ãžã§ãŒã·ãŒããŒã§ã¯ãããžãã¹ã¢ãžãªãã£ãé«ãããããžã§ã¯ããé²ããŠãããå®çŸã«ããããããŸããŸãªæœçãå®è¡ããŠããããæ ¹å¹¹ãšãªãã®ãããJDEPããšåä»ãããã©ãããã©ãŒã ã ãã¯ã©ãŠããã€ãã£ãæè¡ã§æ§ç¯ããå¿ èŠã«å¿ããŠå€éšãµãŒãã¹ã掻çšããªããã»ãã¥ã¢ãªéçšãç®æããŠãããšããã
7æ23æ¥ïœ24æ¥ã«éå¬ããããTECH+ãã©ãŒã©ã - ã¯ã©ãŠãã€ã³ãã© 2024 Jul. çæ³ã®ç°å¢ã«ã¢ããããŒããããã«ãå瀟 ã·ã¹ãã æ¬éš ããžã¿ã«ãœãªã¥ãŒã·ã§ã³éçºéš 䞻幹ã®é·æ²Œäœæš¹æ°ãç»å£ãJDEPãããžã§ã¯ãã®æŠèŠãéçºç°å¢ããã©ãããã©ãŒã ãã¢ããªã±ãŒã·ã§ã³ããããã®ã»ãã¥ãªãã£å¯Ÿçã«ã€ããŠèª¬æããã
ã¯ã©ãŠããã€ãã£ããªæè¡ã§æ°ãã«èšèšãããã©ãããã©ãŒã
è¬æŒåé ã§é·æ²Œæ°ã¯JDEPã®ãããžã§ã¯ãã«ã€ããŠãå 補åãšã¢ãžã£ã€ã«éçºãæšé²ããŠããããšãã¹ããŒããã¢ãžãªãã£ã®æ ä¿ã®ããå šäœãšç°ãªãåå¥ã®ã«ãŒã«ãããã»ã¹ã§å§ããŠããããšããããŠã¯ã©ãŠããã€ãã£ããªæè¡ã§æ°ããªãã©ãããã©ãŒã ããŒãããèšèšãããã®äžã§ã¢ããªã±ãŒã·ã§ã³ãéçºãããšãã£ãç¹é·ããããšè¿°ã¹ããéçºã»éçšã®äœå¶ã¯ãã¢ããªã±ãŒã·ã§ã³éçºããŒã ããQuality Assurance ïŒQAãå質ä¿èšŒïŒãSite Reliability EngineeringïŒSREïŒãã»ãã¥ãªãã£ãšãã£ãå°éæ§ã®ããå ±éããŒã ãæ¯ããããã¡ã ã
çŸåšã®ã·ã¹ãã éçºã§ã¯ãå¿ èŠã«å¿ããŠå€éšãµãŒãã¹ãå©çšããããšãæ¬ ãããªããäŸãã°ãããªãã¯ã¯ã©ãŠãã䜿ã£ãããéç«¶äºé åã«SaaSãæŽ»çšããããããã«ãªãŒãã³ãœãŒã¹ã®ãœãããŠãšã¢ãçµã¿åããããªã©ããŠã·ã¹ãã ãæ§æããå¿ èŠããããã»ãã¥ãªãã£ã«ã€ããŠãåæ§ã§ããããªãã¯ã¯ã©ãŠããSaaSããªãŒãã³ãœãŒã¹ãœãããŠãšã¢ãªã©ã®æŽ»çšã¯ãã¯ãå¿ ç¶ã ã
JDEPã§ãå€éšãµãŒãã¹ã掻çšããŠãããšé·æ²Œæ°ã¯èšããéçºã«ã¯Google Cloudã®Google Kubernetes Engineãšãããã¯ãŒã¯å¶åŸ¡ã®æ©æ§ã§ããCloud Service Meshã䜿ãããã®ä»å ±éã®ãµãŒãã¹ãšããŠInfrastructure as CodeïŒIaCïŒãCode RepoãCI/CDãæŽ»çšãããéçºãéçšãã»ãã¥ãªãã£ã®é¢ã§æ¯æŽããã¯ã©ãŠããµãŒãã¹ãšããŠã¯ããŠã§ãã¢ããªã®Web Application and API ProtectionïŒWAAPïŒãAPIä¿è·ã®CloudflareãMBSD Managed Security Serviceããããã¯ãŒã¯éä¿¡å¶åŸ¡ã®NetskopeãèªèšŒãµãŒãã¹ã®Oktaãªã©ã掻çšããŠããããã ã
éçºç°å¢ã«ã¯å ±éIDåºç€ããŒããã©ã¹ãç°å¢ãå°å ¥
JDEPã®ãããžã§ã¯ãã«ã¯8瀟以äžã®ããžãã¹ããŒãããŒãçŽ500人ã®ã¡ã³ããŒãåå ããŠããããã®ãã瀟å¡ãããŒãããŒãäžäœãšãªã£ãŠãã©ãããã©ãŒã ã䜿ãããã«ã¯å ±éIDåºç€ãèªååãããæš©é管çãšãã£ãä»çµã¿ãå¿ èŠã ãéèæ©é¢ã«ã¯IDãã»ãã¥ãªãã£ã«é¢ããããŸããŸãªèŠåãããããããèžãŸããŠã»ãã¥ã¢ã«éçšããããšãå¿ èŠã§ãããããã§JDEPãã©ãããã©ãŒã ã§ã¯å ±éã®èªèšŒåºç€ãšããŠIDaaSãçšããããã«Unified Endpoint Management ïŒUEMãçµ±åãšã³ããã€ã³ã管çïŒãCloud Access Security Broker ïŒCASBïŒãEDRïŒEndpoint Detection and ResponseïŒãšãã£ããŒããã©ã¹ããæ§æããããŒã«çŸ€ãå ¥ãããããžã§ã¯ãå°çšç«¯æ«ã䜿ãããšã«ããŠããã
éçºçšã®å端æ«ã«ã€ããŠã¯ãéçºç°å¢ãæ€èšŒç°å¢ãéçºããŒã«ãžã®ã¢ã¯ã»ã¹ã¯èš±å¯ããããæ¬çªç°å¢ãžã®ã¢ã¯ã»ã¹ã¯èš±å¯ããªããšãã£ã察åŠãããŠãããæ¬çªç°å¢ãžã®ã¢ã¯ã»ã¹ã¯å ¥å®€ãå¶éãããã»ãã¥ãªãã£ã«ãŒã ããã®ã¿ãšããæ å ±æŒæŽ©ãé²ãããã»ãã¥ãªãã£ã«ãŒã ããã®ã¢ã¯ã»ã¹ãå³ããå¶éããŠããã
ãã®ããã§é害察å¿ããªãªãŒã¹ã®ã¢ãžãªãã£ãé«ããããããã°åç §ãã³ã³ããã®åèµ·åãªã©ã®å®ååŠçã«ã€ããŠã¯ãã»ãã¥ãªãã£ã®åæãç¶æãã€ã€ãªã¢ãŒãã§ã宿œã§ããããã«ãããäŸãã°ãªã¢ãŒãããã®ãã°åç §ã§ããã°ãã«ãŒãæ å ±ãå人æ å ±ã®ãããªé«æ©å¯æ å ±ã¯ã»ãã¥ãªãã£ã«ãŒã ããããã¢ã¯ã»ã¹ã§ããªããšããåæã¯ç¶æããããã§ãã·ã¹ãã çãªå¯Ÿå¿ã§å¿ èŠãšãªã髿©å¯æ å ±ãå«ãŸãªããã°ã®ã¿ãåç §ã§ããããã«ãããšãããå ããŠãData Loss Prevention ïŒDLPïŒã«ãã髿©å¯æ å ±ã®åé€åŠçãå°å ¥ããããšã§æ³å®å€ã®ç¶æ³ã§ãæ å ±æŒæŽ©ãèµ·ãããªãããã«äºéã®ä¿è·çãè¬ããŠããã
ãã©ãããã©ãŒã ã«ãå€éšã»ãã¥ãªãã£ãµãŒãã¹ã掻çš
ã¯ã©ãŠããã€ãã£ãã«ãããŠã¯ã·ã¹ãã ã®å€åãæ¿ãããæ°ãå¢å ããã人éã察å¿ã§ããéçãè¶ ããããšãçºçãåŸãããã人ã«äŸåãããèªååãDevSecOpsã«åºã¥ã察å¿ãå¿ èŠã«ãªã£ãŠãããããã§JDEPãã©ãããã©ãŒã ã§ããã»ãã¥ãªãã£ãµãŒãã¹ãå¹ççã«æŽ»çšããŠãããéèŠããã®ã¯ãæ»æã«å¯Ÿããé²åŸ¡ã«å ããŠãæ€ç¥æã®éç¥ã®è¿ éãªææ¡ãšãã®å¯Ÿçãã§ãããããªç°å¢ãæŽåããããšã ã£ããšé·æ²Œæ°ã¯èªãã
å€éšããã®æ»æã«å¯ŸããŠã¯ãå€éšãµãŒãã¹ã®WAAPãšSecurity Operations Center ïŒSOCïŒã䜿ããæ»æãæ€ç¥ãããå ŽåãSOCãæ€ç¥ãã°ãèŠãŠå¯Ÿå¿ããããã¯JDEPåŽã«éç¥ãããšããä»çµã¿ã ãããèªäœã¯æšæºçãªå¯Ÿå¿ã ããå瀟ã®å Žåã¯éèæ©é¢ãšããç¹æ®ãªäºæ ãããããã®ä»çµã¿ãå®çŸãããªãã§ãåè¿°ã®DLPãšåæ§ã®åŠçãå°å ¥ããŠãããSOCãæ±ãæ€ç¥ãã°ã«é«æ©å¯æ å ±ãå«ãŸããªããã培åºããŠããã
SOCããã®éç¥ã¯SREãåããŠéçšã§ããããã«ããŠãããããã¯ã»ãã¥ãªãã£ã§ãã£ãŠãç¹å¥æ±ããããéåžžã®éçšã«çµã¿èŸŒãããšã§ãã€ã³ã·ãã³ãã®éã«éçšè ãè¿ éã«ææ¡ã§ããããã«ããããã ããŸããSOCããã®éç¥ããã€ããŒã ã§æ åœè ã«å²ãåœãŠãŠããŸããšãåãæ åœè ã確ä¿ãç¶ããå¿ èŠãããã人äºç°åã®éãªã©ã«ãªã¹ã¯ãé«ãŸãå¯èœæ§ããããããã§JDEPã§ã¯ã€ã³ã·ãã³ã管çSaaSãçµã¿èŸŒã¿ãããããéç¥ã®éèŠåºŠã«å¿ããŠãªã³ã³ãŒã«ã·ããã®æ åœè ã«ã€ãªãããšã§ãç¹å®ã®äººã«äŸåããªãéçšäœå¶ãæ¡ã£ãŠããã
ã»ãã¥ã¢ãªéçšãç¶æããããã«æŽ»çšããŠããã®ãCloud Security Posture ManagementïŒCSPMïŒã ãCSPMã®ããªã·ãŒããªããžããªã§ç®¡çããããŒã¿é²åãäžæ£ã¢ã¯ã»ã¹ã®å¯èœæ§ã宿çã«ãã§ãã¯ãç°åžžã®éç¥ãããã°å 容ã粟æ»ããŠå¯Ÿå¿æ¹éãæ±ºãããããã«ããã®çµæãCSPMããªã·ãŒã«åæ ãããšããæµãã«ãªã£ãŠãããé·æ²Œæ°ã¯ãããã宿çãç¶ç¶çã«è¡ãããšãéèŠãã ãšèšãã管ç察象ã§ããã¯ã©ãŠããã€ãã£ãã®æè¡ãã¢ããªã±ãŒã·ã§ã³ã¯æ¥ã å€åããŠãããããäžåºŠããªã·ãŒãã€ããã°ããã§çµãããšããããã«ã¯ãããªãã
ã¢ããªã±ãŒã·ã§ã³ã®ã»ãã¥ãªãã£å¯Ÿçã§ã¯ã·ããã¬ãããæšé²
ã¢ããªã±ãŒã·ã§ã³ã®ã»ãã¥ãªãã£å¯Ÿçã«ã€ããŠã¯ãååãªãªãŒã¹ãšãã®åŸã§æµããå€ãã£ãŠãããšãããååãªãªãŒã¹ãŸã§ã¯èšãã°ãŠã©ãŒã¿ãŒãã©ãŒã«ã§ãã¹ããªã³ãã¯èšèšäž»äœãå®è£ äž»äœããã¹ãäž»äœã®é ã§æµããããããã£ãŠãªãªãŒã¹ã®æç¹ã§ã»ãã¥ãªãã£ãã¹ããããã°è¯ãã£ããããªãªãŒã¹æžã¿ã®ã¢ããªã±ãŒã·ã§ã³ãå¢ããã°ãã»ãã¥ãªãã£ããŒã ã«é«é »åºŠã§ãã¹ãã®èŠè«ãæ¥ãããããªããšãã»ãã¥ãªãã£ããŒã ã«è² è·ãéäžããŠããŸãã
ã人ã«äŸåããã»ãã¥ãªãã£ãæ ä¿ããããã«ã¯ãDevSecOpsãå¿ èŠã ãšçæããŸãããïŒé·æ²Œæ°ïŒ
ããã§çŸåšã¯ã·ããã¬ãããä¿ãããã«ãã¢ããªã±ãŒã·ã§ã³ã®æ¥åããžãã¯ããã¬ãŒã ã¯ãŒã¯ã®éšåã«xASTãã€ãŸãStatic Application Security Testing ïŒSASTïŒãInteractive Application Security Testing ïŒIASTïŒãDynamic Application Security Testing ïŒDASTïŒãšãã£ãã»ãã¥ãªãã£ã®èªåãã¹ããå°å ¥ããããšã«åãçµãã§ããããããŸã§ã«ãxASTã䜿ã£ãŠããã¢ããªã±ãŒã·ã§ã³ã¯ãããããã©ãããã©ãŒã å šäœãšããŠæšæºããŒã«ãšããŠå°å ¥ããããšã§ãå šäœã®ã»ãã¥ãªãã£å質ãåäžãããããšããèãã ã
ãã ããSASTãIASTãDASTã«ã¯ããããäžé·äžçããããããããã®å šãŠãå šéšã®ã¢ããªã±ãŒã·ã§ã³ã«é©çšããã®ã¯ã³ã¹ãããããããããã£ãŠãäŸãã°ã«ãŒãçªå·ãæ±ããå€éšããã®ã¢ã¯ã»ã¹ãã§ãããã®ã«å¯ŸããŠã¯é«ã¬ãã«ã®ã»ãã¥ãªãã£ãé©çšãããªã©ãã¢ããªã±ãŒã·ã§ã³ã®ç¹æ§ãç®çãèžãŸããäžã§éžæããããšãéèŠã ããã¡ããããªã¹ã¯ãäœããã°äœãããªããŠããããã§ã¯ãªãã
é·æ²Œæ°ã¯ä»åŸãå©çšåœ¢æ ãšåãæ±ãæ å ±ã«åºã¥ããŠã¢ããªã±ãŒã·ã§ã³ãåé¡ããã¿ãŒã³åããŠã¿ã°ä»ãããã»ãã¥ãªãã£ãã¹ããæœçãèªåçã«å€æã§ãããããªã»ãã¥ãªãã£ãšå¹çãäž¡ç«ããä»çµã¿ãã€ããããšãç®æšã§ãããšè©±ããè¬æŒãç· ãããã£ãã
