﻿{"id":35357,"date":"2024-10-16T21:59:06","date_gmt":"2024-10-16T12:59:06","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35357"},"modified":"2024-10-16T21:59:06","modified_gmt":"2024-10-16T12:59:06","slug":"%e3%80%8c%e3%82%bc%e3%83%ad%e3%83%88%e3%83%a9%e3%82%b9%e3%83%88%e6%8c%87%e9%87%9d%e3%81%a8%e3%81%aa%e3%82%8b%e5%8e%9f%e5%89%87%e3%80%8d%e6%9b%b4%e6%96%b0%e7%89%88%e3%82%92%e5%85%ac%e9%96%8b%e3%81%97","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35357","title":{"rendered":"\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\u66f4\u65b0\u7248\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01"},"content":{"rendered":"<p>\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u300cZero Trust Guiding Principles\u300d\u306e\u65e5\u672c\u8a9e\u7248\u3067\u3001\u539f\u6587\u306e\u66f4\u65b0\uff082024\/9\/3\uff09\u3092\u53cd\u6620\u3055\u305b\u305f\u3082\u306e\u3067\u3059\u3002\u65b0\u305f\u306b\u3001AI\u306e\u8a18\u8ff0\u3092\u8ffd\u52a0\u3057\u3001AI\u304c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306e\u5b9f\u65bd\u3092\u652f\u63f4\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3042\u308b\u3053\u3068\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u539f\u5247\u304cAI\u30e2\u30c7\u30eb\u3084\u8a13\u7df4\u30c7\u30fc\u30bf\u3092\u542b\u3080AI\u306e\u4f7f\u7528\u3092\u78ba\u4fdd\u3059\u308b\u969b\u306b\u9069\u7528\u3055\u308c\u308b\u3053\u3068\u3092\u8aac\u660e\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2024\/10\/Zero-Trust-Guiding-Principles-20240903-J.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167\u3057\u3066\u304f\u3060\u3055\u3044<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u300cZero Tru <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35357\" title=\"\u300c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u6307\u91dd\u3068\u306a\u308b\u539f\u5247\u300d\u66f4\u65b0\u7248\u3092\u516c\u958b\u3057\u307e\u3057\u305f\uff01\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[106,413,121,319],"class_list":["post-35357","post","type-post","status-publish","format-standard","hentry","category-1","tag-ai","tag-413","tag-zero-trust"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35357"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35357\/revisions"}],"predecessor-version":[{"id":35358,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35357\/revisions\/35358"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}