ã¯ã©ãŠãå°å ¥ã®æ¡å€§ã¯ãæ¥æ¬äŒæ¥ã«æçãªææããããããŠããŸããããã«ããæ©æµãããããããŠããäžæ¹ãã¯ã©ãŠãã€ã³ãã©ã®ã»ãã¥ãªãã£ãã©ã®ããã«ç¢ºä¿ããããšããé倧ãªèª²é¡ãçããŠããŸãã
Tenableãå§èšããŠå®æœããForrester Consultingã«ããæè¿ã®èª¿æ»ã§ã¯ãæ¥æ¬äŒæ¥ã®74%ããçµç¹ã®ãµã€ããŒãªã¹ã¯ã®æå€§ã®åå ã¯ã¯ã©ãŠãã€ã³ãã© (ç¹ã«ãããªãã¯ã¯ã©ãŠãããã³ãã«ãã¯ã©ãŠã) ã«ãããšåçããŠããŸãã
ãã®ãããªæžå¿µã¯ããµã€ããŒç¯çœªè ãã¯ã©ãŠãã®èšå®ãã¹ãæªçšããŠçµç¹ã®ITç°å¢ã«äžæ£ã¢ã¯ã»ã¹ããããšæ°ããªæŠç¥ã次ã ã«èæ¡ããŠããããšãèããã°ãåœç¶ã®ããšã§ããããŒã¿äŸµå®³ãè€æ°ã®ç°å¢ã«ãŸãããå Žåã察åŠã«ã¯è«å€§ãªã³ã¹ããããããæ€åºãšåæŸã«1幎è¿ããèŠãããšããIBMã®ã¬ããŒãããããŸãã
ã¯ã©ãŠãã»ãã¥ãªãã£ãå°é£ãªèª²é¡ãšãªãèŠå
å€ãã®çµç¹ã§ã¯ãã¯ã©ãŠãç°å¢ãå æ¬çã«å¯èŠåããå¿ èŠããããããã»ãã¥ãªãã£ã®å®åæ åœè ã¯ã¯ã©ãŠãç°å¢ãä¿è·ããããã®ããŒãããããå¿ èŠãšããŠããŸãã
ã¯ã©ãŠãã®ã»ãã¥ãªãã£ã广çã«ç¢ºä¿ããã«ã¯ãã¯ã©ãŠããè€éã«æ§æããã³ã³ããŒãã³ããæ·±ãçè§£ããäžã§ãè匱æ§ãèšå®ãã¹ããã®ã»ãã®ãªã¹ã¯ã®ç¹å®ãšè»œæžãè¡ãå¿ èŠããããŸãããã«ãã¯ã©ãŠãç°å¢ã§ã¯ãç²ç¹ãå¢ããããã課é¡ã¯ããã«æ·±å»ããå¢ããŸãã
äŸãã°ãè€æ°ã®ã¯ã©ãŠãéã«ãããã»ãã¥ãªãã£ç®¡çã§ã¯ãåã¯ã©ãŠããã³ããŒã«ãã£ãŠç°ãªãã¢ã€ãã³ãã£ãã£ãšã¢ã¯ã»ã¹ç®¡çã¢ãã«ã«åŸã£ãŠäœæ¥ããå¿ èŠããããŸãã
ãã®èª²é¡ãããã«è€éã«ããŠããã®ããçµç¹ã®ãµã€ãåã§ããã¯ã©ãŠãã®è²¬ä»»ã¯ãçµç¹å ã®ç¹å®ã®éšçœ²ãåŸæ¥å¡ã«éå®ããããã®ã§ã¯ãããŸãããã¯ã©ãŠãã®å¹æçãªç®¡çã«ã¯ãã»ãã¥ãªãã£ãITãDevOpsãDevSecOpsãIAMãªã©ãããŸããŸãªäºæ¥éšéã®ç©æ¥µçãªååãæ±ããããŸãã
ã»ãã¥ãªãã£éšéãã¯ã©ãŠãç°å¢ãååã«å¶åŸ¡ã§ãããã¯ã©ãŠããµãŒãã¹ã®å°å ¥æ€èšã«ã»ãšãã©é¢äžããŠããªãå Žåã«ãåé¡ãçºçããŸãã
å çšã®èª¿æ»ã«ãããšãã¯ã©ãŠããµãŒãã¹ã®éžæãšå°å ¥ã«ãµã€ããŒã»ãã¥ãªãã£æ åœè ãååæ©ãæ®µéã§é¢äžããŠããªããšåçããåœå äŒæ¥ã¯30ïŒ ããŸããµã€ããŒã»ãã¥ãªãã£æ åœè ã«çžè«ããããšãªãäºæ¥éšéããšã³ãžãã¢éšéãã¯ã©ãŠããµãŒãã¹ãè³Œå ¥ãå°å ¥ããŠãããšåçããäŒæ¥ã¯38ïŒ ã«äžããŸãããæ åœéšéã«ã¯ã©ãŠãã«é¢ããç¥èããªããšã广çãªã¯ã©ãŠãã»ãã¥ãªãã£ã®éçšã«äžå¯æ¬ ãªããã»ã¹ãããŒã«ãäžè¶³ããããšã«ãªããŸãã
ããã§éåžžã«éèŠãªããšã¯ãã¯ã©ãŠãç°å¢ã«ãããŠã¢ã€ãã³ãã£ãã£ãæ°ããªå¢çç·ãšãªã£ãŠããããšã§ãã人ããœãããŠã§ã¢ãµãŒãã¹ (åãããŠãµãŒãã¹ããªã³ã·ãã«ãšããåŒã°ããŠããŸã) ããåŸæ¥ã®ãªã³ãã¬ãã¹ã·ã¹ãã ãšã¯ç°ãªããã€ã³ã¿ãŒãããããçŽæ¥ã¢ã¯ã»ã¹ã§ããããšãå€ãã¯ã©ãŠããªãœãŒã¹ã«ã¢ã¯ã»ã¹ããéã«ã¢ã€ãã³ãã£ãã£ã䜿çšããŸãã
ITéšéãšã»ãã¥ãªãã£éšéãèšå€§ãªæ°ã®æ°ããããžã¿ã«ã¢ã€ãã³ãã£ãã£ãšé¢é£ããæš©éã®ç®¡çã«åãçµãã§ããéã«ãæªç¥ã®é åã«å¯Ÿããå¯èŠæ§ãäœäžããŸãããã®ç¶æ³ã¯ããµã€ããŒç¯çœªè ã«ããäžæ£ã¢ã¯ã»ã¹ã容æã«ããã¯ã©ãŠãç°å¢å šäœã®å¶åŸ¡ãææ¡ããããããŒã¿ããŒã¹ããããŒã¿ãæãåã£ãããããŒã¿ãæå·åããŠèº«ä»£éãèŠæ±ããããšãã£ãæªæã®ããæŽ»åã蚱容ããäºæ ã«ãªããŸãã
ã¯ã©ãŠãã®ã»ãã¥ãªãã£ç¢ºä¿ãçµç¹ã¯äœããå§ããã¹ãã
ã¯ã©ãŠãã®ã»ãã¥ãªãã£ã確ä¿ããã«ããã£ãŠã¯ã 3ã€ã®æ¹æ³ããå§ããããšãã§ããŸãã3ã€ã®æ¹æ³ãšã¯ããã¯ã©ãŠãã®äœ¿çšãå¶éããããšããã»ãã¥ãªãã£æ åœè ãšDevSecOps æ åœè ã®ã»ãã¥ãªãã£ç¥èã匷åããããšããèªååãœãªã¥ãŒã·ã§ã³ãæ¡çšããããšãã§ãã
èªååããããœãªã¥ãŒã·ã§ã³ã¯ã¯ã©ãŠãã»ãã¥ãªãã£ã®ãªã¹ã¯ã«å æ¬çã«å¯Ÿå¿ããæ åœè ã«é«åºŠãªæè¡çãªããŠããŠããªããŠã䜿ããããæ¶è²»ãããããå®è¡å¯èœãªããŒã«ãšããŠæäŸãããŠããŸãããã®ãããªã»ãã¥ãªãã£ããŒã«ãããã°ãæ åœéšéã¯è€éãã«æžæãããšãªããªã¹ã¯ãçè§£ãã調æ»ã»èå¥ããŠå¯ŸåŠããããšãã§ããŸãããµã€ããŒãšã¯ã¹ããŒãžã£ãŒç®¡çãœãªã¥ãŒã·ã§ã³ã®ãããªé©åãªèªååãœãªã¥ãŒã·ã§ã³ã«ãã£ãŠãäŒæ¥ã¯ä»¥äžã®ããšãå¯èœã«ãªããŸãã
å®å šãªå¯èŠæ§ã®ç²åŸ
èªååãœãªã¥ãŒã·ã§ã³ã¯ãã¹ãŠã®ã¯ã©ãŠãè³ç£ãèšå®ãããžã¿ã«ã¢ã€ãã³ãã£ãã£ãé¢é£ããæš©éãå¯èŠåããŠããã衚瀺ããŸãããã®ãããã³ã°æ©èœã¯ãã¯ã©ãŠããªãœãŒã¹ã®èšå®ããã¢ã€ãã³ãã£ãã£ããªãœãŒã¹ã«ä»äžãããæš©éãçè§£ããããã«å¿ èŠãªå¯èŠæ§ãæäŸããé »ç¹ã«äœ¿çšãããŠããã¢ã€ãã³ãã£ãã£ãç¹å®ããããšãã§ããŸãã
ã¯ã©ãŠãã€ã³ãã©ã®ãããã«ãããæ£ç¢ºãªãªã¹ã¯åæãšã€ã³ãµã€ããä¿èšŒãããã»ãã¥ãªãã£éšéã¯ãŒããã©ã¹ãã¢ãã«å®è£ ã«åããçç¢ºãªææ¡ãè¡ãããšãã§ããŸãã
ãã«ãã¯ã©ãŠãã®èª²é¡ãžã®å¯ŸåŠ
ãããªãã¯ã¯ã©ãŠããããã€ã㌠(Amazon Web ServicesãMicrosoft) ããšã«ã¯ã©ãŠãã³ã³ããŒãã³ãã®ç®¡çãšèšå®ãç°ãªããããç¶ç¶çãªã»ãã¥ãªãã£ç£èŠã«ãããŠäžæŽåãçããŸãã
äŒæ¥ã«ãšã£ãŠå¿ èŠãªã®ã¯ããã¹ãŠã®ãããªãã¯ã¯ã©ãŠããããã€ããŒã®æ å ±ãäžå åãããç£èŠã»ç®¡çç»é¢ã«éçŽããããšã§ãããã®ãããªãœãªã¥ãŒã·ã§ã³ã¯ãã¯ã©ãŠããããã€ããŒã®ã€ã³ãã©ãæš©éã¢ãã«ãšãã£ãããŸããŸãªã¡ã«ããºã ãçè§£ããçµ±åãããçç¢ºãªæ¹åçã®ããã®åºç€ãæ§ç¯ãããã®ã§ããå¿ èŠããããŸãã
åªå é äœä»ããšèªåä¿®æ£
ã¯ã©ãŠãã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ã¯ãçã®ãªã¹ã¯æ·±å»åºŠã«ã€ããŠæ·±ãçè§£ã䌎ã£ããã®ã§ãªããã°ãªããŸãããå ·äœçã«ã¯ããªã¹ã¯ãæ£ç¢ºã«åªå é äœä»ãããæ©èœãå¿ èŠã§ãããã»ãã¥ãªãã£æ åœè ã«ä¿¡é Œã§ããåæçµæãæäŸããéãããæéãåªå äºé ã«å ãŠãããããã«ããããšã§ãã
å ç¢ãªãœãªã¥ãŒã·ã§ã³ã¯ã¢ããã€ã¶ãŒãšããŠã®åœ¹å²ãæãããå³å»å¯Ÿå¿ãã¹ãè匱æ§ãèšå®ãã¹ã«é¢ããæ¹åã¢ããã€ã¹ãæäŸããŸããããã«ããªã¹ã¯è»œæžã«é¢ããæææ±ºå®ã«åœ¹ç«ã€å®çšçãªç¥èŠããä¿®æ£ãèªååãå éåããããŒã«ãæäŸããå¿ èŠããããŸããèªåä¿®æ£ã¯ã»ãã¥ãªãã£æ©èœãæ¡åŒµããŸãã
人ãããã»ã¹ããã¯ãããžãŒã®ãµã€ããææ
ã¯ã©ãŠãã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ã¯äœ¿ãããããããŸããŸãªäºæ¥éšééã§ã¯ã©ãŠãã»ãã¥ãªãã£ãæšæºåãããã®ã§ãªããã°ãªããŸãããå®çšçãªãœãªã¥ãŒã·ã§ã³ãããã°ãã»ãã¥ãªãã£ãDevOpsãDevSecOpsãSOCãITãéçºè ã1ã«æã§æ å ±ãå ±æã§ããIT ãšã»ãã¥ãªãã£éã®æ©æŠãæå°éã«ãšã©ããããšãã§ããŸããããã«ããã誰ããçè§£ã§ããæ£ç¢ºãªæšå¥šé ç®ã«åºã¥ããè¿ éãªæææ±ºå®ãå¯èœã«ãªããŸãã
é©åãªã¯ã©ãŠãã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ãæ¢ãéã100ïŒ å®ç§ãªã¯ã©ãŠãã»ãã¥ãªãã£ãçŽæãããã®ããããè€éæ§ãšãªã¹ã¯ã軜æžãããã®ãåªå ããããšããå§ãããŸããã¯ã©ãŠãã»ãã¥ãªãã£ãå®çŸå¯èœã«ãããœãªã¥ãŒã·ã§ã³ã¯ãå¯èŠæ§ã®åŒ·åãšãçµç¹å šäœãçè§£ã§ããå®è¡å¯èœã§ç確ãªã€ã³ãµã€ãã®æäŸã«ãã£ãŠçµç¹çã»æè¡çãªãµã€ããåãæããã¯ã©ãŠãã»ãã¥ãªãã£äœå¶ã匷åãããªã¹ã¯è»œæžã广çã«é²ããããã§ã極ããŠéèŠã§ãã
èè ãããã£ãŒã«
貎島 çŽä¹ïŒãã㟠ãªããïŒ Tenable Network Security Japanæ ªåŒäŒç€Ÿ ã«ã³ããªãŒãããŒãžã£ãŒ
ã¢ãã ãããæ ªåŒäŒç€ŸïŒçŸãäžäºæ å ±æ ªåŒäŒç€ŸïŒãEMCãžã£ãã³æ ªåŒäŒç€Ÿã§äž»ã«éèæ åœå¶æ¥ããã³å¶æ¥ãããŒãžã£ãŒãçµãŠãEMCãžã£ãã³ã®ã»ãã¥ãªãã£éšéã§ããRSAã«å·è¡åœ¹å¡ãšããŠæå±ãGRCãœãªã¥ãŒã·ã§ã³ãxDRã®ããžãã¹ã®ç«ã¡äžãã»æ¡å€§ã«åŸäºãããã«éåœã®ãŒãã©ã«ãããŒãžã£ãŒãå Œåããã®åŸãRSAã®ç¬ç«ã«äŒŽãå·è¡åœ¹å¡ç€Ÿé·ãšããŠRSAã®ããžãã¹ã®æ¡åŒµãçœåŒã2021幎4æããçŸè·ãæ¥æ¬äŒæ¥ã®ã»ãã¥ãªãã£ããŒã±ããã®æ¡å€§ããã³ãã£ãã«ã¢ã¯ãã£ããã£ã®å®è¡ãçµ±æ¬ã
