{"id":460,"date":"2019-01-08T12:59:13","date_gmt":"2019-01-08T03:59:13","guid":{"rendered":"https:\/\/wp.apibank.jp\/contents\/?p=460"},"modified":"2020-11-06T13:00:47","modified_gmt":"2020-11-06T04:00:47","slug":"api-security","status":"publish","type":"post","link":"https:\/\/www.apibank.jp\/contents\/news\/api-security\/","title":{"rendered":"\u81ea\u793eAPI\u3092\u516c\u958b\u3059\u308b\u4e0a\u3067\u306eAPI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u91cd\u8981\u6027\u306b\u3064\u3044\u3066 &#8211; \u4e3b\u8981\u306a\u30cf\u30c3\u30ad\u30f3\u30b0\u653b\u6483\u306e\u7a2e\u985e\u306b\u3064\u3044\u3066"},"content":{"rendered":"\n<h3>\u30cf\u30c3\u30ab\u30fc\u306b\u3088\u308bAPI\u7d4c\u7531\u3067\u306e\u653b\u6483\u304c\u5897\u52a0<\/h3>\n<p>\u30ea\u30b5\u30fc\u30c1\u30fb\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4f1a\u793e\u306eGartner\u793e\u306b\u3088\u308b\u3068\u30012022\u5e74\u307e\u3067\u306bAPI\u306e\u60aa\u7528\u304c\u3082\u3063\u3068\u3082\u4e00\u822c\u7684\u306aWeb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u653b\u6483\u306b\u306a\u308b\u3068\u3044\u3044\u307e\u3059\u3002<\/p>\n<p>\u5916\u90e8\u306bAPI\u3092\u516c\u958b\u3059\u308b\u4f01\u696d\u306e\u6570\u306f\u5897\u3048\u3066\u304a\u308a\u3001\u30cf\u30c3\u30ab\u30fc\u306fAPI\u7d4c\u7531\u3067\u4f01\u696d\u306e\u5185\u90e8\u60c5\u5831\u30fb\u30b7\u30b9\u30c6\u30e0\u306a\u3069\u306b\u653b\u6483\u3059\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\n<h3>API\u306b\u5bfe\u3059\u308b\u4e3b\u8981\u306a\u653b\u6483<\/h3>\n<p>Ping Identity\u306eCTO\u517cGM\u306eBernard Harguindeguy\u6c0f\u306b\u3088\u308b\u3068\u3001\u30cf\u30c3\u30ab\u30fc\u306b\u3088\u308bAPI\u306b\u5bfe\u3059\u308b\u653b\u6483\u306f\u4e3b\u306b3\u3064\u306e\u30d1\u30bf\u30fc\u30f3\u306b\u96c6\u7d04\u3055\u308c\u308b\u3068\u3044\u3044\u307e\u3059\u3002<\/p>\n<ol class=\"basic_list\">\n<li>DoS\u304a\u3088\u3073DDoS\u653b\u6483<\/li>\n<li>\u30ed\u30b0\u30a4\u30f3\u653b\u6483<\/li>\n<li>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3068\u30c7\u30fc\u30bf\u306e\u653b\u6483<\/li>\n<\/ol>\n<h4>1.DoS\u304a\u3088\u3073DDoS\u653b\u6483<\/h4>\n<p>Dos\u653b\u6483\u306fDenial of Service attack\u3001DDoS\u653b\u6483\u306fDistributed Denial of Service attack\u306e\u82f1\u8a9e\u540d\u304b\u3089\u304d\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>Dos\u653b\u6483\u306f\u3001\u653b\u6483\u5bfe\u8c61\u3067\u3042\u308b\u30b5\u30a4\u30c8\u3084\u30b5\u30fc\u30d0\u30fc\u306b\u5bfe\u3057\u3066\u5927\u91cf\u306e\u30c7\u30fc\u30bf\u3092\u9001\u308a\u3064\u3051\u308b\u3068\u3044\u3046\u3082\u306e\u3067\u3059\u3002<\/p>\n<p>\u30c7\u30fc\u30bf\u306e\u53d7\u4fe1\u5074\u3067\u306f\u5927\u91cf\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u304c\u767a\u751f\u3057\u3001\u8ca0\u8377\u306b\u8010\u3048\u3089\u308c\u306a\u304f\u306a\u3063\u305f\u30b5\u30fc\u30d0\u30fc\u3084\u30b5\u30a4\u30c8\u304c\u30c0\u30a6\u30f3\u3057\u3066\u3057\u307e\u3044\u307e\u3059\u3002<\/p>\n<p>DDoS\u653b\u6483\u306f\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u4f7f\u7528\u3057\u8907\u6570\u306e\u30de\u30b7\u30f3\u3092\u4e57\u3063\u53d6\u3063\u305f\u4e0a\u3067\u3001DoS\u653b\u6483\u3092\u884c\u3046\u3068\u3044\u3046\u3082\u306e\u3067\u3059\u3002<\/p>\n<p>DDoS\u653b\u6483\u306f\u8907\u6570\u306eIP\u3092\u4f7f\u3063\u3066\u884c\u308f\u308c\u308b\u306e\u3067\u3001\u653b\u6483\u5bfe\u8c61\u306b\u3088\u308a\u5927\u304d\u306a\u8ca0\u8377\u3092\u304b\u3051\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002<\/p>\n<p>API\u7d4c\u7531\u3067\u306eDooS\u653b\u6483\u306f\u3001\u8907\u6570\u306e\u9001\u4fe1\u5143\u304b\u3089\u5927\u91cf\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u3092\u9001\u4fe1\u3057\u3066\u3001\u30ed\u30b0\u30a4\u30f3\u3084\u30bb\u30c3\u30b7\u30e7\u30f3\u7ba1\u7406\u306a\u3069\u306e\u91cd\u8981\u306aAPI\u30b5\u30fc\u30d3\u30b9\u306b\u8ca0\u8377\u3092\u304b\u3051\u308b\u3053\u3068\u3067\u884c\u308f\u308c\u307e\u3059\u3002<\/p>\n<h4>2.\u30ed\u30b0\u30a4\u30f3\u653b\u6483<\/h4>\n<p>\u30e6\u30fc\u30b6\u30fc\u306eAPI\u30ad\u30fc\u307e\u305f\u306f\u30c8\u30fc\u30af\u30f3\u3092\u76d7\u307f\u3001API\u30b5\u30fc\u30d3\u30b9\u306b\u4e0d\u6b63\u306b\u30a2\u30af\u30bb\u30b9\u3059\u308b\u653b\u6483\u3067\u3059\u3002<\/p>\n<p>\u9069\u5207\u306a\u8a8d\u8a3c\u60c5\u5831\u3092\u76d7\u3093\u3067\u4f7f\u7528\u3059\u308b\u305f\u3081\u3001API\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u306f\u3053\u306e\u653b\u6483\u3092\u691c\u77e5\u3067\u304d\u307e\u305b\u3093\u3002<\/p>\n<p>\u30ed\u30b0\u30a4\u30f3\u653b\u6483\u306b\u3088\u3063\u3066\u3001\u6b63\u5f53\u306a\u30e6\u30fc\u30b6\u30fc\u304c\u30ed\u30b0\u30a4\u30f3\u3067\u304d\u306a\u3044\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3042\u308b\u3088\u3046\u3067\u3059\u3002<\/p>\n<h4>3.\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3068\u30c7\u30fc\u30bf\u306e\u653b\u6483<\/h4>\n<p>Harguindeguy\u6c0f\u306b\u3088\u308b\u3068\u3001\u30cf\u30c3\u30ab\u30fc\u306f\u4e00\u822c\u30e6\u30fc\u30b6\u30fc\u306e\u8a8d\u8a3c\u60c5\u5831\u3092\u5229\u7528\u3057\u30a2\u30af\u30bb\u30b9\u3057\u305f\u4e0a\u3067\u3001API\u30b5\u30fc\u30d3\u30b9\u306b\u5bfe\u3057\u4ee5\u4e0b\u306e\u3088\u3046\u306a\u64cd\u4f5c\u3092\u884c\u3046\u3068\u3044\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<p>\u00a0<\/p>\n<ul class=\"basic_list\">\n<li>\u30c7\u30fc\u30bf\u62bd\u51fa\u307e\u305f\u306f\u76d7\u96e3<\/li>\n<li>\u30c7\u30fc\u30bf\u306e\u524a\u9664\u307e\u305f\u306f\u64cd\u4f5c<\/li>\n<li>\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u5f15\u304d\u7d99\u304e<\/li>\n<li>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u3078\u306e\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u653b\u6483<\/li>\n<li>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b5\u30fc\u30d3\u30b9\u3078\u306e\u60aa\u8cea\u306a\u30b3\u30fc\u30c9\u633f\u5165<\/li>\n<li>\u30ea\u30e2\u30fc\u30c8\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u307e\u305f\u306f\u30b7\u30b9\u30c6\u30e0\u5236\u5fa1<\/li>\n<\/ul>\n<\/blockquote>\n<p>API\u3092\u516c\u958b\u3059\u308b\u4f01\u696d\u306f\u3001\u4ee5\u4e0a\u306e\u3088\u3046\u306a\u653b\u6483\u3092\u53d7\u3051\u308b\u30ea\u30b9\u30af\u306b\u3055\u3089\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u81ea\u793e\u306eAPI\u30b5\u30fc\u30d3\u30b9\u306e\u516c\u958b\u3092\u8003\u3048\u3066\u3044\u308b\u306e\u3067\u3042\u308c\u3070\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3092\u53d7\u3051\u308b\u30ea\u30b9\u30af\u306b\u3064\u3044\u3066\u5341\u5206\u306b\u691c\u8a0e\u3059\u308b\u5fc5\u8981\u304c\u3042\u308b\u3068\u8a00\u3048\u308b\u306e\u3067\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3002<\/p>\n<p><cite><a href=\"https:\/\/www.programmableweb.com\/news\/how-does-your-api-security-stand-against-3-most-common-attacks\/sponsored-content\/2019\/01\/03\"><br \/>How Does Your API Security Stand Up Against the 3 Most Common Attacks? &#8211; programmableweb<br \/><\/a><\/cite><\/p>\n<p><cite><a href=\"https:\/\/www.pingidentity.com\/en\/resources\/client-library\/analyst-reports\/2018\/gartner-report-build-effective-api-security-strategy.html\"><br \/>GARTNER REPORT: HOW TO BUILD AN EFFECTIVE API SECURITY STRATEGY &#8211; Ping<br \/><\/a><\/cite><\/p>\n<p><cite><a href=\"https:\/\/cybersecurity-jp.com\/security-measures\/18262\"><br \/>DoS\u653b\u6483\u30fbDDoS\u653b\u6483\u3068\u306f\uff1f\u653b\u6483\u306e\u76ee\u7684\u3084\u7a2e\u985e\u3001\u4e8b\u4f8b\u3001\u5bfe\u7b56\u65b9\u6cd5\u3092\u89e3\u8aac &#8211; \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fc.com<br \/><\/a><\/cite><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30ea\u30b5\u30fc\u30c1\u30fb\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u4f1a\u793e\u306eGartner\u793e\u306b\u3088\u308b\u3068\u30012022\u5e74\u307e\u3067\u306bAPI\u306e\u60aa\u7528\u304c\u3082\u3063\u3068\u3082\u4e00\u822c\u7684\u306aWeb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u653b\u6483\u306b\u306a\u308b\u3068\u3044\u3044\u307e\u3059\u3002<\/p>\n","protected":false},"author":1,"featured_media":28,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":{"0":"post-460","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/posts\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":2,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"predecessor-version":[{"id":462,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/posts\/460\/revisions\/462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/media\/28"}],"wp:attachment":[{"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apibank.jp\/contents\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}