﻿{"id":31236,"date":"2023-12-22T13:09:44","date_gmt":"2023-12-22T04:09:44","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=31236"},"modified":"2023-12-22T13:09:44","modified_gmt":"2023-12-22T04:09:44","slug":"%e3%80%8c%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e6%8c%87%e9%87%9d%e3%81%a8%e3%81%aa%e3%82%8b%e5%8e%9f%e5%89%87%e3%80%8d%e3%82%92%e5%85%ac%e9%96%8b%e3%81%97%e3%81%be%e3%81%97%e3%81%9f","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=31236","title":{"rendered":"\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01"},"content":{"rendered":"<p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\u304c\u3001\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u306e\u300cZero Trust Guiding Principles\u300d\u306e\u7ffb\u8a33\u7248\u3067\u3059\u3002<\/p>\n<p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u754c\u5185\u3067\u306e\u69d8\u3005\u306a\u30e1\u30c3\u30bb\u30fc\u30b8\u3084\u3001\u78ba\u7acb\u3055\u308c\u305f\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u57fa\u6e96\u306e\u6b20\u5982\u304b\u3089\u3001\u8aa4\u89e3\u3055\u308c\u3084\u3059\u304f\u3001\u8907\u96d1\u306b\u306a\u308a\u3059\u304e\u3066\u3044\u307e\u3059\u3002\u6642\u306b\u306f\u3001\u88fd\u54c1\u306b\u5927\u304d\u304f\u4f9d\u5b58\u3057\u3066\u3044\u305f\u308a\u3001\u8a8d\u8a3c\u6280\u8853\u306b\u504f\u3063\u3066\u6271\u3063\u305f\u308a\u3057\u3066\u3044\u307e\u3059\u3002\u672c\u66f8\u306f\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068\u306f\u4f55\u304b\u3092\u660e\u78ba\u306b\u7406\u89e3\u3057\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3092\u8a08\u753b\u3001\u5b9f\u88c5\u3001\u904b\u7528\u3059\u308b\u969b\u306b\u899a\u3048\u3066\u304a\u304f\u3079\u304d\u6307\u91dd\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u771f\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u610f\u5473\u3092\u7406\u89e3\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2023\/12\/Zero-Trust-Guiding-Principles-072123-J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8WG\u304c\u3001\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=31236\" title=\"\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[97,203,204,121],"class_list":["post-31236","post","type-post","status-publish","format-standard","hentry","category-1","tag-97","tag-203","tag-204","tag-zero-trust"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/31236","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=31236"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/31236\/revisions"}],"predecessor-version":[{"id":31237,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/31236\/revisions\/31237"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=31236"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=31236"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=31236"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}