96%e3%83%ad%e3%82%b0%e3%80%8c%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e3%81%ae2%e3%81%a4%e3%81%ae%e6%88%90%e7%86%9f%e5%ba%a6%e3%83%a2%e3%83%87%e3%83%ab%e3%82%92%e7%90%86%e8%a7%a3","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=28577","title":{"rendered":"\u30d6\u30ed\u30b0\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e2\u3064\u306e\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3092\u7406\u89e3\u3059\u308b\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002"},"content":{"rendered":"<p>\u672c\u30d6\u30ed\u30b0\u306f\u3001CSA\u672c\u90e8\u306e\u30d6\u30ed\u30b0\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u300cUnderstanding the Two Maturity Models of Zero Trust\u300d\u306e\u65e5\u672c\u8a9e\u8a33\u3068\u306a\u308a\u307e\u3059\u3002<\/p>\n<p>\u672c\u30d6\u30ed\u30b0\u306f\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3092\u6700\u521d\u306b\u63d0\u5531\u3057\u305fJohn Kindervag\u304cCSA\u672c\u90e8\u306e\u30d6\u30ed\u30b0\u306b\u6295\u7a3f\u3057\u305f\u8a18\u4e8b\u306e\u65e5\u672c\u8a9e\u8a33\u3067\u3059\u3002<\/p>\n<p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3092\u884c\u3046\u306b\u3042\u305f\u3063\u3066\u3001\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3092\u7528\u3044\u308b\u3053\u3068\u306f\u91cd\u8981\u3067\u3059\u3002\u672c\u30d6\u30ed\u30b0\u3067\u306f\u3001Forrester ZTX\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068CISA\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3092\u6bd4\u8f03\u3057\u306a\u304c\u3089\u3001\u77ed\u671f\u9593\u3067\u9032\u6357\u3092\u78ba\u8a8d\u3067\u304d\u308b\u65b9\u6cd5\u3092\u89e3\u8aac\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2023\/06\/01\/%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e3%81%ae2%e3%81%a4%e3%81%ae%e6%88%90%e7%86%9f%e5%ba%a6%e3%83%a2%e3%83%87%e3%83%ab%e3%82%92%e7%90%86%e8%a7%a3%e3%81%99%e3%82%8b\/\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30d6\u30ed\u30b0\u306b\u30a2\u30af\u30bb\u30b9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u672c\u30d6\u30ed\u30b0\u306f\u3001CSA\u672c\u90e8\u306e\u30d6\u30ed\u30b0\u306b\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u300cU <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=28577\" title=\"\u30d6\u30ed\u30b0\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e2\u3064\u306e\u6210\u719f\u5ea6\u30e2\u30c7\u30eb\u3092\u7406\u89e3\u3059\u308b\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,237],"tags":[121],"class_list":["post-28577","post","type-post","status-publish","format-standard","hentry","category-2","category-237","tag-zero-trust"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/28577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=28577"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/28577\/revisions"}],"predecessor-version":[{"id":28579,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/28577\/revisions\/28579"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=28577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=28577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=28577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}