- ãããã¨ããããã¾ãï¼
- ãããï¼ããè¨äºä¸è¦§ãã¿ã
SMBCã°ã«ã¼ãã®è å¨ã¤ã³ããªã¸ã§ã³ã¹éç¨ããå°éãã¼ã ãã®å½¹å²ã¨ã¯
å¹´ã å¢å¤§ãããµã¤ãã¼ã»ãã¥ãªãã£ãªã¹ã¯ã«å¯¾å¦ããææ³ã¨ãã¦æ³¨ç®ããã¦ãããè å¨ã¤ã³ããªã¸ã§ã³ã¹ããä¸äºä½åãã£ãã³ã·ã£ã«ã°ã«ã¼ãï¼ä»¥ä¸ãSMBCã°ã«ã¼ãï¼ã§ã¯ãåææ³ãæ´»ç¨ããããã«å°éãã¼ã ãç«ã¡ä¸ããåãçµã¿ãé²ãã¦ãããSMBCã°ã«ã¼ãã®äºä¾ããã广çãªè å¨ã¤ã³ããªã¸ã§ã³ã¹ã®æ´»ç¨æ¹æ³ã解説ãããå°éãã¼ã ãç«ã¡ä¸ããSMBCã°ã«ã¼ã
ãããããåãã«é¢é£ãã¦ããªã¹ã¯ç®¡çã®å¯¾è±¡ã¯æ¥ã æ¡å¤§ãã¦ãããã»ãã¥ãªãã£æ å¢ããã£ããã¨ç®¡çãã¦ããããã«ã¯ãªã¹ã¯ãã¼ã¹ã§èããå¿ è¦ããããæ£ãã夿ãããããã«ã¯è å¨ã¤ã³ããªã¸ã§ã³ã¹ã®æ´»ç¨ãä¸å¯æ¬ ã«ãªã£ã¦ããããã話ãã®ã¯ãä¸äºä½åãã£ãã³ã·ã£ã«ã°ã«ã¼ã ãµã¤ãã¼ã»ãã¥ãªãã£çµ±æ¬é¨ã»é¨é·ä»£çã®åç°åè¼æ°ã ãåç°æ°ã¯2019å¹´ã«è å¨ã¤ã³ããªã¸ã§ã³ã¹åæï¼CTIAï¼Cyber Threat Intelligence Analysisï¼ãã¼ã ãSMBCã°ã«ã¼ãå ã«ç«ã¡ä¸ããä¸ã®ä¸ã®è å¨ååãè¸ã¾ãããªã¹ã¯ãã¼ã¹ã§ã®å¯¾å¿ãè¡ã£ã¦ããã
ãSMBCã°ã«ã¼ãã§ã¯2019å¹´ã«ãµã¤ãã¼è å¨ã¤ã³ããªã¸ã§ã³ã¹åæã®å°éãã¼ã ãç«ã¡ä¸ããå¤é¨è å¨ãè¸ã¾ãããªã¹ã¯ãã¼ã¹ã§ã®å¯¾å¿ãè¡ã£ã¦ãã¾ããè å¨ã¤ã³ããªã¸ã§ã³ã¹ã«åãçµãã«ã¯å°éçãªã¹ãã«ãå¿ è¦ã§ãããå¤é¨ã®ãµã¼ãã¹ãå©ç¨ããã¨è²»ç¨ãå¿ è¦ã§ãããã®ãããç§å ±ã®ãããªã¦ã¼ã¶ã¼ä¼æ¥ã«ããã¦ã¯æ´»ç¨ãé²ãã§ããã¨ã¯è¨ããªãç¶æ³ã¨æãã¦ãã¾ããSMBCã°ã«ã¼ãã§ã¯ãã客ãã¾ãèªç¤¾ã·ã¹ãã ãå®ããéèãµã¼ãã¹ãå®å®çã«æä¾ãã¦ãããã¨ã«ç¦ç¹ãå½ã¦ã¦ã大èã«æ©è½ã忍鏿ãããã¨ã§å¹æçã«ã¤ã³ããªã¸ã§ã³ã¹ãæ´»ç¨ãã¦ãã¾ãããï¼åç°æ°ï¼
ãã§ã¯ãSMBCã°ã«ã¼ãã§ã¯å ·ä½çã«ã©ã®ããã«ãã¦è å¨ã¤ã³ããªã¸ã§ã³ã¹ãæ´»ç¨ãã¦ããã®ã ãããã以ä¸ã§è©³ãã解説ããã
ãã®è¨äºã®ç¶ã ï¼ï¼
-
ã»è å¨ã¤ã³ããªã¸ã§ã³ã¹æ´»ç¨ã«ã¯ä½ãæ±ããããï¼
ã»SMBCãéè¦ãã¦ãããããå§¿å¢ã
ã»è å¨ã¤ã³ããªã¸ã§ã³ã¹ã®éç¨ã5ã¤ã®ãã¤ã³ãã
ãã®ç¶ãã¯
ä¼å¡éå®ï¼å®å
¨ç¡æï¼ã§ã
ããããå ã¯ããã¸ãã¹+ITãä¼å¡ã«ç»é²ãããæ¹ã®ã¿ãã覧ããã ãã¾ãã
ä»ãããã¸ãã¹ï¼ITä¼å¡ã«
ãç»é²ãã ããã
ãã¹ã¦ç¡æï¼ä»æ¥ãã使ããã
ä»äºã«å½¹ç«ã¤æ
å ±æºè¼ï¼
-
ããã§ããè¦ãããªã
2䏿¬è¶ ã®ãªãªã¸ãã«è¨äºã»åç»ã»è³æãè¦æ¾é¡ï¼
-
å®å ¨ç¡æ
ç»é²æã»æé¡æãªããå®å ¨ç¡æã§ä½¿ãæ¾é¡ï¼
-
ãã¬ã³ããèãã¦å¦ã¶
å¹´é1000æ¬è¶ ã®å³é¸ã»ããã¼ã«åå ãæ¾é¡ï¼
-
èå³é¢å¿ã®ã¿å³é¸
ãããã¯ï¼ã¿ã°ï¼ããã©ãã¼ãã¦èªååéï¼
æä¾ä¼æ¥ä¸è¦§
- æ ªå¼ä¼ç¤¾ãã¯ãã«
- ã Splunk Services Japanååä¼ç¤¾