{"id":3339,"date":"2019-08-29T01:17:16","date_gmt":"2019-08-28T16:17:16","guid":{"rendered":"https:\/\/tech.akat.info\/?p=3339"},"modified":"2019-08-29T01:17:16","modified_gmt":"2019-08-28T16:17:16","slug":"security-jaws-%e3%80%90%e7%ac%ac14%e5%9b%9e%e3%80%91-%e5%8b%89%e5%bc%b7%e4%bc%9a-2019%e5%b9%b48%e6%9c%8828%e6%97%a5-%e3%81%ab%e5%8f%82%e5%8a%a0%e3%81%97%e3%81%9f","status":"publish","type":"post","link":"https:\/\/tech.akat.info\/?p=3339","title":{"rendered":"Security JAWS \u3010\u7b2c14\u56de\u3011 \u52c9\u5f37\u4f1a 2019\u5e748\u670828\u65e5 \u306b\u53c2\u52a0\u3057\u305f"},"content":{"rendered":"<p><a href=\"https:\/\/s-jaws.doorkeeper.jp\/events\/95909\">Security JAWS \u3010\u7b2c14\u56de\u3011 \u52c9\u5f37\u4f1a 2019\u5e748\u670828\u65e5(\u6c34)<\/a>\u306b\u53c2\u52a0\u3057\u305f\u3002<br \/>\n\u305d\u306e\u6642\u306e\u30e1\u30e2\u3002<\/p>\n<h1>Session1: \u30a2\u30de\u30be\u30f3\u30a6\u30a7\u30d6\u30b5\u30fc\u30d3\u30b9\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e \u677e\u672c \u7167\u543e\u3055\u3093 \u300cre:Inforce re:cap\u300d<\/h1>\n<p>\u30fbAWS Security Roadshow Tokyo \u304c 2019-9-25 \u306b\u958b\u50ac\u3055\u308c\u308b<br \/>\n\u30fbre:Inforce \u3067\u306e\u30aa\u30b9\u30b9\u30e1\u306e\u30bb\u30c3\u30b7\u30e7\u30f3\u3002\u5b9f\u6226\u5f62\u5f0f\u3067\u8a66\u305b\u308b\u74b0\u5883\u304c\u63d0\u4f9b\u3055\u308c\u3066\u3044\u308b<\/p>\n<div class=\"oceanwp-oembed-wrap clr\"><iframe loading=\"lazy\" title=\"Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 \" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/key\/oxxt2oNVPbug8k\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen> <\/iframe> <\/p>\n<div style=\"margin-bottom:5px\"> <strong> <a href=\"https:\/\/www.slideshare.net\/AmazonWebServices\/security-best-practices-the-wellarchitected-way-sdd318-aws-reinforce-2019\" title=\"Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 \" target=\"_blank\">Security best practices the well-architected way &#8211; SDD318 &#8211; AWS re:Inforce 2019 <\/a> <\/strong> from <strong><a href=\"https:\/\/www.slideshare.net\/AmazonWebServices\" target=\"_blank\">Amazon Web Services<\/a><\/strong> <\/div>\n<\/div>\n<h1>Session2: \u30d1\u30cd\u30e9\u30fc : \u682a\u5f0f\u4f1a\u793e\u30ea\u30af\u30eb\u30fc\u30c8\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba \u5b89\u6771 \u7f8e\u7a42\u3055\u3093, \uff2e\uff32\uff29\u30bb\u30ad\u30e5\u30a2\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba\u682a\u5f0f\u4f1a\u793e \u95a2\u6238 \u4eae\u4ecb\u3055\u3093, \u682a\u5f0f\u4f1a\u793e\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6 \u5409\u7530 \u6d69\u548c\u3055\u3093, \u30e2\u30c7\u30ec\u30fc\u30bf\u30fc : Security-JAWS \u5409\u6c5f \u77ac\u3055\u3093\u300cre:Inforce \u53c2\u52a0\u5831\u544a\u30d1\u30cd\u30eb\u300d<\/h1>\n<h2>re:Inforce\u306e\u30aa\u30b9\u30b9\u30e1\u30dd\u30a4\u30f3\u30c8\u3084\u5b66\u3093\u3060\u3053\u3068<\/h2>\n<p>\u30fbEBC\u306b\u53c2\u52a0\u3059\u308b\u3053\u3068\u3067\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u3092\u5b9f\u65bd\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd<br \/>\n\u30fb\u82f1\u8a9e\u304c\u3067\u304d\u306a\u304f\u3068\u3082\u3001\u7b2c\u4e00\u7dda\u306e\u30a8\u30f3\u30b8\u30cb\u30a2\u3068\u30db\u30ef\u30a4\u30c8\u30dc\u30fc\u30c9\u3067\u6bb4\u308a\u5408\u3048\u308b<br \/>\n\u30fb\u5468\u308a\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30f3\u30b8\u30cb\u30a2\u306e\u30ec\u30d9\u30eb\u306e\u9ad8\u3055\u3092\u808c\u3067\u611f\u3058\u3089\u308c\u308b<br \/>\n\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5b9f\u88c5\u3084\u76e3\u67fb\u306e\u30b3\u30fc\u30c9\u5316\u304c\u9032\u3093\u3067\u304a\u308a\u3001\u958b\u767a\u30c1\u30fc\u30e0\u3068\u878d\u5408\u3057\u3066\u304d\u3066\u3044\u308b\u3053\u3068\u3092\u611f\u3058\u3066\u3044\u308b<\/p>\n<h1>Session3: \u682a\u5f0f\u4f1a\u793e\u30af\u30e9\u30a6\u30c9\u30cd\u30a4\u30c6\u30a3\u30d6 \u5409\u7530 \u6d69\u548c\u3055\u3093\u300cUnConfig\u300d<\/h1>\n<p>\u30fbAWS\u30ea\u30bd\u30fc\u30b9\u306e\u30a4\u30d9\u30f3\u30c8\u30ea\/\u69cb\u6210\u7ba1\u7406\u306e\u305f\u3081\u306e\u30d5\u30eb\u30de\u30cd\u30fc\u30b8\u30c9\u30b5\u30fc\u30d3\u30b9<br \/>\n\u30fbConfig\u306e\u6a5f\u80fd\u306f3\u3064<br \/>\n\u3000\u30fbSnapshot<br \/>\n\u3000\u30fbHistory<br \/>\n\u3000\u30fbStream<br \/>\n\u3000\u3000\u30ea\u30bd\u30fc\u30b9\u306e\u5909\u66f4\u304c\u3042\u3063\u305f\u3068\u304d\u306bSNS\u306b\u901a\u77e5\u53ef\u80fd<br \/>\n\u21d2\u69cb\u6210\u7ba1\u7406\/\u76e3\u67fb\u306e\u661f<\/p>\n<h2>AWS Config\u306b\u62b1\u304f\u3001\u7518\u3044\u5e7b\u60f3\u3092\u3076\u3063\u3053\u308f\u3059\uff01<\/h2>\n<p>\u30fb\u5b89\u5b9a\u3057\u305f\u74b0\u5883\u304c\u5909\u66f4\u3055\u308c\u305f\u3068\u304d\u306b\u6c17\u304c\u3064\u3051\u308b\u3088\u3046\u306b\u3057\u305f\u3044<br \/>\n\u3000\u30fb\u5909\u66f4\u901a\u77e5\u3059\u308c\u3070\u3044\u3044\u3058\u3083\u306a\u3044(Stream)<br \/>\n\u3000\u21d2AWS\u304c\u884c\u3046\u5909\u66f4\u306f\u3059\u3079\u3066\u901a\u77e5\u3055\u308c\u308b<br \/>\n\u3000\u3000\u3064\u307e\u308a\u88cf\u3067\u52d5\u3044\u3066\u3044\u308bALB\u306e\u30b9\u30b1\u30fc\u30eb\u30a2\u30c3\u30d7\u3084\u30ea\u30bf\u30a4\u30a2\u30e1\u30f3\u30c8\u306a\u3069\u306e\u901a\u77e5\u3082\u304f\u308b<br \/>\n\u3000\u3000EC2\u306b\u65b0\u3057\u3044\u5c5e\u6027\u304c\u3064\u3051\u3089\u308c\u308b\u3068\u3001\u305d\u306e\u901a\u77e5\u3082\u304f\u308b\u3002\u30d5\u30a3\u30eb\u30bf\u306b\u3082\u9650\u754c\u304c\u3042\u308b<br \/>\n\u3000\u30fbConfig TimeLine\u3092\u5229\u7528\u3059\u308c\u3070\u826f\u3044<br \/>\n\u3000\u3000\u4eba\u70ba\u7684\u306a\u64cd\u4f5c\u3092\u62fe\u3048\u308b\u30ec\u30d9\u30eb\u307e\u3067\u306f\u69cb\u7bc9\u3067\u304d\u305f\u3002git\u306b\u3066MIT\u30e9\u30a4\u30bb\u30f3\u30b9\u3067\u516c\u958b\u3057\u3066\u3044\u308b<\/p>\n<h1>Session4: \u682a\u5f0f\u4f1a\u793eChillStack \u4f0a\u6771 \u9053\u660e\u3055\u3093\u300cAWS\u4e0a\u3067\u52d5\u304fWeb\u30b5\u30fc\u30d3\u30b9\u306e\u4e0d\u6b63\u30e6\u30fc\u30b6\u691c\u77e5\u624b\u6cd5\u306e\u7d39\u4ecb\u300d<\/h1>\n<p>\u30fb\u4e0d\u6b63\u884c\u70ba\u3055\u308c\u305f\u3042\u3068\u306e\u3001\u4e0d\u6b63\u306a\u30e6\u30fc\u30b6\u3092\u898b\u3064\u3051\u308b\u3088\u3046\u306a\u624b\u6cd5\u306f\u78ba\u7acb\u3055\u308c\u3066\u3044\u306a\u3044<br \/>\n\u30fb\u30ed\u30b0\u30c7\u30fc\u30bf\u3092\u8aad\u307f\u8fbc\u307f\u3001\u7570\u5e38\u306a\u632f\u308b\u821e\u3044\u3092\u898b\u3064\u3051\u308b\u3002\u3064\u307e\u308a\u30c1\u30fc\u30bf\u30fc\u3092\u767a\u898b\u3059\u308bStena\u3068\u3044\u3046\u30b5\u30fc\u30d3\u30b9\u3092\u4f5c\u6210\u3057\u3066\u3044\u308b<br \/>\n\u30fb\u7570\u5e38\u691c\u77e5\u306a\u3069\u3092\u30d6\u30ed\u30b0\u306b\u307e\u3068\u3081\u3066\u3044\u308b<br \/>\n\u3000https:\/\/blog.chillstack.com\/<\/p>\n<h1>Session5: \u307f\u305a\u307b\u30d5\u30a3\u30ca\u30f3\u30b7\u30e3\u30eb\u30b0\u30eb\u30fc\u30d7 \u5c71\u6cc9 \u4e98\u3055\u3093\u300c\uff1c\u307f\u305a\u307b\uff1e\u304c\u8003\u3048\u308b\u30af\u30e9\u30a6\u30c9\u6d3b\u7528\u306e\u4ed5\u7d44\u307f\u301cLanding Zone\u3068\u305d\u306e\u5148\u301c\u300d<\/h1>\n<p>\u30fbIaaS\u304b\u3089PaaS\u306a\u3069\u306e\u5229\u7528\u306b\u306a\u308b\u3068\u3001FW\u3067\u306f\u306a\u304f\u8a8d\u8a3c\u30fb\u8a8d\u53ef\u304c\u5883\u754c\u306b\u306a\u3063\u3066\u3044\u304f<br \/>\n\u30fb\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u306fIT\u90e8\u9580\u3067\u8003\u3048\u308b\u3001\u3067\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u304c\u9ad8\u304f\u306a\u308b<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security JAWS \u3010\u7b2c14\u56de\u3011 \u52c9\u5f37\u4f1a 2019\u5e748\u670828\u65e5(\u6c34)\u306b\u53c2\u52a0\u3057\u305f\u3002 \u305d\u306e\u6642\u306e\u30e1\u30e2\u3002 Session1: \u30a2\u30de\u30be\u30f3\u30a6\u30a7\u30d6\u30b5\u30fc\u30d3\u30b9\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e \u677e\u672c \u7167\u543e\u3055\u3093 \u300cre:Inforce re:cap\u300d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[35],"tags":[],"_links":{"self":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/3339"}],"collection":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3339"}],"version-history":[{"count":1,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/3339\/revisions"}],"predecessor-version":[{"id":3340,"href":"https:\/\/tech.akat.info\/index.php?rest_route=\/wp\/v2\/posts\/3339\/revisions\/3340"}],"wp:attachment":[{"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.akat.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}