{"id":33265,"date":"2023-10-19T09:00:00","date_gmt":"2023-10-19T15:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=33265"},"modified":"2026-03-31T03:54:47","modified_gmt":"2026-03-31T09:54:47","slug":"%e6%94%bb%e6%92%83%e5%af%be%e8%b1%a1%e9%a0%98%e5%9f%9f%e7%ae%a1%e7%90%86%e3%81%a8%e3%81%af%e4%bd%95%e3%81%8b","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u3067\u3059\u304b?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-50ac0cc438dbf2f3b380783c05a3c736bb0670e7{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-6770b3369b6c61539d3140cb52ed6bc5ec393625 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_Masthead.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"What is Attack Surface Management and its Role in Cybersecurity\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Attack_Surface_Masthead.png 1344w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Attack_Surface_Masthead-300x200.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Attack_Surface_Masthead-1024x683.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Attack_Surface_Masthead-768x512.png 768w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-2ba18c9b6304620af4785b54fe900bf0ce0fc4d5 bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-10-19T09:00:00-06:00\">10\u6708 19, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is Attack Surface Management in Cybersecurity?<\/h1>\n\n\n<div class=\"bs-div bs-div-4c0c357bf69b7e1367afb30b9d59be1945441399 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">6 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-205a03f93391472c82564395e3b5684e68c8ef7d bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-fa02c15a19a9c2952663733986e45d4eef708638 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20Attack%20Surface%20Management%20in%20Cybersecurity%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhat-is-attack-surface-management%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Attack%20Surface%20Management%20%26%20its%20Role%20in%20Cybersecurity%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhat-is-attack-surface-management%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhat-is-attack-surface-management%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhat-is-attack-surface-management%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-0d83d6d9863f92131cc95492d42e5b50c72f00bb bs-column---default bs-column--contents     \">\n<p>In today&#8217;s digitally-driven world, safeguarding sensitive data and critical systems from cyber threats is paramount, and understanding your organization&#8217;s attack surface is fundamental.<br>Continue reading to explore attack surface management (ASM) and its role in cybersecurity. What is an attack surface (ASM)? What are the different types of attack surface management? Let\u2019s discover how ASM helps identify vulnerabilities, assess risks, and fortify defenses to keep your digital assets secure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-attack-surface-management-amp-what-role-does-it-play-in-cybersecurity\">What is Attack Surface Management &amp; What Role Does it Play in Cybersecurity?<\/h2>\n\n\n\n<p>From competition-driven invasions to state-sponsored surveillance, the scope and different <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cyber security attacks<\/a> continue to multiply. And it\u2019s no surprise that the stakes are high &#8211; government sectors, private organizations, small businesses, and individuals are all caught up in a series of invisible crossfires in the cyber world.<\/p>\n\n\n\n<p>Hackers seamlessly take advantage of unstable touchpoints, referred to as the attack surfaces, to breach into systems. A cyber attack surface encompasses several attack vectors, which may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network attack surface<\/li>\n\n\n\n<li>Security attack surface<\/li>\n\n\n\n<li>Application attack surface<\/li>\n<\/ul>\n\n\n\n<p>Opposite to this, a human attack surface covers those touchpoints acquired through physical access like desktops, laptops and phones, where <a href=\"https:\/\/swimlane.com\/blog\/mobile-phishing\/\">mobile phishing<\/a> is the immediate threat. Just like the dynamic of the digital landscape, cyber attack surfaces evolve. As threats continue, the need for<a href=\"https:\/\/swimlane.com\/\"> <\/a>well-engineered attack surface management solutions has become more urgent than ever.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Mitigate Attack Surface Risks<\/h2>\n\n\n\n<p>Now that hackers have turned to more ingenious hacking methods, it\u2019s important to have solid knowledge of attack surfaces and <a href=\"https:\/\/swimlane.com\/blog\/best-practices-to-fortify-your-cyber-security-strategy\/\">fortify cybersecurity<\/a> with security best practices. Below are the areas that encompass the proper mitigation of attack surface risks:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attack-surface-reduction\">Attack Surface Reduction<\/h3>\n\n\n\n<p>This first technique focuses on attack surface reduction rules. Generally, smaller attack surfaces are much easier to protect than larger attack surfaces. That\u2019s why eliminating them as early as possible is critical.<\/p>\n\n\n\n<p>Organizations can limit the possibilities of breaches by implementing zero-trust policies. This principle ensures that systems are accessed by the right people, at the right time. Another way to reduce the attack surface is to identify vulnerabilities in the system in advance. Upon identification, implement secure access controls and <a href=\"https:\/\/swimlane.com\/blog\/common-rest-api-authentication-methods-explained-2\/\">rest api authentication<\/a> processes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attack-surface-monitoring\">Attack Surface Monitoring<\/h3>\n\n\n\n<p>The mitigation process continues with monitoring the attack surface for vulnerabilities. Regular scans are vital in <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/\">threat readiness<\/a> and spotting potential breaches earlier. To exploit endpoints accurately and ensure a system free from suspicious activities, follow this with a complete scan.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-attack-surface-analysis\">Attack Surface Analysis<\/h3>\n\n\n\n<p>It\u2019s important to use relevant data from the reduction and monitoring phases, this ensures you are mapping all attack surfaces. Through attack surface analysis, you can easily pinpoint pathways that are in need of regular testing and higher security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-is-attack-surface-management\">What is Attack Surface Management?<\/h2>\n\n\n\n<p>The implications of a cyber attack are damaging. To combat operational disruptions and harm from a system breach, organizations need a reliable set of security technologies to help mitigate these attacks.The role of attack surface management focuses on the key processes involved in the security exposures and attacks on the system.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Surface Management vs. Vulnerability Management<\/h3>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/blog\/automating-vulnerability-lifecycle-management\/\">Vulnerability management automation<\/a> emerges from the overall attack surface management. It brings to light certain weak points for better coverage of the attack surface. There are solutions available that automate vulnerability scans and assist teams to make sense of vulnerability reports, so information is more easily accessible and human-readable. Low-code security automation assists your organization with better tracking of assets and risk management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Attack Surface Management<\/h2>\n\n\n\n<p>Attack surface management is best described through the main types. So, let\u2019s get into the different categories of ASM:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Internal Attack Surface Management<\/h3>\n\n\n\n<p>Internal attack surface management involves procedures that are within the corporate firewalls. Some of the most common internal attack surfaces include unauthorized access, privilege misappropriation, and service disruption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">External Attack Surface Management<\/h3>\n\n\n\n<p>This is the opposite of internal-facing ASM. The external attack surface management points out the identification, analysis, and mitigation beyond the firewall. These vulnerabilities are from outside elements like applications, public web servers, and other external threat factors.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Continuous Attack Surface Management<\/h3>\n\n\n\n<p>Managing attack surfaces isn\u2019t a one-time task. It\u2019s a continuous procedure of mapping network systems for suspicious activities, hence the name continuous attack surface management. This type ensures constant monitoring of the attack surface, often in real-time. As a result, the <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC team<\/a> needs to work on potential threats efficiently.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Open Source Attack Surface Management<\/h3>\n\n\n\n<p>Designed to be accessible by anyone, open source generally comes with higher risk. This stems from its public nature, where maintenance, license, and dependency are relatively unstable. It highlights the Open-source intelligence (OSINT) framework, making use of free resources to reduce the attack surface.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber Asset Attack Surface Management<\/h3>\n\n\n\n<p>This emerging technology centers on the implications associated with asset visibility. It makes use of API integrations for a more comprehensive asset inventory.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Roles and Responsibilities of ASM<\/h2>\n\n\n\n<p>ASM\u2019s core purpose is to get into the mind of an attacker &#8211; to get better visibility and control across all attack surfaces. The process covers both internal and external assets, ensuring that organizations are free from vulnerabilities and<a href=\"https:\/\/www.forbes.com\/sites\/edwardsegal\/2021\/02\/12\/7-ways-to-prepare-for-and-recover-from-cyber-attack-crisis-situations\/?sh=46fe868a47dc\"> <\/a>ready for any <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">type of cyber attack<\/a>.<\/p>\n\n\n\n<p>Now, let\u2019s expound the primary roles of ASM:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Discover assets through scans, logs, and other relevant tools.<\/li>\n\n\n\n<li>Map entry points and classify them accordingly.<\/li>\n\n\n\n<li>Set priority to highly critical attack surfaces.<\/li>\n\n\n\n<li>Remediate vulnerabilities in order of importance.<\/li>\n\n\n\n<li>Keep a close eye on the attack surface.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Combine Your Current Security Technologies with Automation&nbsp;<\/h2>\n\n\n\n<p>Organizations likely have various security technologies, like ASM, in order to make an effort against attackers and to protect their organization. But doing this efficiently is where organizations tend to struggle. The main point of attack surface management is to be one step ahead of the attacker. It\u2019s one of the many solutions that helps discover possible lapses in security and remediate vulnerabilities. The Security Operations Center (<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\">SOC<\/a>) is typically the team handling these types of tasks.<\/p>\n\n\n\n<p>Companies using ASM solutions and other security technologies optimize their processes even more by implementing an <a href=\"https:\/\/swimlane.com\/solutions\/use-cases\/\">automation<\/a> platform alongside these. With automation capabilitites, DevSecOps can easily assess vulnerabilities and apply mitigation techniques as they emerge. It also leads to more efficient security management and attack reduction.&nbsp;<\/p>\n\n\n\n<p>The overall impact of ASM combined with low-code automation gives systems the ability to operate without disruptions caused by cyber attacks. More than that, it\u2019s a pivotal enhancement for organization\u2019s security postures.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attack Surface Management Key Distinctions<\/h2>\n\n\n\n<p>ASM is associated with other relevant cybersecurity terms. Continue reading to understand ASM and other related terminologies:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between attack surface management and attack surface reduction?<\/h3>\n\n\n\n<p>Attack surface reduction is a part of attack surface management. It aims to minimize the possibilities of attacks. Meanwhile, ASM pertains to the entire process of identifying entry points, categorizing these risks, and remediating them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between ASM and Pen testing?<\/h3>\n\n\n\n<p>Both terms are related to securing systems. However, pen testing helps emphasize flaws in the system. This means that organziations coverage is likely limited. A key difference between ASM and pen testing is the technicality of the test. Pen testing conducts a highly detailed assessment of a particular environment. That\u2019s why this method is a part of both security and auditing.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between attack surface and attack vector?<\/h3>\n\n\n\n<p>Attack vectors pertain to any possibility of infiltration to exploit information and disrupt the system. All attack vectors take shape in the name of the attack surface, which is a collective term for all these attack entry points.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between trust boundary and attack surface?<\/h3>\n\n\n\n<p>Trust boundaries serve as the fine line that characterizes the extent to which resources are secured. More simply, it\u2019s the parameter before there is a modification in the trust level. Meanwhile, attack surfaces are boundaries that are open to attackers. So, when new data is incorporated into an established system, it\u2019s a portrayal of a trust boundary that is altered.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between attack resistance management and attack surface management?<\/h3>\n\n\n\n<p>Attack resistance management takes on the technicalities of security tests on attack surfaces for lesser attack infiltration. Lower attack resistance arises from incorrect attack surface management, among other reasons.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why ASM is Integral for Your Exposure Management Strategy<\/h2>\n\n\n\n<p>Being proactive in addressing risks is the most effective way to reduce attack surfaces. Exposure management strategy becomes a vital tool in ASM. The strategy itself limits all the weak links in the system through a more detailed view of cyber exposures. It imposes the importance of prioritization of risks that are most crucial to an organization.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Choose the Best Solutions&nbsp;<\/h2>\n\n\n\n<p>With attacks and breaches becoming more sophisticated, it\u2019s important for organziations to choose the best solutions to protect their data. Through attack surface management tools, experts can keep up with the variety of vulnerabilities and cyber attacks. Paring your security technologies with automation will streamline your processes and connect your siloed tools to be able to mitigate all alerts. According to our <a href=\"https:\/\/swimlane.com\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/\">Cyber Threat Readiness Report<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>78% of organizations that handle all alerts incorporate low-code security automation into their security posture.<\/li>\n\n\n\n<li>98% of respondents highlighted the benefits of low-code security automation solutions.<\/li>\n<\/ul>\n\n\n\n<p>Automation offers organizations a streamlined and more secure security posture, integrating with all the technologies your organziation uses today. With low-code automation, you get the right balance of pre-built solutions, limitless integrations, and a fully customizable user experience.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don\u2019t Leave Any Vulnerabilities Unaddressed&nbsp;<\/h2>\n\n\n\n<p>Swimlane is an exodus from outdated ASM solutions. It reconsiders the needs of organizations through <a href=\"https:\/\/swimlane.com\/blog\/low-code-security-automation-simplicity\/\">AI enabled low-code security automation<\/a> and extended visibility. <a href=\"https:\/\/swimlane.com\/\">Swimlane<\/a> makes an immediate impact on secuirty teams and empowers the <a href=\"https:\/\/swimlane.com\/blog\/soc-team-roles-responsibilities\/\">SOC team<\/a> to automate manual tasks associated with use cases like, phishing, SIEM triage, vulnerability managemnet, and many more.<\/p>\n\n\n\n<div class=\"bs-div bs-div-780504ec595335944e97a5b9e1877653f3fe2723 bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-ddf602f96bc37be62fe235ec8527d7d4dcd39c51 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-ddf602f96bc37be62fe235ec8527d7d4dcd39c51 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023-08-23_13-38-40.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-773aef0a3852274bc6b23f7985e05efd194e399e bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-the-swimlane-armor-framework\">The Swimlane ARMOR Framework<\/h3>\n\n\n\n<p>SecOps teams who want to map their goals, tactics, and security automation use cases to industry standard frameworks like NIST, CMMC, CMMI or C2M2<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-de524685406ee1ccb7bc0f5eb694df60501e96c9\"><style>.bs-pro-button-p-btn-de524685406ee1ccb7bc0f5eb694df60501e96c9 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-0ad64702520e52820989c3b8a4a5574abd826112 bs-column---default     \">\n<div class=\"bs-div bs-div-f0851be86a4542da358c10ec17ccebffa17efe07 bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-5e7267355d8caf36f5b5e0c86eef387b664b848d bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d2458700ec9 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-b619eb984092e720779a969a873521d2ec1a85a5 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d2458702016 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":33266,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":33266,"learn_more_label":"","image_alt_text":"What is Attack Surface Management and its Role in Cybersecurity","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,70,71],"class_list":["post-33265","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-secops","blog-category-soar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Attack Surface Management in Cybersecurity?<\/title>\n<meta name=\"description\" content=\"What is attack surface management? Learn how to protect attack surfaces &amp; keep your organization from vulnerabilities &amp; security breaches here, with Swimlane.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u304b\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack Surface Management &amp; its Role in Cybersecurity | Swimlane\" \/>\n<meta property=\"og:description\" content=\"What is attack surface management? Learn how to protect attack surfaces and keep your organization from vulnerabilities and security breaches here, with Swimlane.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u304b\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T09:54:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_ST.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Attack Surface Management &amp; its Role in Cybersecurity | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"What is attack surface management? Learn how to protect attack surfaces and keep your organization from vulnerabilities and security breaches here, with Swimlane.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"8\u5206\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u3067\u3059\u304b?","description":"\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u3067\u3057\u3087\u3046\u304b\uff1fSwimlane \u3092\u4f7f\u3063\u3066\u3001\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u4fdd\u8b77\u3057\u3001\u7d44\u7e54\u3092\u8106\u5f31\u6027\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fb5\u5bb3\u304b\u3089\u5b88\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u304b\/","og_locale":"ja_JP","og_type":"article","og_title":"Attack Surface Management & its Role in Cybersecurity | Swimlane","og_description":"What is attack surface management? Learn how to protect attack surfaces and keep your organization from vulnerabilities and security breaches here, with Swimlane.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u304b\/","og_site_name":"AI Security Automation","article_modified_time":"2026-03-31T09:54:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_ST.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Attack Surface Management & its Role in Cybersecurity | Swimlane","twitter_description":"What is attack surface management? Learn how to protect attack surfaces and keep your organization from vulnerabilities and security breaches here, with Swimlane.","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"8\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/","url":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/","name":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u3067\u3059\u304b?","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_Masthead.png","datePublished":"2023-10-19T15:00:00+00:00","dateModified":"2026-03-31T09:54:47+00:00","description":"\u653b\u6483\u5bfe\u8c61\u9818\u57df\u7ba1\u7406\u3068\u306f\u4f55\u3067\u3057\u3087\u3046\u304b\uff1fSwimlane \u3092\u4f7f\u3063\u3066\u3001\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u4fdd\u8b77\u3057\u3001\u7d44\u7e54\u3092\u8106\u5f31\u6027\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4fb5\u5bb3\u304b\u3089\u5b88\u308b\u65b9\u6cd5\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_Masthead.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Attack_Surface_Masthead.png","width":1344,"height":896,"caption":"What is Attack Surface Management and its Role in Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/what-is-attack-surface-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is Attack Surface Management in Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/33265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":1,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/33265\/revisions"}],"predecessor-version":[{"id":55407,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/33265\/revisions\/55407"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/33266"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=33265"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=33265"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=33265"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=33265"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=33265"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=33265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}