ã¬ã¤ãã©ã¤ã³
ããã¯ã¢ããã¨ã¯ ããã¯ã¢ããã¨ããè¨èã¯ãã使ãã¾ãããããã¯ã¢ããã«ã¯ãããããªç¨®é¡ãããã¾ãã以ä¸ã«ããã¯ã¢ããã®ç¨®é¡ãã¾ã¨ãã¾ãã ã·ã¹ãã ããã¯ã¢ãã ã·ã¹ãã ããã¯ã¢ããã¨ã¯ãOSãã¢ããªã±ã¼ã·ã§ã³ãªã©ãå«ãã·ã¹ãã å ¨ä½ãããã¯ã¢ãâ¦
æ¦è¦ ããµã¤ãã¼ã¬ã¹ãã¥ã¼é(J-CRAT)æè¡ã¬ãã¼ã2017 ã¤ã³ã·ãã³ãçºçæã®åå調æ»ã®æå¼ãï½WindowsOSæ¨æºãã¼ã«ã§ææãè¦ã¤ããï½ãã§å¦ãã ãã¨ãã¾ã¨ãã¾ãã www.ipa.go.jp // J-CRATã¨ã¯ IPAã¯æ¨çåãµã¤ãã¼æ»æã®è¢«å®³æ¡å¤§é²æ¢ã®ããã2014å¹´7æ1â¦
ãã¯ã¬ã¸ããã«ã¼ãã»ã»ãã¥ãªãã£ã¬ã¤ãã©ã¤ã³ãï¼å®è¡è¨ç»ã®å¾ç¶ææ¸ï¼ã«ã¤ã㦠çºè¡æ©é¢ ï¼ã¯ã¬ã¸ããåå¼ã»ãã¥ãªãã£å¯¾çåè°ä¼ï¼æ¥æ¬ã¯ã¬ã¸ããåä¼ï¼ çºè¡å¹´ææ¥ï¼2020å¹´3æ www.j-credit.or.jp ã¯ã¬ã¸ããåå¼ã»ãã¥ãªãã£å¯¾çåè°ä¼ã¨ã¯ ã¯ã¬ã¸ããâ¦
ã¯ã©ã¦ããµã¼ãã¹å©ç¨ã®ããã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã¬ã¤ãã©ã¤ã³ çºè¡æ©é¢ï¼çµæ¸ç£æ¥ççºè¡å¹´ï¼2013å¹´ åè www.meti.go.jp https://www.meti.go.jp/policy/netsecurity/downloadfiles/cloudsec2013fy.pdf // æ¦è¦ ãã¯ã©ã¦ããµã¼ãã¹å©ç¨ã®ããã®æ â¦
æ¦è¦ ã¯ã©ã¦ãã®æ®åã¨å©ç¨ã®ä¿é²ã«ãããå½å ãæµ·å¤åãããæ§ã ãªãµã¼ãã¹ãå©ç¨ããæ©ä¼ãå¢ãã¦ãã¾ãããããããµã¼ãã¹ãå©ç¨ããå ´åãç¹ã«çµç¹ã«ããã¦ã¯é è¨ãããã¼ã¿ã®ä¿è·ã«é¢ããåãçµã¿ã«ã¤ãã¦èããå¿ è¦ãããã¾ããä»åã¯å人æ å ±ã«é¢ããâ¦
æ¦è¦ ãå®å ¨ãªã¦ã§ããµã¤ãã®ä½ãæ¹ãããã¿ãWebã¢ããªã®èå¼±æ§ã«ã¤ãã¦èª¿ã¹ããã¨ãã¾ã¨ãã¾ããã SQLã¤ã³ã¸ã§ã¯ã·ã§ã³ æ¦è¦ ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã®å¤ãã¯ãã¼ã¿ãã¼ã¹ã¨é£æºãã¦ãããã¦ã¼ã¶ã®å ¥åæ å ±ããSQLæä½æãã¾ããSQLæã®çµã¿ç«ã¦ã«åé¡ãâ¦
ã©ã³ãã³ã°åå ä¸ã»ãã¥ãªã㣠æ¦è¦ ISMAPã¨ã¯Information system Security Management and Assessment Programã®ç¥ã§ã æ¥æ¬èªã§ã¯ãæ¿åºæ å ±ã·ã¹ãã ã®ããã®ã»ãã¥ãªãã£è©ä¾¡å¶åº¦ãã¨å¼ã°ãã¾ãã ISMAPã¯ãã¯ã©ã¦ãã»ãã¤ã»ããã©ã«ãã®æ¹éãæã¡åºããâ¦
MITERã¨ã¯ MITREã¯ãç±³å½ã®é£é¦æ¿åºãè³éãæä¾ããéå¶å©çµç¹ã§ãããå½ã®å®å ¨æ§ã«é¢ããäºé ã«åãçµãã§ãã¾ãããµã¤ãã¼ã»ãã¥ãªãã£ã®åéã§ã¯ãNISTã®é£é¦ç 究éçºã»ã³ã¿ã¼ï¼Federally funded research and development centerï¼FFRDCï¼ã®éå¶ãè¡ãâ¦
SDPã®æ¦è¦ Software Defined Perimeterã¯ããããã¯ã¼ã¯ãçµç±ããæ§ã ãªè å¨ããã¤ã³ãã©ãæ å ±ãå®ãããã®æ©è½ã§ãã æè¿ã§ã¯ã¯ã©ã¦ããµã¼ãã¹ï¼ç¤¾å¤ã®ãµã¼ãã¹ï¼çã®æ´»ç¨ãå¢ããå¾æ¥ã®ãã¡ã¤ã¢ã¦ã©ã¼ã«çã使ã£ãå¢çåã»ãã¥ãªãã£ã§ã¯å®ãåããªããâ¦
æ¦è¦ ã³ããã®å½±é¿ãããæè¿ã¯ãªã¢ã¼ãã¯ã¼ã¯ãã«é¢ãã話é¡ãå¤ããªã£ã¦ãã¾ããããã«ä¼´ããWebä¼è°ã®ãã¼ã«ã®å©ç¨ãå¢ãã¦ãã¾ããWebä¼è°ãã¼ã«ã¯æ¥å以å¤ã«ããªã¢ã¼ã飲ã¿ãªã©ã«ã使ããã¦ãã¾ãããããã£ãä¸ã§ãç¬ç«è¡æ¿æ³äººæ å ±å¦çæ¨é²æ©æ§ã¯7æ1â¦
æ¦è¦ ãã£ãã·ã³ã°å¯¾çåè°ä¼ã§ã¯ããã£ãã·ã³ã°è©æ¬ºã®è¢«å®³ãé²ãããã«Webãµã¼ãã¹äºæ¥è ã«åãã対çãã¾ã¨ããã¬ã¤ãã©ã¤ã³ãå ¬éãã¦ãã¾ãã www.antiphishing.jp 2020年度çã§ã¯ãæè¿ã®è å¨ååãè¸ã¾ã対çè¦ä»¶ãè¦ç´ããã¾ããåªå 度ã®è¨å®ãè¦ç´ãâ¦
èæ¯ è²ã ãªITæè¡ã使ã£ããµã¼ãã¹ã次ã ã«ç»å ´ããå人æ å ±ãå«ããæ§ã ãªæ å ±ãæ´»ç¨ããã¦ãã¾ããå人æ å ±ä¿è·æ³ã§ã¯ãããã£ã社ä¼æ å¢ãè¸ã¾ããå¹³æ27å¹´ï¼2015å¹´ï¼ããããããã3å¹´ãã¨ã®è¦ç´ããï¼éå第12æ¡3é ï¼ãè¨ãã¾ããã å人æ å ±ä¿è·æ³ã¯â¦
Guidelines for Securing Wireless Local Area Networks(WLANs) NIST Special Publication 800-153 çºè¡å¹´ææ¥ï¼2012å¹´2æ https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf // æ¦è¦ ãã®ã¬ã¤ãã©ã¤ã³ã¯ãNISTãä¼æ¥ã®ç¡ç·LAâ¦
æ¿åºæ å ±ã·ã¹ãã ã«ãããã¯ã©ã¦ããµã¼ãã¹ã®å©ç¨ã«ä¿ãåºæ¬æ¹é çºè¡å¹´ææ¥ï¼2018å¹´6æ7æ¥ https://cio.go.jp/sites/default/files/uploads/documents/cloud_%20policy.pdf // æ¦è¦ å é£å®æ¿ITç·åæ¦ç¥å®¤ã¯ãæ¨æºã¬ã¤ãã©ã¤ã³ä»å±ææ¸ã«ãæ¿åºæ å ±ã·ã¹ãã â¦
å æ¥ãSonicwallã®è£½åè©ä¾¡ã«é¢ããè¨äºãèªã¿ã¾ããã blog.sonicwall.com ä¸è¨ã®è¨äºã«åºã¦ãããNetSecOpenãã«ã¤ãã¦èª¿ã¹ã¦ã¿ã¾ããã // NetSecOpenã¨ã¯ NetSecOPENã¯ããããã¯ã¼ã¯ã»ãã¥ãªãã£ãã³ãã¼çãåå ãã¦ãããä¼å¡å¶ã®éå¶å©å£ä½ã§ãããâ¦
åãæ¹æ¹é©ã®ããã®ãã¬ã¯ã¼ã¯å°å ¥ã¢ãã« çºè¡å¹´ææ¥ï¼2019å¹´6æçºè¡è ï¼ç·åç https://www.soumu.go.jp/main_content/000616262.pdf // æ¦è¦ã¨ç®ç ãåãæ¹æ¹é©ã®ããã®ãã¬ã¯ã¼ã¯å°å ¥ã¢ãã«ãã¯ããã¬ã¯ã¼ã¯å°å ¥ã®ããã®ãã¦ãã¦ããã©ã¯ãã£ã¹ãã¾ã¨ãâ¦
ã»ãã¥ãªãã£æ¥åãæ ã人æã®ã¹ãã«å¯è¦åã¬ã¤ãã©ã¤ã³ çºè¡è ï¼JNSA çºè¡å¹´ææ¥ï¼2019å¹´1æ18æ¥ https://www.jnsa.org/isepa/images/outputs/JTAG_guideline-%CE%B2_190118.pdf https://www.jnsa.org/isepa/images/outputs/JTAGreport2019.pdf // ç®ç JNSâ¦
ã»ãã¥ãªãã£ã§é¢é£ãã¦ããæ³å¾ã«ã¤ãã¦ã¾ã¨ãã¦ã¿ã¾ããã // ä¸æ£ã¢ã¯ã»ã¹ç¦æ¢æ³ ãä¸æ£ã¢ã¯ã»ã¹ç¦æ¢æ³ãã¯ãæ£å¼å称ãä¸æ£ã¢ã¯ã»ã¹è¡çºã®ç¦æ¢çã«é¢ããæ³å¾ãã§ããã2000å¹´ã«æ½è¡ãããã¤ã³ã¿ã¼ãããä¸ã§ã®ä¸æ£ãªã¢ã¯ã»ã¹ã«é¢ããæ³å¾ã®ãã¨ã§ãã â¦
ã³ã³ãã¥ã¼ã¿ã»ãã¥ãªãã£ã¤ã³ã·ãã³ã対å¿ã¬ã¤ã(NIST SP800 61)ãèªãã§ã¿ã¾ãããã¬ã¤ãã©ã¤ã³ã®æ¦è¦ãã¾ã¨ãã¾ãã ã³ã³ãã¥ã¼ã¿ã»ãã¥ãªãã£ã¤ã³ã·ãã³ã対å¿ã¬ã¤ã(NIST SP800 61)https://www.ipa.go.jp/files/000025341.pdf // æ¦è¦ ãã®ã¬ã¤ãã©ã¤ã³â¦
èªåã®åå¼·ã®ããã«ãCISãå ¬éãã¦ããè³æãèªãã§ã¿ã¾ããã www.cisecurity.org // CISã¨ã¯ CIS(Center for Internet Security)ã¯ãã»ãã¥ãªãã£æ¨é²ã®ããã®ã¢ã¡ãªã«ã®éå¶å©å£ä½ã§ãã»ãã¥ãªãã£ã®åºæºçãå ¬éãã¦ãã¾ãã www.jiten.com CISã«ã¯CIS â¦
ã¼ããã©ã¹ãã«ã¤ãã¦NISTã®ã¬ã¤ãã©ã¤ã³ï¼ãã©ããï¼ãå ¬éããã¦ãã¾ããã Draft NIST Special Publication 800-207(Zero Trust Architecture) https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207-draft.pdf å¾æ¥ã®ã»ãã¥ãªãã£ã¢ãâ¦
æ¦è¦ NIST SP800-40ã¯ãèå¼±æ§ã¨ãããã®ç®¡çã«ã¤ãã¦ã®ã¬ã¤ãã©ã¤ã³ã§ããæ¥æ¬èªçã«ã¤ãã¦ãIPAã§ã¯ãNIST SP 800-40 Version 2.0ï¼ãããããã³èå¼±æ§ç®¡çããã°ã©ã ã®çå®ï¼ããå ¬éãã¦ãããã¾ã¼ãã¼ã¸ã£ãã³æ ªå¼ä¼ç¤¾ã§ã¯ãRevision 3ï¼ã¨ã³ã¿ã¼ãã©ã¤â¦
ç§ç©ç«¯æ«ã®æ¥åå©ç¨ã«ãããã»ãã¥ãªãã£è¦ä»¶ã®èãæ¹ https://www.kantei.go.jp/jp/singi/it2/cio/hosakan/wg_report/byod.pdf // æ¦è¦ ãã®è³æã§ã¯ãBYOD(Bring Your Own Device=ç§ç©ç«¯æ«ãæ¥åã«å©ç¨ãããã¨)ã«ãããã»ãã¥ãªãã£ã®èãæ¹ã解説ãã¦ãâ¦
Pãã¼ã¯ã¨ã¯ ãã©ã¤ãã·ã¼ãã¼ã¯å¶åº¦ã¯ãæ¥æ¬ç£æ¥è¦æ ¼ãJIS Q 15001å人æ å ±ä¿è·ããã¸ã¡ã³ãã·ã¹ãã ï¼è¦æ±äºé ãã«é©åãã¦ãå人æ å ±ã®ä¿è·æªç½®ï¼PMSï¼ãæ´åãã¦ããäºæ¥è ãèªå®ããå¶åº¦ã§ãã ä¸è¬çãªå¾åã¨ãã¦ãæ¶è²»è ã®å人æ å ±ãé©åã«ç®¡çãã¦ãâ¦
ã·ã¹ãã ã«å¯¾ããè¦ä»¶ æ å ±ã·ã¹ãã ã¯ç¾ä»£ç¤¾ä¼ã«ããã¦å¿ è¦ä¸å¯æ¬ ãªæ§ã ãªæ©è½ãæä¾ãã¦ãã¾ããã¾ããæ å ±ã·ã¹ãã ã¯ç¤¾ä¼çã«éè¦ãªã¤ã³ãã©ã¨ãªã£ã¦ãããä¸è¨ã®æ©è½ä»¥å¤ã«å®å®ãã¦ãµã¼ãã¹ãæä¾ãããã¨ãæ±ãããã¾ãã æ©è½è¦ä»¶ã¨éæ©è½è¦ä»¶ æ©è½è¦ä»¶â¦
å人æ å ±ä¿è·æ³ã¨ã¯ å人æ å ±ä¿è·æ³ã¯ã2005å¹´4æã«æ½è¡ãããæ³å¾ã§å人æ å ±ãä¿è·ããããã®æ³å¾ã§ããæ½è¡ãåããåçåºãã¨ã«æ³æ¡ã§ä½¿ããã¦ããç¨èªããåæ¥çåãã®å®å ¨ç®¡çã®å ·ä½çãªä¾ãå ¬éããã¦ãã¾ãã å人æ å ±ã®ä¿è·ã«é¢ããæ³å¾ã«ã¤ãã¦ã®çµâ¦
ISO27000ã·ãªã¼ãºã«ã¤ã㦠ISO27000ãã¡ããªã¼ã¯ãå½éæ¨æºåæ©æ§ï¼ISOï¼ã¨å½éé»æ°æ¨æºä¼è°ï¼IECï¼ã«ãã£ã¦çå®ãããæ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã·ã¹ãã ã«é¢ããè¦æ ¼ç¾¤ã®ãã¨ã§ãä¸æ ¸ãæãISO27001ãå§ãã¨ããISMSã«é¢ãã第ä¸è èªè¨¼è¦æ ¼ã®ãã¨ã§ããâ¦
ãã¡ã¸ã³ã°å®è·µè³æ(ãã¹ããã¼ã¿ç·¨) çºè¡æ©é¢ï¼IPA çºè¡å¹´ææ¥ï¼2013å¹´11æ https://www.ipa.go.jp/files/000035160.pdf // æ¦è¦ ãã¡ã¸ã³ã°å®è·µè³æ(ãã¹ããã¼ã¿ç·¨)ã¯ããã¡ã¸ã³ã°ã§åé¡ãæ¤åºããããã®ããã¹ããã¼ã¿ãã«ç¦ç¹ãå½ã¦ãå®è·µè³æã§ããIPAâ¦
CSAã¨ã¯ ã¯ã©ã¦ãã»ãã¥ãªãã£ã¢ã©ã¤ã¢ã³ã¹ï¼CSAï¼ã¯ãã¯ã©ã¦ãå©ç¨ã«ããã£ã¦ã®ã»ãã¥ãªãã£ã®èãæ¹ã«ã¤ãã¦çºä¿¡ãã¦ããéå¶å©æ³äººå£ä½ã§ãã www.cloudsecurityalliance.jp // CCMã«ã¤ãã¦Cloud Controls Matrix(CCM)ã¯ãã¯ã©ã¦ããµã¼ãã¹ã®ã»ãã¥ãªãã£â¦
ã¦ã§ããµã¤ãã«ãããèå¼±æ§æ¤æ»ææ³ã®ç´¹ä»çºè¡æ©é¢ï¼IPAçºè¡å¹´ææ¥ï¼2013å¹´12æ www.ipa.go.jp https://www.ipa.go.jp/files/000035859.pdf // 2013å¹´ã¯èå¼±æ§ãåå ã§ãæ å ±æ¼æ´©ãªã©ã®ã¤ã³ã·ãã³ããå¤æ°çºçãã¾ããããã®ã¬ãã¼ãã§ã¯ã管çè ãã³ã¹ããâ¦