{"author_url":"https://blog.hatena.ne.jp/tanigawa/","height":"190","description":"\u3010\u8a33\u3011EPA\u306f\u6c34\u30a4\u30f3\u30d5\u30e9\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u306b\u5411\u3051\u3001\u30b5\u30a4\u30d0\u30fc\u5bfe\u5fdc\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3068\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8\u3092\u516c\u958b\u3057\u305f \u3010\u8981\u70b9\u3011 \u25ceEPA\u304c\u6c34\u9053\u30bb\u30af\u30bf\u30fc\u5411\u3051\u306b\u30b5\u30a4\u30d0\u30fc\u5bfe\u5fdc\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3068\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8\u3092\u516c\u958b\u3002\u7dca\u6025\u5bfe\u5fdc\u3068\u8abf\u9054\u8a55\u4fa1\u3092\u652f\u63f4\u3057\u3001\u6c34\u30a4\u30f3\u30d5\u30e9\u306e\u9632\u5fa1\u529b\u5411\u4e0a\u3092\u56f3\u308b\u3002","published":"2025-10-28 00:00:00","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2025%2F10%2F28%2F000000_1\" title=\"EPA publishes cyber response templates and checklists to strengthen water infrastructure security - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["\u696d\u7a2e: \u6c34\u9053 / \u4e0b\u6c34","\u30ac\u30a4\u30c9 / \u624b\u5f15\u66f8","\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8","\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8"],"blog_url":"https://security-log.hatenablog.com/","url":"https://security-log.hatenablog.com/entry/2025/10/28/000000_1","provider_url":"https://hatena.blog","title":"EPA publishes cyber response templates and checklists to strengthen water infrastructure security","image_url":null,"version":"1.0","blog_title":"TT Security Log","provider_name":"Hatena Blog","author_name":"tanigawa","width":"100%","type":"rich"}