ã»ãã¥ãªãã£æç度ã¢ãã«ï¼ãã®1ï¼ ï½ã»ãã¥ãªãã£æç度ã¢ãã«ã®ååï½
ã½ããã¦ã§ã¢ã®éçºã«ããã¦ã¯ãç±³ã«ã¼ãã®ã¼ã¡ãã³å¤§å¦ã®ã½ããã¦ã§ã¢å·¥å¦ç 究æï¼SEIï¼ãéçºããCMMIï¼Capability Maturity Model Integrationï¼è½åæç度ã¢ãã«çµ±åï¼ã¨å¼ã°ããããã»ã¹ã®æç度ã¢ãã«ãããã
ã»ãã¥ãªãã£ã«é¢ãã¦ãã»ãã¥ãªãã£ã®ããã¸ã¡ã³ãåºæºããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã®ã¬ã¤ãã©ã¤ã³ãããã«ã»ãã¥ãªãã£ã®ç£æ»åºæºãªã©ãéçºãããå ¬éããã¦ãããæè¿ãã»ãã¥ãªãã£ã«é¢ããèªå·±è©ä¾¡ããããã®ã¬ã¤ãã©ã¤ã³ã¨ãã¦ãã»ãã¥ãªãã£ããã¸ã¡ã³ãã®æç度ãã½ããã¦ã§ã¢ã®ã»ãã¥ãªãã£æç度ãã»ãã¥ãªãã£å¯¾å¿çµç¹ã®æç度ãªã©ãã»ãã¥ãªãã£æç度ã«é¢ããè°è«ãè¡ããå種è³æãå ¬éããã¦ããã
æ¬å·ã§ã¯ãã»ãã¥ãªãã£æç度ã®ååã解説ãããã¯ããã«ãæç度ã®ååã«é¢ããæ¦è¦ã表ï¼ã«ç¤ºãããã ããæç度ã®åé¡æ¹æ³ã«ã¤ãã¦ã¯ãçè ãèããåé¡ã§ãããã»ãã¥ãªãã£æç度ãç¶²ç¾ çã«é¸å®ã§ãã¦ããªãå¯è½æ§ãããã
表1ãã»ãã¥ãªãã£æç度ã®æ¦è¦
1. ã»ãã¥ãªãã£ããã¸ã¡ã³ãã®æç度
1.1 C2M2
ï¼1ï¼C2M2
ç±³å½ã¨ãã«ã®ã¼çï¼DOE: Department of Energyï¼ãé»åæ¥çåãã®ã»ãã¥ãªãã£è½åæç度ã¢ãã«ï¼ ES-C2M2: Electricity Subsector Cybersecurity Capability Maturity Modelï¼ï¼å¾è¿°ï¼ã®ãã¼ã¸ã§ã³1.0ï¼2012å¹´5æï¼ãå ¬éãããç±³å½ã¨ãã«ã®ã¼çã¯ãES-C2M2ãã¨ã«ãé»åç¹æã®é¨åãé¤ãã¦ãµã¤ãã¼ã»ãã¥ãªãã£è½åæç度ã¢ãã«C2M2*1ãéçºããC2M2ã®ãã¼ã¸ã§ã³1.1ã2014å¹´2æã«ããã¼ã¸ã§ã³2.0ã2019å¹´6æã«å ¬éããã
C2M2ã¯ããªã¹ã¯ããã¸ã¡ã³ããè³ç£å¤æ´ããã³æ§æ管çãªã©10ã®é åãé åãã¨ã«39ã®ç®æ¨ãç®æ¨ã«å¯¾ããè¨299ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã«ããæ§æããã¦ããããã©ã¯ãã£ã¹ã«å¯¾ãã¦æç度ï¼MIL: Maturity Indicator Levelï¼ã1ï½3ã¬ãã«ã¾ã§è¨å®ããã¦ããã
ï¼2ï¼ES-C2M2ãONG-C2M2ãB-C2M2
ç±³å½ã¨ãã«ã®ã¼çããå½åå®å ¨ä¿éçï¼DHSï¼ã¨é£æºããç£æ¥çãæ°éã¨ååãã¦é»åæ¥çåãã®ãµã¤ãã¼ã»ãã¥ãªãã£è½åæç度ã¢ãã«ï¼ES-C2M2*2ï¼ãéçºãããES-C2M2ã®ãã¼ã¸ã§ã³1.0ã2012å¹´5æããã¼ã¸ã§ã³1.1ã2014å¹´2æã«å ¬éããã
ES-2M2ã¯ããªã¹ã¯ããã¸ã¡ã³ããè³ç£å¤æ´ããã³æ§æ管çãªã©10ã®é åãé åãã¨ã«37ã®ç®æ¨ãç®æ¨ã«å¯¾ããè¨312ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã«ããæ§æãããã¦ããããã©ã¯ãã£ã¹ã«å¯¾ãã¦æç度ï¼MIL: Maturity Indicator Levelï¼ã1ï½3ã¾ã§è¨å®ããã¦ããã
ONG-C2M2ï¼Oil and Natural Gas Subsector Cybersecurity Capability Maturity Modelï¼ã¯ãç±³å½ã¨ãã«ã®ã¼çãES-C2M2 ãã¼ã¸ã§ã³1.0ããã¨ã«ãç³æ²¹ããã³å¤©ç¶ã¬ã¹æ¥çåãã®ãµã¤ãã¼ã»ãã¥ãªãã£è½åæç度ã¢ãã«ï¼ONG-C2M2ï¼ã¨ãã¦éçºãããç¾å¨ãã¼ã¸ã§ã³1.1*3ï¼2014å¹´2æï¼ãå ¬éããã
ONG-C2M2ã¯ãç³æ²¹ããã³å¤©ç¶ã¬ã¹ã®æ¥çã«åãããã«ãå 容ãé¢é£å£ä½ãªã©ã«é¢ãã¦å çä¿®æ£ããããã10ã®è©ä¾¡é åã37ã®ç®æ¨ã312ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã¯ãES-C2M2ã¨åçã®å 容ã§ããã
B-C2M2ï¼Buildings Cybersecurity Capability Maturity Modelï¼ã¯ãç±³å½ã¨ãã«ã®ã¼çã®ç 究æ©é¢ã§ããPNNLï¼Pacific Northwest National Laboratoryï¼ï¼ãES-C2M2ããã¨ã«å»ºç©ç®¡çã«ç¦ç¹ãå½ã¦ãITã·ã¹ãã ã®ã©ã¤ããµã¤ã¯ã«å ¨ä½ã§æã¾ããã¬ãã«ã®ã»ãã¥ãªãã£ãç¶æããããã«ãç¹å®ã®é åãèå¥ããã®ãæ¯æ´ããããã«è¨è¨ããå ¬éãããB-C2M2ãã¼ã¸ã§ã³1.1ããå 容ãé¢é£å£ä½ãªã©ã«é¢ãã¦å çä¿®æ£ããããã10ã®è©ä¾¡é åã37ã®ç®æ¨ã312ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã¯ãES-C2M2ã¨åçã®å 容ã§ãããB-C2M2ã¯è©ä¾¡ç¨ã®ãã¼ã«ã¨ãã¦å ¬éããã*4 ã
1.2 CMMC
CMMCï¼Cybersecurity Maturity Model Certificationï¼*5ã¯ãç±³å½å½é²çï¼DoD: Department of Defenseï¼ãæ¤è¨ãé²ãã¦ãããµã¤ãã¼ã»ãã¥ãªãã£æç度ã¢ãã«ã®èªè¨¼ã§ããã
ç±³å½ã®å½é²ã«ããã¦ã¯ãéçºã調éãªã©ã¯ä¸çä¸ã®æ©é¢ãä¼æ¥ãªã©ã¨ãããããæã¡ãæ©å¯æ å ±ã®æ¼ãããç±³å½ã®çµæ¸ã¨å½å®¶ã®å®å ¨ä¿éãè ããå¯è½æ§ããããç±³å½å½é²çã¯ãæ¿åºãå¤äº¤ã»è»ãªã©ã®æ©å¯æ å ±ã®ãããªæ©å¯æ§ã§ã¯ãªããå ¬éãæ¼ãããããã¨æ¿åºãªã©ã«å¤§ããªå½±é¿ãããæ å ±ã管çãããéæ ¼ä»ãæ å ±ï¼NIST SP800-171*6ã®CUIï¼ã¨ãã¦ä¿è·ãããã¨ãè¦æ±ãã¦ãããç±³å½å½é²çã¯ããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã¨ãã¦ãå©å®³é¢ä¿è ã大å¦é¢é£ã®ç 究ã»ã³ã¿ã¼ãæ¥çã¨ååãã¦ããµã¤ãã¼ã»ãã¥ãªãã£æç度ã¢ãã«èªè¨¼ï¼CMMCï¼ãéçºãã¦ãããããã«ãå½é²ã«ããããä¸çä¸ã®æ©é¢ãä¼æ¥ã®CUIãä¿è·ããè½åãè©ä¾¡ããã¾ããä»å¾ã¯ããèªè¨¼ããã»ã¹ãæ¤è¨ããäºå®ã§ããã
CMMCã¯ãæç度ã¨ãã¦5ã¤ã®ã¬ãã«ãè¨å®ããã¦ããã2019å¹´8 æã«å ¬éããããã¼ã¸ã§ã³0.4ã§ã¯ãå®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã«é¢ãã¦ãã¢ã¯ã»ã¹ã³ã³ããã¼ã«ãªã©ã®18ã®é åãé åãã¨ã«84ã®æ©è½ï¼Capabilityï¼ã«ããæ§æããã¦ããããã®æ©è½ã«å¯¾ãã¦ã¬ãã«ãåãã¦377ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ãè¨å®ããã¦ãããã¾ããæç度ãéæããããã«ããã»ã¹ã«é¢ãã¦ã18ã®é åã«å¯¾ãã¦ãã¬ãã«ãåãã¦162ã®ããã»ã¹ãè¨å®ãããã
2019å¹´11æã«å ¬éãããCMMCãã¼ã¸ã§ã³0.6*7ã§ã¯ãããã»ã¹ã«é¢ãã¦Cybersecurity Governanceã®é åãåé¤ã17ã®é åãè¨å®ãæ©è½ï¼Capabilityï¼ã40ã«éç´ãããå®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ã219ã«è¨å®ãããããã ããã¬ãã«1ãã3ã¾ã§ã«ã¤ãã¦ãSP800-171ãªã©ã¨ã®ãããã³ã°ã¯è¨è¼ããã¦ããããã¬ãã«4ããã³5ã«ã¤ãã¦ã¯æ¤è¨ä¸ã§ã2020å¹´1æã«å ¬éäºå®ã®ãã¼ã¸ã§ã³1.0ãå¾ ã¤ãã¨ã«ãªãã
1.3 Cybersecurity Assessment Tool
ç±³å½é£é¦éèæ©é¢æ¤æ»åè°ä¼ï¼FFIEC: Federal Financial Institutions Examination Councilï¼ã¯ããµã¤ãã¼æ»æã®è å¨ã®æ¡å¤§ã«å¯¾å¿ããããã«ãåéèæ©é¢ã®ãªã¹ã¯ãèå¥ãããµã¤ãã¼ã»ãã¥ãªãã£ã®æç度ã¬ãã«ãè©ä¾¡ããããã®ã¢ã»ã¹ã¡ã³ããã¼ã«ï¼Cybersecurity Assessment Toolï¼ã2015å¹´6æã«å ¬è¡¨ãã2017å¹´5æã«æ´æ°çã®ã¢ã»ã¹ã¡ã³ããã¼ã«*8ãå ¬éããã
ã¢ã»ã¹ã¡ã³ããã¼ã«ã¯ãåºæãªã¹ã¯ã®èå¥ã¨ãµã¤ãã¼ã»ãã¥ãªãã£ã®æç度è©ä¾¡ã®2ã¤ã®ãã§ã¼ãºã«åããããåºæãªã¹ã¯ã®èå¥ã®è©ä¾¡ã¯ãããã¯ããã¸ã¼ã¨æ¥ç¶ã¿ã¤ãããªã©ã®5ã¤ã®ã«ãã´ãªã«åãããå ¨é¨ã§39ã®è³ªåé ç®ãè¨å®ãããããããã®è³ªåé ç®ã«å¯¾ãã¦ã5段éã§è©ä¾¡ãè¡ãããµã¤ãã¼ã»ãã¥ãªãã£æç度ã®è©ä¾¡ã¯ãããµã¤ãã¼ãªã¹ã¯ç®¡çã¨ç£ç£ããªã©5ã¤ã®é åã«ã¤ãã¦å ¨é¨ã§494ã®è³ªåé ç®ãããããéæã§ãã¦ããï¼ããªãï¼æ¡ä»¶ä»ãéæããåçããããã®2ã¤ã®ãã§ã¼ãºã®åçããæç度ãè©ä¾¡ããããã®è©ä¾¡ã¯Excelã®ãã¼ã«ã¨ãã¦å ¬éããã *9ã
1.4 IoT Security Maturity Model
IIC ï¼Industrial Internet Consortium ï¼ã¯ã2014å¹´3æã«è¨ç«ããããç£æ¥çã®è£½é ã®çµã¿ç«ã¦ããã¹ãããã³ãã¹ããã©ã¯ãã£ã¹ãä¿é²ãããã¨ã«ãããç£æ¥ãã¤ã³ã¿ã¼ãããã®æé·ãå éããããã«å¿ è¦ãªçµç¹ãæè¡ãæä¾ããã³ã³ã½ã¼ã·ã¢ã ã§ã ã¡ã³ãã¼ã«ã¯ãå°è¦æ¨¡ããã³å¤§è¦æ¨¡ãªçµç¹ã®æè¡è ããªã¼ãã¼ãç 究è ã大å¦ãæ¿åºæ©é¢ããæ§æããã¦ãããIICã¯ãITæ©å¨ã®äºæ¥è ãç£æ¥ç¨è¨åã®éç¨è ãã½ããã¦ã§ã¢ã®éçºè ãªã©ã対象ã¨ããæéããIoT Security Maturity Model : Practitioner's Guide*10ãã¨ãã¦2019å¹´2æã«å ¬éãããIoT Security Maturity Modelã¯ãç¾å¨ã®çµç¹ãã·ã¹ãã ã®ã»ãã¥ãªãã£æç度ãè©ä¾¡ããèªç¤¾ã® IoT ã«å¿ è¦ãªã»ãã¥ãªãã£æç度ã®ç®æ¨ã¬ãã«ãè¨å®ããããã«å©ç¨ãããã
IoT Security Maturity Modelã¯ãã¬ããã³ã¹ãæå¹åãå¼·åã®3ã¤ã®é åã«å¯¾ãã¦ãããããï¼ã¤ã®ãµãé åã18ã®å®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ãè¨å®ããã¦ãããæç度ã¯1ãã4ã®4ã¬ãã«ã§ãåå®æ½é ç®ï¼ãã©ã¯ãã£ã¹ï¼ãè©ä¾¡ãããããã«ãã±ã¼ã¹ã¹ã¿ãã£ããããèªç¤¾ã®éæ度ãæ¯è¼ãããã¨ãå¯è½ã§ããã
2. ã½ããã¦ã§ã¢ã®ã»ãã¥ãªãã£æç度
2.1 SAMM
ã¢ããªã±ã¼ã·ã§ã³ã½ããã¦ã¨ã¢ã®ã»ãã¥ãªãã£åä¸ã«é¢ããæ´»åãå±éããOWASPï¼Open Web Application Security Projectï¼ã¯ãçµç¹ãç´é¢ããåºæã®ãªã¹ã¯ã«å¿ããã½ããã¦ã§ã¢ã®ã»ãã¥ãªãã£å¯¾çã®ããã®æ¦ç¥ã®çå®ã»å®æ½ã®ããã®ãã¬ã¼ã ã¯ã¼ã¯ããã½ããã¦ã§ã¢ä¿è¨¼æç度ã¢ãã«ï¼SAMM: Software Assurance Maturity Model*11ï¼ã¨ãã¦ã2009å¹´3æã«ãã¼ã¸ã§ã³1*12ãå ¬éãã2017å¹´4æã«ãã¼ã¸ã§ã³1.5ãå ¬éããã
SAMMã¯ããã¬ããã³ã¹ãããæ§ç¯ãããæ¤è¨¼ãããé åãã®4ã¤ã®ãã¸ãã¹æ©è½ããããããããã®æ©è½ãã¨ã«ï¼ã¤ã®ã»ãã¥ãªãã£å¯¾çãè¨12ã®ã»ãã¥ãªãã£å¯¾çãè¨å®ããã¦ãããããããã®ã»ãã¥ãªãã£å¯¾çãã¨ã«ãè¤æ°ã®å®æ½é ç®ã3段éã®ã¬ãã«ã§è¨å®ããã¦ããããã®éæ度ããã§ãã¯ãããã¨ã«ãããå ¨ä½ã®ã»ãã¥ãªãã£ã®æç度ã¹ã³ã¢ãä½æããããã¨ã«ãªããæ¥çå¥ã®ã»ãã¥ãªãã£ä¿è¨¼ããã°ã©ã ã®ãã¼ããããã示ããã¦ãããè©ä¾¡ããçµæããã¨ã«æ¹åæ´»åã®åèã¨ãã¦å©ç¨ã§ããã
2.2 BSIMM
BSIMM*13ï¼Building Security In Maturity Modelï¼ã¯ãã»ãã¥ãªãã£éçºã®æç度ã¢ãã«ã§ããã2008å¹´ã«ä¼æ¥ã®ã½ããã¦ã§ã¢ã»ãã¥ãªãã£å¯¾çï¼ãã©ã¯ãã£ã¹ï¼ã®èª¿æ»ãè¡ããåä¼æ¥ã®å¯¾çç¶æ³ãå®éåããããã®ã¢ãã«ã¨ææ³ã¨ãã¦è¨å®ãããããã®ã¢ãã«ã®éçºã«ã¯ãç¾å¨120社ãåå ãã¦æ¤è¨ã調æ»ãé²ãããã¼ã¸ã§ã³ã¢ãããéãã2018å¹´11æã«ã¡ã¸ã£ã¼ãã¼ã¸ã§ã³9ï¼BSIMM9ï¼ãå ¬éããã
BSIMM9ã§ã¯ãã¬ããã³ã¹ãªã©ã®4ã¤ã®ãã¡ã¤ã³ã12ã®ãã©ã¯ãã£ã¹ã116ã®ã¢ã¯ãã£ããã£ãè¨å®ãããã®ã¢ã¯ãã£ããã£ã1ï½ï¼æ®µéã«ã¬ãã«ä»ãããã¦ãããããããã®ã¢ã¯ãã£ããã£ãéæã§ãã¦ããããè©ä¾¡ãããã¨ã§ãã»ãã¥ãªãã£éçºã®æç度ãè©ä¾¡ã§ãããã¾ããæ¥çå¥ã«èª¿æ»ããæç度ãå ¬éããã¦ãããããèªçµç¹ã¨ã®æ¯è¼è©ä¾¡ãã§ããã
3.ã»ãã¥ãªãã£ã®å¯¾å¿çµç¹ã®æç度
3.1 SIM3
SIM3ï¼Security Incident Management Maturity Model*14ï¼ã¯ãEUãä¸å¿ã«å©ç¨ããã¦ããã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã®ããã¸ã¡ã³ãã®æç度ã¢ãã«ã§ãããOpen CSIRTãFoundationã2019å¹´5æã«ãã¼ã¸ã§ã³1ãå ¬éããããã®ã¢ãã«ã¯ãCSIRTï¼Computer Security Incident Response Teamï¼ãæ§ç¯ãéç¨ããããã®æéã¨ãªããã®ã§ããã
SIM3ã§ã¯ãçµç¹ã人æããã¼ã«ãããã»ã¹ã®4ã¤ã®ã«ãã´ãªãããã«44ã®è©ä¾¡é ç®ãè¨å®ããã¦ãããæç度ã¯ã1ãã4ã®ã¬ãã«ãå®ç¾©ãã対å¿ãã¦ããªãã¬ãã«0ãå«ãã¦5段éã§è©ä¾¡ãè¡ãã
EUã®ãããã¯ã¼ã¯æ å ±ã»ãã¥ãªãã£æ©é¢ã§ããENISAï¼European Network and Information Security Agencyï¼ã¯ãSIM3ã®ã¢ãã«ããã¨ã«èªå·±è©ä¾¡ããããã®ãã¼ã«ï¼CSIRT Maturity - Self-assessment Tool*15ï¼ãå ¬éããã
3.2 ISOMM
ISOMMï¼ISOG-J SOC/CSIRT Maturity Modelï¼ã¯ãæ¥æ¬ãããã¯ã¼ã¯ã»ãã¥ãªãã£åè°ä¼ï¼JNSAï¼ã®é¨ä¼ã§ããISOG-Jï¼æ¥æ¬ã»ãã¥ãªãã£ãªãã¬ã¼ã·ã§ã³äºæ¥è åè°ä¼ï¼ã2018å¹´10æã«å ¬éããã»ãã¥ãªãã£å¯¾å¿çµç¹ã®æç度ãèªå·±è©ä¾¡ãããã§ãã¯ã·ã¼ãã§ãããã»ãã¥ãªãã£å¯¾å¿çµç¹ã¯CSIRTãSOCï¼Security Operation Centerï¼ãªã©ããããè¨ç½®ãã¦ããä¼æ¥ã«ãã£ã¦çµç¹å½¢æ ãç°ãªãããã«ãçµç¹ã®ã»ãã¥ãªãã£å¯¾å¿çµç¹ã«æ±ããããè¦ä»¶ãã¾ã¨ãæç度ãå®éåããå¯è¦åããããã®ãã®ã§ããã
ISOMMã§ã¯ããã»ãã¥ãªãã£å¯¾å¿çµç¹éå¶ããªã©ã®9ã®æ©è½ããã®æ©è½ã«å¯¾ãã¦54ã®å½¹å²ãå®ç¾©ããã¦ãããæç度ã¯ã対象å¤ãå«ãã¦6ã®ã¬ãã«ã§è©ä¾¡ããããISOMMã®èªå·±è©ä¾¡ã®ãã§ãã¯ã·ã¼ãã¯ãISOG-Jã®ãã¼ã ãã¼ã¸*16ã§å ¬éããã¦ããã
3.3 ãããã¯ãèå¼±æ§å¯¾çã»å¯¾å¿æç度ã·ã¼ã
ä¸çä¸ã®ã³ã³ãã¥ã¼ã¿ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã«å¯¾å¿ããä¼æ¥ã»çµç¹ã®ãã©ã¼ã©ã ã§ã¤ã³ã·ãã³ãé²æ¢ãæ¨é²ããæã権å¨ããçµç¹ã§ããFIRSTï¼Forum of Incident Response and Security Teams1ï¼ãã製åã»ãã¥ãªãã£ã¤ã³ã·ãã³ã対å¿ãã¼ã ï¼PSIRTï¼ã®ãã¬ã¼ã ã¯ã¼ã¯ãProduct Security Incident Response Teamï¼PSIRTï¼ Services Framework Version1.0*17ãã2018å¹´å¤ã«å ¬éããããã®ãã¬ã¼ã ã¯ã¼ã¯ã¯ãã¹ãã¼ã¯ãã©ã«ãããã¸ã¡ã³ããªã©6ã¤ã®ãµã¼ãã¹ã¨ãªã¢ãµã¼ãã¹ã¨ãªã¢ã«å¯¾ããè¨27ã®ãµã¼ãã¹ãè¨å®ããã¦ãããããããã®ãµã¼ãã¹ã«ã¯ãè¨84ã®æ©è½ãå®ç¾©ãããããããã®å®ç¾©ã«ã¤ãã¦ã¯ããã«ãµãæ©è½ãå®ç¾©ããã¦ããã
ä¸è¬ç¤¾å£æ³äººã³ã³ãã¥ã¼ã¿ã½ããã¦ã§ã¢åä¼ã¯ããPSIRT Service Framework Version 1.0 Draft æ¥æ¬èªæ訳*18ãããã¨ã«ãPSIRTã®è¨ç«ãé²ãã¦ããçµç¹ãPSIRTæ¥åã®å質ã®åä¸ãç®çã¨ãã¦ããããã¯ãèå¼±æ§å¯¾çã»å¯¾å¿æç度ã·ã¼ãããä½æãã2019å¹´4æã«å ¬éãããæ¬ã·ã¼ãã¯ã6ã®ãµã¼ãã¹ã¨ãªã¢ã®ãµã¼ãã¹ãã¨ã«ã¬ãã«0ãã5ã¾ã§ã®6段éã®æç度ãå®ç¾©ããã¦ããã
æ¬å·ã§ã¯ãã»ãã¥ãªãã£ã®æç度ã®ååã«ã¤ãã¦ã¾ã¨ãã¾ããã次å·ã§ã¯ãC2M2ã«ã¤ãã¦è§£èª¬ãã¾ãã
注é
- *1ï¼C2M2 version2.0
https://www.energy.gov/sites/prod/files/2019/08/f65/C2M2%20v2.0%2006202019%20DOE%20for%20Comment.pdf - *2ï¼ES-C2M2 version1.1
https://www.energy.gov/sites/prod/files/2014/02/f7/ES-C2M2-v1-1-Feb2014.pdf - *3ï¼ONG-C2M2
https://www.energy.gov/sites/prod/files/2014/03/f13/ONG-C2M2-v1-1_cor.pdf
é£é¦æ¿åºå¤ã®ã·ã¹ãã ã¨çµç¹ã«ããã管çãããéæ ¼ä»ãæ
å ±ã®ä¿è·
- *4ï¼B-C2M2
https://bc2m2.pnnl.gov/#h-rm-1 - *5ï¼CMMC version0.4
https://www.acq.osd.mil/cmmc/docs/cmmc-draft-model-30aug19.pdf - *6ï¼NIST SP800-171
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r1.pdf
https://www.ipa.go.jp/files/000057365.pdf - *7ï¼CMMC version0.6
https://www.acq.osd.mil/cmmc/docs/CMMC-V0.6b-20191107.pdf - *8ï¼FFIEC Cybersecurity Assessment Tool
https://www.ffiec.gov/cyberassessmenttool.htm - *9ï¼FSSCC Automated Cybersecurity Assessment Tool
https://www.fsscc.org/files/galleries/Copy_of_FSSCC_ACAT_v2.xlsx - *10ï¼IoT Security Maturity Model : Practitioner's Guide
https://iiconsortium.org/pdf/IoT_SMM_Practitioner_Guide_2019-02-25.pdf - *11ï¼Software Assurance Maturity Model
https://www.opensamm.org/ - *12ï¼Software Assurance Maturity Model Version 1.0
https://opensamm.org/downloads/SAMM-1.0.pdf
https://www.jpcert.or.jp/research/2010/SAMM_20100407.pdf - *13ï¼BSIMM
https://www.bsimm.com/ja-jp.html - *14ï¼SIM3
http://opencsirt.org/wp-content/uploads/2019/12/SIM3-mkXVIIIc.pdf - *15ï¼CSIRT Maturity - Self-assessment Tool
https://www.enisa.europa.eu/topics/csirts-in-europe/csirt-capabilities/csirt-maturity/csirt-maturity-self-assessment-survey - *16ï¼ISOMMã®èªå·±è©ä¾¡ã®ãã§ãã¯ã·ã¼ã
https://isog-j.org/output/2017/Textbook_soc-csirt_v2.2_maturity-checklist.xlsx - *17ï¼Product Security Incident Response Team ï¼PSIRTï¼ Services Framework Version 1.0
https://www.first.org/education/FIRST_PSIRT_Services_Framework_v1.0.pdf - *18ï¼PSIRT Service Framework Version 1.0 Draft æ¥æ¬èªæ訳
https://www.first.org/education/PSIRT_Services_Framework_v1.0_ja.pdf
Writer Profile
ã»ãã¥ãªãã£äºæ¥æ¬é¨
ã»ãã¥ãªãã£ã³ã³ãµã«ãã£ã³ã°äºæ¥é¨ ã³ã³ãµã«ãã£ã³ã°ãµã¼ãã¹æ
å½
ã¨ã°ã¼ã¯ãã£ãã³ã³ãµã«ã¿ã³ã
ãµã¤ãã¼ã»ãã¥ãªãã£æ¦ç¥æ¬é¨éè¦ã¤ã³ãã©å°é調æ»ä¼ å§å¡
æ¾ç° æ ä¹
Tweet