ãµã¤ãã¼ã»ãã¥ãªãã£ã«é¢ãããã¬ã¼ã ã¯ã¼ã¯ã¨ISMS ï½ç¬¬2å CSC20ã¨Top35 Mitigation Strategies
ä»åãç´¹ä»ããï¼ã¤ã®ãã¬ã¼ã ã¯ã¼ã¯ã¯ã第ä¸åã§ç»å ´ãããã¬ã¼ã ã¯ã¼ã¯ã¨ã¯ç°ãªãã対çã®åªå
度ä»ããããã¦ããã®ãç¹å¾´ã§ããã¾ããåçå
¬é以éããã§ã«1å以ä¸æ´æ°ããã¦ãããå®æ度ãåä¸ãã¦ããã¨èãããã¾ãã
ããã§ã¯ã©ã®å¯¾çã®åªå
度ãé«ãã¨ããã¦ããã®ã§ããããï¼ãã®å
容ãè¦ã¦ããã¾ãããã
ãCritical Security Controls for Effective Cyber Defenseã(CSC20)ã¨ã¯ï¼
ãCritical Security Controls for Effective Cyber Defenseãï¼å¹æçãªãµã¤ãã¼é²å¾¡ã®ããã®éè¦ãªã»ãã¥ãªãã£ã³ã³ããã¼ã«ï¼ã¯ãVersion6.0ã2015å¹´10æã«ç±³å½ã®Center for Internet Securityããå ¬éããã¦ãã¾ãï¼ä»¥åã¯SANS Instituteããå ¬éï¼ãããã¯ããµã¤ãã¼æ»æã«å¯¾ããéè¦ãªã»ãã¥ãªãã£å¯¾çã20ã®ã³ã³ããã¼ã«ã«åé¡ã»åªå 度ä»ãããããã®ã§ã極åèªååãããæè¡ç対çã主ä½ã¨ãªã£ã¦ãã¾ãã
No. | ã³ã³ããã¼ã« | No. | ã³ã³ããã¼ã« |
---|---|---|---|
1 | 許å¯ããã³ç¡è¨±å¯ã®æ©å¨ã®ã¤ã³ãã³ã㪠| 11 | ãã¡ã¤ã¢ã¦ã©ã¼ã«ãã«ã¼ã¿ã¼ãã¹ã¤ãããªã©ã®ãããã¯ã¼ã¯æ©å¨ã®ã»ãã¥ã¢ãªæ§æ |
2 | 許å¯ããã³ç¡è¨±å¯ã®ã½ããã¦ã§ã¢ã®ã¤ã³ãã³ã㪠| 12 | å¢çé²å¾¡ |
3 | ã¢ãã¤ã«æ©å¨ãã©ããããããã¯ã¼ã¯ã¹ãã¼ã·ã§ã³ããµã¼ãã«ããããã¼ãã¦ã§ã¢ããã³ã½ããã¦ã§ã¢ã®ã»ãã¥ã¢ãªæ§æ | 13 | ãã¼ã¿ä¿è· |
4 | ç¶ç¶çãªèå¼±æ§è¨ºæã¨æ¹ä¿® |
14 | ç¥ãå¿ è¦æ§ã«åºã¥ããã管çãããã¢ã¯ã»ã¹ |
5 | 管çè
権éã®ã³ã³ããã¼ã«ãããä½¿ç¨ |
15 | ç¡ç·ã®ã¢ã¯ã»ã¹ã³ã³ããã¼ã« |
6 | ç£æ»ãã°ã®ä¿å®ãç£è¦ãããã³åæ |
16 | ã¢ã«ã¦ã³ãã®ã¢ãã¿ãªã³ã°ããã³ã³ã³ããã¼ã« |
7 | é»åã¡ã¼ã«ã¨Webãã©ã¦ã¶ã®ä¿è· | 17 | ä¸è¶³ãè£å®ããããã®ã»ãã¥ãªãã£ã¹ãã«è©ä¾¡ããã³é©åãªãã¬ã¼ãã³ã° |
8 | ãã«ã¦ã§ã¢é²å¾¡ |
18 | ã¢ããªã±ã¼ã·ã§ã³ã½ããã¦ã§ã¢ã®ã»ãã¥ãªã㣠|
9 | ãããã¯ã¼ã¯ãã¼ãããããã³ã«ããµã¼ãã¹ã®å¶éããã³ã³ã³ããã¼ã« | 19 | ã¤ã³ã·ãã³ã対å¿ã¨ç®¡ç |
10 | ãã¼ã¿å¾©æ§è½å | 20 | ãããã¬ã¼ã·ã§ã³ãã¹ãããã³ã¬ãããã¼ã ã«ããè¨ç·´ |
å¼ç¨ï¼ãCritical Security Controls for Effective Cyber Defenseãï¼Center for Internet Securityï¼
â»é¦è¨³çã¯å
¬éããã¦ãã¾ããã
ããããã®ã³ã³ããã¼ã«ã¯ãããã¤ãã®ãµãã³ã³ããã¼ã«ã«åããã¦ããããµãã³ã³ããã¼ã«ã¯å
¨é¨ã§150ã«ã®ã¼ãã¾ãã
ä¾ãã°ããç¶ç¶çãªèå¼±æ§è¨ºæã¨æ¹ä¿®ãã¯ä»¥ä¸ã®ããã«ãã¬ã¼ã¯ãã¦ã³ããã¦ãã¾ãã
20ã®ã³ã³ããã¼ã«ã¯ãã»ã¼ãã¹ã¦ãISMSã®ç®¡ççã«é¢ä¿ãã¦ããã¨èãããã¾ãããISMS管ççã¨ã®é¢é£ã示ãè³æã¯å
¬éããã¦ãã¾ããã
ãªããå½ææ¸ã®ãAppendixC: The NIST Framework for Improving Critical Infrastructure Cybersecurityããåç
§ãããã¨ã«ãã£ã¦ã20ã®ã³ã³ããã¼ã«ãNISTãéè¦ã¤ã³ãã©ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ãï¼ç¬¬ä¸åãåç
§ï¼ã®ã©ã®ã«ãã´ãªã¼ã«å¯¾å¿ãã¦ããã®ãã確èªãããã¨ãã§ãã¾ãã
ãStrategies to Mitigate Targeted Cyber Intrusionsã(Top35 Mitigation Strategies)ã¨ã¯ï¼
ãStrategies to Mitigate Targeted Cyber Intrusionsãï¼æ¨çåãµã¤ãã¼ä¾µå ¥ã®è»½æ¸æ¦ç¥ï¼ã¯ã2014å¹´2æã«2014å¹´çããªã¼ã¹ãã©ãªã¢ã®å½é²ä¿¡å·å±ããå ¬éããã¦ãã¾ããæ¨çåæ»æã主ãªè å¨ã¨æ³å®ããã»ãã¥ãªãã£å¯¾çããåªå 度é ã«35ã®ã«ãã´ãªã¼ã§ç¤ºãããã®ã§ãã
No. | 軽æ¸æ¦ç¥ | No. | 軽æ¸æ¦ç¥ |
---|---|---|---|
1 | ã¢ããªã±ã¼ã·ã§ã³ã®ãã¯ã¤ããªã¹ãã£ã³ã° | 19 | å ¨ã¦ã®ãã¡ã¤ã³ã«ãããWebãã¡ã¤ã³ã®ãã¯ã¤ããªã¹ãå |
2 | ã¢ããªã±ã¼ã·ã§ã³ã¸ã®ãããé©ç¨ |
20 | ãªããã¾ãé»åã¡ã¼ã«ã®ããã㯠|
3 | OSã®èå¼±æ§ã¸ã®ãããé©ç¨ |
21 | ã¯ã¼ã¯ã¹ãã¼ã·ã§ã³åã³ãµã¼ãã®è¨å®ç®¡ç |
4 | 管çè 権éã®å¶é | 22 | ãã¥ã¼ãªã¹ãã£ãã¯ãªææ³ã¨èªååããã¤ã³ã¿ã¼ãããåã®ã¬ãã¥ãã¼ã·ã§ã³ã»ã¬ã¼ãã£ã³ã°ãç¨ããã¢ã³ãã¦ã¤ã«ã¹ã½ãã |
5 | ã¦ã¼ã¶ã¼ã¢ããªã±ã¼ã·ã§ã³è¨å®ã®è¦å¡å | 23 | ã¯ã¼ã¯ã¹ãã¼ã·ã§ã³ããã¤ã³ã¿ã¼ãããã¸ã®ç´æ¥æ¥ç¶ã®æå¦ |
6 | èªååãããåç解æ |
24 | ãµã¼ãã»ã¢ããªã±ã¼ã·ã§ã³è¨å®ã®è¦å¡å |
7 | OSã«å¯¾ããä¸è¬çãªexploitã®è»½æ¸ã¡ã«ããºã |
25 | å¼·åºãªãã¹ã¯ã¼ãããªã·ã¼ã®å¼·å¶ |
8 | ãã¹ãåã®IDS/IPS |
26 | å¯æ¬ååã³æºå¸¯åã¡ãã£ã¢ã®ç®¡ç |
9 | ãã¼ã«ã«ç®¡çè
権éã®ç¡å¹å |
27 | SMBããã³NetBIOSã¸ã®ã¢ã¯ã»ã¹å¶é |
10 | ãããã¯ã¼ã¯ã®åå²åã³åé¢ |
28 | ã¦ã¼ã¶æè² |
11 | å¤è¦ç´ èªè¨¼ | 29 | ã¯ã¼ã¯ã¹ãã¼ã·ã§ã³ä¸ã®Microsoft Officeã®ãã¡ã¤ã«ã®æ¤æ» |
12 | å¤é¨ããå ¥ã£ã¦ãããããã¯ã¼ã¯ãã©ãã£ãã¯ãé®æããã½ããã¦ã§ã¢åã®ã¢ããªã±ã¼ã·ã§ã³ã»ãã¡ã¤ã¢ã¦ã©ã¼ã« | 30 | ã·ã°ããã£åã®ã¢ã³ãã¦ã¤ã«ã¹ã½ãã |
13 | å¤é¨ã¸åºã¦ãããããã¯ã¼ã¯ãã©ãã£ãã¯ãé®æããã½ããã¦ã§ã¢åã®ã¢ããªã±ã¼ã·ã§ã³ã»ãã¡ã¤ã¢ã¦ã©ã¼ã« | 31 | é»åã¡ã¼ã«ãµã¼ãéã®TLSæå·å |
14 | ä¸æçã«ä»®æ³åãã¤ãµã³ãããã¯ã¹åãããä¿¡é ¼ã§ããéç¨ç°å¢ | 32 | IPã¢ãã¬ã¹ã«ãã£ã¦Webãµã¤ãã«ã¢ã¯ã»ã¹ãã試ã¿ã®ããã㯠|
15 | æååã¯å¤±æããã³ã³ãã¥ã¼ã¿ã¤ãã³ãã®ä¸å åãã¤åæããããã°ã®åå¾ | 33 | ãããã¯ã¼ã¯åã®IDSï¼IPS |
16 | 許å¯ãããåã¯é®æããããããã¯ã¼ã¯ã¤ãã³ãã®ä¸å åãã¤åæããããã°ã®åå¾ | 34 | ã²ã¼ãã¦ã§ã¤ã®ãã©ãã¯ãªã¹ãå |
17 | é»åã¡ã¼ã«ã³ã³ãã³ãã®ãã£ã«ã¿ãªã³ã° |
35 | ãããã¯ã¼ã¯ãã©ãã£ãã¯ã®ãã£ãã㣠|
18 | Webã³ã³ãã³ãã®ãã£ã«ã¿ãªã³ã° |
å¼ç¨ï¼ãStrategies to Mitigate Targeted Cyber Intrusionsãï¼ãªã¼ã¹ãã©ãªã¢å½é²ä¿¡å·å±ï¼
â»é¦è¨³çã¯å
¬éããã¦ãã¾ããã
ããããã®è»½æ¸æ¦ç¥ã¯ãããã«ä¸ä½ã«ç´°ååããã¦ã¯ãã¾ãããã軽æ¸çã®èª¬æãè¨è¼ããã¦ãã¾ããä¾ãã°ããã¢ããªã±ã¼ã·ã§ã³ã¸ã®ãããé©ç¨ãã¯ä»¥ä¸ã®èª¬æãè¨è¼ããã¦ãã¾ãã
35ã®è»½æ¸æ¦ç¥ããã»ã¼ãã¹ã¦ãISMSã®ç®¡ççã«é¢ä¿ãã¦ããã¨èãããã¾ãããISMS管ççã¨ã®é¢é£ã示ãè³æã¯å ¬éããã¦ãã¾ããããªãã35ã®è»½æ¸æ¦ç¥ã¯ããµã¤ãã¼æ»æã®ä¸ã§ãæ¨çåæ»æã主ãªè å¨ã¨æ³å®ãã対çã§ãããã¨ã«æ³¨æãå¿ è¦ã§ãã
ã¾ã¨ã
ããã¾ã§è¦ã¦ããï¼ã¤ã®ãã¬ã¼ã ã¯ã¼ã¯ã並ã¹ãã¨ã以ä¸ã®éããè¦ããã¾ãã(2016å¹´7æç¾å¨)
â | ãã¬ã¼ã ã¯ã¼ã¯ | 対象çµç¹ | æ¦è¦ | å ¬éææ |
---|---|---|---|---|
1 | ãµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ | 大ä¼æ¥åã³ä¸å°ä¼æ¥ï¼å°è¦æ¨¡äºæ¥è é¤ãï¼ã®ãã¡ãITã«é¢ããã·ã¹ãã ããµã¼ãã¹çãä¾çµ¦ããä¼æ¥åã³çµå¶æ¦ç¥ä¸ï¼©ï¼´ã®å©æ´»ç¨ãä¸å¯æ¬ ã§ããä¼æ¥ | ãµã¤ãã¼æ»æããä¼æ¥ãå®ã観ç¹ã§ãçµå¶è
ãèªèããå¿
è¦ã®ããã3ååããåã³CISOçã«æ示ãã¹ããéè¦10é
ç®ããã¾ã¨ãããã®ã ä»é²ã«æè¡ç対çã®ä¾ãæ²è¼ã |
2015å¹´12æ (çµæ¸ç£æ¥çãIPA) |
2 | Framework for Improving Critical Infrastructure Cybersecurityï¼éè¦ã¤ã³ãã©ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãåä¸ãããããã®ãã¬ã¼ã ã¯ã¼ã¯ï¼ | éè¦ã¤ã³ãã©ã«æºããä¼æ¥ | ãµã¤ãã¼ã»ãã¥ãªãã£ã®ææãéæããããã®å¯¾çã¨ãã¦ããç¹å®ãããé²å¾¡ãããæ¤ç¥ããã対å¿ããã復æ§ãã®5ã¤ã®æ©è½ãããããã®æ©è½ãç´°ååãã22ã®ã«ãã´ãªã¼ã«ã¤ãã¦ç¤ºãããã®ã | 2014å¹´2æ (ç±³å½å½ç«æ¨æºæè¡ç 究æ) |
3 | Critical Security Controls for Effective Cyber Defenseï¼å¹æçãªãµã¤ãã¼é²å¾¡ã®ããã®éè¦ãªã»ãã¥ãªãã£ã³ã³ããã¼ã«ï¼ | ï¼å¯¾è±¡ãéå®ãã¦ããªãï¼ | ãµã¤ãã¼æ»æã«å¯¾ããéè¦ãªã»ãã¥ãªãã£å¯¾çã20ã®ã³ã³ããã¼ã«ã«åé¡ããåªå 度ä»ãããããã®ãããããã³ã³ããã¼ã«ã®ãµãã³ã³ããã¼ã«ãåªå 度ä»ããããã¦ããã | Version6.0 2015å¹´10æ (Center for Internet SecurityãSANS Institute) |
4 | Strategies to Mitigate Targeted Cyber Intrusionsï¼æ¨çåãµã¤ãã¼ä¾µå ¥ã®è»½æ¸æ¦ç¥ï¼ | ï¼å¯¾è±¡ãéå®ãã¦ããªãï¼ | 主ã«æ¨çåæ»æã対象ã¨ãã35ã®ã»ãã¥ãªãã£å¯¾çãåªå 度é ã«ä¸¦ã¹ããã®ã | 第2ç 2014å¹´2æ (ãªã¼ã¹ãã©ãªã¢å½é²ä¿¡å·å±) |
ï¼ã¤ã®ãã¬ã¼ã ã¯ã¼ã¯ã®ä½ç½®ã¥ããè¦ãã¨ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã¨ãã¦ããã¹ããã¨ã®å
¨ä½çãªæ´çã«é©ãã¦ããã®ã¯ãããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãåã³ããéè¦ã¤ã³ãã©ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãåä¸ãããããã®ãã¬ã¼ã ã¯ã¼ã¯ãã¨èãããã¾ãã
ä¸æ¹ãå
·ä½çãªå¯¾çã®æ¤è¨ã«ã¯ããCritical Security Controls for Effective Cyber Defenseãåã³ãStrategies to Mitigate Targeted Cyber Intrusionsããåèã«ã§ãã¾ããã¾ããããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ãã®ä»é²åã³ä»é²ã«è¨è¼ã®åèæç®ã対çã®æ¤è¨ã«å½¹ç«ã¡ã¾ãã
å®éã«ã¯ãåã ã®çµç¹ã«ãã£ã¦äºæ¥ãã·ã¹ãã æ§æçã®ç¶æ³ã¯å¤§ããç°ãªããããå®ãã¹ãè³ç£ããªã¹ã¯ãæ£ç¢ºã«ææ¡ããããã§å¯¾çã®æ¤è¨ã»å°å ¥ãé²ãããã¨ãæã¾ãã¾ãã
Writer Profile
ã»ãã¥ãªãã£äºæ¥é¨
ã»ãã¥ãªãã£ã³ã³ãµã«ãã£ã³ã°æ
å½ ãã¼ãã³ã³ãµã«ã¿ã³ã
æ¸ç° åä¹
Tweet