﻿{"id":35829,"date":"2024-12-09T15:27:21","date_gmt":"2024-12-09T06:27:21","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35829"},"modified":"2024-12-09T15:27:21","modified_gmt":"2024-12-09T06:27:21","slug":"%e3%80%8c%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%b3%e3%83%b3%e3%83%94%e3%83%a5%e3%83%bc%e3%83%86%e3%82%a3%e3%83%b3%e3%82%b0%e3%81%ab%e5%af%be%e3%81%99%e3%82%8b%e9%87%8d%e5%a4%a7%e3%81%aa%e8%84%85","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35829","title":{"rendered":"\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5bfe\u3059\u308b\u91cd\u5927\u306a\u8105\u5a012024\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002"},"content":{"rendered":"<p>\u7ffb\u8a33WG\u304c\u3001\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5bfe\u3059\u308b\u91cd\u5927\u306a\u8105\u5a012024\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u672c\u66f8\u306f\u3001CSA\u672c\u90e8\u304c\u516c\u958b\u3057\u3066\u3044\u308b\u300cTop Threats to Cloud Computing 2024\u300d\u306e\u65e5\u672c\u8a9e\u8a33\u306b\u306a\u308a\u307e\u3059\u3002<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2024\/12\/TopThreatstoCloudComputing202420240805_J.pdf\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044<\/a>\u3002<\/p>\n<p>CSA\u3067\u306f\u3001\u307b\u307c2\u5e74\u306b\u4e00\u5ea6\u3001\u6700\u65b0\u306e\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u91cd\u5927\u8105\u5a01\u30ec\u30dd\u30fc\u30c8\u3092\u516c\u958b\u3057\u3066\u3044\u307e\u3059\u3002\u30af\u30e9\u30a6\u30c9\u696d\u754c\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u306b\u3064\u3044\u3066\u3001500\u4eba\u4ee5\u4e0a\u306e\u696d\u754c\u5c02\u9580\u5bb6\u3092\u5bfe\u8c61\u306b\u8abf\u67fb\u3092\u884c\u3044\u307e\u3057\u305f\u3002\u56de\u7b54\u8005\u306f\u3001\u4eca\u5e74\u306e\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306b\u304a\u3051\u308b11\u306e\u91cd\u8981\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u3092\u7279\u5b9a\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u4eca\u56de\u306e\u30ec\u30dd\u30fc\u30c8\u306e\u7279\u5fb4\u3068\u3057\u3066\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u306b\u8d77\u56e0\u3059\u308b\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8ab2\u984c\u306b\u95a2\u3059\u308b\u9806\u4f4d\u304c\u4e0b\u304c\u308a\u7d9a\u3051\u3066\u304a\u308a\u3001IaaS\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u306f\u305d\u308c\u307b\u3069\u61f8\u5ff5\u3055\u308c\u308b\u3082\u306e\u3067\u306f\u306a\u3044\u3053\u3068\u304c\u3042\u3052\u3089\u308c\u307e\u3059\u3002\u307e\u305f\u3001\u4ee5\u4e0b\u306e4\u70b9\u304c\u91cd\u8981\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8ab2\u984c\u3068\u3057\u3066\u4e0a\u3052\u3089\u308c\u3066\u3044\u308b\u70b9\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u8a2d\u5b9a\u30df\u30b9\u3068\u4e0d\u5341\u5206\u306a\u5909\u66f4\u7ba1\u7406<\/li>\n<li>\u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u3068\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\uff08IAM\uff09<\/li>\n<li>\u30bb\u30ad\u30e5\u30a2\u3067\u306a\u3044\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9\u3084API<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3068\u6226\u7565\u306e\u6b20\u5982<\/li>\n<\/ul>\n<p>\u4ee5\u4e0a\u3001\u3088\u308d\u3057\u304f\u304a\u9858\u3044\u3044\u305f\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u7ffb\u8a33WG\u304c\u3001\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5bfe\u3059\u308b\u91cd <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=35829\" title=\"\u300c\u30af\u30e9\u30a6\u30c9\u30b3\u30f3\u30d4\u30e5\u30fc\u30c6\u30a3\u30f3\u30b0\u306b\u5bfe\u3059\u308b\u91cd\u5927\u306a\u8105\u5a012024\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[418],"class_list":["post-35829","post","type-post","status-publish","format-standard","hentry","category-1","tag-418"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35829"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35829\/revisions"}],"predecessor-version":[{"id":35832,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/35829\/revisions\/35832"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}