{"categories":["\u8a8d\u8a3c\u5236\u5ea6: JC-STAR / \u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u4ef6\u9069\u5408\u8a55\u4fa1\u53ca\u3073\u30e9\u30d9\u30ea\u30f3\u30b0\u5236\u5ea6","\u8a8d\u8a3c\u5236\u5ea6: CLS / Cybersecurity Labelling Scheme (\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb)","\u899a\u66f8"],"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2026%2F03%2F19%2F000000\" title=\"\u65e5\u672c\u3068\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u3001IoT\u88fd\u54c1\u30bb\u30ad\u30e5\u30e9\u30d9\u30eb\u5236\u5ea6\u3067\u76f8\u4e92\u627f\u8a8d - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","version":"1.0","published":"2026-03-19 00:00:00","description":"\u3010\u8981\u70b9\u3011 \u25ce\u65e5\u672c\u3068\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u304cIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30e9\u30d9\u30eb\u5236\u5ea6\u306e\u76f8\u4e92\u627f\u8a8d\u3067\u5408\u610f\u3002JC-STAR\u3068CLS\u306e\u4e00\u90e8\u8981\u4ef6\u3092\u540c\u7b49\u3068\u307f\u306a\u3057\u30012026\u5e746\u6708\u304b\u3089\u9069\u5408\u78ba\u8a8d\u624b\u7d9a\u3092\u7c21\u7565\u5316 (Security NEXT)","height":"190","author_url":"https://blog.hatena.ne.jp/tanigawa/","provider_url":"https://hatena.blog","url":"https://security-log.hatenablog.com/entry/2026/03/19/000000","blog_title":"TT Security Log","image_url":null,"type":"rich","provider_name":"Hatena Blog","title":"\u65e5\u672c\u3068\u30b7\u30f3\u30ac\u30dd\u30fc\u30eb\u3001IoT\u88fd\u54c1\u30bb\u30ad\u30e5\u30e9\u30d9\u30eb\u5236\u5ea6\u3067\u76f8\u4e92\u627f\u8a8d","width":"100%","author_name":"tanigawa","blog_url":"https://security-log.hatenablog.com/"}