{"id":155375,"date":"2022-02-21T20:38:31","date_gmt":"2022-02-22T04:38:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=155375"},"modified":"2022-02-21T20:38:31","modified_gmt":"2022-02-22T04:38:31","slug":"cyber-operational-collaboration","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/02\/cyber-operational-collaboration\/?lang=ja","title":{"rendered":"\u300c\u6b21\u306eLog4j\u300d\u5bfe\u5fdc\u306e\u9375\u306f\u30b5\u30a4\u30d0\u30fc\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u9023\u643a"},"content":{"rendered":"<p>\u4eca\u9031\u521d\u3081\u3001\u7b46\u8005\u306f\u7c73\u56fd\u4e0a\u9662\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u653f\u5e9c\u554f\u984c\u59d4\u54e1\u4f1a\u306b<a href=\"https:\/\/www.hsgac.senate.gov\/hearings\/responding-to-and-learning-from-the-log4shell-vulnerability\" rel=\"nofollow,noopener\">\u51fa\u5e2d\u3057<\/a>\u3001\u300cLog4Shell\u300d\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3068\u7bc4\u56f2\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3059\u308b\u6a5f\u4f1a\u3092\u3044\u305f\u3060\u304d\u307e\u3057\u305f\u3002\u305d\u306e\u306a\u304b\u3067\u306f\u3001CISA\u9577\u5b98\u306eJen Easterly\u6c0f\u304c\u300c\u60c5\u5831\u5171\u6709\u3092\u60c5\u5831<em>\u5b9f\u73fe<\/em>\u306b\u5909\u3048\u308b\u3082\u306e\u300d\u3068\u8868\u73fe\u3057\u305f\u3001\u30b5\u30a4\u30d0\u30fc\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u306b\u304a\u3044\u3066\u5354\u696d\u306e\u679c\u305f\u3059\u91cd\u8981\u306a\u5f79\u5272\u300d\u306b\u3064\u3044\u3066\u3082\u8a71\u3057\u5408\u308f\u308c\u307e\u3057\u305f\u3002<\/p>\n<p>\u51fa\u81ea\u304c\u8ecd\u4eba\u3068\u3044\u3046\u3053\u3068\u3082\u3042\u308a\u3001\u79c1\u306f\u5171\u901a\u306e\u76ee\u6a19\u306b\u5bfe\u3059\u308b\u5949\u4ed5\u306e\u7cbe\u795e\u3092\u305f\u305f\u304d\u3053\u307e\u308c\u3066\u304d\u307e\u3057\u305f\u3002\u3053\u306e\u7cbe\u795e\u306f\u5f0a\u793e\u3067\u3082\u5171\u6709\u3055\u308c\u3066\u3044\u307e\u3059\u3057\u3001\u3072\u308d\u304f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u754c\u5168\u4f53\u306e\u898f\u7bc4\u305f\u308b\u3082\u306e\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u306f\u672c\u5f53\u306e\u610f\u5473\u3067\u4e00\u84ee\u6258\u751f\u306a\u306e\u3067\u3059\u3002<\/p>\n<p>\u3044\u307e\u306e\u79c1\u305f\u3061\u306f\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/apache-log4j-vulnerability-cve-2021-44228\/\" rel=\"nofollow,noopener\" >Log4Shell<\/a>\u306e\u3088\u3046\u306a\u56fd\u5bb6\u7684\u30ec\u30d9\u30eb\u306e\u8106\u5f31\u6027\u306b\u76f4\u9762\u3057\u3066\u3044\u307e\u3059\u3002\u3067\u3059\u304b\u3089\u3001\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u5171\u6709\u3055\u308c\u305f\u60c5\u5831\u3092\u3082\u3068\u306b\u7d44\u7e54\u304c\u4eca\u65e5\u306e\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u304b\u3089\u81ea\u8eab\u3092\u5b88\u308b\u5177\u4f53\u7684\u63a8\u5968\u4e8b\u9805\u306b\u843d\u3068\u3057\u8fbc\u3093\u3067\u3044\u3051\u308b\u3088\u3046\u306a\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306e\u69cb\u7bc9\u306f\u3001\u304b\u3064\u3066\u306a\u3044\u307b\u3069\u91cd\u8981\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<h2>\u30b5\u30a4\u30d0\u30fc\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u9023\u643a: \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u305f\u3081\u306e\u6709\u671b\u306a\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6<\/h2>\n<p>\u7c73\u56fd\u8b70\u4f1a\u306e\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u306b\u3088\u308a\u767a\u8db3\u3057\u305fJCDC\uff08<a href=\"https:\/\/www.cisa.gov\/jcdc\" rel=\"nofollow,noopener\">Joint Cyber Defense Collaborative<\/a>\uff09\u306f\u6709\u671b\u306a\u5171\u540c\u4f53\u3067\u3042\u308a\u3001\u79c1\u305f\u3061\u306f\u305d\u306e\u8a2d\u7acb\u540c\u76df\u30e1\u30f3\u30d0\u30fc\u3067\u3042\u308b\u3053\u3068\u3092\u8a87\u308a\u306b\u601d\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u5171\u540c\u4f53\u306e\u304a\u304b\u3052\u3067\u3001Log4Shell\u304c\u767b\u5834\u3057\u305f\u571f\u66dc\u65e5\u306e\u5348\u5f8c\u306b\u306f\u3001\u696d\u754c\u7af6\u5408\u4ed6\u793e\u540c\u58eb\u304c\u653f\u5e9c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066\u751f\u306e\u72b6\u6cc1\u8a8d\u8b58\u3092\u5171\u6709\u3057\u3042\u3048\u308b\u4f53\u5236\u3092\u305f\u3060\u3061\u306b\u7acb\u3061\u4e0a\u3052\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u308c\u306f\u5b98\u6c11\u9023\u643a\u306e\u6210\u529f\u4e8b\u4f8b\u3068\u3044\u3048\u308b\u3082\u306e\u3067\u3057\u3087\u3046\u3002\u5177\u4f53\u7684\u306b\u306f\u3001JCDC\u306f\u5546\u696d\u7684\u306b\u306f\u7af6\u5408\u3068\u306a\u308b\u4f01\u696d\u304c\u540c\u58eb\u3068\u3057\u3066\u884c\u52d5\u3057\u3001\u6025\u901f\u306b\u9032\u5c55\u3059\u308b\u72b6\u6cc1\u8a8d\u8b58\u3092\u5171\u6709\u3059\u308b\u5834\u3068\u3057\u3066\u6a5f\u80fd\u3057\u3001\u56fd\u5bb6\u306e\u91cd\u8981\u6a5f\u80fd\u306e\u5b89\u5168\u4fdd\u969c\u306b\u8ca2\u732e\u3057\u3066\u3044\u307e\u3059\u3002CISA\u9577\u5b98\u306eJen Easterly\u6c0f\u304b\u3089\u300c\u4eca\u5f8c\u3082JCDC\u3092\u6210\u719f\u3055\u305bJCDC\u304c\u3082\u305f\u3089\u3059\u53cc\u65b9\u5411\u306e\u4fa1\u5024\u3092\u6700\u5927\u9650\u306b\u9ad8\u3081\u308b\u300d\u3068\u304a\u7d04\u675f\u3092\u3044\u305f\u3060\u3044\u305f\u3053\u3068\u306b\u611f\u8b1d\u7533\u3057\u4e0a\u3052\u307e\u3059\u3002\u4eca\u5f8c\u3082\u79c1\u305f\u3061\u306f\u3001\u3053\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u30b7\u30c3\u30d7\u3092\u7d99\u7d9a\u3057\u3066\u3044\u304b\u306d\u3070\u306a\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u307e\u305f\u5148\u9031\u3001\u79c1\u306e\u540c\u50da\u3067\u3082\u3042\u308bUnit 42\u30b7\u30cb\u30a2\u30d0\u30a4\u30b9\u30d7\u30ec\u30b8\u30c7\u30f3\u30c8Wendi Whitmore\u304c\u3001\u653f\u5e9c\u306a\u3089\u3073\u306b\u7523\u696d\u754c\u306e\u8457\u540d\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30fc\u30c0\u30fc\u306e\u7686\u3055\u3093\u3068\u3068\u3082\u306b\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u306e<a href=\"https:\/\/www.cisa.gov\/cyber-safety-review-board\" rel=\"nofollow,noopener\">\u300cCyber Safety Review Board (CSRB)\u300d<\/a>\u306e\u30e1\u30f3\u30d0\u30fc\u306b\u9078\u3070\u308c\u305f\u3053\u3068\u3092\u8a87\u308a\u306b\u601d\u3044\u307e\u3059\u3002CSRB\u306e\u6700\u521d\u306e\u4efb\u52d9\u306f\u3001\u300cLog4j\u306e\u8106\u5f31\u6027\u306e\u6839\u672c\u539f\u56e0\u3068\u3001\u305d\u306e\u8106\u5f31\u6027\u306e\u60aa\u7528\u304a\u3088\u3073\u5175\u5668\u5316\u306b\u95a2\u3059\u308b\u91cd\u8981\u306a\u4e8b\u5b9f\u300d\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u3067\u3059\u3002<\/p>\n<p>JCDC \u304a\u3088\u3073 CSRB \u3078\u306e\u7a4d\u6975\u7684\u53c2\u52a0\u306b\u52a0\u3048\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u3001\u5927\u7d71\u9818\u306e\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u96fb\u6c17\u901a\u4fe1\u8aee\u554f\u59d4\u54e1\u4f1a (NSTAC) \u306e\u30e1\u30f3\u30d0\u30fc\u3082\u52d9\u3081\u3001\u305d\u306e\u306a\u304b\u3067\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u653f\u7b56\u3068\u6280\u8853\u7684\u306a\u554f\u984c\u306b\u95a2\u3057\u3001\u7523\u696d\u754c\u304c\u30db\u30ef\u30a4\u30c8\u30cf\u30a6\u30b9\u305d\u306e\u4ed6\u306e\u7c73\u56fd\u653f\u5e9c\u4e0a\u7d1a\u95a2\u4fc2\u8005\u306b\u52a9\u8a00\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u307b\u304b\u79c1\u305f\u3061\u306f\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u3068 IT \u696d\u754c\u3068\u306e\u9593\u3067\u4e3b\u8981\u8abf\u6574\u6a5f\u95a2\u3068\u3057\u3066\u6a5f\u80fd\u3059\u308bIT\u30bb\u30af\u30bf\u30fc\u8abf\u6574\u8a55\u8b70\u4f1a (IT-SCC) \u306e\u57f7\u884c\u59d4\u54e1\u3084\u3001\u9632\u885b\u7523\u696d\u57fa\u76e4\u30bb\u30af\u30bf\u30fc\u8abf\u6574\u8a55\u8b70\u4f1a (DIB-SCC) \u306e\u30e1\u30f3\u30d0\u30fc\u3082\u52d9\u3081\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u79c1\u305f\u3061\u306f\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u306eICT\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3 \u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8 \u30bf\u30b9\u30af\u30d5\u30a9\u30fc\u30b9\u306b\u3082\u7a4d\u6975\u7684\u306b\u53c2\u52a0\u3057\u3066\u304a\u308a\u3001NIST (\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240) \u306eNational Cybersecurity Center of Excellence\u306e<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/05\/secure-5g-nccoe-technology-partner\/\">5G Cybersecurity Project<\/a>\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30d1\u30fc\u30c8\u30ca\u30fc\u306b\u9078\u3070\u308c\u305f\u3053\u3068\u3082\u5b09\u3057\u304f\u601d\u3044\u307e\u3059\u3002<\/p>\n<p>\u6700\u5f8c\u306b\u3001\u5f0a\u793e\u306f\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u3001<a href=\"https:\/\/www.cyberthreatalliance.org\/\" rel=\"nofollow,noopener\">Cyber Threat Alliance<\/a>\uff08\u5f0a\u793e\u306f\u8a2d\u7acb\u30e1\u30f3\u30d0\u30fc\uff09\u3001\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9 \u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3001\u56fd\u969b\u7684\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3068\u5f37\u56fa\u306a\u8105\u5a01\u60c5\u5831\u5171\u6709\u30d1\u30fc\u30c8\u30ca\u30fc\u30b7\u30c3\u30d7\u3092\u7dad\u6301\u3057\u3001\u6280\u8853\u7684\u8105\u5a01\u30c7\u30fc\u30bf\u3092\u5171\u6709\u3057\u3001<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/12\/next-solarwinds-modernizing-cybersecurity\/?lang=ja\">SolarWinds<\/a>\u3084<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/03\/exchange-server-new-playbook\/\">Microsoft Exchange Server<\/a>\u3001<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2022\/01\/defense-for-apache-log4j\/?lang=ja\">Log4Shell<\/a>\u306a\u3069\u306e\u91cd\u5927\u30b5\u30a4\u30d0\u30fc\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306b\u5bfe\u3059\u308b\u653f\u5e9c\u30fb\u696d\u754c\u306e\u5bfe\u5fdc\u3092\u652f\u63f4\u3059\u308b\u305f\u3081\u306b\u5354\u529b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u79c1\u305f\u3061\u306f\u3001\u7d71\u5408\u3055\u308c\u305f\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066\u306e\u30b3\u30df\u30c3\u30c8\u30e1\u30f3\u30c8\u3092\u7d99\u7d9a\u3057\u3001\u9032\u5316\u3059\u308b\u8105\u5a01\u306b\u5171\u306b\u7acb\u3061\u5411\u304b\u3046\u305f\u3081\u306b\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3 \u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u3068\u5354\u529b\u3057\u3066\u3044\u304d\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<h2>\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306e\u91cd\u8981\u6027\u306f\u5909\u308f\u3089\u306a\u3044<\/h2>\n<p>\u3053\u3046\u3057\u305f\u8a71\u3057\u5408\u3044\u3092\u3059\u308b\u306a\u304b\u3067\u306f\u3001\u30ea\u30b9\u30af\u4f4e\u6e1b\u306e\u660e\u3089\u304b\u306a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6839\u5e79\u304b\u3089\u76ee\u3092\u305d\u3089\u3059\u3053\u3068\u306f\u3067\u304d\u307e\u305b\u3093\u3002\u305f\u3068\u3048\u3070\u6b21\u306e\u3088\u3046\u306a\u3082\u306e\u3067\u3059\u3002<\/p>\n<ol>\n<li>\u653b\u6483\u8005\u76ee\u7dda\u3067\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u6b63\u78ba\u306b\u628a\u63e1\u3059\u308b\u3002<\/li>\n<li>\u30af\u30e9\u30a6\u30c9\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3001\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\u306a\u3069\u306e\u30b7\u30b9\u30c6\u30e0\u3092\u307e\u305f\u3044\u3067\u306e\u53ef\u8996\u5316\u3092\u4fc3\u9032\u3057\u3001\u30c7\u30fc\u30bf\u3092\u5b64\u7acb\u3055\u305b\u306a\u3044\u3002<\/li>\n<li>\u958b\u767a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\uff08DevSecOps\uff09\u306e\u30d9\u30b9\u30c8\u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u3092\u696d\u754c\u306b\u666e\u53ca\u3055\u305b\u308b\u3002<\/li>\n<li>\u7279\u306b\u3001\u8106\u5f31\u6027\u7ba1\u7406\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306b\u95a2\u9023\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30fc\u30b1\u30b9\u30c8\u30ec\u30fc\u30b7\u30e7\u30f3\u3092\u53ef\u80fd\u306a\u9650\u308a\u81ea\u52d5\u5316\u3059\u308b\u3002<\/li>\n<li>\u3082\u3061\u308d\u3093\u3053\u308c\u307e\u3067\u7a4d\u307f\u91cd\u306d\u304d\u305f\u30b5\u30a4\u30d0\u30fc\u885b\u751f\u306e\u57fa\u672c\u3082\u6709\u52b9\u3067\u3001\u5b88\u3089\u306a\u304b\u3063\u305f\u5834\u5408\u306b\u3069\u3046\u306a\u308b\u304b\u306f\u660e\u3089\u304b\u3002\u793e\u4f1a\u3068\u3057\u3066\u79c1\u305f\u3061\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u7a7a\u9593\u306b\u304a\u3051\u308b\u904b\u8ee2\u3067\u30b7\u30fc\u30c8\u30d9\u30eb\u30c8\u88c5\u7740\u7fa9\u52d9\u9055\u53cd\u3092\u3059\u3079\u304d\u3067\u306a\u3044\u3002<\/li>\n<\/ol>\n<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u30cb\u30e5\u30fc\u30b9\u3092\u898b\u308c\u3070\u3001\u306a\u305c\u3053\u3046\u3057\u305f\u3053\u3068\u304c\u91cd\u8981\u306a\u306e\u304b\u304c\u3088\u304f\u308f\u304b\u308a\u307e\u3059\u3002\u7b46\u8005\u304c\u65e5\u3005\u5206\u6790\u3057\u3066\u3044\u308b\u8105\u5a01\u60c5\u52e2\u306f\u3001<em>\u6700\u5927\u9650\u306e\u8b66\u6212<\/em>\u3092\u6c42\u3081\u3066\u304d\u307e\u3059\u3002<\/p>\n<p>Log4Shell\u306e\u3088\u3046\u306a\u8106\u5f31\u6027\u3067\u3042\u308c\u3001\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u8105\u5a01\u3067\u3042\u308c\u3001\u63fa\u308c\u52d5\u304f\u5730\u653f\u5b66\u7684\u60c5\u52e2\u3067\u3042\u308c (\u6700\u8fd1\u79c1\u305f\u3061\u304c\u516c\u958b\u3057\u305f\u30a6\u30af\u30e9\u30a4\u30ca\u3092\u57f7\u62d7\u306b\u6a19\u7684\u3068\u3059\u308b<a href=\"https:\/\/unit42.paloaltonetworks.jp\/gamaredon-primitive-bear-ukraine-update-2021\/\" rel=\"nofollow,noopener\" >\u30ed\u30b7\u30a2\u3068\u3064\u306a\u304c\u308a\u3092\u3082\u3064APT\u8105\u5a01\u30b0\u30eb\u30fc\u30d7<\/a>\u306b\u95a2\u3059\u308b\u8abf\u67fb\u7d50\u679c\u3082\u305d\u308c\u3092\u88cf\u4ed8\u3051\u3066\u3044\u308b)\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u304c\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u4f53\u5236\u306e\u6839\u5e79\u3067\u3042\u308a\u7d9a\u3051\u308b\u3053\u3068\u306f\u9593\u9055\u3044\u306a\u3044\u3067\u3057\u3087\u3046\u3002\u4eca\u307e\u3067\u4ee5\u4e0a\u306b\u3001\u793e\u4f1a\u5168\u4f53\u3067\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u304c\u6c42\u3081\u3089\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u300cLog4Shell\u306e\u8106\u5f31\u6027\u306f\u3042\u307e\u305f\u3042\u308b\u8106\u5f31\u6027\u306e\u65b0\u305f\u306a1\u3064\u306b\u3059\u304e\u305a\u3001\u3053\u308c\u304b\u3089\u3082\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306f\u305d\u306e\u5bfe\u5fdc\u306e\u305f\u3081\u306b\u96c6\u7d50\u305b\u3056\u308b\u3092\u3048\u306a\u3044\u300d\u3068\u7686\u3055\u3093\u304c\u611f\u3058\u3066\u3044\u308b\u306a\u3089\u3001\u305d\u308c\u306f\u305d\u306e\u3068\u304a\u308a\u3067\u3059\u3002\u3060\u304b\u3089\u3053\u305d\u3001Log4Shell\u3092\u5358\u72ec\u306e\u8106\u5f31\u6027\u3068\u3057\u3066\u500b\u5225\u306b\u5206\u6790\u3059\u308b\u306e\u307f\u306a\u3089\u305a\u3001\u6025\u901f\u306b\u9032\u5316\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u60c5\u52e2\u306e\u3088\u308a\u5e83\u3044\u6587\u8108\u3067\u3082\u6349\u3048\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002Log4Shell\u306f\u56fd\u5bb6\u30ec\u30d9\u30eb\u306e\u8106\u5f31\u6027\u3068\u3057\u3066\u3001\u6700\u521d\u306e\u3082\u306e\u3067\u3082\u6700\u5f8c\u306e\u3082\u306e\u3067\u3082\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3089\u3002<\/p>\n<p><em>\u7b46\u8005\u306e\u8a3c\u8a00\u306f\u3053\u3061\u3089\u306e<\/em><a href=\"https:\/\/www.hsgac.senate.gov\/hearings\/responding-to-and-learning-from-the-log4shell-vulnerability\" rel=\"nofollow,noopener\"><em>\u516c\u8074\u4f1a\u306e\u30ea\u30d7\u30ec\u30a4<\/em><\/a><em>\u304b\u3089\u3054\u89a7\u304f\u3060\u3055\u3044\u3002 <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eca\u9031\u521d\u3081\u3001\u7b46\u8005\u306f\u7c73\u56fd\u4e0a\u9662\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u653f\u5e9c\u554f\u984c\u59d4\u54e1\u4f1a\u306b\u51fa\u5e2d\u3057\u3001\u300cLog4Shell\u300d\u8106\u5f31\u6027\u306e\u5f71\u97ff\u3068\u7bc4\u56f2\u306b\u3064\u3044\u3066\u8b70\u8ad6\u3059\u308b\u6a5f\u4f1a\u3092\u3044\u305f\u3060\u304d\u307e\u3057\u305f\u3002\u305d\u306e\u306a\u304b\u3067\u306f\u3001CISA\u9577\u5b98\u306eJen Easterly\u6c0f\u304c\u300c\u60c5\u5831\u5171\u6709\u3092\u60c5\u5831\u5b9f\u73fe\u306b\u5909\u3048\u308b\u3082\u306e\u300d\u3068\u8868\u73fe\u3057\u305f\u3001\u30b5\u30a4\u30d0\u30fc\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u306b\u304a\u3044\u3066\u5354\u696d\u306e\u679c\u305f\u3059\u91cd\u8981\u306a\u5f79\u5272\u300d\u306b\u3064\u3044\u3066\u3082\u8a71\u3057\u5408\u308f\u308c\u307e\u3057\u305f\u3002 \u51fa\u81ea\u304c\u8ecd\u4eba\u3068\u3044\u3046\u3053\u3068\u3082\u3042\u308a\u3001\u79c1\u306f\u5171\u901a\u306e\u76ee\u6a19\u306b\u5bfe\u3059\u308b\u5949\u4ed5\u306e\u7cbe\u795e\u3092\u305f\u305f\u304d\u3053\u307e\u308c\u3066\u304d\u307e\u3057\u305f\u3002\u3053\u306e\u7cbe\u795e\u306f\u5f0a\u793e\u3067\u3082\u5171\u6709\u3055\u308c\u3066\u3044\u307e\u3059\u3057\u3001\u3072\u308d\u304f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u754c\u5168\u4f53\u306e\u898f\u7bc4\u305f\u308b\u3082\u306e\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u306f\u672c\u5f53\u306e\u610f\u5473\u3067\u4e00\u84ee\u6258\u751f\u306a\u306e\u3067\u3059\u3002 \u3044\u307e\u306e\u79c1\u305f\u3061\u306f\u3001Log4Shell\u306e\u3088\u3046\u306a\u56fd\u5bb6\u7684\u30ec\u30d9\u30eb\u306e\u8106\u5f31\u6027\u306b\u76f4\u9762\u3057\u3066\u3044\u307e\u3059\u3002\u3067\u3059\u304b\u3089\u3001\u60c5\u5831\u3092\u5171\u6709\u3057\u3001\u5171\u6709\u3055\u308c\u305f\u60c5\u5831\u3092\u3082\u3068\u306b\u7d44\u7e54\u304c\u4eca\u65e5\u306e\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u304b\u3089\u81ea\u8eab\u3092\u5b88\u308b\u5177\u4f53\u7684\u63a8\u5968\u4e8b\u9805\u306b\u843d\u3068\u3057\u8fbc\u3093\u3067\u3044\u3051\u308b\u3088\u3046\u306a\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6\u306e\u69cb\u7bc9\u306f\u3001\u304b\u3064\u3066\u306a\u3044\u307b\u3069\u91cd\u8981\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002 \u30b5\u30a4\u30d0\u30fc\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30f3\u9023\u643a: \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u305f\u3081\u306e\u6709\u671b\u306a\u30a4\u30cb\u30b7\u30a2\u30c1\u30d6 \u7c73\u56fd\u8b70\u4f1a\u306e\u30ea\u30fc\u30c0\u30fc\u30b7\u30c3\u30d7\u306b\u3088\u308a\u767a\u8db3\u3057\u305fJCDC\uff08Joint Cyber Defense Collaborative\uff09\u306f\u6709\u671b\u306a\u5171\u540c\u4f53\u3067\u3042\u308a\u3001\u79c1\u305f\u3061\u306f\u305d\u306e\u8a2d\u7acb\u540c\u76df\u30e1\u30f3\u30d0\u30fc\u3067\u3042\u308b\u3053\u3068\u3092\u8a87\u308a\u306b\u601d\u3063\u3066\u3044\u307e\u3059\u3002 \u3053\u306e\u5171\u540c\u4f53\u306e\u304a\u304b\u3052\u3067\u3001Log4Shell\u304c\u767b\u5834\u3057\u305f\u571f\u66dc\u65e5\u306e\u5348\u5f8c\u306b\u306f\u3001\u696d\u754c\u7af6\u5408\u4ed6\u793e\u540c\u58eb\u304c\u653f\u5e9c\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u3068\u3057\u3066\u751f\u306e\u72b6\u6cc1\u8a8d\u8b58\u3092\u5171\u6709\u3057\u3042\u3048\u308b\u4f53\u5236\u3092\u305f\u3060\u3061\u306b\u7acb\u3061\u4e0a\u3052\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3057\u305f\u3002 \u3053\u308c\u306f\u5b98\u6c11\u9023\u643a\u306e\u6210\u529f\u4e8b\u4f8b\u3068\u3044\u3048\u308b\u3082\u306e\u3067\u3057\u3087\u3046\u3002\u5177\u4f53\u7684\u306b\u306f\u3001JCDC\u306f\u5546\u696d\u7684\u306b\u306f\u7af6\u5408\u3068\u306a\u308b\u4f01\u696d\u304c\u540c\u58eb\u3068\u3057\u3066\u884c\u52d5\u3057\u3001\u6025\u901f\u306b\u9032\u5c55\u3059\u308b\u72b6\u6cc1\u8a8d\u8b58\u3092\u5171\u6709\u3059\u308b\u5834\u3068\u3057\u3066\u6a5f\u80fd\u3057\u3001\u56fd\u5bb6\u306e\u91cd\u8981\u6a5f\u80fd\u306e\u5b89\u5168\u4fdd\u969c\u306b\u8ca2\u732e\u3057\u3066\u3044\u307e\u3059\u3002CISA\u9577\u5b98\u306eJen Easterly\u6c0f\u304b\u3089\u300c\u4eca\u5f8c\u3082JCDC\u3092\u6210\u719f\u3055\u305bJCDC\u304c\u3082\u305f\u3089\u3059\u53cc\u65b9\u5411\u306e\u4fa1\u5024\u3092\u6700\u5927\u9650\u306b\u9ad8\u3081\u308b\u300d\u3068\u304a\u7d04\u675f\u3092\u3044\u305f\u3060\u3044\u305f\u3053\u3068\u306b\u611f\u8b1d\u7533\u3057\u4e0a\u3052\u307e\u3059\u3002\u4eca\u5f8c\u3082\u79c1\u305f\u3061\u306f\u3001\u3053\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u30b7\u30c3\u30d7\u3092\u7d99\u7d9a\u3057\u3066\u3044\u304b\u306d\u3070\u306a\u308a\u307e\u305b\u3093\u3002 \u307e\u305f\u5148\u9031\u3001\u79c1\u306e\u540c\u50da\u3067\u3082\u3042\u308bUnit 42\u30b7\u30cb\u30a2\u30d0\u30a4\u30b9\u30d7\u30ec\u30b8\u30c7\u30f3\u30c8Wendi Whitmore\u304c\u3001\u653f\u5e9c\u306a\u3089\u3073\u306b\u7523\u696d\u754c\u306e\u8457\u540d\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30fc\u30c0\u30fc\u306e\u7686\u3055\u3093\u3068\u3068\u3082\u306b\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u306e\u300cCyber Safety Review Board (CSRB)\u300d\u306e\u30e1\u30f3\u30d0\u30fc\u306b\u9078\u3070\u308c\u305f\u3053\u3068\u3092\u8a87\u308a\u306b\u601d\u3044\u307e\u3059\u3002CSRB\u306e\u6700\u521d\u306e\u4efb\u52d9\u306f\u3001\u300cLog4j\u306e\u8106\u5f31\u6027\u306e\u6839\u672c\u539f\u56e0\u3068\u3001\u305d\u306e\u8106\u5f31\u6027\u306e\u60aa\u7528\u304a\u3088\u3073\u5175\u5668\u5316\u306b\u95a2\u3059\u308b\u91cd\u8981\u306a\u4e8b\u5b9f\u300d\u3092\u660e\u3089\u304b\u306b\u3059\u308b\u3053\u3068\u3067\u3059\u3002 JCDC \u304a\u3088\u3073 CSRB \u3078\u306e\u7a4d\u6975\u7684\u53c2\u52a0\u306b\u52a0\u3048\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u3001\u5927\u7d71\u9818\u306e\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u96fb\u6c17\u901a\u4fe1\u8aee\u554f\u59d4\u54e1\u4f1a (NSTAC) \u306e\u30e1\u30f3\u30d0\u30fc\u3082\u52d9\u3081\u3001\u305d\u306e\u306a\u304b\u3067\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u653f\u7b56\u3068\u6280\u8853\u7684\u306a\u554f\u984c\u306b\u95a2\u3057\u3001\u7523\u696d\u754c\u304c\u30db\u30ef\u30a4\u30c8\u30cf\u30a6\u30b9\u305d\u306e\u4ed6\u306e\u7c73\u56fd\u653f\u5e9c\u4e0a\u7d1a\u95a2\u4fc2\u8005\u306b\u52a9\u8a00\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u307b\u304b\u79c1\u305f\u3061\u306f\u3001\u56fd\u571f\u5b89\u5168\u4fdd\u969c\u7701\u3068 IT \u696d\u754c\u3068\u306e\u9593\u3067\u4e3b\u8981\u8abf\u6574\u6a5f\u95a2\u3068\u3057\u3066\u6a5f\u80fd\u3059\u308bIT\u30bb\u30af\u30bf\u30fc\u8abf\u6574\u8a55\u8b70\u4f1a (IT-SCC) \u306e\u57f7\u884c\u59d4\u54e1\u3084\u3001\u9632\u885b\u7523\u696d\u57fa\u76e4\u30bb\u30af\u30bf\u30fc\u8abf\u6574\u8a55\u8b70\u4f1a (DIB-SCC) \u306e\u30e1\u30f3\u30d0\u30fc\u3082\u52d9\u3081\u3066\u3044\u307e\u3059\u3002 &hellip;<\/p>\n","protected":false},"author":89,"featured_media":153615,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7044,6877],"tags":[8374,7308,8375,7213,7254],"coauthors":[736],"class_list":["post-155375","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-sector-ja","category-6877","tag-apache-log4j-vulnerability-ja","tag-collaboration-ja","tag-cybersecurity-public-private-partnerships-ja","tag-policy-ja","tag-unit-42-ja"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/02\/Brainstorm.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/155375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=155375"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/155375\/revisions"}],"predecessor-version":[{"id":155381,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/155375\/revisions\/155381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/153615"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=155375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=155375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=155375"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=155375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}