{"id":31944,"date":"2023-08-22T11:00:00","date_gmt":"2023-08-22T17:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=31944"},"modified":"2023-08-23T19:32:52","modified_gmt":"2023-08-24T01:32:52","slug":"mitre-attack-defense%e3%82%92%e4%bd%bf%e7%94%a8%e3%81%97%e3%81%9f%e3%82%af%e3%83%a9%e3%82%a6%e3%83%89%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%81%ae%e5%9f%ba%e6%9c%ac","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/","title":{"rendered":"MITRE ATT&amp;CK\u3068D3FEND\u3092\u6d3b\u7528\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5f37\u5316\u306e\u305f\u3081\u306e5\u3064\u306e\u5fc5\u9808\u30b9\u30c6\u30c3\u30d7"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"MITRE ATT&amp;CK and DEFEND\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/5STEPS_Masthead.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/5STEPS_Masthead-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/5STEPS_Masthead-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/5STEPS_Masthead-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-08-22T11:00:00-06:00\">8\u6708 22, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">5 Essential Steps For Stronger Cloud Security Using MITRE ATT&#038;CK And D3FEND<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">3 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('5%20Essential%20Steps%20For%20Stronger%20Cloud%20Security%20Using%20MITRE%20ATT%26CK%20And%20D3FEND').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcloud-security-essential-using-mitre-attck-defend%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=5%20Essential%20Steps%20for%20Stronger%20Cloud%20Security%20Using%20MITRE%20ATT%26CK%20and%20DEFEND&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcloud-security-essential-using-mitre-attck-defend%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcloud-security-essential-using-mitre-attck-defend%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fcloud-security-essential-using-mitre-attck-defend%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p>As organizations increasingly move their infrastructure and applications to the cloud, it&#8217;s more important than ever to have a strong understanding of the security threats and vulnerabilities that come with this migration. The <a href=\"https:\/\/swimlane.com\/resources\/datasheets\/optimizing-the-mitre-att-ck-framework-with-soar\/\">MITRE ATT&amp;CK <\/a>and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments. In this article, we&#8217;ll explore the top 5 do&#8217;s and don&#8217;ts of leveraging these frameworks for cloud security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-top-5-do-s-for-stronger-cloud-security\">Top 5 Do&#8217;s for Stronger Cloud Security <\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-understand-the-shared-responsibility-model\">1. Understand the Shared Responsibility Model<\/h3>\n\n\n\n<p>Cloud security is a shared responsibility between the cloud provider and the customer. Organizations should understand their role in securing their cloud environment and leverage the MITRE frameworks to identify potential threats and vulnerabilities (AWS, 2021).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Map the ATT&amp;CK Framework to Cloud Environments<\/h3>\n\n\n\n<p>To effectively use the ATT&amp;CK framework, it&#8217;s essential to map it to your specific cloud environment. This allows organizations to identify which threats are most relevant to their cloud infrastructure and where to focus their defense efforts (NIST, 2020).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Use the ATT&amp;CK Framework for Threat Hunting in Cloud Environments<\/h3>\n\n\n\n<p>The ATT&amp;CK framework is also a valuable tool for <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/threat-hunting\/\">threat hunting <\/a>in cloud environments. By using the framework to identify potential attack techniques and indicators, security teams can detect and respond to attacks before they cause significant damage (Cloud Security Alliance, 2021).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Incorporate the ATT&amp;CK Framework into Your Cloud Incident Response Plan<\/h3>\n\n\n\n<p>Integrating the ATT&amp;CK framework into your cloud<a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/incident-response\"> incident response<\/a> plan can improve your organization&#8217;s ability to respond quickly and effectively to security incidents. By mapping specific ATT&amp;CK techniques to response procedures, security teams can more efficiently triage and remediate security incidents (SANS Institute, 2020).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-use-d3fend-to-identify-gaps-in-your-cloud-security-controls\">5. Use D3FEND to Identify Gaps in Your Cloud Security Controls<\/h3>\n\n\n\n<p>D3FEND is a companion framework to ATT&amp;CK that provides guidance on how to implement effective security controls. By using D3FEND, organizations can identify gaps in their existing cloud security controls and take steps to mitigate those gaps (MITRE, 2021).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-top-5-things-to-not-do\">Top 5 Things to Not Do:<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-1-treat-the-frameworks-as-a-checklist\">1. Treat the Frameworks as a Checklist<\/h3>\n\n\n\n<p>It&#8217;s important not to view the MITRE frameworks as a checklist to be completed and forgotten. Instead, they should be used as a living document that is continually updated and refined based on the evolving threat landscape (SANS Institute, 2020).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-2-ignore-the-frameworks-once-implemented\">2. Ignore the Frameworks Once Implemented<\/h3>\n\n\n\n<p>Implementing the frameworks is just the first step. Organizations must continually review and update their use of the frameworks to ensure they remain effective over time (MITRE, 2021).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-3-implement-the-frameworks-without-buy-in-from-key-stakeholders\">3. Implement the Frameworks Without Buy-In from Key Stakeholders<\/h3>\n\n\n\n<p>The successful implementation of the MITRE frameworks requires buy-in and support from key stakeholders across the organization, including IT, security, and management teams (Cloud Security Alliance, 2021).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-4-focus-solely-on-technology-solutions\">4. Focus Solely on Technology Solutions<\/h3>\n\n\n\n<p>While technology solutions are an important component of cloud security, they are only one part of a comprehensive defense strategy. Organizations must also address the human and process factors that contribute to security vulnerabilities (NIST, 2020).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-5-assume-compliance-equals-security\">5. Assume Compliance Equals Security<\/h3>\n\n\n\n<p>Compliance with regulations and standards does not necessarily equate to effective cloud security. Organizations must go beyond compliance to implement effective security controls and defense strategies (AWS, 2021).<\/p>\n\n\n\n<p>In conclusion, leveraging the MITRE ATT&amp;CK and D3FEND frameworks can significantly enhance an organization&#8217;s cloud security defenses. By following the top 5 do&#8217;s and avoiding the top 5 do nots, organizations can use these frameworks to their full potential and better protect against cyber threats in the cloud.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Top 5 Do&#8217;s<\/strong><\/td><td><strong>Citation<\/strong><\/td><\/tr><tr><td>1. Understand the Shared Responsibility Model<\/td><td><a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS (2021)<\/a><\/td><\/tr><tr><td>2. Map the ATT&amp;CK Framework to Cloud Environments<\/td><td><a href=\"https:\/\/csrc.nist.gov\/pubs\/cswp\/21\/updated-mapping-between-nist-csf-and-nerc-cip-stan\/final\" target=\"_blank\" rel=\"noreferrer noopener\">NIST (2020)<\/a><\/td><\/tr><tr><td>3. Use the ATT&amp;CK Framework for Threat Hunting in Cloud Environments<\/td><td><a href=\"https:\/\/www.brighttalk.com\/webcast\/10415\/501341?utm_source=linkedin&amp;utm_medium=post\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security Alliance  (2021)<\/a><\/td><\/tr><tr><td>4. Incorporate the ATT&amp;CK Framework into Your Cloud Incident Response Plan<\/td><td><a href=\"https:\/\/www.sans.org\/white-papers\/39790\/\" target=\"_blank\" rel=\"noreferrer noopener\">SANS Institute (2020)<\/a><\/td><\/tr><tr><td>5. Use DEFEND to Identify Gaps in Your Cloud Security Controls<\/td><td><a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE (2021)<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Top 5 Do Not&#8217;s<\/strong><\/td><td><strong>Citation<\/strong><\/td><\/tr><tr><td>1. Treat the Frameworks as a Checklist<\/td><td><a href=\"https:\/\/www.sans.org\/white-papers\/39790\/\" target=\"_blank\" rel=\"noreferrer noopener\">SANS Institute (2020)<\/a><\/td><\/tr><tr><td>2. Ignore the Frameworks Once Implemented<\/td><td><a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE (2021)<\/a><\/td><\/tr><tr><td>3. Implement the Frameworks Without Buy-In from Key Stakeholders<\/td><td><a href=\"https:\/\/www.brighttalk.com\/webcast\/10415\/501341?utm_source=linkedin&amp;utm_medium=post\" target=\"_blank\" rel=\"noreferrer noopener\">Cloud Security Alliance (2021)<\/a><\/td><\/tr><tr><td>4. Focus Solely on Technology Solutions<\/td><td><a href=\"https:\/\/csrc.nist.gov\/pubs\/cswp\/21\/updated-mapping-between-nist-csf-and-nerc-cip-stan\/final\" target=\"_blank\" rel=\"noreferrer noopener\">NIST (2020)<\/a><\/td><\/tr><tr><td>5. Assume Compliance Equals Security<\/td><td><a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS (2021)<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-365bc88ba7068904a2e865fad2cc8eda2ecb40b1 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-365bc88ba7068904a2e865fad2cc8eda2ecb40b1 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023-08-23_13-38-40.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-the-swimlane-armor-framework\">The Swimlane ARMOR Framework<\/h3>\n\n\n\n<p>SecOps teams who want to map their goals, tactics, and security automation use cases to industry standard frameworks like NIST, CMMC, CMMI or C2M2<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a\"><style>.bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d19fccc0670 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/top-soc-analyst-challenges\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>11\u6708 18, 2022<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Top SOC Analyst Challenges<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d19fccc1abd bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/incident-response-plans\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 20, 2017<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Automating cybersecurity incident response plans<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d19fccc2ab0 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/nist-incident-response\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>1\u6708 31, 2018<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Improving incident response with the NIST Cybersecurity Framework and security automation and orchestration (SAO)<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":31946,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":30404,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,79,72],"class_list":["post-31944","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-leadership","blog-category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Essential Steps for Stronger Cloud Security<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/mitre-attack-defense\u3092\u4f7f\u7528\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u672c\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Essential Steps for Stronger Cloud Security Using MITRE ATT&amp;CK and DEFEND\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/mitre-attack-defense\u3092\u4f7f\u7528\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u672c\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-24T01:32:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_ST.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"5 Essential Steps for Stronger Cloud Security Using MITRE ATT&amp;CK and DEFEND\" \/>\n<meta name=\"twitter:description\" content=\"The MITRE ATT&amp;CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_ST.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/\",\"name\":\"5 Essential Steps for Stronger Cloud Security\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png\",\"datePublished\":\"2023-08-22T17:00:00+00:00\",\"dateModified\":\"2023-08-24T01:32:52+00:00\",\"description\":\"The MITRE ATT&CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png\",\"width\":1120,\"height\":666,\"caption\":\"MITRE ATT&CK and DEFEND\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Essential Steps For Stronger Cloud Security Using MITRE ATT&#038;CK And D3FEND\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306e5\u3064\u306e\u5fc5\u9808\u30b9\u30c6\u30c3\u30d7","description":"MITRE ATT&amp;CK \u304a\u3088\u3073 D3FEND \u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306f\u3001\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u78ba\u4fdd\u3057\u305f\u3044\u7d44\u7e54\u306b\u3068\u3063\u3066\u8cb4\u91cd\u306a\u30c4\u30fc\u30eb\u3068\u306a\u308a\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/mitre-attack-defense\u3092\u4f7f\u7528\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u672c\/","og_locale":"ja_JP","og_type":"article","og_title":"5 Essential Steps for Stronger Cloud Security Using MITRE ATT&CK and DEFEND","og_description":"The MITRE ATT&CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/mitre-attack-defense\u3092\u4f7f\u7528\u3057\u305f\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u57fa\u672c\/","og_site_name":"AI Security Automation","article_modified_time":"2023-08-24T01:32:52+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_ST.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"5 Essential Steps for Stronger Cloud Security Using MITRE ATT&CK and DEFEND","twitter_description":"The MITRE ATT&CK and D3FEND frameworks can be valuable tools for organizations looking to secure their cloud environments.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_ST.png","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"4\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/","url":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/","name":"\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306e5\u3064\u306e\u5fc5\u9808\u30b9\u30c6\u30c3\u30d7","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png","datePublished":"2023-08-22T17:00:00+00:00","dateModified":"2023-08-24T01:32:52+00:00","description":"MITRE ATT&amp;CK \u304a\u3088\u3073 D3FEND \u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306f\u3001\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u78ba\u4fdd\u3057\u305f\u3044\u7d44\u7e54\u306b\u3068\u3063\u3066\u8cb4\u91cd\u306a\u30c4\u30fc\u30eb\u3068\u306a\u308a\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/5STEPS_Masthead.png","width":1120,"height":666,"caption":"MITRE ATT&CK and DEFEND"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/cloud-security-essential-using-mitre-attck-defend\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"5 Essential Steps For Stronger Cloud Security Using MITRE ATT&#038;CK And D3FEND"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/31944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/31944\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/31946"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=31944"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=31944"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=31944"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=31944"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=31944"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=31944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}