ãµãã©ã¤ãã§ã¼ã³ã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ã 第6å ï½ NIST SP800-161ãä¸å¿ã«è§£èª¬
ãã®ã³ã©ã ã®ç¬¬5åã¾ã§ã¯ISOã§ã®ãµãã©ã¤ãã§ã¼ã³ã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ããç¹ã«ISO/IEC 27036ãä¸å¿ã«è§£èª¬ãã¦ãã¾ãããããããã¯ãNIST(National Institute of Standards and Technologyï¼ç±³å½æ¨æºæè¡ç 究æ)1ã§ä½æããããµãã©ã¤ãã§ã¼ã³ã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãæ¨æºã§ããNIST SP800-161[1]ã«ã¤ãã¦è§£èª¬ãã¾ãããã®åã«ãã¾ãNISTã§ä½æãããæ¨æºã®ä½ç½®ã¥ãããã³SP 800-161ãä½æãããã«è³ã£ãèæ¯ã確èªãã¦ããã¾ãããã
1. NISTã«ããSP800-161ä½æã®èæ¯
FISMAï¼Federal Information Security Management Actï¼é£é¦æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãæ³)
ç±³å½ã§ã¯ã2002å¹´ã«FISMA[2]ãå¶å®ããã¾ãããããã¯ãé£é¦æ¿åºæ å ±ã»ãã¥ãªãã£è¿ä»£åæ³ãé称E-Government Actã®Part3ã«ç¸å½ãããã®ã§ãç±³å½ã«ãããé»åæ¿åºãæ¨é²ããã«ããã£ã¦ã®ãæ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã«é¢ããæ³å¾ã§ãããã®ä¸ã§ã¯ã
- â æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã®å®ç¾ã«ããã£ã¦å¹ççãªå¯¾å¿ãåãããã«ããªã¹ã¯ãã¼ã¹ã¢ããã¼ãããªãã¡æ¿åºæ©é¢ã®ããã·ã§ã³ãã©ã®ç¨åº¦éè¦ã§ãããã«åºã¥ãã¦ãã®æ å ±ã·ã¹ãã ãè©ä¾¡ãããæ å ±ã»ãã¥ãªãã£å¯¾çã®åªå 度ã決å®ãããã¨ã§ãçµæ¸çãªæ å ±ã»ãã¥ãªãã£ç®¡ççãåããã¨ãæ±ãããã¦ãã¾ãã
- â¡ ãããå®è¡ããããã«ãNISTã«å¯¾ãã¦ç±³å½æ¿åºæ©é¢å ±éã®æ å ±ã»ãã¥ãªãã£è¦æ ¼ãã¬ã¤ãã³ã¹ãä½æãããã¨ã決ãããã¦ãã¾ããããã§è¨ããé£é¦æ¿åºæ©é¢ã«ã¯ããããè»æãã¯å½å®¶å®å ¨ä¿éã·ã¹ãã ï¼æ å ±æ©é¢çã®ã·ã¹ãã ï¼2ã¯å¯¾è±¡ã¨ããã¦ãã¾ããã§ãããã¤ã¾ããNISTã®æ¨æºã¯ããã¾ã§ç±³å½æ¿åºæ©é¢ããã³ãã®ã³ã³ãã©ã¯ã¿ã¼ã«é©ç¨ããããã®ã¨ãã¦ã¹ã¿ã¼ããã¾ããã
以ä¸ãèæ¯ã«ãNISTã«ããFIPS199(é£é¦æ¿åºã®ã»ãã¥ãªãã£åé¡è¦æ ¼(2004)[3])ãFIPS 200(æä½éã®ã»ãã¥ãªãã£è¦æ±äºé (2006)[4])ããã³RMF(Risk Management Framework)ãè¦æ ¼åããã¾ãããFIPS199ã¯ãªã¹ã¯ãã¼ã¹ã¢ããã¼ããåãå ´åã«å¿ è¦ãªãæ å ±ããã³æ å ±ã·ã¹ãã ã®ãªã¹ã¯ãã¼ã¹ã§ã®éè¦åº¦ã®åé¡ã®èãæ¹ãFIPS200ã¯ãã®åé¡ã«åºã¥ãæ å ±ããã³æ å ±ã·ã¹ãã ã«å¯¾ããæä½éã®æ å ±ç®¡ççãã¾ã¨ãããã®ã§ããããã®å¾ããããNIST SP 800-60 vol.1[5], vol.2[6]ããã³NIST SP 800-53 rev.4[7]3ã¨ãã¦è©³ç´°åãè¡ããã¦ãã¾ã4ã
ä¸æ¹ãRMFã«é¢ãã¦ã¯ãNIST SP 800-30ããªã¹ã¯ã¢ã»ã¹ã¡ã³ãã®å®æ½ã®æå¼ãã[8], NIST SP 800-37ãé£é¦æ¿åºæ å ±ã·ã¹ãã ã«å¯¾ãããªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯é©ç¨ã¬ã¤ãã[9], NIST SP 800-39ãæ å ±ã»ãã¥ãªãã£ãªã¹ã¯ç®¡çã-çµç¹ãããã·ã§ã³ãæ å ±ã·ã¹ãã ã®è¦ç¹ã[10]ã¨ãã£ãè¦æ ¼ãåºããã¦ãã¾ãããããªã¹ã¯ç®¡çã«é¢ãã¦ã¯ãNISTã対象ã¨ãã¦ããæ¿åºæ©é¢ã ãã§ãªããè»äºãå½å®¶å®å ¨ä¿éã·ã¹ãã çã¨ã®é£æºãéè¦ã§ããã¨ã®è¦³ç¹ããã2009å¹´ã«NISTãä¸å¿ã«è»äºãå½å®¶å®å ¨ä¿éã·ã¹ãã çã®é¢é£æ©é¢ãéããJoint Task Force Transformation Initiativeãç«ã¡ä¸ãããããã以éãNIST SP 800-37ã®å¤§å¹ ãªæ¹å®ã¨NIST SP800-53, 53Aãå«ãé¢é£ã®è¦æ ¼ã®æ¹å®ãè¡ãããç¾å¨ã«è³ã£ã¦ãã¾ã[11]ã
- 1: NISTã«é¢ãã¦ã¯ãå½ç¤¾ã³ã©ã ãNISTï¼ç±³å½æ¨æºæè¡ç 究æï¼ã¨ã»ãã¥ãªãã£ããåç §ãã¦ä¸ããã
- 2: å½é²ç·çåä¸ã®è»äºã·ã¹ãã ãã¤ã³ããªã¸ã§ã³ã¹ã³ãã¥ããã£ï¼CIA, FBI, NSAï¼ããã³ãã®ä»ã®å½å®¶å®å ¨ä¿éã·ã¹ãã (DHSåä¸ã®çµç¹ãå½åçã®ã·ã¹ãã ç)ã¨ãã¦èªå®ããããã®ã§ãããããããã®æ å ±ã»ãã¥ãªãã£åºæºãæãã¦ãã¾ãã
- 3: ããããæ å ±ã»ãã¥ãªãã£ã«å¯¾ããè¦æ±æ¡ä»¶ã¨ç®¡ççãã¾ã¨ãããã®ã§ãããISO 27001, 27002ã«ç¸å½ãã¾ãããé£é¦æ¿åºã®æ å ±ããã³æ å ±ã·ã¹ãã ã®æ ¼ä»ãã«å¯¾å¿ãã管ççã示ããã¦ãã¾ããå½ç¤¾ã³ã©ã ãåç §ãã¦ãã ããã
- ï¼: NIST SP800ã·ãªã¼ãºã¯é次ãã¼ã¸ã§ã³ã¢ããããã¦ãã¾ãããã®ã³ã©ã ã§ã¯ã以éãææ°ã®ãã®ãåç
§ãã¦ãã¾ããã¾ããIPAã«ããé¦è¨³ãããã¤ãè¡ããã¦ãã¾ãã
https://www.ipa.go.jp/security/publications/nist/
CNCI (Comprehensive National Cybersecurity Initiativeï¼å æ¬çãµã¤ãã¼ã»ãã¥ãªãã£ã»ã¤ãã·ã¢ãã£ã)
2000年代ã«å ¥ããç±³å½ã§ã¯æ¿åºæ©é¢ãå§ãã¨ãã¦ãã¾ãã¾ãªçµç¹ãä¼æ¥ã®ãã¸ã¿ã«åã®é²å±ã«å¼å¿ãã¦ãããã«å¯¾ããé大ãªæ å ±ã»ãã¥ãªãã£ä¾µå®³ãçºçãã¾ãããããã«å±æ©æãæã£ãåè¡å½æ¿åºã¯2009å¹´ã«åè¡å½ã«ãããæ¿çè©ä¾¡ãå®æ½ããçµæãå½æã®ãªãã大統é ã«å ±åãã¾ãã[12]ããããåãã¦ããªãã大統é ã®å CNCIãç«ã¡ä¸ãããã¾ãã[13]ãããã¯ãâ ç¾å¨ç´é¢ãã¦ãããµã¤ãã¼è å¨ã«å¯¾ãã¦ã®ç¬¬ï¼ç·é²å¾¡ã®ç¢ºç«ãâ¡ããããè å¨ã«å¯¾ããé²å¾¡çã®æ¤è¨ãâ¢å°æ¥ã®ãµã¤ãã¼ã»ãã¥ãªãã£ç°å¢å¯¾å¿ã®å¼·åãã®ï¼ã¤ã®æ±ã«ããããï¼ã¤ã®ã¤ãã·ã¢ãã£ãã対å¿ããç±³å½ã«ããããµã¤ãã¼ã»ãã¥ãªãã£å¯¾çãå¼·åãããæ¦ç¥ã§ãããã®ä¸ã®ãâ¢ã®ä¸ã«11çªç®ã®ã¤ãã·ã¢ãã£ãã¨ãã¦ãâå¤é¢çãªã°ãã¼ãã«ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ç®¡çã®éçºâãæãããã¦ãã¾ããå ·ä½çãªç®æ¨ã¨ãã¦ã以ä¸ã®ãã®ãããããã¦ãããé£é¦æ¿åºæ©é¢ã®ã°ãã¼ãã«ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ç®¡çã®ã¹ãã«ãããªã·ã¼ãããã³ããã»ã¹ãå¼·åããã·ã¹ãã ããããã¯ã¼ã¯ã®éè¦æ§ããªã¹ã¯ã«è¦åã£ãã¬ãã«ã§ãµãã©ã¤ãã§ã¼ã³ã®ãªã¹ã¯ãããé©åã«ç®¡çããã³è»½æ¸ããããã«å¿ è¦ãªç¢ºç«ããããã¼ã«ã»ãããæä¾ãããã¨ãæ±ãããã¾ããã
- 製åã®ã©ã¤ããµã¤ã¯ã«å ¨ä½ï¼è¨è¨ããå»æ£ã¾ã§ï¼ã®ãªã¹ã¯ãæè¡çããã³éç¨çã«è»½æ¸ããããã®ãã¼ã«ã¨ãªã½ã¼ã¹ã®éçºã¨æ¡ç¨
- è¤éãªã°ãã¼ãã«å¸å ´ãåæ ããæ°ãã調éæ¹éã¨å®æ½æ¹æ³ã®éçº
- ãµãã©ã¤ãã§ã¼ã³ã¨ãªã¹ã¯ç®¡çã®åºæºã¨ãã¹ããã©ã¯ãã£ã¹ãéçºãæ¡ç¨ããããã®æ¥çã¨ã®ãã¼ããã¼ã·ãã
ãã®ã¤ãã·ã¢ãã£ããåãã¦ãNISTãä¸å¿ã¨ããããµãã©ã¤ãã§ã¼ã³ã®æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãã®è¦æ ¼ä½ããæ¬æ ¼åãã¾ããã
ï¼åèï¼ãµãã©ã¤ãã§ã¼ã³ã«ä¿ãé大ãªã»ãã¥ãªãã£ä¾µå®³ã®äºä¾
2000年代ã«å ¥ããç±³å½ã§ã¯ããã¤ãã®æ·±å»ãªãµãã©ã¤ãã§ã¼ã³ã«ä¿ãã»ãã¥ãªãã£ä¾µå®³ãçºçãã¦ãã¾ãã以ä¸ã«ä»£è¡¨çãªãã®ãæãã¾ãã
-
â 2008å¹´ FBIã«ãã£ã¦ç±³å½æ¿åºæ©é¢ãè»ã®æ
å ±ã·ã¹ãã ã«Cisco社製ã«ã¼ã¿ãã¹ã¤ããã®ä¸å½è£½æ¨¡é åãç´å
¥ãããæ·±å»ãªåé¡ï¼æ
å ±ã·ã¹ãã ã®æ·±å»ãªé害ãããã¯ãã¢ãªã©ã®ãµãã©ã¤ãã§ã¼ã³æ»æï¼ãçºçããæãã®ãããã¨ã調æ»ã«ããæããã«ããããã¨ã®å ±éããªããããFBIã®è³æã§ã¯ãæ©ããã®ã§2003å¹´é ããç´å
¥ããã¦ããããã¾ãã¾ãªãµãã©ã¤ãã§ã¼ã³ãå©ç¨ããã¦ãããã¨ãå¤æã
http://www.abovetopsecret.com/forum/thread350381/pg1 - â¡ å½é åå°ä½é¨åã®æ··å ¥åé¡ã2008å¹´10æBloomberg Businessweekèªãç±³è»ã®ãã¾ãã¾ãªè»ç¨é»åæ©å¨ã«ä¸å½è£½ã®å½é åå°ä½ã使ç¨ããã¦ããæãããããã¨ãå ±éï¼https://www.bloomberg.com/news/articles/2008-10-01/dangerous-fakesï¼ãå½é²ç·çã«ã¯2005年以éBAEã·ã¹ãã ãºç¤¾çè¤æ°ã®è»éæ¥è ããå ±åãä¸ãã£ã¦ããã4件ã®å½é åå°ä½ã«é¢ããBusinessweekèªç¬èªã®è¿½è·¡èª¿æ»ã§ã¯ãããããä¸å½ã«ãã©ãçããã¨ã®ãã¨ããã®ãããªç¶æ³ãåããç±³å½ä¸é¢è»äºå§å¡ä¼ã¯è©³ç´°ãªèª¿æ»ãéå§ãã2011å¹´ã«å ±åæ¸ãã¾ã¨ãã¦ããã(https://www.armed-services.senate.gov/press-releases/senate-armed-services-committee-releases-report-on-counterfeit-electronic-partsï¼ãã¾ããç±³è°ä¼ã®è¶ å 派諮åæ©é¢ãç±³ä¸çµæ¸å®å ¨ä¿é調æ»å§å¡ä¼ï¼USCCï¼ãããã¼ã¹ãããã»ã°ã©ãã³ç¤¾ã«èª¿æ»å§è¨ããå ±åæ¸ãæ å ±åªä½ã®ç²å¾ï¼ã³ã³ãã¥ã¼ã¿ã»ãããã¯ã¼ã¯ä½æ¦ããã³ãµã¤ãã¼ã¹ãã¤æ´»åã®ããã®ä¸å½ã®è½åãã«ããã¦ãç±³å½ã«ããããµãã©ã¤ãã§ã¼ã³ã®èå¼±æ§ã®åé¡ãææããã¦ããï¼é¦è¨³ï¼https://ssl.bsk-z.or.jp/kakusyu/pdf/25-1shousassi.pdfï¼
- ⢠2009å¹´å½æéçºä¸ãããã¼ãã»ãã¼ãã³ç¤¾ãä¸å¿ã«éçºãé²ãããã¦ããF35ã¹ãã«ã¹æ¦éæ©ã®æ©å¯æ å ±ãæ¼æ´©ããã¨ã®å ±éãã¦ã©ã¼ã«ã¹ããªã¼ãã¸ã£ã¼ãã«ç´ããè¡ãããï¼https://www.wsj.com/articles/SB124027491029837401ï¼ãF35ã«ã¯å¤ãã®åç¨é¨åãå©ç¨ããããããä¾çµ¦ããå¤ãã®æ°éä¼æ¥ããµãã©ã¤ãã¼ã³ãå½¢æãã¦ãããã¾ããå½éå ±åéçºã¨ãã¦è±å½ãå§ãå¤æ°ã®å½ãéçºã«ååãã¦ããã¨ã¨ãã«ãã®å°å ¥ãé²ãã¦ããã2012å¹´ã«ã¯å ±åéçºä¼ç¤¾ã§ããè±å½BAEã·ã¹ãã ããã®æ å ±æ¼æ´©ãå ±åãããï¼https://archive.is/3F1q/imageï¼ãã¾ãã2014å¹´ã«ã¯ã«ããå¨ä½ã®ä¸å½äººå®æ¥å®¶ã¹ã»ãã³ãF-35ãC-17ãF-22ã®ç§å¯æ å ±ãåè¡å½å ã®å½é²ç£æ¥ã®ã³ã³ãã¥ã¼ã¿ããçãã ã¨ãã¦FBIã«é®æã起訴ããã2016å¹´æ²å½¹ï¼å¹´ã®æ罪å¤æ±ºãåãã¦ãã¾ãï¼https://www.justice.gov/opa/pr/chinese-national-who-conspired-hack-us-defense-contractors-systems-sentenced-46-monthsï¼ããã®ã±ã¼ã¹ã§ã¯ã被åãã«ããã«ææããè»ç¨èªç©ºæ©ã®ãã¼ãã¹ã製é ããä¼ç¤¾ãéãã¦ãè¤æ°ã®é¢é£è»äºä¼æ¥ã®ä¼æ¥æ å ±ãå ¥æããã®æ å ±ããã£ãã·ã³ã°ã¡ã¼ã«çã«å©ç¨ãã¦ãæçµçã«ã¯ãã¼ã¤ã³ã°ç¤¾ã®ãããã¯ã¼ã¯ã«ä¾µå ¥ãããã¨ãæããã«ããã¦ãããããã«ã2015å¹´ã«ã¯ããã¤ãã·ã¥ãã¼ã²ã«èªããã¨ãã¯ã¼ãã¹ãã¼ãã³ã«ããæ¼æ´©ããæ©å¯ææ¸ãããç±³å½ã¯2009å¹´é ããä¸å½ã«ããF35é¢é£ã®æ©å¯ãæ¼æ´©ãã¦ãããã¨ãææ¡ãã¦ãããã¨ãå ±éãã¦ãã¾ãï¼https://www.smh.com.au/national/china-stole-plans-for-a-new-fighter-plane-spy-documents-have-revealed-20150118-12sp1o.htmlï¼ã
FISMA of 2014ï¼Federal Information Security Management Act :é£é¦æ å ±ã»ãã¥ãªãã£ããã¸ã¡ã³ãæ³ 2014ï¼
2014å¹´ãªãã大統é ã®å ãæ¥éãªæè¡é©æ°ã¨ãµã¤ãã¼è å¨ã®å¤åã«å¯¾å¿ããããFISMAã®åå®ç¾©ãè¡ããã¾ãããåé£é¦æ¿åºæ©é¢ã«å¯¾ãã¦ã
- â ã»ãã¥ãªãã£å¯¾å¿è¨ç»ã®çå®ã
- â¡ é©åãªã»ãã¥ãªãã£è²¬ä»»è ãæå®ã
- ⢠該å½ããã·ã¹ãã ã®ã»ãã¥ãªãã£ç®¡ççã®å®æçãªã¬ãã¥ã¼ã
- ⣠ã·ã¹ãã ã®éç¨åããã³å®æçãªæ¿èªã
ãè¦æ±ãããã¨ã¨ãã«ãªã¹ã¯ãã¼ã¹ã«ããå¹ççãªã»ãã¥ãªãã£å¯¾çã®å®æ½ãæ±ãããããã®ã¬ã¤ãã©ã¤ã³ã¨è¦æ ¼ãçå®ããããNISTã«ããã¦çµ±åçãªãªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯ï¼RMFï¼Risk Management Frameworkï¼ã®ä½æããã¸ã§ã¯ããã¹ã¿ã¼ããã¾ãã[2]ããã®ããã¸ã§ã¯ãã§ã¯ãå¾è¿°ããããã«ãªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯ã«å¿ è¦ãªããã¾ãã¾ãªã¬ã¤ãã©ã¤ã³ã¨è¦æ ¼ãä½æãããç¾å¨ã§ããã®æ¹çãç¶ãã¦ãã¾ãããã®ä»£è¡¨çãªãã®ããNIST SP 800-37ã§ãããã¡ãã¯å½ç¤¾ã³ã©ã ãNISTã®ãªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯ï¼RMFï¼ã¨ã¯ã(http://www.intellilink.co.jp/article/column/RMF-01.html)ã«ææ°ã®Rev.2ã®æ¦è¦ãç´¹ä»ããã¦ãã¾ãã®ã§åç §ãã¦ãã ããã
ãCybersecurity Enhancement Act of 2014ï¼2014å¹´ãµã¤ãã¼ã»ãã¥ãªãã£å¼·åæ³ï¼
ä¸è¨ã®FISMA of 2014ã«å ãã¦ãåã2014å¹´ã«ãµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã«åãã¦ã®å®æ°é£æºãR&Dããã³æè²ã®æ¨é²ã®å ·ä½çå®æ½ã«åãã¦ãâCybersecurity Enhancement Act of 2014âãè°ä¼ã§æ¿èªããã¾ããããã®ä¸ã§ãNISTã«å¯¾ãã¦æ¬¡ã®ãããªå½¹å²ãè¦å®ããã¦ãã¾ãã
- â âèªä¸»çãæ¥ç主å°ãã³ã³ã»ã³ãµã¹ãã¼ã¹âã®ãµã¤ãã¼ã»ãã¥ãªãã£ã®ã¬ã¤ãã©ã¤ã³ãè¦æ ¼ã®ä½æã¨é¢é£ããæå 端ç 究ã®æ¨é²ãæ¨æºã®éçºã«ã¯ãæ°éé¨éã¨ç·å¯ã«èª¿æ´ããã¨ã¨ãã«éè¦ã¤ã³ãã©ã«å¯¾ããã¬ã¤ãã©ã¤ã³ãè¦æ ¼ãè¡ãã
- â¡ æ¥çã®ãã¹ããã©ã¯ãã£ã¹ãçµã¿è¾¼ã¿ãå¯è½ãªéãå½éãµã¤ãã¼ã»ãã¥ãªãã£æ¨æºã¨æ´åãããã
- ⢠é£é¦æ¿åºãå·æ¿åºãããã³å°æ¹æ¿åºã¯ãæ°éä¼æ¥ãå ±æããæ å ±ã使ç¨ãã¦ããã®ä¼æ¥ãè¦å¶ããç®çã§åºæºãçå®ãããã¨ã¯ç¦ããããã
- ⣠é£é¦æ¿åºã®ã¯ã©ã¦ãã³ã³ãã¥ã¼ãã£ã³ã°æè¡ã®å©ç¨æ¡å¤§ã®ããã®æ¦ç¥ã®éçºãæ¨æºåã¨ç¸äºéç¨æ§ãå¼·åããããã®æ°éé¨éã®åãçµã¿ã®æ¯æ´ã
- ⤠4å¹´ãã¨ã«æ´æ°ãããé£é¦ãµã¤ãã¼ã»ãã¥ãªãã£ç 究éçºæ¦ç¥è¨ç»5ãçå®ãããæ¦ç¥è¨ç»ã¯ãæ°éé¨éã®ç 究éçºåªåã¨éè¤ããªããã¨ãä¿è¨¼ããããã«ãç£æ¥çããã³å¦è¡é¢ä¿è ã¨ååãã¦ä½æãããã
- ⥠é£é¦æ¿åºã®ãµã¤ãã¼ã»ãã¥ãªãã£ã¨ã³ã¸ãã¢ã®ããã®å¥¨å¦éããã°ã©ã ãå®æ°é£æºãã¦ãµã¤ãã¼ã»ãã¥ãªãã£æè²ããã³æèåä¸ããã°ã©ã ãä½æã
以ä¸ã®ååãã¾ã¨ããã¨ãNISTã«ãããæ å ±ã»ãã¥ãªãã£ããµã¤ãã¼ã»ãã¥ãªãã£é¢é£ã®ã¬ã¤ãã©ã¤ã³ã®çå®ã¯ã次ã®ãããªæ¹éã§è¡ããã¦ããã¨è¦ããã¾ãããã®æ¹éã¯ãSP 800-161ã®çå®ã«ãåæ ããã¦ããã¨è¨ãã¾ãã
- â ãªã¹ã¯ãã¼ã¹ã®æ å ±ã»ãã¥ãªãã£å¯¾ç
- â¡ é£é¦æ¿åºæ©é¢ã®éã§ã®è¦æ ¼ã®å ±æã¨å®æ°é£æºã®æ¨é²
- ⢠æ°ãããµã¼ãã¹ï¼ã¯ã©ã¦ããµã¼ãã¹çï¼ãç°å¢ã®å¤åï¼ã°ãã¼ãã«ãµãã©ã¤ãã§ã¼ã³çï¼ã«å¯¾å¿ããæ å ±ã»ãã¥ãªãã£å¯¾çã®æ¨é²
- ⣠å½éæ¨æºã¨ã®æ´åæ§ãå½éæ¨æºåã¸ã®åããã
ã¾ããåè¡å½æ¿åºæ©é¢å ¨ä½ã§ITã¸ã®ä¾å度ãé«ã¾ããã¨ã«å¿ãã¦ããµãã©ã¤ãã§ã¼ã³ã®ãªã¹ã¯ç®¡çã¯é大ãªåé¡ã§ãããç¹ã«æ å ±ã»ãã¥ãªãã£ãªã¹ã¯ç®¡çã®è¦³ç¹ã§å ±éã®ã¬ã¤ãã©ã¤ã³ãè¦æ ¼ãä½æããã¨ã¨ãã«æ¿åºæ©é¢ã ãã§ãªãé¢é£ããæ°éä¼æ¥ã¨ãå ±æãããã¨ã§ããµãã©ã¤ãã§ã¼ã³ã®ä¿¡é ¼æ§ãæ ä¿ããå¿ è¦ãããã¨èªèãããSP 800-161ã®ä½æã«è³ã£ãã¨ããäºãè¨ãã¾ãã
次å以éã¯ãSP 800-161ã®å ·ä½çãªå 容ã«ã¤ãã¦ã®è§£èª¬ããããããã¨ã«ãã¾ãã
- 5: Federal Cybersecurity Research and Development Strategic Plan
åç §æç®
- [1] NIST, SP800 161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations, 2015.
- [2] NIST, âFISMA Implementation Project,â https://csrc.nist.gov/projects/risk-management/detailed-overview.
- [3] NIST, âFIPS199,â Standards for Security Categorization of Federal Information and Information Systems, p. https://csrc.nist.gov/publications/detail/fips/199/final, 2004.
- [4] NIST, âFIPS200,â Minimum Security Requirements for Federal Information and Information Systems, p. https://csrc.nist.gov/publications/detail/fips/200/final, 2006.
- [5] NIST, SP 800-60 Vol.1 Rev.1 Guide for Mapping Types of Information and Information Systems to Security Categories, 2008.
- [6] NIST, SP 800-60 Vol.2 Rev.1 Guide for Mapping Types of Information and Information Systems to Security Categories: Appendices, 2008.
- [7] NIST, SP 800-53 Rev.4 Security and Privacy Controls for Federal Information Systems and Organizations.
- [8] NIST, SP 800-30 Rev.1 Guide for Conducting Risk Assessments, 2012.
- [9] NIST, SP 800-37 Rev.2 Risk Management Framework for Information Systems and Organizations, A System Life Cycle Approach for Security and Privacy, 2018.
- [10] NIST, SP 800-39 Managing Information Security Risk, Organization, Mission, and Information System View, 2011.
- [11] J. Broad, Risk Management Framework 1st Edition -A Lab-Based Approach to Securing Information Systemsã第4ç« , Elsevier, 2013.
- [12] U.S. Government Accountability Office, âCyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure,â https://www.hsdl.org/?view&did=740047, 2009.
- [13] the WHITE HOUSE, âThe Comprehensive National Cybersecurity Initiative,â https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/national-initiative.
Writer Profile
NTTãã¼ã¿å
端æè¡æ ªå¼ä¼ç¤¾ ãã§ãã¼
å·¥å¦å士ãCISSP, CISA
ä¸å®
å
Tweet