ãµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ãããã¬ã¼ã ã¯ã¼ã¯ã¨ISMSï½ç¬¬1å ãµã¤ãã¼çµå¶ã¬ã¤ãã¨CSF
2015å¹´12æã«çµæ¸ç£æ¥çããã³æ å ±å¦çæ¨é²æ©æ§ï¼ä»¥ä¸ãIPAï¼ããããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ããå ¬éããã¾ãããæ¬ã¬ã¤ãã©ã¤ã³ã«ã¯ããµã¤ãã¼æ»æããä¼æ¥ãå®ã観ç¹ã§ãçµå¶è ãèªèããå¿ è¦ã®ããååãæ示äºé ãªã©ãæ¸ããã¦ãã¾ããã¾ããããæ°å¹´ãæ¥æ¬ä»¥å¤ã®å½ããããµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ãããã¾ãã¾ãªãã¬ã¼ã ã¯ã¼ã¯ãå ¬éããã¦ãã¦ããããã®ããã¤ãã¯æ¥æ¬ã§ãå©ç¨ããã¦ãã¾ãã
ãããã®åãã¬ã¼ã ã¯ã¼ã¯ã«ã¯ãã©ã®ãããªéããããã®ã§ããããï¼ä¸è¬çã«ãã£ã¨ã使ç¨ãããã»ãã¥ãªãã£ã®ãã¬ã¼ã ã¯ã¼ã¯ã§ããISMSï¼ISO/IEC27001ã27002ï¼ã¨ã¯ã©ãéãã®ã§ããããï¼ããã§ã¯ä»£è¡¨çãªä»¥ä¸ã®4ã¤ã®ãã¬ã¼ã ã¯ã¼ã¯ãè¦ã¦ããã¾ãã
- ããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãï¼çµæ¸ç£æ¥çãIPAï¼
- ãéè¦ã¤ã³ãã©ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ãï¼ç±³å½ å½ç«æ¨æºæè¡ç 究æï¼
- ãCritical Security Controls for Effective Cyber Defenseãï¼ç±³å½ã®éå¶å©å£ä½Center for Internet Securityï¼
- ãStrategies to Mitigate Targeted Cyber Intrusionsãï¼ãªã¼ã¹ãã©ãªã¢ å½é²ä¿¡å·å±ï¼
ããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãã¨ã¯ï¼
ããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãã¯ã主ã«çµå¶è ãCISOï¼æé«æ å ±ã»ãã¥ãªãã£è²¬ä»»è ï¼ãªã©åãã«æ¸ããã¦ãããã®ã§ãçµå¶ã«ããããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã®ååããã³CISOãªã©ã«æ示ãã¹ãéè¦é ç®ã«ã¤ãã¦è¨è¼ããã¦ãã¾ãã
No. | |
---|---|
1 | ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ã¸ã®å¯¾å¿ã«ã¤ãã¦ãçµç¹ã®å å¤ã«ç¤ºãããã®æ¹éï¼ã»ãã¥ãªãã£ããªã·ã¼ï¼ãçå®ãããã¨ã |
2 | æ¹éã«åºã¥ã対å¿çãå®è£ ã§ãããããçµå¶è ã¨ã»ãã¥ãªãã£æ å½è ã両è ãã¤ãªã仲ä»è ã¨ãã¦ã®CISOçãããªãé©åãªç®¡çä½å¶ãæ§ç¯ãããã¨ããã®ä¸ã§ã責任ãæ確åãããã¨ã |
3 | çµå¶æ¦ç¥ãè¸ã¾ãã¦å®ãã¹ãè³ç£ãç¹å®ããã»ãã¥ãªãã£ãªã¹ã¯ãæ´ãåºãã¨ã¨ãã«ããã®ãªã¹ã¯ã¸ã®å¯¾å¦ã«åããè¨ç»ãçå®ãããã¨ã |
4 | è¨ç»ã確å®ã«å®æ½ãããæ¹åãå³ããããããPDCAãå®æ½ãããã¨ãã¾ãã対çç¶æ³ã«ã¤ãã¦ã¯ãCISOçãå®æçã«çµå¶è ã«å¯¾ãã¦å ±åãããã¨ã¨ãã«ãã¹ãã¼ã¯ãã«ãã¼ããã®ä¿¡é ¼æ§ãé«ããã¹ãé©åã«é示ãããã¨ã |
5 | ç³»åä¼æ¥ããµãã©ã¤ãã§ã¼ã³ã®ãã¸ãã¹ãã¼ããã¼ãå«ããèªç¤¾åæ§ã«PDCAã®éç¨ãå«ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çãè¡ããããã¨ã |
6 | PDCAã®éç¨ãå«ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã®çå®ãªå®æ½ã«åããå¿ è¦ãªäºç®ã®ç¢ºä¿ã人æè²æãªã©è³æºã®ç¢ºä¿ã«ã¤ãã¦æ¤è¨ãããã¨ã |
7 | ITã·ã¹ãã ã®éç¨ã«ã¤ãã¦ãèªç¤¾ã®æè¡åãå¹çæ§ãªã©ã®è¦³ç¹ããèªçµç¹ã§å¯¾å¿ããé¨åã¨ä»çµç¹ã«å§è¨ããé¨åã®é©åãªåãåãããããã¨ãã¾ããä»çµç¹ã«å§è¨ããå ´åã«ããã¦ããå§è¨å ã¸ã®æ»æãæ³å®ãããµã¤ãã¼ã»ãã¥ãªãã£ã®ç¢ºä¿ã確èªãããã¨ã |
8 | æ»æå´ã®ã¬ãã«ã¯å¸¸ã«åä¸ãããã¨ãããæ å ±å ±ææ´»åã«åå ããææ°ã®ç¶æ³ãèªç¤¾ã®å¯¾çã«åæ ãããã¨ãã¾ããå¯è½ãªéããèªç¤¾ã¸ã®æ»ææ å ±ãå ¬çãªæ å ±å ±ææ´»åã«æä¾ãããªã©ã«ãããåæ§ã®è¢«å®³ã社ä¼å ¨ä½ã«åºãããã¨ã®æªç¶é²æ¢ã«è²¢ç®ãããã¨ã |
9 | ãµã¤ãã¼æ»æãåããå ´åãè¿ éãªåå対å¿ã«ãã被害æ¡å¤§ãé²ããããCSIRTï¼ãµã¤ãã¼æ»æã«ããæ å ±æ¼ãããé害ãªã©ãã³ã³ãã¥ã¼ã¿ã»ãã¥ãªãã£ã«ãããã¤ã³ã·ãã³ãã«å¯¾å¦ããããã®çµç¹ï¼ã®æ´åããåå対å¿ããã¥ã¢ã«ã®çå®ãªã©ç·æ¥æã®å¯¾å¿ä½å¶ãæ´åãããã¨ãã¾ããå®æçãã¤å®è·µçãªæ¼ç¿ãå®æ½ãããã¨ã |
10 | ãµã¤ãã¼æ»æãåããå ´åã«åãã被害çºè¦å¾ã®éç¥å ãé示ãå¿ è¦ãªæ å ±é ç®ã®æ´çãããã¨ã¨ãã«ãçµç¹ã®å å¤ã«å¯¾ããçµå¶è ãã¹ã ã¼ãºã«å¿ è¦ãªèª¬æãã§ããããæºåãã¦ãããã¨ã |
å¼ç¨ï¼ããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãï¼çµæ¸ç£æ¥çãIPAï¼
ãªããå½ã¬ã¤ãã©ã¤ã³ã®æ¬æåã³ä»é²ã«ã¯ãä¸è¨ã®éè¦10é
ç®ããã¼ã¹ã¨ããå®æ½æ
å½è
ï¼ã·ã¹ãã é¨éãã»ãã¥ãªãã£é¨éã®æ
å½è
ï¼åãã®å¯¾çé
ç®ãæ¸ããã¦ãã¾ãã
ä¾ãã°ãéè¦é
ç®ï¼ã¯ã以ä¸ã®ããã«ãã¬ã¼ã¯ãã¦ã³ããã¦ãã¾ãã
ãªãããä»é²Cãå½éè¦æ ¼ISO/IEC27001åã³27002ã¨ã®é¢ä¿ããåç §ãããã¨ã§ããã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãã¨ã対å¿ããISMSã®è¦æ ¼è¦æ±äºé ã確èªãããã¨ãã§ããããã«ãªã£ã¦ãã¾ãã
ãéè¦ã¤ã³ãã©ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ï¼CSFï¼ãã¨ã¯ï¼
ãéè¦ã¤ã³ãã©ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ãï¼âFramework for Improving Critical Infrastructure Cybersecurityâï¼ã¯ã2014å¹´2æã«ç±³å½ã®å½ç«æ¨æºæè¡ç 究æï¼NISTï¼ããå
¬éããã¦ããããã®é¦è¨³çãIPAãå
¬éãã¦ãã¾ãã主ã«éè¦ã¤ã³ãã©ã«æºããä¼æ¥åãã«æ¸ããã¦ãã¾ããããã以å¤ã®çµç¹ã§ãååæ´»ç¨ã§ããå
容ã«ãªã£ã¦ããããCSFãã¨ãå¼ã°ãã¦æµ·å¤ã§ã¯æ¥éã«å©ç¨ãåºãã£ã¦ãã¾ãã
2015å¹´11æã«ãã©ã¤ã¹ã¦ã©ã¼ã¿ã¼ãã¦ã¹ã¯ã¼ãã¼ã¹æ ªå¼ä¼ç¤¾ãçºè¡¨ãããã°ãã¼ãã«æ
å ±ã»ãã¥ãªãã£èª¿æ»2016ãã«ããã¨ãã°ãã¼ãã«ä¼æ¥ã§ã®å½ãã¬ã¼ã ã¯ã¼ã¯ã®ä½¿ç¨ã¯35%ã¨ãªã£ã¦ãããISO/IEC27001ã®40%ã«è¿«ãå¢ãã¨ãªã£ã¦ãã¾ãï¼è¤æ°åçããã®æ°å¤ã§ãï¼ã
å½ãã¬ã¼ã ã¯ã¼ã¯ã¯ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çãããç¹å®ãããé²å¾¡ãããæ¤ç¥ããã対å¿ããã復æ§ãã®5ã¤ã®æ©è½ã«åé¡ãããããã®æ©è½ã22ã®ã«ãã´ãªã¼ã§ç¤ºãã¦ãã¾ãã
æ©è½ | ã«ãã´ãªã¼ | æ©è½ | ã«ãã´ãªã¼ |
---|---|---|---|
ç¹å® (ID) |
è³ç£ç®¡ç | æ¤ç¥ (DE) |
ç°å¸¸ã¨ã¤ãã³ã |
ãã¸ãã¹ç°å¢ | ã»ãã¥ãªãã£ã®ç¶ç¶çãªã¢ãã¿ãªã³ã° | ||
ã¬ããã³ã¹ | æ¤ç¥ããã»ã¹ | ||
ãªã¹ã¯ã¢ã»ã¹ã¡ã³ã | å¯¾å¿ (RS) |
対å¿è¨ç»ã®ä½æ | |
ãªã¹ã¯ç®¡çæ¦ç¥ | ä¼é | ||
é²å¾¡ (PR) |
ã¢ã¯ã»ã¹å¶å¾¡ | åæ | |
æèåä¸åã³ãã¬ã¼ãã³ã° | ä½æ¸ | ||
ãã¼ã¿ã»ãã¥ãªã㣠| æ¹å | ||
æ å ±ãä¿è·ããããã®ããã»ã¹ããã³æé | å¾©æ§ (RC) |
復æ§è¨ç»ã®ä½æ | |
ä¿å® | æ¹å | ||
ä¿è·æè¡ | ä¼é |
å¼ç¨ããã³ä¸é¨æç²ï¼ãéè¦ã¤ã³ãã©ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ãï¼IPAï¼
ããããã®ã«ãã´ãªã¼ã¯ãããã«ããã¤ãã®ãµãã«ãã´ãªã¼ã«åããã¦ããããµãã«ãã´ãªã¼ã¯å ¨é¨ã§98ã«ã®ã¼ãã¾ãã対çã®è¨è¿°ã¬ãã«ã¯ãã¾ãç´°ããã¯ãªããæè¡çãªæ段ã¾ã§ã¯è¨åãã¦ãã¾ãããä¾ãã°ããæ¤ç¥ãã¯ä»¥ä¸ã®ããã«ãã¬ã¼ã¯ãã¦ã³ããã¦ãã¾ãã
æ¬æã®ã表ï¼ããã¬ã¼ã ã¯ã¼ã¯ã³ã¢ãã«ã¯ãåãµãã«ãã´ãªã¼ã«é¢é£ããISMSã®ç®¡ççã確èªãããã¨ãã§ããããã«ãªã£ã¦ãã¾ãããµãã«ãã´ãªã¼ã«é¢é£ããISMSã®ç®¡ççã¯94ã«ã®ã¼ã£ã¦ãããISMS管ççãå ¨é¨ã§114ã§ãããã¨ãèããã¨ãéè¤ããç¯å²ã¯å¤ãã¨è¨ãã¾ãã
ä»åè¦ããµã¤ãã¼çµå¶ã¬ã¤ãã¨CSFã®2ã¤ã®ãã¬ã¼ã ã¯ã¼ã¯ã¯ããµã¤ãã¼æ»æã«å¯¾ããç´æ¥çãªå¯¾çãã®ãã®ã ãã§ãªãããã®å段ã¨ãªããå®ãã¹ãè³ç£ã®ç¹å®ããããªã¹ã¯ã¢ã»ã¹ã¡ã³ããã«ã¤ãã¦ãè¨è¼ããããã¨ãããæ¯è¼çã«ãã¼ç¯å²ãåºããISMSã¨ã®é¡ä¼¼æ§ãé«ãã¨è¨ãã¾ãã
次åã¯ããCritical Security Controls for Effective Cyber Defenseãããã³ãStrategies to Mitigate Targeted Cyber Intrusionsãã«ã¤ãã¦è¦ã¦ããããã¨æãã¾ãã
Writer Profile
ã»ãã¥ãªãã£äºæ¥é¨
ã»ãã¥ãªãã£ã³ã³ãµã«ãã£ã³ã°æ
å½ ãã¼ãã³ã³ãµã«ã¿ã³ã
æ¸ç° åä¹
Tweet