{"published":"2022-06-07 15:03:54","url":"https://foxsecurity.hatenablog.com/entry/2022/06/07/150354","title":"PCI DSSv4.0\u3092\u8aad\u3080\u2466 \u8981\u4ef64\u306e\u5909\u66f4\u6982\u8981","blog_url":"https://foxsecurity.hatenablog.com/","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/f/foxcafelate/20220426/20220426175313.png","provider_name":"Hatena Blog","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ffoxsecurity.hatenablog.com%2Fentry%2F2022%2F06%2F07%2F150354\" title=\"PCI DSSv4.0\u3092\u8aad\u3080\u2466 \u8981\u4ef64\u306e\u5909\u66f4\u6982\u8981 - Fox on Security\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","description":"PCI DSSv4.0\u304c3\u670831\u65e5\uff08\u65e5\u672c\u6642\u9593\u306e4\u67081\u65e5\uff09\u306b\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u307e\u3057\u305f\u3002PCI DSSv3.0\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u306e\u306f2013\u5e7412\u6708\u3067\u3057\u305f\u306e\u3067\u3001\u5b9f\u306b8\u5e74\u3076\u308a\u306e\u30e1\u30b8\u30e3\u30fc\u6539\u8a02\u3068\u306a\u308a\u307e\u3059\u3002 5/13\u306b\u65e5\u672c\u8a9e\u7248\u304c1\u30f6\u6708\u5c11\u3057\u9045\u308c\u3066\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u307e\u3057\u305f\u3002\u82f1\u8a9e\u7248\u306e360\u30da\u30fc\u30b8\u306b\u6bd4\u3079\u3066\u9065\u304b\u306b\u591a\u3044453\u30da\u30fc\u30b8\u306e\u201d\u5927\u4f5c\u201d\u3068\u306a\u3063\u3066\u304a\u308a\u3001\u4e2d\u3005\u7d30\u90e8\u307e\u3067\u8aad\u3080\u306e\u304c\u5927\u5909\u306a\u57fa\u6e96\u66f8\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u304c\u3001PCI DSS\u306e\u5c02\u9580\u5bb6\u3092\u81ea\u8ca0\u3057\u3066\u3044\u308b1\u4eba\u3068\u3057\u3066\u3001\u500b\u4eba\u7684\u306a\u611f\u60f3\u3092\u4ea4\u3048\u3066\u4f55\u56de\u304b\u306b\u5206\u3051\u3066v4.0\u306b\u3064\u3044\u3066\u8a18\u4e8b\u3092\u66f8\u3051\u308c\u3070\u3068\u601d\u3044\u307e\u3059\u3002 \u203b\u2460~\u2463\u307e\u3067\u306e\u8a18\u4e8b\u306f\u82f1\u8a9e\u7248\u3092\u30d9\u30fc\u30b9\u306b\u6a5f\u68b0\u7ffb\u8a33\u3092\u3057\u305f\u3082\u306e\u3067\u3057\u305f\u306e\u3067\u3001\u65e5\u672c\u8a9e\u8868\u73fe\u304c\u6b63\u5f0f\u7248\u3068\u306f\u5c11\u3057\u9055\u3063\u3066\u3044\u308b\u304b\u3068\u2026","provider_url":"https://hatena.blog","blog_title":"Fox on Security","author_url":"https://blog.hatena.ne.jp/foxcafelate/","version":"1.0","categories":["PCI DSS"],"height":"190","author_name":"foxcafelate","width":"100%"}