{"description":"\u3010\u8981\u7d04\u3011 \u65e5\u672c\u3092\u542b\u308015\u30ab\u56fd\u306f\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u90e8\u54c1\u8868\uff08SBOM\uff09\u306e\u5229\u6d3b\u7528\u306b\u95a2\u3059\u308b\u56fd\u969b\u30ac\u30a4\u30c0\u30f3\u30b9\u300cA Shared Vision of SBOM for Cybersecurity\u300d\u306b\u5171\u540c\u7f72\u540d\u3057\u305f\u3002\u7c73CISA\u3084\u7d4c\u7523\u7701\u4e3b\u5c0e\u3067\u7b56\u5b9a\u3055\u308c\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u5b89\u5168\u78ba\u4fdd\u3084\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30ea\u30b9\u30af\u4f4e\u6e1b\u306bSBOM\u304c\u4e0d\u53ef\u6b20\u3068\u4f4d\u7f6e\u4ed8\u3051\u305f\u3002\u30ac\u30a4\u30c0\u30f3\u30b9\u306f\u30bb\u30ad\u30e5\u30a2\u30fb\u30d0\u30a4\u30fb\u30c7\u30b6\u30a4\u30f3\u306e\u7406\u5ff5\u3092\u8e0f\u307e\u3048\u3001\u5404\u56fd\u304cSBOM\u666e\u53ca\u3092\u63a8\u9032\u3002\u4eca\u5f8c\u306f\u5177\u4f53\u7684\u306a\u6280\u8853\u6307\u91dd\u306e\u7b56\u5b9a\u306b\u5411\u3051\u8b70\u8ad6\u3092\u9032\u3081\u308b\u3002 \u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u65e5\u7c73\u6b27\u8c6a\u306a\u306915\u30ab\u56fd\u3001SBOM\u6d3b\u7528\u306b\u5411\u3051\u56fd\u969b\u30ac\u30a4\u30c0\u30f3\u30b9\u3078\u5171\u540c\u7f72\u540d (Security NEXT, 2025/09/09) https://www.\u2026","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2025%2F09%2F09%2F000000_2\" title=\"\u65e5\u7c73\u6b27\u8c6a\u306a\u306915\u30ab\u56fd\u3001SBOM\u6d3b\u7528\u306b\u5411\u3051\u56fd\u969b\u30ac\u30a4\u30c0\u30f3\u30b9\u3078\u5171\u540c\u7f72\u540d - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","image_url":null,"blog_url":"https://security-log.hatenablog.com/","provider_name":"Hatena Blog","height":"190","published":"2025-09-09 00:00:00","width":"100%","url":"https://security-log.hatenablog.com/entry/2025/09/09/000000_2","title":"\u65e5\u7c73\u6b27\u8c6a\u306a\u306915\u30ab\u56fd\u3001SBOM\u6d3b\u7528\u306b\u5411\u3051\u56fd\u969b\u30ac\u30a4\u30c0\u30f3\u30b9\u3078\u5171\u540c\u7f72\u540d","version":"1.0","author_name":"tanigawa","categories":["SBOM","\u56fd\u969b\u30ac\u30a4\u30c0\u30f3\u30b9: A Shared Vision of SBOM for Cybersecurity","\u30ac\u30a4\u30c0\u30f3\u30b9"],"type":"rich","blog_title":"TT Security Log","author_url":"https://blog.hatena.ne.jp/tanigawa/"}