﻿{"id":39841,"date":"2025-08-21T10:31:30","date_gmt":"2025-08-21T01:31:30","guid":{"rendered":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=39841"},"modified":"2025-08-21T10:31:56","modified_gmt":"2025-08-21T01:31:56","slug":"%e3%80%8caicm%ef%bc%88ai-controls-matrix%ef%bc%89-v1-0%e3%80%80%e6%97%a5%e6%9c%ac%e8%aa%9e%e7%89%88%e3%80%8d%e3%81%abiso-iec42001%e3%81%a8%e3%81%ae%e3%83%9e%e3%83%83%e3%83%94%e3%83%b3%e3%82%b0","status":"publish","type":"post","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=39841","title":{"rendered":"\u300cAICM\uff08AI Controls Matrix\uff09 V1.0\u3000\u65e5\u672c\u8a9e\u7248\u300d\u306bISO\/IEC42001\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f\uff01"},"content":{"rendered":"<p>\u300cAICM V1.0 Based on\u00a0 CCM V4.1\u300d\u306e\u65e5\u672c\u8a9e\u7248\u306b\u3001<span style=\"color: #0000ff;\">ISO\/IEC42001\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f<\/span>\u3002\u4ee5\u4e0b\u306eAI\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u300c\u516c\u958b\u8cc7\u6599\u300d\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=29765\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=29765<\/a><\/p>\n<p>AI Controls Matrix(AICM)\u306f\u3001\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30a2\u3067\u4fe1\u983c\u6027\u306e\u9ad8\u3044AI\u30b7\u30b9\u30c6\u30e0\u306e\u305f\u3081\u306e\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3092\u63d0\u4f9b\u3059\u308b\u7ba1\u7406\u7b56\u96c6\u3067\u3059\u3002\u3053\u308c\u306f\u3001AI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u30ac\u30d0\u30ca\u30f3\u30b9\u306e\u305f\u3081\u306e\u6700\u521d\u306e\u30d9\u30f3\u30c0\u30fc\u30cb\u30e5\u30fc\u30c8\u30e9\u30eb\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u3057\u3066\u516c\u958b\u3055\u308c\u307e\u3057\u305f\u3002\u7d44\u7e54\u304cAI\u6280\u8853\u3092\u30bb\u30ad\u30e5\u30a2\u304b\u3064\u8cac\u4efb\u3042\u308b\u65b9\u6cd5\u3067\u958b\u767a\u3001\u5c0e\u5165\u3001\u304a\u3088\u3073\u6d3b\u7528\u3059\u308b\u305f\u3081\u306e\u652f\u63f4\u3092\u76ee\u7684\u3068\u3057\u305f\u7ba1\u7406\u7b56\u306e\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u306a\u308a\u307e\u3059\u3002\u7279\u306b\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u30d7\u30ed\u30d0\u30a4\u30c0\u306b\u5bfe\u3057\u3066\u3001AI\u7279\u6709\u306e\u30ea\u30b9\u30af\uff08\u30e2\u30c7\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30c7\u30fc\u30bf\u30d0\u30a4\u30a2\u30b9\u3001\u8aac\u660e\u8cac\u4efb\u306a\u3069\uff09\u306b\u5bfe\u3059\u308b\u7d71\u4e00\u7684\u306a\u7ba1\u7406\u7b56\u3092\u63d0\u793a\u3057\u3066\u3044\u307e\u3059\u3002<br \/>\n\u306a\u304a\u3001\u672c\u66f8\u306e\u5229\u7528\u306b\u3042\u305f\u3063\u3066\u306f\u3001\u307e\u305a\u300c<strong>AICM V1.0\u65e5\u672c\u8a9e\u7248\u306b\u3064\u3044\u3066<\/strong>\u300d\u306e\u30b7\u30fc\u30c8\u3092\u3054\u89a7\u3044\u305f\u3060\u304d\u3001\u5229\u7528\u65b9\u6cd5\u7b49\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002\u307e\u305f\u3001AICM\u306e\u6982\u8981\u306b\u3064\u3044\u3066\u306f\u3001<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2025\/07\/10\/ai-controls-matrix-aicm-%e9%80%9f%e5%a0%b1\/\" target=\"_blank\" rel=\"noopener\">\u3053\u3061\u3089\u306e\u30d6\u30ed\u30b0\u300cAI Controls Matrix (AICM) \u901f\u5831\u300d\u3092\u3054\u53c2\u7167\u304f\u3060\u3055\u3044<\/a>\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u300cAICM V1.0 Based on\u00a0 CCM  <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=39841\" title=\"\u300cAICM\uff08AI Controls Matrix\uff09 V1.0\u3000\u65e5\u672c\u8a9e\u7248\u300d\u306bISO\/IEC42001\u3068\u306e\u30de\u30c3\u30d4\u30f3\u30b0\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f\uff01\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[106,487,486,502],"class_list":["post-39841","post","type-post","status-publish","format-standard","hentry","category-1","tag-ai","tag-ai-controls-matrix","tag-aicm","tag-iso-iec42001"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/39841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=39841"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/39841\/revisions"}],"predecessor-version":[{"id":39843,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/posts\/39841\/revisions\/39843"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=39841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=39841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=39841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}