NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ï¼CSF2.0ï¼ã§ä½ãå¤ãã£ãã®ã
2024å¹´2æ26æ¥ã«NISTï¼ç±³å½å½ç«æ¨æºæè¡ç 究æï¼ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ãV1.1ããV2.0ã¸ãã¼ã¸ã§ã³ã¢ãããã¾ããããã®ææ¸ã¯ãæ¬æ¥ã¯ç±³å½é£é¦æ¿åºåãã®ææ¸ã ã£ãã®ã§ããããã®å
容ã®åãããããããææµã«å³ããå
容ã«ãããç±³å½ã®æ°éä¼æ¥ã«ããããã¦æ¥æ¬ãå«ãä»å½ã®ã»ãã¥ãªãã£ã®åçµã¿ã«å¤§ããªå½±é¿ãä¸ãã¦ãã¾ãã
æ¬ã³ã©ã ã§ã¯ãNISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ï¼ä»¥ä¸ãCSFï¼V2.0ã®å¤æ´ç¹ãèªã¿è§£ããã¨ã«ãã£ã¦ãä»å¾ã®ãµã¤ãã¼ã»ãã¥ãªãã£å¯¾çã«å¿
è¦ãªè¦ç´ ãçæç¹ã«ã¤ãã¦æããã«ãã¾ãã
- ãªãNISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ï¼CSFï¼ã注ç®ãããã®ãï¼
- NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã¸ã®ä¸»ãªå¤æ´ç¹
- NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã®å ¨ä½å
- NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã®6ã¤ã®æ©è½ããã³ã«ãã´ãªã®å¤æ´ç¹
- NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã«ãããTierã®æ¦è¦
- ã¾ã¨ã
- åèæ å ±
ãªãNISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ï¼CSFï¼ã注ç®ãããã®ãï¼
CSFã¯ãå
ã
ã¯ç±³å½é£é¦æ¿åºã®éè¦ã¤ã³ãã©åãã«2014å¹´ã«çå®ããããã®ã§ãããã®ãããæ¬æ¥ç¡é¢ä¿ãªæ°éä¼æ¥ããæ¥æ¬ã®çµç¹ã§å©ç¨ã»éµå®ãã義åã¯ããã¾ããã
ãããããµã¤ãã¼æ»æã«ãã£ã¦ä¾µå
¥ãããåæã§ãå½å®¶ã¬ãã«ã®ææ¸ã«ããã¦ã»ãã¥ãªãã£æ´»åããç¹å®ãããé²å¾¡ãããæ¤ç¥ããã対å¿ããã復æ§ãã®5ã¤ã®æ©è½ã«åé¡ã»è¡¨ç¾ãããã¨ã¯ãå½åããç»æçãã¤åãããããæ¦å¿µã¨ãã¦å¤ãã®çµç¹ã«åãå
¥ãããã¾ãããã¾ããããã5ã¤ã®æ©è½ãæ§æããå
容ãã«ãã´ãªï¼ãµãã«ãã´ãªã«ç´°ååãããèåãªã»ãã¥ãªãã£åºæºã¨ã®é¢é£ã¥ããåç
§æ
å ±ã¨ãã¦æ示ããã¦ããããã使ããããã®é¢ã§ãå¤ãã®çµç¹ã«é
æ
®ããã¦ãã¾ããã
å³1ï¼ããã¾ã§ã®CSF
ãã®å¾ãCSFããã®èãæ¹ã¯å½éçã«å¤ãã®çµç¹ã§æ´»ç¨ãé²ã¿ãç¹ã«æµ·å¤ã¨ã®ããã¨ããå¤ãçµç¹ã§å°å
¥ãé²ãã§ããããã§ããã¾ããæ¥æ¬ã§ããµã¤ãã¼ã»ãã¥ãªãã£çµå¶ã¬ã¤ãã©ã¤ã³ï¼çµæ¸ç£æ¥çï¼ãããµã¤ãã¼ã»ãã£ã¸ã«ã«ã»ã»ãã¥ãªãã£å¯¾çãã¬ã¼ã ã¯ã¼ã¯ï¼çµæ¸ç£æ¥çï¼ãªã©ãCSFãåèã«çå®ãããã¨æ¨å¯ãããã»ãã¥ãªãã£åºæºãåºã¦ãã¾ãã
ãã®ãããCSFã®ååã¯ãå¤ãã®çµç¹ã§ä»å¾ã®ã»ãã¥ãªãã£æ´»åã®æ¹åæ§ã示åããã»ã©ã®ã¤ã³ãã¯ããããã¾ãã
NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã¸ã®ä¸»ãªå¤æ´ç¹
ä»åã®ãã¼ã¸ã§ã³ã¢ããã§ã¯å¤§ãã以ä¸6ç¹ã®å¤æ´ãããã¾ãã
1. CSFã¯å¹ åºãçµç¹åãã®ãã¬ã¼ã ã¯ã¼ã¯ã¨ä½ç½®ä»ãããã¾ãã
- ã»æ£å¼ã¿ã¤ãã«ã¯ãå½åã®ãéè¦ã¤ã³ãã©ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãæ¹åããããã®ãã¬ã¼ã ã¯ã¼ã¯ï¼Framework for Improving Critical Infrastructure Cybersecurityï¼ããããã NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯ï¼The NIST Cybersecurity Frameworkï¼ãã«å¤æ´ããã¾ããã
- ã»CSFã¯ãç±³å½ã®éè¦ã¤ã³ãã©åããããä¸çä¸ã®ããããçµç¹åãã¨ãªãã¾ããã
2. æ°ããªæ©è½ãã¬ããã³ã¹ãã追å ããã¾ãã
- ã»CSFãæ§æããæ©è½ã«ãã¬ããã³ã¹ï¼GOVERNï¼çµ±æ²»ããã管çããï¼ãæ°ãã«è¿½å ããã¾ããããã®ã¬ããã³ã¹ã®ä¸èº«ã¯ããçµç¹ã®ç¶æ³ããããªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ãã ãå½¹å²ã責任ã権éãããããªã·ã¼ãããç£ç£ããããµã¤ãã¼ã»ãã¥ãªãã£ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ããã®6ã¤ã®ã«ãã´ãªã«åãããã¾ãã
å³2ï¼CSF2.0ã®å ¨ä½å
3. ãµã¤ãã¼ã»ãã¥ãªãã£ã®ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ãã«éç¹ãç½®ããã¾ãã
- ã»ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ãã¯ãã¬ããã³ã¹ã®ä¸ã®1ã«ãã´ãªã«å«ãããã¾ããï¼å ã ãç¹å®ã®ä¸ã®1ã«ãã´ãªã§ããï¼ããµãã«ãã´ãªã¯10é ç®ã«ãåã³ã¾ãï¼ãµãã©ã¤ãã§ã¼ã³ã«é¢ãããªã¹ã¯ããã¸ã¡ã³ããå½¹å²è²¬ä»»ãã¨ã³ã¿ã¼ãã©ã¤ãºãªã¹ã¯ããã¸ã¡ã³ãã¨ã®çµ±åããµãã©ã¤ã¤ã¼ã®åªå é ä½ä»ããå¥ç´è¦ä»¶ãå¥ç´åè©ä¾¡ããªã¹ã¯ç£è¦ãã¤ã³ã·ãã³ã対å¿ã¸ã®åå ãããã©ã¼ãã³ã¹ç£è¦ãå¥ç´çµäºå¯¾å¿ï¼ã
- ã»ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ãã«é¢ããã¬ã¤ãã³ã¹ãå
¬éããã¾ããã
ãµã¤ãã¼ã»ãã¥ãªãã£ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ãï¼C-SCRMï¼ã®ã¯ã¤ãã¯ã¹ã¿ã¼ãã¬ã¤ã - ã»ãµãã«ãã´ãªã®åèæ å ±ã«NIST SP 800-218ï¼ã»ãã¥ã¢ã½ããã¦ã§ã¢éçºãã¬ã¼ã ã¯ã¼ã¯ï¼SSDFï¼ã追å ããã¾ããã
4. æ°ãã«è¤æ°ã®ä»ã®ãã¬ã¼ã ã¯ã¼ã¯ãææ¸ã«é¢é£ä»ãããã¾ãã
- ã»ä¸è¨ææ¸ãCSF2.0ã®åãµãã«ãã´ãªã«å¯¾ããåèæ å ±ã¨ãªãã¾ããï¼å¾æ¥ã®NIST SP 800-53ãISO/IEC27001ãCOBITãISA62443ã¯ãç´æ¥çãªåèæ å ±ããã¯é¤å¤ããã¾ããããã ããNIST SP 800-53ã«ã¤ãã¦ã¯CSF2.0 ãªãã¡ã¬ã³ã¹ãã¼ã«ããåç §å¯è½ã§ãï¼ã
- â»CIS Controlsã¨ã¯ãç±³å½ã®éå¶å©å£ä½Center for Internet Securityï¼CISï¼ãå ¬éããæä½éè¡ãã¹ããµã¤ãã¼ã»ãã¥ãªãã£ã®ã¬ã¤ãã©ã¤ã³ã§ãã
- â»CRI Profileã¨ã¯ãç±³å½ã®éå¶å©å£ä½Cyber Risk Instituteï¼CRIï¼ãå ¬éããéèæ©é¢ã対象ã¨ãããµã¤ãã¼ã»ãã¥ãªãã£ã®ã¬ã¤ãã©ã¤ã³ã§ãã
- ã»ä¸è¨NISTææ¸ãCSF2.0ã®æ°ããªåç §å ã¨ãã¦è¿½å ããã¾ããã
- ã»NIST IR 8286ã·ãªã¼ãºï¼ãµã¤ãã¼ã»ãã¥ãªãã£ããã³ã¨ã³ã¿ã¼ãã©ã¤ãºãªã¹ã¯ããã¸ã¡ã³ãã®çµ±åã·ãªã¼ãº
- ã»NIST SP 800-221ï¼æ å ±éä¿¡æè¡ãªã¹ã¯ã®ã¨ã³ã¿ã¼ãã©ã¤ãºã¸ã®å½±é¿
- ã»NIST SP 800-221Aï¼æ å ±éä¿¡æè¡ï¼ICTï¼ãªã¹ã¯ã«å¯¾ããææ
- ã»NIST SP 800-37ï¼æ å ±ã·ã¹ãã ããã³çµç¹ã®ããã®ãªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯
- ã»NIST SP 800-30 ï¼ãªã¹ã¯ã¢ã»ã¹ã¡ã³ãã®å®æ½ã®æå¼ã
- ã»NIST ãã©ã¤ãã·ã¼ãã¬ã¼ã ã¯ã¼ã¯
- ã»NIST AI 100-1ï¼AIãªã¹ã¯ããã¸ã¡ã³ããã¬ã¼ã ã¯ã¼ã¯
5. CSFã®å®è¡ã«é¢ããåèæ å ±ãã¬ã¤ãã³ã¹ãå¼·åããã¾ãã
- ã»CSF2.0ã®å©ç¨ã«å½¹ç«ã¤ãã¾ãã¾ãªåèæ
å ±ããNISTã®Webãµã¤ãä¸ã§å
¬éããã¾ããï¼ä¸è¨ã¯ä¸ä¾ï¼ã
- ã»CSF2.0 ãªãã¡ã¬ã³ã¹ãã¼ã«ï¼CSFã®ãµãã«ãã´ãªã®å®è£ ä¾ããã©ã¦ã¶ç»é¢ã§è¦ããã¾ãï¼
- ã»çµç¹ãããã¡ã¤ã«ã®ä½æããã³ä½¿â½¤ã®ããã®ã¯ã¤ãã¯ã¹ã¿ã¼ãã¬ã¤ã
- ã»æ¦å¿µçãªCSF2.0ãããã¡ã¤ã«ã®ãã³ãã¬ã¼ã
- ã»ä¸å°ä¼æ¥ããã¯ã¤ãã¯ã¹ã¿ã¼ãã¬ã¤ã
6. ãªã¹ã¯ã¬ããã³ã¹ããã³ãªã¹ã¯ããã¸ã¡ã³ãã®å®è·µã«é¢ããé層ï¼Tierï¼ãè¦ç´ããã¾ãã
- ã»ããµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ã¬ããã³ã¹ããããµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ããã¸ã¡ã³ããã®2ã¤ã®è¦³ç¹ã«ããã¦ãéæææ¨ã¨ãªãé層ï¼Tierï¼ãæ確ã«ãã¾ããï¼å ã ã¯ãããªã¹ã¯ããã¸ã¡ã³ãããã»ã¹ãããçµ±åããããªã¹ã¯ããã¸ã¡ã³ãããã°ã©ã ãããå¤é¨ããã®åå ãã®3ã¤ã®è¦³ç¹ã§ããï¼ã
NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã®å ¨ä½å
CSF 2.0ã®6ã¤ã®æ©è½ã®å½¹å²ï¼ææï¼Outcomeï¼ã¯ã以ä¸ã®ããã«å®ç¾©ããã¾ããã
- ã»ã¬ããã³ã¹ï¼GVï¼ï¼çµç¹ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ãæå¾ ãããªã·ã¼ã確ç«ãããä¼éãããç£è¦ããã¦ããã
- ã»ç¹å®ï¼IDï¼ï¼çµç¹ã®ç¾å¨ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ãç解ããã¦ããã
- ã»é²å¾¡ï¼PRï¼ï¼çµç¹ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ã管çããããã®ä¿è·çã使ç¨ããã¦ããã
- ã»æ¤ç¥ï¼DEï¼ï¼æ½å¨çãªãµã¤ãã¼ã»ãã¥ãªãã£æ»æããã³ä¾µå®³ãçºè¦ãããåæãããã
- ã»å¯¾å¿ï¼RSï¼ï¼æ¤åºããããµã¤ãã¼ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã«é¢ãã¦æªç½®ãè¬ããããã
- ã»å¾©æ§ï¼RCï¼ï¼ãµã¤ãã¼ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã®å½±é¿ãåããè³ç£ããã³éç¨ã復æ§ãããã
å³3ï¼CSF2.0ã®åæ©è½
6ã¤ã®æ©è½ã¯ãå¯æ¥ã«é¢é£ãã¦ããã以ä¸ã®ãããªé¢ä¿æ§ã«ããã¾ãã
- ã»6ã¤ã®æ©è½ã¯ç¸äºã«é¢é£ãã¦ããããã®ãããè»è¼ªï¼ãã¤ã¼ã«ï¼ã®å½¢ã§è¡¨ç¾ããã¦ããã
- ã»ã¬ããã³ã¹ã¯ä¸å¿ã«ä½ç½®ã¥ããããä»ã®5ã¤ã®æ©è½ãã©ã®ããã«å®è£ ãããã示ãã
- ã»6ã¤ã®æ©è½ã¯åæã«åãçµãå¿ è¦ãããï¼1ã¤ãã¤é çªã§ããã°ãããã©ããããããªãã¦ãããã¨ãããã®ã§ã¯ãªãï¼ã
- ã»ã¬ããã³ã¹ãç¹å®ãé²å¾¡ãæ¤ç¥ã¯ããã¹ã¦ãç¶ç¶çã«å®è¡ãããå¿ è¦ãããã
- ã»å¯¾å¿ã復æ§ã¯å¸¸ã«æºåãã§ãã¦ãããã¤ã³ã·ãã³ããçºçããã¨ãã«å®è¡ãããå¿ è¦ãããã
- ã»ã¬ããã³ã¹ãç¹å®ãé²å¾¡ã¯ãã¤ã³ã·ãã³ãã®äºé²ã¨æºåã«å½¹ç«ã¡ãã¬ããã³ã¹ãæ¤ç¥ã対å¿ã復æ§ã¯ã¤ã³ã·ãã³ãã®çºè¦ã¨ç®¡çã«å½¹ç«ã¤ã
NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã®6ã¤ã®æ©è½ããã³ã«ãã´ãªã®å¤æ´ç¹
â ã¬ããã³ã¹ï¼GVï¼GOVERN
æ°æ©è½ã¨ãã¦ãã¬ããã³ã¹ãã追å ããã¾ãããã«ãã´ãªã®å¤ãã¯æ§ãç¹å®ãæ©è½ãã移è¡ãããã¨å
±ã«ããªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ã®è¦ç´ããè¡ãç£ç£ï¼Oversightï¼ãæ°ã«ãã´ãªã¨ãã¦è¿½å ããã¾ãããç£ç£ã§ã¯ããªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ãã®ãã®ã®å®è¡çµæã確èªããè¦ç´ããè¡ããã¨ãæ±ãããã¦ãã¾ãã
ä»ã«ãããµãã«ãã´ãªã«ããã¸ãã£ããªã¹ã¯ã®ãªã¹ã¯è°è«ã¸ã®çµã¿è¾¼ã¿ï¼GV.RM-07ï¼ããªã¼ãã¼ã«ãããªã¹ã¯è²¬ä»»ï¼GV.RR-01ï¼ãªã©ã®è¦ç´ ã追å ããã¾ããã
ãã¸ãã£ããªã¹ã¯ã¨ã¯ããã®å ´åããã©ã¹ã®å½±é¿ãä¸ããå¯è½æ§ããã好æ©ã®ãªã¹ã¯ã®ãã¨ã§ãåããããããã£ã³ã¹ï¼ãã£ã¬ã³ã¸ã¨èªã¿æ¿ãã¦ãããããããã¾ããã
- ã»çµç¹ã®ç¶æ³ï¼GV.OCï¼Organizational Context
çµç¹ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ç®¡çã®æ±ºå®ãåãå·»ãç¶æ³ï¼ããã·ã§ã³ãå©å®³é¢ä¿è ã®æå¾ ãä¾åé¢ä¿ãæ³å¾ãè¦å¶ãå¥ç´ä¸ã®è¦ä»¶ï¼ãç解ããã¦ããã - ã»ãªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ï¼GV.RMï¼Risk Management Strategy
ãªãã¬ã¼ã·ã§ãã«ãªã¹ã¯ã®ææ決å®ããµãã¼ããããããçµç¹ã®åªå é ä½ãå¶ç´ããªã¹ã¯è¨±å®¹åº¦ããã³é¸å¥½åº¦ã®è¡¨æãããã³åææ¡ä»¶ã確⽴ãããä¼éããã使⽤ããã¦ããã - ã»å½¹å²ã責任ãããã³æ¨©éï¼GV.RRï¼Roles, Responsibilities, and Authorities
説æ責任ãããã©ã¼ãã³ã¹è©ä¾¡ãç¶ç¶çæ¹åãä¿é²ããããã®ãµã¤ãã¼ã»ãã¥ãªãã£ã®å½¹å²ã責任ãããã³æ¨©éã確⽴ãããä¼éããã¦ããã - ã»ããªã·ã¼ï¼GV.POï¼Policy
çµç¹ã®ãµã¤ãã¼ã»ãã¥ãªãã£ããªã·ã¼ã確⽴ãããä¼éãããå·è¡ãããã - ã»ç£ç£ï¼GV.OVï¼Oversight
çµç¹å ¨ä½ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ããã¸ã¡ã³ãæ´»åããã³ããã©ã¼ãã³ã¹ã®çµæã¯ããªã¹ã¯ããã¸ã¡ã³ãæ¦ç¥ã®æ å ±æä¾ããæ¹åã調æ´ã«ä½¿â½¤ããã¦ããã - ã»ãµã¤ãã¼ã»ãã¥ãªãã£ãµãã©ã¤ãã§ã¼ã³ãªã¹ã¯ããã¸ã¡ã³ãï¼GV.SCï¼Cybersecurity Supply Chain Risk Management
ãµã¤ãã¼ãµãã©ã¤ãã§ã¼ã³ã®ãªã¹ã¯ããã¸ã¡ã³ãããã»ã¹ã¯ãçµç¹ã®å©å®³é¢ä¿è ã«ãã£ã¦ç¹å®ã確⽴ã管çãç£è¦ãæ¹åããã¦ããã
â¡ ç¹å®ï¼IDï¼IDENTIFY
ã«ãã´ãªã®å¤ãããã¬ããã³ã¹ãæ©è½ã«ç§»è¡ãã¦ã·ã³ãã«ã«ãªãã¾ãããã¾ããå
ã
è¤æ°ã®æ©è½ã«åå¨ãã¦ããã«ãã´ãªãæ¹åããããã«éç´ããã¾ããã
ä»ã«ãããã¼ã¿ããã³ã¡ã¿ãã¼ã¿ã®ã¤ã³ãã³ããªï¼ID.AM-07ï¼ãè©ä¾¡ããã®æ¹åç¹ç¹å®ï¼ID.IM-01ï¼ãªã©ã®è¦ç´ ã追å ããã¾ããã
- ã»è³ç£ç®¡çï¼ID.AMï¼Asset Management
çµç¹ããã¸ãã¹â½¬çãéæã§ããããã«ããããã®è³ç£ï¼ãã¼ã¿ããã¼ãã¦ã§ã¢ ã½ããã¦ã§ã¢ãã·ã¹ãã ãæ½è¨ããµã¼ãã¹ãâ¼æãªã©ï¼ãç¹å®ãããçµç¹ã®â½¬çããã³çµç¹ã®ãªã¹ã¯æ¦ç¥ã«å¯¾ããç¸å¯¾çãªéè¦æ§ã¨â¼è´ãã¦ç®¡çããã¦ããã - ã»ãªã¹ã¯ã¢ã»ã¹ã¡ã³ãï¼ID.RAï¼Risk Assessment
çµç¹ãè³ç£ãåâ¼ã«å¯¾ãããµã¤ãã¼ã»ãã¥ãªãã£ã®ãªã¹ã¯ã¯ãçµç¹ã«ç解ããã¦ããã - ã»æ¹åï¼ID.IMï¼Improvement
CSFã®å ¨ã¦ã®ãã¬ã¼ã ã¯ã¼ã¯ã®æ©è½ã«ããã£ã¦ãçµç¹ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ããã¸ã¡ã³ãã®ããã»ã¹ã⼿é ãæ´»åã«é¢ããæ¹åç¹ãç¹å®ããã¦ããã
⢠é²å¾¡ï¼PRï¼PROTECT
ã«ãã´ãªãåç·¨æããã¾ãããã大è¦æ¨¡ãªå¤æ´ã¯ããã¾ãããIDã¢ãµã¼ã·ã§ã³ã®ä¿è·ï¼PR.AA-04ï¼ãä¸æ£ã½ããé²æ¢ï¼PR.PS-05ï¼ãªã©ã®è¦ç´ ã追å ããã¾ããã
ãã®å ´åã®IDã¢ãµã¼ã·ã§ã³ã¨ã¯ãIDã®èªè¨¼è¦æ±ãèªè¨¼å¯å¦ãå©ç¨è
å±æ§ãªã©ã®èªè¨¼é¢é£æ
å ±ã®ãã¨ã§ãã
- ã»ID管çãèªè¨¼ãããã³ã¢ã¯ã»ã¹å¶å¾¡ï¼PR.AAï¼Identity Management, Authentication, and Access Control
ç©ççããã³è«ççè³ç£ã¸ã®ã¢ã¯ã»ã¹ã¯ã許å¯ãããã¦ã¼ã¶ã¼ããµã¼ãã¹ãããã³ãã¼ãã¦ã§ã¢ã«éå®ãããä¸æ£ã¢ã¯ã»ã¹ã®ãªã¹ã¯è©ä¾¡çµæã«å¿ãã¦ç®¡çããã¦ããã - ã»æèåä¸ããã³ãã¬ã¼ãã³ã°ï¼PR.ATï¼Awareness and Training
çµç¹ã®æ å½è ã¯ããµã¤ãã¼ã»ãã¥ãªãã£é¢é£ã®ã¿ã¹ã¯ãå®è¡ã§ããããã«ããµã¤ãã¼ã»ãã¥ãªãã£ã®æèåä¸æè²ããã³ãã¬ã¼ãã³ã°ãæä¾ããã¦ããã - ã»ãã¼ã¿ã»ãã¥ãªãã£ï¼PR.DSï¼Data Security
ãã¼ã¿ã¯ãæ å ±ã®æ©å¯æ§ãå®å ¨æ§ãå¯ç¨æ§ãä¿è·ãããããçµç¹ã®ãªã¹ã¯æ¦ç¥ã¨ä¸è´ãã¦ç®¡çããã¦ããã - ã»ãã©ãããã©ã¼ã ã»ãã¥ãªãã£ï¼PR.PSï¼Platform Security
ç©çããã³ä»®æ³ãã©ãããã©ã¼ã ã®ãã¼ãã¦ã§ã¢ãã½ããã¦ã§ã¢ï¼ãã¡ã¼ã ã¦ã§ã¢ããªãã¬ã¼ãã£ã³ã° ã·ã¹ãã ãã¢ããªã±ã¼ã·ã§ã³ãªã©ï¼ããã³ãµã¼ãã¹ã¯ãæ©å¯æ§ãå®å ¨æ§ãããã³å¯â½¤æ§ãä¿è·ãããããçµç¹ã®ãªã¹ã¯æ¦ç¥ã¨â¼è´ãã¦ç®¡çããã¦ããã - ã»ãã¯ããã¸ã¼ã¤ã³ãã©ã¹ãã©ã¯ãã£ã¼ã¬ã¸ãªã¨ã³ã¹ï¼PR.IRï¼Technology Infrastructure Resilience
ã»ãã¥ãªãã£ã¢ã¼ããã¯ãã£âã¯ãè³ç£ã®æ©å¯æ§ãå®å ¨æ§ãå¯ç¨æ§ãããã³çµç¹ã®å復åãä¿è·ãããããçµç¹ã®ãªã¹ã¯æ¦ç¥ã«å¾ã£ã¦ç®¡çããã¦ããã
⣠æ¤ç¥ï¼DEï¼DETECT
ã«ãã´ãªãåç·¨æããã¾ãããã大è¦æ¨¡ãªå¤æ´ã¯ããã¾ãããè å¨ã¤ã³ããªã¸ã§ã³ã¹ãæ´»ç¨ããåæï¼DE.AE-07ï¼ã®è¦ç´ ã追å ããã¾ããã
- ã»ç¶ç¶çã¢ãã¿ãªã³ã°ï¼DE.CMï¼Continuous Monitoring
è³ç£ããç°å¸¸ã侵害ã®å åãããã³ãã®ä»ã®æ½å¨çãªæ害ã¤ãã³ããè¦ã¤ããããã«ç£è¦ããã¦ããã - ã»æ害ã¤ãã³ãåæï¼DE.AEï¼Adverse Event Analysis
ç°å¸¸ã侵害ã®å åãããã³ãã®ä»ã®æ½å¨çãªæ害ã¤ãã³ãããåæããããã®ã¤ãã³ããç¹å¾´ä»ãããããµã¤ãã¼ã»ãã¥ãªãã£ã¤ã³ã·ãã³ããæ¤ç¥ããã¦ããã
⤠対å¿ï¼RSï¼RESPOND
ã«ãã´ãªãåç·¨æããã¾ãããã大è¦æ¨¡ãªå¤æ´ã¯ããã¾ããããã ãã¤ã³ã·ãã³ã対å¿ã®æ´»åå
容ããµãã«ãã´ãªã¬ãã«ã§ããã¤ã追å ããã¾ããã
ä¾ãã°ãå復éå§åºæºã®é©ç¨ï¼RS.MA-05ï¼ãã¤ã³ã·ãã³ãé¢é£ãã¼ã¿ã®ä¿è·ï¼RS.AN-07ï¼ã¤ã³ã·ãã³ãè¦æ¨¡ã®æ¨å®ï¼RS.AN-08ï¼ãªã©ã®è¦ç´ ã追å ããã¾ããã
- ã»ã¤ã³ã·ãã³ã管çï¼RS.MAï¼Incident Management
æ¤åºããããµã¤ãã¼ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã¸ã®å¯¾å¿ã管çããã¦ããã - ã»ã¤ã³ã·ãã³ãåæï¼RS.ANï¼Incident Analysis
å¹æçãªå¯¾å¿ã確ä¿ããã©ã¬ã³ã¸ãã¯ããã³å¾©æ§æ´»åããµãã¼ãããããã®èª¿æ»ãå®æ½ããã¦ããã - ã»ã¤ã³ã·ãã³ã対å¿ã®å ±åããã³ã³ãã¥ãã±ã¼ã·ã§ã³ï¼RS.COï¼Incident Response Reporting and Communication
対å¿æ´»åã¯ãæ³å¾ãè¦å¶ãã¾ãã¯ããªã·ã¼ã®è¦æ±ã«å¿ãã¦ç¤¾å ããã³ç¤¾å¤ã®å©å®³é¢ä¿è ã¨èª¿æ´ããã¦ããã - ã»ã¤ã³ã·ãã³ã軽æ¸ï¼RS.MIï¼Incident Mitigation
ã¤ãã³ãã®æ¡å¤§ãé²ãããã®å½±é¿ã軽æ¸ããããã®æ´»åãå®è¡ããã¦ããã
⥠復æ§ï¼RCï¼RECOVER
ã«ãã´ãªãåç·¨æããã¾ãããã大è¦æ¨¡ãªå¤æ´ã¯ããã¾ããããã ãã¤ã³ã·ãã³ã復æ§è¨ç»ã®æ´»åå
容ããµãã«ãã´ãªã®ã¬ãã«ã§è©³ç´°åããã¾ããã
ä¾ãã°ãããã¯ã¢ãã復æ§åã®æ¤è¨¼ï¼RC.RP-03ï¼ãã復æ§ããè³ç£ã®æ¤è¨¼ï¼RC.RP-05ï¼ã復æ§çµäºåºæºã®é©ç¨ï¼RC.RP-06ï¼ãªã©ã®è¦ç´ ã追å ããã¾ããã
- ã»ã¤ã³ã·ãã³ã復æ§è¨ç»ã®å®è¡ï¼RC.RPï¼Incident Recovery Plan Execution
ãµã¤ãã¼ã»ãã¥ãªãã£ã¤ã³ã·ãã³ãã®å½±é¿ãåããã·ã¹ãã ããã³ãµã¼ãã¹ã®ãªãã¬ã¼ã·ã§ãã«ãªå¯ç¨æ§ã確ä¿ããããã«å¾©æ§æ´»åãå®è¡ããã¦ããã - ã»ã¤ã³ã·ãã³ã復æ§ã³ãã¥ãã±ã¼ã·ã§ã³ï¼RC.COï¼Incident Recovery Communication
復æ§æ´»åã¯ç¤¾å ããã³ç¤¾å¤ã®é¢ä¿è ã¨èª¿æ´ããã¦ããã
NISTãµã¤ãã¼ã»ãã¥ãªãã£ãã¬ã¼ã ã¯ã¼ã¯2.0ã«ãããTierã®æ¦è¦
詳細ã¯CSF2.0æ¬æã確èªããå¿
è¦ãããã¾ããããªã¹ã¯ã¬ããã³ã¹ããªã¹ã¯ããã¸ã¡ã³ãã®Tierï¼é層ï¼ã以ä¸ã®ããã«ç¤ºããã¾ããã段éã¯å¾æ¥éãã®4段éã§ãã
å¾æ¥éããå¿
ãããTier4ãç®æããªãã¦ã¯ãªããªãããã§ã¯ãªããçµç¹ã®äºæ
ã«å¿ãã¦ã©ã®Tierãç®æãããèªã決ãããã¨ãéè¦ã§ãã
å³4ï¼ãªã¹ã¯ã¬ããã³ã¹ããªã¹ã¯ããã¸ã¡ã³ãã«é¢ããTierã®æ¦è¦
ã¾ã¨ã
ä»åã®CSF2.0ã¸ã®å¤æ´ã«ããããµã¤ãã¼ã»ãã¥ãªãã£ã®åãçµã¿ã«ããã¦ã¬ããã³ã¹ã®éè¦æ§ãç¹ã«ãµãã©ã¤ãã§ã¼ã³ã»ãã¥ãªãã£ã®éè¦æ§ãã¯ãã¼ãºã¢ããããã¾ããããã¡ãããå¤ãã®çµç¹ã«ããã¦ã¬ããã³ã¹ããµãã©ã¤ãã§ã¼ã³ã»ãã¥ãªãã£ãåãçµãã§ããã¨æãã¾ããããã®åªå
度ã»éè¦åº¦ãä¸æ®µä¸ãã£ãã¨æãã¾ãã
ã¨ã¯ãããã¬ããã³ã¹ã«å®ãããã¦ããå
容ã¯å¤ããç´æ¥çãªã»ãã¥ãªãã£å¯¾çã§ã¯ãªããããã©ããã¦ããã®å¹æãå®è£
ã¤ã¡ã¼ã¸ãã¤ãã¥ããã¨æãã¾ããä»åã®å¤§å¹
æ¹å®ã§ã¯ãCSF2.0å©ç¨ä¸ã®åèæ
å ±ããã¾ãã¾ãªå½¢ã§æä¾ããã¦ãã¾ãã®ã§ãããããåèã«å¸¸ã«ãªã¹ã¯ãææ¡ãã¹ãã¼ãã£ã¼ã«å¯¾å¿ããããã®ä»çµã¿ã¥ãããé²ãããã¨ãæã¾ããã§ãã
åèæ å ±
NTTãã¼ã¿å 端æè¡ã§ã¯CSFã®ãããããã§ã¼ãºã«ããã¦ã»ãã¥ãªãã£ãµã¼ãã¹ãæä¾ãã¦ãã¾ãããåãåãããã ããã
å³5ï¼NTTãã¼ã¿å 端æè¡ã®ä¸»ãªã»ãã¥ãªãã£ãµã¼ãã¹
åèè³æ
- [1]The NIST Cybersecurity Framework 2.0
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf - [2]Public Draft: The NIST Cybersecurity Framework 2.0
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.ipd.pdf - [3]éè¦ã¤ã³ãã©ã®ãµã¤ãã¼ã»ãã¥ãªãã£ãæ¹åããããã®ãã¬ã¼ã ã¯ã¼ã¯ã1.1çï¼é 対訳ï¼
https://www.ipa.go.jp/security/reports/oversea/nist/ug65p90000019cp4-att/000071204.pdf - [4]NIST Cybersecurity Framework (CSF) 2.0 Reference Tool
https://csrc.nist.gov/projects/cybersecurity-framework/filters#/csf/filters - [5]Quick-Start Guide for Creating and Using Organizational Profileï¼NIST SP 1301
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1301.pdf - [6]Quick-Start Guide for Cybersecurity Supply Chain Risk Management (C-SCRM)ï¼NIST SP 1305 (Initial Public Draft)
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1305.ipd.pdf - [7]Small Business Quick-Start Guide
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1300.pdf - [8]Notional CSF 2.0 Profile Template
https://www.nist.gov/document/csf-20-notional-organizational-profile-template - [9]NIST SP 800-218 Version 1.1ï¼ã»ãã¥ã¢ã½ããã¦ã§ã¢éçºãã¬ã¼ã ã¯ã¼ã¯ï¼SSDFï¼
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-218.pdf - [10]NIST SP 800-221Aï¼æ
å ±éä¿¡æè¡ï¼ICTï¼ãªã¹ã¯ã«å¯¾ããææï¼
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-221A.pdf - [11]CIS Controls
https://www.cisecurity.org/controls - [12]CRI Profile Version 2.0
https://cyberriskinstitute.org/the-profile/
- â»æä¸ã®åååãä¼ç¤¾åãå£ä½åã¯ãä¸è¬ã«å社ã®åæ¨ã¾ãã¯ç»é²åæ¨ã§ãã