{"id":27573,"date":"2024-05-20T11:00:40","date_gmt":"2024-05-20T08:00:40","guid":{"rendered":"https:\/\/www.kelacyber.com\/nist-and-cti-the-perfect-match-for-building-a-cyber-resilient-organization\/"},"modified":"2024-06-07T03:01:16","modified_gmt":"2024-06-07T00:01:16","slug":"nist-and-cti-the-perfect-match-for-building-a-cyber-resilient-organization","status":"publish","type":"post","link":"https:\/\/www.kelacyber.com\/ja\/blog\/nist-and-cti-the-perfect-match-for-building-a-cyber-resilient-organization\/","title":{"rendered":"NIST \uff06 CTI\uff1a\u30b5\u30a4\u30d0\u30fc\u30ec\u30b8\u30ea\u30a8\u30f3\u30c8\u306a\u7d44\u7e54\u306e\u69cb\u7bc9\u306b\u6700\u9069\u306a\u7d44\u307f\u5408\u308f\u305b"},"content":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u6a5f\u5bc6\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u5805\u7262\u306a\u696d\u754c\u57fa\u6e96\u3092\u78ba\u7acb\u30fb\u7dad\u6301\u3059\u308b\u306b\u3042\u305f\u3063\u3066\u3001\u3044\u307e\u3084<a href=\"http:\/\/chrome-extension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/https:\/\/nvlpubs.nist.gov\/nistpubs\/CSWP\/NIST.CSWP.29.pdf\">NIST\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\uff08NSF\uff09<\/a>\u304c\u5e45\u5e83\u304f\u6d3b\u7528\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002NSF\u306f\u3001\u7d44\u7e54\u306b\u304a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306e\u7406\u89e3\u30fb\u7ba1\u7406\u30fb\u8efd\u6e1b\u3092\u652f\u63f4\u3059\u308b5\u3064\u306e\u6a5f\u80fd\uff08\u8b58\u5225\u30fb\u9632\u5fa1\u30fb\u691c\u77e5\u30fb\u5bfe\u5fdc\u30fb\u5fa9\u65e7\uff09\u306b\u3064\u3044\u3066\u3001\u6982\u8981\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4eca\u56de\u306e\u30d6\u30ed\u30b0\u3067\u306f\u305d\u308c\u30895\u3064\u306e\u6a5f\u80fd\u306b\u3064\u3044\u3066\u8a73\u8ff0\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\uff08CTI\uff09\u3092NIST\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u4f75\u305b\u3066\u6d3b\u7528\u3059\u308b\u3053\u3068\u3067\u3069\u306e\u3088\u3046\u306b\u898f\u5236\u3092\u9806\u5b88\u3067\u304d\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u898f\u5236\u304c\u6c42\u3081\u308b\u4ee5\u4e0a\u306e\u6210\u679c\u3092\u51fa\u3059\u3053\u3068\u304c\u3067\u304d\u308b\u306e\u304b\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u6a5f\u5bc6\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u5805\u7262\u306a\u696d\u754c\u57fa\u6e96\u3092\u78ba\u7acb\u30fb\u7dad\u6301\u3059\u308b\u306b\u3042\u305f\u3063\u3066\u3001\u3044\u307e\u3084NIST\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\uff08NSF\uff09\u304c\u5e45\u5e83\u304f\u6d3b\u7528\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002NSF\u306f\u3001\u7d44\u7e54\u306b\u304a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306e\u7406\u89e3\u30fb\u7ba1\u7406\u30fb\u8efd\u6e1b\u3092\u652f\u63f4\u3059\u308b5\u3064\u306e\u6a5f\u80fd\uff08\u8b58\u5225\u30fb\u9632\u5fa1\u30fb\u691c\u77e5\u30fb\u5bfe\u5fdc\u30fb\u5fa9\u65e7\uff09\u306b\u3064\u3044\u3066\u3001\u6982\u8981\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002 \u4eca\u56de\u306e\u30d6\u30ed\u30b0\u3067\u306f\u305d\u308c\u30895\u3064\u306e\u6a5f\u80fd\u306b\u3064\u3044\u3066\u8a73\u8ff0\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\uff08CTI\uff09\u3092NIST\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u4f75\u305b\u3066\u6d3b\u7528\u3059\u308b\u3053\u3068\u3067\u3069\u306e\u3088\u3046\u306b\u898f\u5236\u3092\u9806\u5b88\u3067\u304d\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u898f\u5236\u304c\u6c42\u3081\u308b\u4ee5\u4e0a\u306e\u6210\u679c\u3092\u51fa\u3059\u3053\u3068\u304c\u3067\u304d\u308b\u306e\u304b\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"author":34,"featured_media":27531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[],"class_list":["post-27573","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-7"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8.png",1080,1080,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-150x150.png",150,150,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-300x300.png",300,300,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-768x768.png",768,768,true],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8.png",1080,1080,false],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8.png",1080,1080,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-400x180.png",400,180,true],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-301x279.png",301,279,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-450x316.png",450,316,true],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-642x200.png",642,200,true],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-400x180.png",400,180,true],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-694x384.png",694,384,true],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-932x420.png",932,420,true],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-225x275.png",225,275,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-50x50.png",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/05\/NIST-meets-CTI-8-150x150.png",150,150,true]},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u6a5f\u5bc6\u30c7\u30fc\u30bf\u306e\u4fdd\u8b77\u306b\u95a2\u3059\u308b\u5805\u7262\u306a\u696d\u754c\u57fa\u6e96\u3092\u78ba\u7acb\u30fb\u7dad\u6301\u3059\u308b\u306b\u3042\u305f\u3063\u3066\u3001\u3044\u307e\u3084NIST\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\uff08NSF\uff09\u304c\u5e45\u5e83\u304f\u6d3b\u7528\u3055\u308c\u308b\u3088\u3046\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002NSF\u306f\u3001\u7d44\u7e54\u306b\u304a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306e\u7406\u89e3\u30fb\u7ba1\u7406\u30fb\u8efd\u6e1b\u3092\u652f\u63f4\u3059\u308b5\u3064\u306e\u6a5f\u80fd\uff08\u8b58\u5225\u30fb\u9632\u5fa1\u30fb\u691c\u77e5\u30fb\u5bfe\u5fdc\u30fb\u5fa9\u65e7\uff09\u306b\u3064\u3044\u3066\u3001\u6982\u8981\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002 \u4eca\u56de\u306e\u30d6\u30ed\u30b0\u3067\u306f\u305d\u308c\u30895\u3064\u306e\u6a5f\u80fd\u306b\u3064\u3044\u3066\u8a73\u8ff0\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\uff08CTI\uff09\u3092NIST\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u4f75\u305b\u3066\u6d3b\u7528\u3059\u308b\u3053\u3068\u3067\u3069\u306e\u3088\u3046\u306b\u898f\u5236\u3092\u9806\u5b88\u3067\u304d\u308b\u306e\u304b\u3001\u305d\u3057\u3066\u898f\u5236\u304c\u6c42\u3081\u308b\u4ee5\u4e0a\u306e\u6210\u679c\u3092\u51fa\u3059\u3053\u3068\u304c\u3067\u304d\u308b\u306e\u304b\u3092\u89e3\u8aac\u3057\u307e\u3059\u3002","_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/27573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=27573"}],"version-history":[{"count":40,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/27573\/revisions"}],"predecessor-version":[{"id":27724,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/27573\/revisions\/27724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/27531"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=27573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/categories?post=27573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/tags?post=27573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}