¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤Î10ÂçÀßÄê¥ß¥¹¡¢ÊƹñNSA¤ÈCISA¤¬·Ù¹ð
ÊƹñÅÚ°ÂÁ´Êݾã¾Ê¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¡¦¥¤¥ó¥Õ¥é¥¹¥È¥é¥¯¥Á¥ã¥»¥¥å¥ê¥Æ¥£Ä£(CISA: Cybersecurity and Infrastructure Security Agency)¤Ï2023ǯ10·î5Æü(Êƹñ»þ´Ö)¡¢¡ÖNSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations¡ÃCISA¡×¤Ë¤ª¤¤¤Æ¡¢Êƹñ²È°ÂÁ´Êݾã¶É(NSA: National Security Agency)¤È¶¦¤Ë¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤ÎÀßÄê¥ß¥¹¥È¥Ã¥×10¤Ë´Ø¤¹¤ë´«¹ð¤òȯɽ¤·¤¿¡£
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations¡ÃCISA
ȯɽ¤µ¤ì¤¿¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤Ï¼¡¤Î¥µ¥¤¥È¤«¤é±ÜÍ÷¤Ç¤¤ë¡£
¡ÖNSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations | CISA¡×
PDFÈÇ - ¡ÖNSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations | U.S. Department of Defense¡×
¤³¤Î´«¹ð¤Ç¤Ï¡¢Â絬ÌÏÁÈ¿¥¤Ç°ìÈÌŪ¤Ê¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤ÎÀßÄê¥ß¥¹¤Ë¤Ä¤¤¤ÆÀâÌÀ¤·¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤¬¤³¤ì¤éÀßÄê¥ß¥¹¤ò°ÍѤ¹¤ë¤¿¤á¤Ë»ÈÍѤ¹¤ëÀï½Ñ¡¢µ»½Ñ¡¢¼ê½ç(TTPs: Tactics, Techniques, and Procedures)¤Ë¤Ä¤¤¤Æ¾Ü¤·¤¯²òÀ⤷¤Æ¤¤¤ë¡£¤Þ¤¿¡¢ÀßÄê¥ß¥¹¤ò¶¼°Ò¥¢¥¯¥¿¡¼¤Ë°ÍѤµ¤ì¤ë¥ê¥¹¥¯¤ò·Ú¸º¤¹¤ë¤¿¤á¤Ë¡¢¿ä¾©¤µ¤ì¤ë´ËϺö¤òÄ󼨤·¤Æ¤¤¤ë¡£
¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤ÇÀâÌÀ¤µ¤ì¤Æ¤¤¤ëÀßÄê¥ß¥¹¡¢¥È¥Ã¥×10¤È¤½¤ÎÍ×Ìó¤Ï¼¡¤Î¤È¤ª¤ê¡£
¥½¥Õ¥È¥¦¥§¥¢¤È¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥Ç¥Õ¥©¥ë¥ÈÀßÄê - ¥·¥¹¥Æ¥à¡¢¥µ¡¼¥Ó¥¹¡¢¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥Ç¥Õ¥©¥ë¥ÈÀßÄê¤Ï¡¢ÉÔÀµ¥¢¥¯¥»¥¹¤ä¤½¤Î¤Û¤«¤Î°°Õ¤¢¤ë³èÆ°¤òµö¤¹²ÄǽÀ¤¬¤¢¤ë¡£Æä˥ǥե©¥ë¥È¤Îǧ¾Ú¾ðÊó¤ä¥µ¡¼¥Ó¥¹¤Î¸¢¸Â¤Ê¤É¤Ï¡¢¶¼°Ò¥¢¥¯¥¿¤«¤é´Êñ¤Ë°ÍѤµ¤ì¤ë²ÄǽÀ¤¬¤¢¤ë
¥æ¡¼¥¶¡¼¸¢¸Â¤È´ÉÍý¼Ô¸¢¸Â¤ÎÉÔŬÀÚ¤ÊʬΥ - ´ÉÍý¼Ô¤Ï¿¤¯¤Î¾ì¹ç¡¢1¤Ä¤Î¥¢¥«¥¦¥ó¥È¤ËÊ£¿ô¤Î¸¢¸Â¤òÍ¿¤¨¤ë¡£¤³¤Î¤è¤¦¤Ê¥¢¥«¥¦¥ó¥È¤Ï¶¼°Ò¥¢¥¯¥¿¡¼¤Î²£Êý¸þ¤Î°ÜÆ°¤ä¸¢¸Â¾º³Ê¤Î¸¡½Ð¤ò˸¤²¡¢¤³¤ì¤é¹Ô°Ù¤ò¼Â¸½¤¹¤ë²ÄǽÀ¤¬¤¢¤ë
ÉÔ½½Ê¬¤ÊÆâÉô¥Í¥Ã¥È¥ï¡¼¥¯¤Î´Æ»ë - °ìÉô¤ÎÁÈ¿¥¤Ç¤Ï¥È¥é¥Õ¥£¥Ã¥¯¼ý½¸¤È¥¨¥ó¥É¥Û¥¹¥È¤Î¥í¥°µÏ¿¤Î¤¿¤á¤Ë¥Û¥¹¥È¤È¥Í¥Ã¥È¥ï¡¼¥¯¥»¥ó¥µ¡¼¤òŬÀڤ˹½À®¤·¤Æ¤¤¤Ê¤¤¡£¤³¤ì¤é¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¿¯³²¤ò¸¡½Ð¤Ç¤¤Ê¤¤²ÄǽÀ¤¬¤¢¤ë
¥Í¥Ã¥È¥ï¡¼¥¯¥»¥°¥á¥ó¥Æ¡¼¥·¥ç¥ó¤Î·çÇ¡ - ¥Í¥Ã¥È¥ï¡¼¥¯¥»¥°¥á¥ó¥Æ¡¼¥·¥ç¥ó¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¥æ¡¼¥¶¡¼¡¢±¿Íѥͥåȥ¥¯¡¢½ÅÍפʥ·¥¹¥Æ¥à¥Í¥Ã¥È¥ï¡¼¥¯´Ö¤Ë¥»¥¥å¥ê¥Æ¥£¤Î¶³¦¤¬¤Ê¤¤¾õÂ֤Ȥʤ롣¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Î¥ê¥½¡¼¥¹¤ò¿¯³²¤·¤¿¶¼°Ò¥¢¥¯¥¿¤Ï¤µ¤Þ¤¶¤Þ¤Ê¥·¥¹¥Æ¥à´Ö¤ò²£Êý¸þ¤Ë°ÜÆ°¤Ç¤¤Æ¤·¤Þ¤¦
ÉÔ½½Ê¬¤Ê¥Ñ¥Ã¥Á´ÉÍý - ¥Ñ¥Ã¥Á´ÉÍý¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤Ï½¤Àµ¤µ¤ì¤Æ¤¤¤Ê¤¤ÉÔ¶ñ¹ç¤òȯ¸«¤·¤Æ½ÅÂç¤ÊÀȼåÀ¤ò°ÍѤ¹¤ë²ÄǽÀ¤¬¤¢¤ë¡£¥Ñ¥Ã¥ÁŬÍѤÎÃÙ¤ì¤Î¤Û¤«¤Ë¥µ¥Ý¡¼¥È¤ò½ªÎ»¤·¤¿¥½¥Õ¥È¥¦¥§¥¢¤ä¥Ï¡¼¥É¥¦¥§¥¢¤Î»ÈÍѤ⤳¤ì¤Ë³ºÅö¤¹¤ë
¥·¥¹¥Æ¥à¥¢¥¯¥»¥¹À©¸æ¤Î¥Ð¥¤¥Ñ¥¹ - ¶¼°Ò¥¢¥¯¥¿¡¼¤Ï´Ä¶Æâ¤ÎÂåÂØǧ¾ÚÊýË¡¤ò¿¯³²¤¹¤ë¤³¤È¤Ç¥·¥¹¥Æ¥à¤Î¥¢¥¯¥»¥¹À©¸æ¤ò¥Ð¥¤¥Ñ¥¹¤¹¤ë¤³¤È¤¬¤¢¤ë¡£ÂåɽŪ¤Ê¤â¤Î¤ËKerberoasting¹¶·â¤¬¤¢¤ë
¿Í×ÁÇǧ¾Ú(MFA: Multi-Factor Authentication)Êý¼°¤Î¼å¤µ¤äÀßÄê¥ß¥¹ - ¿Í×ÁÇǧ¾Ú¤Ë¤ª¤±¤ë°ìÉô¤ÎÊý¼°¤Ï¥Õ¥£¥Ã¥·¥ó¥°¤äSIM¥¹¥ï¥Ã¥×¤Ê¤É¤Î¹¶·â¤ËÂФ·¤ÆÀȼå
¥Í¥Ã¥È¥ï¡¼¥¯¶¦Í¤È¥µ¡¼¥Ó¥¹¤ËÂФ¹¤ë¥¢¥¯¥»¥¹À©¸æ¥ê¥¹¥È¤¬ÉÔ½½Ê¬ - ÉÔŬÀÚ¤ÊÀßÄê¤Ë¤è¤ê¡¢¸¢¸Â¤Î¤Ê¤¤¥æ¡¼¥¶¤¬¶¦Í¥É¥é¥¤¥Ö¾å¤Îµ¡Ì©¥Ç¡¼¥¿¤Ë¥¢¥¯¥»¥¹¤Ç¤¤ë¾ì¹ç¤¬¤¢¤ë¡£¶¦Í¥É¥é¥¤¥Ö¤ä¥Õ¥©¥ë¥À¤Ï¡¢¥³¥Þ¥ó¥É¡¢¥ª¡¼¥×¥ó¥½¡¼¥¹¤Î¥Ä¡¼¥ë¡¢¥Þ¥ë¥¦¥§¥¢¤Ê¤É¤«¤é¸¡º÷¤¹¤ë¤³¤È¤¬¤Ç¤¤ë
ǧ¾Ú¾ðÊó¤Î±ÒÀ¸¾õÂÖ¤¬ÉÔŬÀÚ - ´Êñ¤Ë²òÆɤǤ¤ë¥Ñ¥¹¥ï¡¼¥É¤Î»ÈÍѤ䡢¥Ñ¥¹¥ï¡¼¥É¤ò¥Æ¥¥¹¥È¥Õ¥¡¥¤¥ë¤ËÊݸ¤¹¤ë¤È¶¼°Ò¥¢¥¯¥¿¤Ë¤è¤ê»ñ³Ê¾ðÊó¤¬Àà¼è¤µ¤ì¤ë²ÄǽÀ¤¬¹â¤¯¤Ê¤ë
̵À©¸Â¤Î¥³¡¼¥É¼Â¹Ô - ̤¸¡¾Ú¤Î¥×¥í¥°¥é¥à¤Î¼Â¹Ô¤¬µö²Ä¤µ¤ì¤Æ¤¤¤ë¾ì¹ç¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤ÏǤ°Õ¤Î°°Õ¤¢¤ë¥Ú¥¤¥í¡¼¥É¤ò¼Â¹Ô¤¹¤ë²ÄǽÀ¤¬¤¢¤ë
¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤Ç¤Ï¼¡¤Î¤è¤¦¤ÊÂкö¤Î¼Â»Ü¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£
¾åµ¤ÎÀßÄê¥ß¥¹¤ò²þÁ±¤·¤Æ¥ê¥¹¥¯¤ò·Ú¸º¤¹¤ë¤¿¤á¡¢Æ±´«¹ð¤ËµºÜ¤µ¤ì¤Æ¤¤¤ë´ËϺö¤òɬÍפ˱þ¤¸¤Æ¼Â»Ü¤¹¤ë
¤¹¤Ù¤Æ¤Î½ÅÍ×¥¤¥ó¥Õ¥é»ö¶ÈÂΤϡÖCross-Sector Cybersecurity Performance Goals | CISA¡×¤ò±ÜÍ÷¤·É¬Íפ˱þ¤¸¤Æ¼Â»Ü¤¹¤ë
¥½¥Õ¥È¥¦¥§¥¢³«È¯À½Â¤¶È¼Ô¤Ï¡ÖÈ¢¤«¤é½Ð¤·¤Æ¤¹¤°°ÂÁ´¡×¤Ç¤¢¤ë¤³¤È¤òÊݾڤ¹¤ë¤¿¤á¡¢Æ±´«¹ð¤ËµºÜ¤µ¤ì¤Æ¤¤¤ë¿ä¾©»ö¹à¤ò¼Â»Ü¤¹¤ë
Ʊ´«¹ð¤Ë¥¢¥É¥Ð¥¤¥¶¥ê¤È¤·¤ÆµºÜ¤·¤Æ¤¤¤ë¡ÖMITRE ATT&CK Tactics and Techniques¡×¤ËÂбþ¤·¤¿¶¼°Ò¤ÎµóÆ°¤ËÂФ¹¤ëÁÈ¿¥¤Î¥»¥¥å¥ê¥Æ¥£¥×¥í¥°¥é¥à¤Î±é½¬¡¢¥Æ¥¹¥È¡¢¸¡¾Ú¤ò¹Ô¤¦
CISA¤Ï¾åµ¤Î¤è¤¦¤ÊÀßÄê¥ß¥¹¤Ï¤¢¤Þ¤ê¤Ë°ìÈÌŪ¤Ç¤¢¤ê¡¢µºÜ¤µ¤ì¤ë¥Æ¥¯¥Ë¥Ã¥¯¤â¶¼°Ò¥¢¥¯¥¿¡¼¤Ëɸ½àŪ¤Ë°ÍѤµ¤ì¤Æ¤¤¤ë¤â¤Î¤Ç¡¢¼ÂºÝ¤Ë¿¤¯¤Î¥Í¥Ã¥È¥ï¡¼¥¯¿¯³²¤Î¸¶°ø¤Ë¤Ê¤Ã¤Æ¤¤¤ë¤È¤·¤Æ¤¤¤ë¡£Â絬ÌÏÁÈ¿¥¤Î¥·¥¹¥Æ¥à¤ª¤è¤Ó¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¼Ô¤ËÂФ·¤Æ¤Ï¡¢Æ±´«¹ð¤ÇÄ󼨤µ¤ì¤Æ¤¤¤ë´ËϺö¤òŬÀڤ˼»ܤ·¡¢¥·¥¹¥Æ¥à¡¢¥Í¥Ã¥È¥ï¡¼¥¯¡¢µ¡Ì©¾ðÊó¤Ê¤É¤òÊݸ¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£
ȯɽ¤µ¤ì¤¿¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤Ï¼¡¤Î¥µ¥¤¥È¤«¤é±ÜÍ÷¤Ç¤¤ë¡£
¡ÖNSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations | CISA¡×
PDFÈÇ - ¡ÖNSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations | U.S. Department of Defense¡×
¤³¤Î´«¹ð¤Ç¤Ï¡¢Â絬ÌÏÁÈ¿¥¤Ç°ìÈÌŪ¤Ê¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£¤ÎÀßÄê¥ß¥¹¤Ë¤Ä¤¤¤ÆÀâÌÀ¤·¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤¬¤³¤ì¤éÀßÄê¥ß¥¹¤ò°ÍѤ¹¤ë¤¿¤á¤Ë»ÈÍѤ¹¤ëÀï½Ñ¡¢µ»½Ñ¡¢¼ê½ç(TTPs: Tactics, Techniques, and Procedures)¤Ë¤Ä¤¤¤Æ¾Ü¤·¤¯²òÀ⤷¤Æ¤¤¤ë¡£¤Þ¤¿¡¢ÀßÄê¥ß¥¹¤ò¶¼°Ò¥¢¥¯¥¿¡¼¤Ë°ÍѤµ¤ì¤ë¥ê¥¹¥¯¤ò·Ú¸º¤¹¤ë¤¿¤á¤Ë¡¢¿ä¾©¤µ¤ì¤ë´ËϺö¤òÄ󼨤·¤Æ¤¤¤ë¡£
¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤ÇÀâÌÀ¤µ¤ì¤Æ¤¤¤ëÀßÄê¥ß¥¹¡¢¥È¥Ã¥×10¤È¤½¤ÎÍ×Ìó¤Ï¼¡¤Î¤È¤ª¤ê¡£
¥½¥Õ¥È¥¦¥§¥¢¤È¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥Ç¥Õ¥©¥ë¥ÈÀßÄê - ¥·¥¹¥Æ¥à¡¢¥µ¡¼¥Ó¥¹¡¢¥¢¥×¥ê¥±¡¼¥·¥ç¥ó¤Î¥Ç¥Õ¥©¥ë¥ÈÀßÄê¤Ï¡¢ÉÔÀµ¥¢¥¯¥»¥¹¤ä¤½¤Î¤Û¤«¤Î°°Õ¤¢¤ë³èÆ°¤òµö¤¹²ÄǽÀ¤¬¤¢¤ë¡£Æä˥ǥե©¥ë¥È¤Îǧ¾Ú¾ðÊó¤ä¥µ¡¼¥Ó¥¹¤Î¸¢¸Â¤Ê¤É¤Ï¡¢¶¼°Ò¥¢¥¯¥¿¤«¤é´Êñ¤Ë°ÍѤµ¤ì¤ë²ÄǽÀ¤¬¤¢¤ë
¥æ¡¼¥¶¡¼¸¢¸Â¤È´ÉÍý¼Ô¸¢¸Â¤ÎÉÔŬÀÚ¤ÊʬΥ - ´ÉÍý¼Ô¤Ï¿¤¯¤Î¾ì¹ç¡¢1¤Ä¤Î¥¢¥«¥¦¥ó¥È¤ËÊ£¿ô¤Î¸¢¸Â¤òÍ¿¤¨¤ë¡£¤³¤Î¤è¤¦¤Ê¥¢¥«¥¦¥ó¥È¤Ï¶¼°Ò¥¢¥¯¥¿¡¼¤Î²£Êý¸þ¤Î°ÜÆ°¤ä¸¢¸Â¾º³Ê¤Î¸¡½Ð¤ò˸¤²¡¢¤³¤ì¤é¹Ô°Ù¤ò¼Â¸½¤¹¤ë²ÄǽÀ¤¬¤¢¤ë
ÉÔ½½Ê¬¤ÊÆâÉô¥Í¥Ã¥È¥ï¡¼¥¯¤Î´Æ»ë - °ìÉô¤ÎÁÈ¿¥¤Ç¤Ï¥È¥é¥Õ¥£¥Ã¥¯¼ý½¸¤È¥¨¥ó¥É¥Û¥¹¥È¤Î¥í¥°µÏ¿¤Î¤¿¤á¤Ë¥Û¥¹¥È¤È¥Í¥Ã¥È¥ï¡¼¥¯¥»¥ó¥µ¡¼¤òŬÀڤ˹½À®¤·¤Æ¤¤¤Ê¤¤¡£¤³¤ì¤é¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¿¯³²¤ò¸¡½Ð¤Ç¤¤Ê¤¤²ÄǽÀ¤¬¤¢¤ë
¥Í¥Ã¥È¥ï¡¼¥¯¥»¥°¥á¥ó¥Æ¡¼¥·¥ç¥ó¤Î·çÇ¡ - ¥Í¥Ã¥È¥ï¡¼¥¯¥»¥°¥á¥ó¥Æ¡¼¥·¥ç¥ó¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¥æ¡¼¥¶¡¼¡¢±¿Íѥͥåȥ¥¯¡¢½ÅÍפʥ·¥¹¥Æ¥à¥Í¥Ã¥È¥ï¡¼¥¯´Ö¤Ë¥»¥¥å¥ê¥Æ¥£¤Î¶³¦¤¬¤Ê¤¤¾õÂ֤Ȥʤ롣¥Í¥Ã¥È¥ï¡¼¥¯¾å¤Î¥ê¥½¡¼¥¹¤ò¿¯³²¤·¤¿¶¼°Ò¥¢¥¯¥¿¤Ï¤µ¤Þ¤¶¤Þ¤Ê¥·¥¹¥Æ¥à´Ö¤ò²£Êý¸þ¤Ë°ÜÆ°¤Ç¤¤Æ¤·¤Þ¤¦
ÉÔ½½Ê¬¤Ê¥Ñ¥Ã¥Á´ÉÍý - ¥Ñ¥Ã¥Á´ÉÍý¤¬ÉÔ½½Ê¬¤Ê¾ì¹ç¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤Ï½¤Àµ¤µ¤ì¤Æ¤¤¤Ê¤¤ÉÔ¶ñ¹ç¤òȯ¸«¤·¤Æ½ÅÂç¤ÊÀȼåÀ¤ò°ÍѤ¹¤ë²ÄǽÀ¤¬¤¢¤ë¡£¥Ñ¥Ã¥ÁŬÍѤÎÃÙ¤ì¤Î¤Û¤«¤Ë¥µ¥Ý¡¼¥È¤ò½ªÎ»¤·¤¿¥½¥Õ¥È¥¦¥§¥¢¤ä¥Ï¡¼¥É¥¦¥§¥¢¤Î»ÈÍѤ⤳¤ì¤Ë³ºÅö¤¹¤ë
¥·¥¹¥Æ¥à¥¢¥¯¥»¥¹À©¸æ¤Î¥Ð¥¤¥Ñ¥¹ - ¶¼°Ò¥¢¥¯¥¿¡¼¤Ï´Ä¶Æâ¤ÎÂåÂØǧ¾ÚÊýË¡¤ò¿¯³²¤¹¤ë¤³¤È¤Ç¥·¥¹¥Æ¥à¤Î¥¢¥¯¥»¥¹À©¸æ¤ò¥Ð¥¤¥Ñ¥¹¤¹¤ë¤³¤È¤¬¤¢¤ë¡£ÂåɽŪ¤Ê¤â¤Î¤ËKerberoasting¹¶·â¤¬¤¢¤ë
¿Í×ÁÇǧ¾Ú(MFA: Multi-Factor Authentication)Êý¼°¤Î¼å¤µ¤äÀßÄê¥ß¥¹ - ¿Í×ÁÇǧ¾Ú¤Ë¤ª¤±¤ë°ìÉô¤ÎÊý¼°¤Ï¥Õ¥£¥Ã¥·¥ó¥°¤äSIM¥¹¥ï¥Ã¥×¤Ê¤É¤Î¹¶·â¤ËÂФ·¤ÆÀȼå
¥Í¥Ã¥È¥ï¡¼¥¯¶¦Í¤È¥µ¡¼¥Ó¥¹¤ËÂФ¹¤ë¥¢¥¯¥»¥¹À©¸æ¥ê¥¹¥È¤¬ÉÔ½½Ê¬ - ÉÔŬÀÚ¤ÊÀßÄê¤Ë¤è¤ê¡¢¸¢¸Â¤Î¤Ê¤¤¥æ¡¼¥¶¤¬¶¦Í¥É¥é¥¤¥Ö¾å¤Îµ¡Ì©¥Ç¡¼¥¿¤Ë¥¢¥¯¥»¥¹¤Ç¤¤ë¾ì¹ç¤¬¤¢¤ë¡£¶¦Í¥É¥é¥¤¥Ö¤ä¥Õ¥©¥ë¥À¤Ï¡¢¥³¥Þ¥ó¥É¡¢¥ª¡¼¥×¥ó¥½¡¼¥¹¤Î¥Ä¡¼¥ë¡¢¥Þ¥ë¥¦¥§¥¢¤Ê¤É¤«¤é¸¡º÷¤¹¤ë¤³¤È¤¬¤Ç¤¤ë
ǧ¾Ú¾ðÊó¤Î±ÒÀ¸¾õÂÖ¤¬ÉÔŬÀÚ - ´Êñ¤Ë²òÆɤǤ¤ë¥Ñ¥¹¥ï¡¼¥É¤Î»ÈÍѤ䡢¥Ñ¥¹¥ï¡¼¥É¤ò¥Æ¥¥¹¥È¥Õ¥¡¥¤¥ë¤ËÊݸ¤¹¤ë¤È¶¼°Ò¥¢¥¯¥¿¤Ë¤è¤ê»ñ³Ê¾ðÊó¤¬Àà¼è¤µ¤ì¤ë²ÄǽÀ¤¬¹â¤¯¤Ê¤ë
̵À©¸Â¤Î¥³¡¼¥É¼Â¹Ô - ̤¸¡¾Ú¤Î¥×¥í¥°¥é¥à¤Î¼Â¹Ô¤¬µö²Ä¤µ¤ì¤Æ¤¤¤ë¾ì¹ç¡¢¶¼°Ò¥¢¥¯¥¿¡¼¤ÏǤ°Õ¤Î°°Õ¤¢¤ë¥Ú¥¤¥í¡¼¥É¤ò¼Â¹Ô¤¹¤ë²ÄǽÀ¤¬¤¢¤ë
¶¦Æ±¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£´«¹ð¤Ç¤Ï¼¡¤Î¤è¤¦¤ÊÂкö¤Î¼Â»Ü¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£
¾åµ¤ÎÀßÄê¥ß¥¹¤ò²þÁ±¤·¤Æ¥ê¥¹¥¯¤ò·Ú¸º¤¹¤ë¤¿¤á¡¢Æ±´«¹ð¤ËµºÜ¤µ¤ì¤Æ¤¤¤ë´ËϺö¤òɬÍפ˱þ¤¸¤Æ¼Â»Ü¤¹¤ë
¤¹¤Ù¤Æ¤Î½ÅÍ×¥¤¥ó¥Õ¥é»ö¶ÈÂΤϡÖCross-Sector Cybersecurity Performance Goals | CISA¡×¤ò±ÜÍ÷¤·É¬Íפ˱þ¤¸¤Æ¼Â»Ü¤¹¤ë
¥½¥Õ¥È¥¦¥§¥¢³«È¯À½Â¤¶È¼Ô¤Ï¡ÖÈ¢¤«¤é½Ð¤·¤Æ¤¹¤°°ÂÁ´¡×¤Ç¤¢¤ë¤³¤È¤òÊݾڤ¹¤ë¤¿¤á¡¢Æ±´«¹ð¤ËµºÜ¤µ¤ì¤Æ¤¤¤ë¿ä¾©»ö¹à¤ò¼Â»Ü¤¹¤ë
Ʊ´«¹ð¤Ë¥¢¥É¥Ð¥¤¥¶¥ê¤È¤·¤ÆµºÜ¤·¤Æ¤¤¤ë¡ÖMITRE ATT&CK Tactics and Techniques¡×¤ËÂбþ¤·¤¿¶¼°Ò¤ÎµóÆ°¤ËÂФ¹¤ëÁÈ¿¥¤Î¥»¥¥å¥ê¥Æ¥£¥×¥í¥°¥é¥à¤Î±é½¬¡¢¥Æ¥¹¥È¡¢¸¡¾Ú¤ò¹Ô¤¦
CISA¤Ï¾åµ¤Î¤è¤¦¤ÊÀßÄê¥ß¥¹¤Ï¤¢¤Þ¤ê¤Ë°ìÈÌŪ¤Ç¤¢¤ê¡¢µºÜ¤µ¤ì¤ë¥Æ¥¯¥Ë¥Ã¥¯¤â¶¼°Ò¥¢¥¯¥¿¡¼¤Ëɸ½àŪ¤Ë°ÍѤµ¤ì¤Æ¤¤¤ë¤â¤Î¤Ç¡¢¼ÂºÝ¤Ë¿¤¯¤Î¥Í¥Ã¥È¥ï¡¼¥¯¿¯³²¤Î¸¶°ø¤Ë¤Ê¤Ã¤Æ¤¤¤ë¤È¤·¤Æ¤¤¤ë¡£Â絬ÌÏÁÈ¿¥¤Î¥·¥¹¥Æ¥à¤ª¤è¤Ó¥Í¥Ã¥È¥ï¡¼¥¯´ÉÍý¼Ô¤ËÂФ·¤Æ¤Ï¡¢Æ±´«¹ð¤ÇÄ󼨤µ¤ì¤Æ¤¤¤ë´ËϺö¤òŬÀڤ˼»ܤ·¡¢¥·¥¹¥Æ¥à¡¢¥Í¥Ã¥È¥ï¡¼¥¯¡¢µ¡Ì©¾ðÊó¤Ê¤É¤òÊݸ¤ë¤³¤È¤¬Ë¾¤Þ¤ì¤Æ¤¤¤ë¡£