{"provider_url":"https://hatena.blog","published":"2025-11-17 23:55:32","author_url":"https://blog.hatena.ne.jp/sekiko-jo/","url":"https://infomation-sytem-security.hatenablog.com/entry/zero-trust-architecture-nist-guide-cissp","blog_title":"\u57ce\u54b2\u5b50\uff5c\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u90e8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u62c5\u5f53\u306e\u3064\u3076\u3084\u304d\uff08\u307c\u3084\u304d\uff09","height":"190","title":"\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068\u306f\uff1f CISSP\u306e\u5c02\u9580\u5bb6\u304cNIST SP 800-207\u3092\u57fa\u306b\u5fb9\u5e95\u89e3\u8aac\u3059\u308b\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5168\u8c8c","categories":["\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Finfomation-sytem-security.hatenablog.com%2Fentry%2Fzero-trust-architecture-nist-guide-cissp\" title=\"\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068\u306f\uff1f CISSP\u306e\u5c02\u9580\u5bb6\u304cNIST SP 800-207\u3092\u57fa\u306b\u5fb9\u5e95\u89e3\u8aac\u3059\u308b\u6b21\u4e16\u4ee3\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5168\u8c8c - \u57ce\u54b2\u5b50\uff5c\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u90e8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u62c5\u5f53\u306e\u3064\u3076\u3084\u304d\uff08\u307c\u3084\u304d\uff09\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","provider_name":"Hatena Blog","description":"\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3068\u306f\uff1fCISSP/\u767b\u9332\u30bb\u30ad\u30b9\u30da\u306e\u60c5\u30b7\u30b9\u62c5\u5f53\u304c\u3001NIST SP 800-207\u3068\u30c7\u30b8\u30bf\u30eb\u5e81\u306e\u5b9a\u7fa9\uff08\u30d5\u30a1\u30af\u30c8\uff09\u306b\u57fa\u3065\u304d\u5168\u8c8c\u3092\u5fb9\u5e95\u89e3\u8aac\u3002\u5883\u754c\u578b\u9632\u5fa1\u306e\u5d29\u58ca\u7406\u7531\u3001\u4e3b\u8981\u6280\u8853\uff08IDaaS, ZTNA, EDR\uff09\u3001SASE\u3068\u306e\u9055\u3044\u3001\u5c0e\u5165\u306e\u73fe\u5b9f\u7684\u306a\u8ab2\u984c\uff08\u30b7\u30e3\u30c9\u30fcIT\uff09\u307e\u3067\u7db2\u7f85\u3002","version":"1.0","author_name":"sekiko-jo","type":"rich","blog_url":"https://infomation-sytem-security.hatenablog.com/","image_url":null,"width":"100%"}