ã¯ã©ã¦ã
ã¯ã©ã¦ããµã¼ãã¹å©ç¨ã®ããã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã¬ã¤ãã©ã¤ã³ çºè¡æ©é¢ï¼çµæ¸ç£æ¥ççºè¡å¹´ï¼2013å¹´ åè www.meti.go.jp https://www.meti.go.jp/policy/netsecurity/downloadfiles/cloudsec2013fy.pdf // æ¦è¦ ãã¯ã©ã¦ããµã¼ãã¹å©ç¨ã®ããã®æ â¦
ã©ã³ãã³ã°åå ä¸ã»ãã¥ãªã㣠æ¦è¦ ISMAPã¨ã¯Information system Security Management and Assessment Programã®ç¥ã§ã æ¥æ¬èªã§ã¯ãæ¿åºæ å ±ã·ã¹ãã ã®ããã®ã»ãã¥ãªãã£è©ä¾¡å¶åº¦ãã¨å¼ã°ãã¾ãã ISMAPã¯ãã¯ã©ã¦ãã»ãã¤ã»ããã©ã«ãã®æ¹éãæã¡åºããâ¦
æ¦è¦ GCPä¸ã§Wordpressãæ§ç¯ãã¾ãããä»åã®æ§ç¯ã§ã¯ä»¥ä¸ã®å 容ãå®æ½ãã¾ããã使ç¨ããã®ã¯ãã¹ã¦Googleãæä¾ãã¦ãããµã¼ãã¹ãå©ç¨ãã¾ãã MarketPlaceãå©ç¨ããWordpressç°å¢ã®æ§ç¯ Google Domainsã§ç¬èªãã¡ã¤ã³ãåå¾ Let's Encryptã使ã£ã¦HTTPâ¦
SDPã®æ¦è¦ Software Defined Perimeterã¯ããããã¯ã¼ã¯ãçµç±ããæ§ã ãªè å¨ããã¤ã³ãã©ãæ å ±ãå®ãããã®æ©è½ã§ãã æè¿ã§ã¯ã¯ã©ã¦ããµã¼ãã¹ï¼ç¤¾å¤ã®ãµã¼ãã¹ï¼çã®æ´»ç¨ãå¢ããå¾æ¥ã®ãã¡ã¤ã¢ã¦ã©ã¼ã«çã使ã£ãå¢çåã»ãã¥ãªãã£ã§ã¯å®ãåããªããâ¦
èæ¯ãªã© æè¿ã§ã¯ã¯ã©ã¦ãã®å©ç¨ãé²ãã§ãããæ§ã ãªä¼æ¥ãã¯ã©ã¦ãä¸ã«ã·ã¹ãã ãæ§ç¯ãããã¼ã¿ãæ ¼ç´ãã¦ãã¾ãã ascii.jp ã¯ã©ã¦ãã¯å¸¸ã«æ°ããæ©è½ãéçºããã¦ãããã¯ã©ã¦ãã«å¯¾ããç解ãæµ ãã¾ã¾ã·ã¹ãã ãæ§ç¯ããã¨ã»ãã¥ãªãã£ã®è¦³ç¹ããã¯èâ¦
èªåã®åå¼·ã®ããã«ãCISãå ¬éãã¦ããè³æãèªãã§ã¿ã¾ããã www.cisecurity.org // CISã¨ã¯ CIS(Center for Internet Security)ã¯ãã»ãã¥ãªãã£æ¨é²ã®ããã®ã¢ã¡ãªã«ã®éå¶å©å£ä½ã§ãã»ãã¥ãªãã£ã®åºæºçãå ¬éãã¦ãã¾ãã www.jiten.com CISã«ã¯CIS â¦
CSAã¨ã¯ ã¯ã©ã¦ãã»ãã¥ãªãã£ã¢ã©ã¤ã¢ã³ã¹ï¼CSAï¼ã¯ãã¯ã©ã¦ãå©ç¨ã«ããã£ã¦ã®ã»ãã¥ãªãã£ã®èãæ¹ã«ã¤ãã¦çºä¿¡ãã¦ããéå¶å©æ³äººå£ä½ã§ãã www.cloudsecurityalliance.jp // CCMã«ã¤ãã¦Cloud Controls Matrix(CCM)ã¯ãã¯ã©ã¦ããµã¼ãã¹ã®ã»ãã¥ãªãã£â¦
NISTã«ããã¯ã©ã¦ãã³ã³ãã¥ã¼ãã£ã³ã°ã®å®ç¾© çºè¡æ©é¢ï¼NISTçºè¡å¹´ææ¥ï¼2011å¹´9æ https://www.ipa.go.jp/files/000025366.pdf NISTã§ã¯ãã¯ã©ã¦ãã³ã³ãã¥ã¼ãã£ã³ã°ã5ã¤ã®åºæ¬çãªç¹å¾´ã¨ã3ã¤ã®ãµã¼ãã¹ã¢ãã«ãããã³4ã¤ã®å®è£ ã¢ãã«ã§å®ç¾©ãã¦ãã¾ãâ¦