{"type":"rich","url":"https://blog.serverworks.co.jp/threat-composer-ai","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/s/swx-tamaki-kakimi/20260317/20260317155425.png","blog_title":"\u30b5\u30fc\u30d0\u30fc\u30ef\u30fc\u30af\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2\u30d6\u30ed\u30b0","title":"\u300cThreat-composer AI\u300d\u3067\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\u3092\u81ea\u52d5\u6a19\u6e96\u5316\u3057\u3088\u3046\uff08\u69cb\u6210\u56f3\u3082\u81ea\u52d5\u4f5c\u6210\uff01\uff09","provider_name":"Hatena Blog","author_name":"swx-tamaki-kakimi","blog_url":"https://blog.serverworks.co.jp/","width":"100%","version":"1.0","published":"2026-04-07 12:23:41","categories":["\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0","threat-composer","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","\u69cb\u6210\u53ef\u8996\u5316"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.serverworks.co.jp%2Fthreat-composer-ai\" title=\"\u300cThreat-composer AI\u300d\u3067\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\u3092\u81ea\u52d5\u6a19\u6e96\u5316\u3057\u3088\u3046\uff08\u69cb\u6210\u56f3\u3082\u81ea\u52d5\u4f5c\u6210\uff01\uff09 - \u30b5\u30fc\u30d0\u30fc\u30ef\u30fc\u30af\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","height":"190","provider_url":"https://hatena.blog","author_url":"https://blog.hatena.ne.jp/swx-tamaki-kakimi/","description":"\u57a3\u898b\u3067\u3059\u3002 \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u3092\u691c\u8a0e\u3059\u308b\u969b\u3001\u300c\u3068\u308a\u3042\u3048\u305aWAF\u3092\u5165\u308c\u308b\u300d\u300c\u30dd\u30fc\u30c8\u3092\u9589\u3058\u308b\u300d\u3068\u3044\u3063\u305f\u5834\u5f53\u305f\u308a\u7684\u306a\u5bfe\u5fdc\u306b\u306a\u3063\u3066\u3044\u307e\u305b\u3093\u304b\uff1f \u30b7\u30b9\u30c6\u30e0\u306e\u5168\u4f53\u50cf\u3092\u628a\u63e1\u3057\u3001\u3069\u3053\u306b\u3069\u306e\u3088\u3046\u306a\u30ea\u30b9\u30af\u304c\u3042\u308b\u306e\u304b\u3092\u69cb\u9020\u7684\u306b\u7406\u89e3\u3059\u308b\u305f\u3081\u306e\u624b\u6cd5\u304c\u300c\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\uff08Threat Modeling\uff09\u300d\u3067\u3059\u3002 Well-Architected\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u3082\u3001SEC01-BP07 \u8105\u5a01\u30e2\u30c7\u30eb\u3092\u4f7f\u7528\u3057\u3066\u8105\u5a01\u3092\u7279\u5b9a\u3057\u3001\u7de9\u548c\u7b56\u306e\u512a\u5148\u9806\u4f4d\u3092\u4ed8\u3051\u308b\u3067\u300c\u3084\u3089\u306a\u3044\u5834\u5408\u306e\u30ea\u30b9\u30af\u30ec\u30d9\u30eb\uff1a\u9ad8\u300d\u3068\u3057\u3066\u8f09\u3063\u3066\u3044\u307e\u3059\u3002 \u4eca\u56de\u306f\u3001\u3053\u306e\u8105\u5a01\u30e2\u30c7\u30ea\u30f3\u30b0\u306e\u8003\u3048\u65b9\u3068\u3001AWS\u304c\u516c\u958b\u3057\u3066\u3044\u308bOSS\u30c4\u30fc\u30eb\u300cThreat-composer\u300d\u3001\u7279\u306b\u305d\u306e\u4e2d\u3067\u3082\u8105\u5a01\u30e2\u30c7\u2026"}