{"id":1115,"date":"2022-04-03T15:09:13","date_gmt":"2022-04-03T06:09:13","guid":{"rendered":"https:\/\/cybersecurity-jp.com\/zero-trust\/?p=335"},"modified":"2022-04-03T15:09:13","modified_gmt":"2022-04-03T06:09:13","slug":"%e5%b1%9e%e6%80%a7%e3%83%99%e3%83%bc%e3%82%b9%e3%82%a2%e3%82%af%e3%82%bb%e3%82%b9%e5%88%b6%e5%be%a1%ef%bc%88abac%ef%bc%89","status":"publish","type":"post","link":"https:\/\/securityagent.jp\/cont\/cat-security-glossary\/1115\/","title":{"rendered":"\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09"},"content":{"rendered":"<h3>\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09\u3068\u306f<\/h3>\n<p>\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1 (Attribute-Based Access Control: ABAC) \u306f\u3001\u30a2\u30af\u30bb\u30b9\u5236\u9650\u306e\u5236\u5fa1\u306b\u304a\u3044\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u6301\u3064\u5c5e\u6027\u306b\u57fa\u3065\u3044\u3066\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u3092\u5224\u65ad\u3059\u308b\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306e\u624b\u6cd5\u3067\u3042\u308b\u3002<\/p>\n<p>\u5177\u4f53\u7684\u306b\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u6301\u3064\u5c5e\u6027\uff08\u4f8b\uff1a\u5f79\u8077\u3001\u6240\u5c5e\u90e8\u7f72\u3001\u6240\u6301\u3059\u308b\u30e9\u30a4\u30bb\u30f3\u30b9\u306a\u3069\uff09\u306b\u5bfe\u3057\u3066\u3001\u3042\u3089\u304b\u3058\u3081\u8a2d\u5b9a\u3055\u308c\u305f\u30eb\u30fc\u30eb\u306b\u57fa\u3065\u3044\u3066\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u3092\u5224\u65ad\u3057\u3001\u8a31\u53ef\u307e\u305f\u306f\u62d2\u5426\u3092\u884c\u3046\u3002ABAC\u3067\u306f\u3001\u30ed\u30fc\u30eb\u306b\u3088\u308b\u5236\u5fa1\u3067\u306f\u306a\u304f\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u500b\u5225\u306b\u6301\u3064\u5c5e\u6027\u306b\u57fa\u3065\u3044\u3066\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u3092\u7ba1\u7406\u3059\u308b\u305f\u3081\u3001\u3088\u308a\u67d4\u8edf\u6027\u304c\u3042\u308a\u3001\u8a73\u7d30\u306a\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u5236\u5fa1\u304c\u53ef\u80fd\u3067\u3042\u308b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\uff08ABAC\uff09\u3068\u306f \u5c5e\u6027\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u5236\u5fa1 (Attribute-Based Access Control: ABAC) \u306f\u3001\u30a2\u30af\u30bb\u30b9\u5236\u9650\u306e\u5236\u5fa1\u306b\u304a\u3044\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u304c\u6301\u3064\u5c5e\u6027\u306b\u57fa\u3065\u3044\u3066\u30a2\u30af\u30bb\u30b9\u6a29\u9650\u3092\u5224\u65ad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1115","post","type-post","status-publish","format-standard","hentry","category-cat-security-glossary"],"acf":[],"_links":{"self":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts\/1115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/comments?post=1115"}],"version-history":[{"count":0,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/posts\/1115\/revisions"}],"wp:attachment":[{"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/media?parent=1115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/categories?post=1115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securityagent.jp\/cont\/wp-json\/wp\/v2\/tags?post=1115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}