¥µ¥¤¥Ð¡¼¹¶·â¤«¤é¥½¥Õ¥È¥¦¥§¥¢¥µ¥×¥é¥¤¥Á¥§¡¼¥ó¤ò¼é¤ë3¤Ä¤Î¥Ò¥ó¥È
The Hacker News¤Ï1·î4Æü(¸½ÃÏ»þ´Ö)¡¢¡ÖThree Ways To Supercharge Your Software Supply Chain Security¡×¤Ë¤ª¤¤¤Æ¡¢¥½¥Õ¥È¥¦¥§¥¢¥µ¥×¥é¥¤¥Á¥§¡¼¥ó¤Î¥»¥¥å¥ê¥Æ¥£¤ò¶¯²½¤¹¤ë3¤Ä¤Î¥Ò¥ó¥È¤ò¾Ò²ð¤·¤¿¡£¤³¤ì¤Ï2021ǯ5·î¤Ë¸ø³«¤µ¤ì¤¿ÂçÅýÎÎÎá¡ÖExecutive Order on Improving the Nation's Cybersecurity | The White House¡×¤ÎÂè4Àá¤Ë¤ª¤¤¤Æ¾Ò²ð¤µ¤ì¤¿¡Ö¥½¥Õ¥È¥¦¥§¥¢¥µ¥×¥é¥¤¥Á¥§¡¼¥ó¡×¤È¤½¤Î¥»¥¥å¥ê¥Æ¥£³ÎÊݤȤ¤¤¦³µÇ°¤ËÁêÅö¤¹¤ë¡£
¡û¥Ò¥ó¥È1¡§ÈëÌ©¤ÏÈëÌ©¤Î¤Þ¤Þ¤Ë¤¹¤ë
2023ǯ¤ËȯÀ¸¤·¤¿Â絬ÌϤʥµ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£»ö°Æ¤Î°ìÉô¤Ç¤Ï¡¢Ê¿Ê¸¤Ç¸ø³«¤µ¤ì¤¿µ¡Ì©¾ðÊ󤬶¼°Ò¥¢¥¯¥¿¤Ëȯ¸«¤µ¤ì¤¿¤³¤È¤ÇȯÀ¸¤·¤¿¡£Sourcegraph¤Î»ö°Æ¤Ç¤Ï¡¢¥³¡¼¥É¤ËËä¤á¹þ¤Þ¤ì¤¿¥¢¥¯¥»¥¹¥È¡¼¥¯¥ó¤ò¥Ñ¥×¥ê¥Ã¥¯¥¤¥ó¥¹¥¿¥ó¥¹¤Ë¸ø³«¤·¤ÆÈëÌ©¤¬Ï³±Ì¡£Sourcegraph API¤Ø¤Î¼«Í³¤Ê¥¢¥¯¥»¥¹¤òµö¤¹¤³¤È¤Ë¤Ê¤Ã¤¿¡£Microsoft¤Î»ö°Æ¤Ç¤Ï¡¢Microsoft¼ÒÆâ¤Î¥Ç¥Ð¥Ã¥°´Ä¶¤Î¥¯¥é¥Ã¥·¥å¥À¥ó¥×¤«¤é¥á¡¼¥ë¤Îǧ¾Ú¾ðÊó¤òºîÀ®¤¹¤ë½ð̾¥¡¼¤¬Ï³±Ì¤·¤¿¡£¤³¤ì¤é¤òËɻߤ¹¤ë¤¿¤á¤Ë¡¢¥³¡¼¥É¤Ëµ¡Ì©¾ðÊó¤òËä¤á¹þ¤Þ¤Ê¤¤¤è¤¦¤ËÃí°Õ¤·¡¢¤³¤ì¤ò¸¡½Ð¤¹¤ë¥Ä¡¼¥ë¤Î³èÍѤȥ³¡¼¥É¥ì¥Ó¥å¡¼¤Î¼Â»Ü¤¬½ÅÍס£
¡û¥Ò¥ó¥È2¡§¥½¥Õ¥È¥¦¥§¥¢¥³¥ó¥Ý¥¸¥·¥ç¥óʬÀÏ(SCA: Software Composition Analysis)¤ò»ÈÍѤ·¤ÆÉôÉÊɽ(BOM: Bills Of Materials)¤òºîÀ®¤¹¤ë
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£µ¬Â§¤È¥Ù¥¹¥È¥×¥é¥¯¥Æ¥£¥¹¤ÎÁÐÊý¤Ç¡¢¥½¥Õ¥È¥¦¥§¥¢¤ò¹½À®¤¹¤ë¤¹¤Ù¤Æ¤ÎÍ×ÁǤνнê¤ò¼¨¤¹¥½¥Õ¥È¥¦¥§¥¢ÉôÉÊɽ¤Î¹Í¤¨¤¬ºÎÍѤµ¤ì¤Æ¤¤¤ë¡£¤·¤«¤·¤Ê¤¬¤é¡¢¥½¥Õ¥È¥¦¥§¥¢¤ÎÉôÉÊɽ¤òºîÀ®¤¹¤ë¤³¤È¤Ï´Êñ¤Ç¤Ï¤Ê¤¤¡£NPM¤äPyPI¤Ê¤É¤Î¥Ñ¥Ã¥±¡¼¥¸¥ê¥Ý¥¸¥È¥ê¤ä¥ª¡¼¥×¥ó¥½¡¼¥¹¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ê¤É¤ò»ÈÍѤ·¤¿¾ì¹ç¡¢°Í¸´Ø·¸¤òÄÉÀפ·¤Æ¤¹¤Ù¤Æ¤Î¥½¥Õ¥È¥¦¥§¥¢°ìÍ÷¤òºîÀ®¤¹¤ëɬÍפ¬¤¢¤ë¡£¤³¤¦¤·¤¿¥Ä¡¼¥ë¤ò»ÈÍѤ¹¤ë¤³¤È¤Ç¡¢¤¹¤Ù¤Æ¤Î°Í¸´Ø·¸¤Ë¤¢¤ë¥½¥Õ¥È¥¦¥§¥¢¥³¥ó¥Ý¡¼¥Í¥ó¥È¤ò¼±Ê̤Ǥ¤ë¡£
¡û¥Ò¥ó¥È3¡§ ¼«Ê¬¼«¿È¤ò¥Ï¥Ã¥¯¤¹¤ë
ÀÕǤ¤¢¤ë¹çˡŪ¤ÊÊýË¡¤Ç¥·¥¹¥Æ¥à¤Þ¤¿¤Ï¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÀȼåÀ¤òÆÃÄꤹ¤ë¡£¤½¤Î¤¿¤á¤Ë¥Û¥ï¥¤¥È¥Ï¥Ã¥«¡¼¤Îµ»½ÑÎϤòÍøÍѤ¹¤ë¡£°°Õ¤Î¤¢¤ë¿Íʪ¤ËÀȼåÀ¤ò°ÍѤµ¤ì¤ëÁ°¤Ë¥Û¥ï¥¤¥È¥Ï¥Ã¥«¡¼¤Ë¤½¤ì¤é¤òȯ¸«¤·¤Æ¤â¤é¤¦¤³¤È¤Ç¡¢ÍøÍѼԤؤμպá¤äÅö¶É¤Ø¤ÎÊó¹ð¤ò²óÈò¤Ç¤¤ë¡£Ê󾩶â¥×¥í¥°¥é¥à¤â¤³¤ÎÂкö¤Ë´Þ¤Þ¤ì¤ë¡£
The Hacker News¤Ï¤³¤ì¤é¥Ò¥ó¥È¤ò³èÍѤ·¡¢¥½¥Õ¥È¥¦¥§¥¢¥µ¥×¥é¥¤¥Á¥§¡¼¥ó¤ò¶¯²½¤¹¤ë¤³¤È¤Ç¥¤¥ó¥·¥Ç¥ó¥ÈÂбþ¤Î»þ´Ö¤òºï¸º¤·¡¢¼ý±×¤ÎÁý²Ã¤Ë¤Ä¤Ê¤¬¤ë¤È»ØŦ¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢¤µ¤é¤Ë¥»¥¥å¥ê¥Æ¥£¶¯²½¤òÌܻؤ¹¾ì¹ç¡¢Google¤¬Ä󾧤¹¤ë¥»¥¥å¥ê¥Æ¥£¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡ÖSLSA • Supply-chain Levels for Software Artifacts¡×¤ò³èÍѤ¹¤ë¤³¤È¤Ç²þ¤¶¤ó¤ÎËɻߡ¢´°Á´À¤Î¸þ¾å¤Ê¤É¤¬Ë¾¤á¤ë¤È¥¢¥É¥Ð¥¤¥¹¤·¤Æ¤¤¤ë¡£
2023ǯ¤ËȯÀ¸¤·¤¿Â絬ÌϤʥµ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£»ö°Æ¤Î°ìÉô¤Ç¤Ï¡¢Ê¿Ê¸¤Ç¸ø³«¤µ¤ì¤¿µ¡Ì©¾ðÊ󤬶¼°Ò¥¢¥¯¥¿¤Ëȯ¸«¤µ¤ì¤¿¤³¤È¤ÇȯÀ¸¤·¤¿¡£Sourcegraph¤Î»ö°Æ¤Ç¤Ï¡¢¥³¡¼¥É¤ËËä¤á¹þ¤Þ¤ì¤¿¥¢¥¯¥»¥¹¥È¡¼¥¯¥ó¤ò¥Ñ¥×¥ê¥Ã¥¯¥¤¥ó¥¹¥¿¥ó¥¹¤Ë¸ø³«¤·¤ÆÈëÌ©¤¬Ï³±Ì¡£Sourcegraph API¤Ø¤Î¼«Í³¤Ê¥¢¥¯¥»¥¹¤òµö¤¹¤³¤È¤Ë¤Ê¤Ã¤¿¡£Microsoft¤Î»ö°Æ¤Ç¤Ï¡¢Microsoft¼ÒÆâ¤Î¥Ç¥Ð¥Ã¥°´Ä¶¤Î¥¯¥é¥Ã¥·¥å¥À¥ó¥×¤«¤é¥á¡¼¥ë¤Îǧ¾Ú¾ðÊó¤òºîÀ®¤¹¤ë½ð̾¥¡¼¤¬Ï³±Ì¤·¤¿¡£¤³¤ì¤é¤òËɻߤ¹¤ë¤¿¤á¤Ë¡¢¥³¡¼¥É¤Ëµ¡Ì©¾ðÊó¤òËä¤á¹þ¤Þ¤Ê¤¤¤è¤¦¤ËÃí°Õ¤·¡¢¤³¤ì¤ò¸¡½Ð¤¹¤ë¥Ä¡¼¥ë¤Î³èÍѤȥ³¡¼¥É¥ì¥Ó¥å¡¼¤Î¼Â»Ü¤¬½ÅÍס£
¡û¥Ò¥ó¥È2¡§¥½¥Õ¥È¥¦¥§¥¢¥³¥ó¥Ý¥¸¥·¥ç¥óʬÀÏ(SCA: Software Composition Analysis)¤ò»ÈÍѤ·¤ÆÉôÉÊɽ(BOM: Bills Of Materials)¤òºîÀ®¤¹¤ë
¥µ¥¤¥Ð¡¼¥»¥¥å¥ê¥Æ¥£µ¬Â§¤È¥Ù¥¹¥È¥×¥é¥¯¥Æ¥£¥¹¤ÎÁÐÊý¤Ç¡¢¥½¥Õ¥È¥¦¥§¥¢¤ò¹½À®¤¹¤ë¤¹¤Ù¤Æ¤ÎÍ×ÁǤνнê¤ò¼¨¤¹¥½¥Õ¥È¥¦¥§¥¢ÉôÉÊɽ¤Î¹Í¤¨¤¬ºÎÍѤµ¤ì¤Æ¤¤¤ë¡£¤·¤«¤·¤Ê¤¬¤é¡¢¥½¥Õ¥È¥¦¥§¥¢¤ÎÉôÉÊɽ¤òºîÀ®¤¹¤ë¤³¤È¤Ï´Êñ¤Ç¤Ï¤Ê¤¤¡£NPM¤äPyPI¤Ê¤É¤Î¥Ñ¥Ã¥±¡¼¥¸¥ê¥Ý¥¸¥È¥ê¤ä¥ª¡¼¥×¥ó¥½¡¼¥¹¥Õ¥ì¡¼¥à¥ï¡¼¥¯¤Ê¤É¤ò»ÈÍѤ·¤¿¾ì¹ç¡¢°Í¸´Ø·¸¤òÄÉÀפ·¤Æ¤¹¤Ù¤Æ¤Î¥½¥Õ¥È¥¦¥§¥¢°ìÍ÷¤òºîÀ®¤¹¤ëɬÍפ¬¤¢¤ë¡£¤³¤¦¤·¤¿¥Ä¡¼¥ë¤ò»ÈÍѤ¹¤ë¤³¤È¤Ç¡¢¤¹¤Ù¤Æ¤Î°Í¸´Ø·¸¤Ë¤¢¤ë¥½¥Õ¥È¥¦¥§¥¢¥³¥ó¥Ý¡¼¥Í¥ó¥È¤ò¼±Ê̤Ǥ¤ë¡£
¡û¥Ò¥ó¥È3¡§ ¼«Ê¬¼«¿È¤ò¥Ï¥Ã¥¯¤¹¤ë
ÀÕǤ¤¢¤ë¹çˡŪ¤ÊÊýË¡¤Ç¥·¥¹¥Æ¥à¤Þ¤¿¤Ï¥Í¥Ã¥È¥ï¡¼¥¯¤ÎÀȼåÀ¤òÆÃÄꤹ¤ë¡£¤½¤Î¤¿¤á¤Ë¥Û¥ï¥¤¥È¥Ï¥Ã¥«¡¼¤Îµ»½ÑÎϤòÍøÍѤ¹¤ë¡£°°Õ¤Î¤¢¤ë¿Íʪ¤ËÀȼåÀ¤ò°ÍѤµ¤ì¤ëÁ°¤Ë¥Û¥ï¥¤¥È¥Ï¥Ã¥«¡¼¤Ë¤½¤ì¤é¤òȯ¸«¤·¤Æ¤â¤é¤¦¤³¤È¤Ç¡¢ÍøÍѼԤؤμպá¤äÅö¶É¤Ø¤ÎÊó¹ð¤ò²óÈò¤Ç¤¤ë¡£Ê󾩶â¥×¥í¥°¥é¥à¤â¤³¤ÎÂкö¤Ë´Þ¤Þ¤ì¤ë¡£
The Hacker News¤Ï¤³¤ì¤é¥Ò¥ó¥È¤ò³èÍѤ·¡¢¥½¥Õ¥È¥¦¥§¥¢¥µ¥×¥é¥¤¥Á¥§¡¼¥ó¤ò¶¯²½¤¹¤ë¤³¤È¤Ç¥¤¥ó¥·¥Ç¥ó¥ÈÂбþ¤Î»þ´Ö¤òºï¸º¤·¡¢¼ý±×¤ÎÁý²Ã¤Ë¤Ä¤Ê¤¬¤ë¤È»ØŦ¤·¤Æ¤¤¤ë¡£¤Þ¤¿¡¢¤µ¤é¤Ë¥»¥¥å¥ê¥Æ¥£¶¯²½¤òÌܻؤ¹¾ì¹ç¡¢Google¤¬Ä󾧤¹¤ë¥»¥¥å¥ê¥Æ¥£¥Õ¥ì¡¼¥à¥ï¡¼¥¯¡ÖSLSA • Supply-chain Levels for Software Artifacts¡×¤ò³èÍѤ¹¤ë¤³¤È¤Ç²þ¤¶¤ó¤ÎËɻߡ¢´°Á´À¤Î¸þ¾å¤Ê¤É¤¬Ë¾¤á¤ë¤È¥¢¥É¥Ð¥¤¥¹¤·¤Æ¤¤¤ë¡£