{"id":64474,"date":"2020-08-19T09:00:00","date_gmt":"2020-08-19T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=64474"},"modified":"2021-12-23T16:11:43","modified_gmt":"2021-12-23T08:11:43","slug":"%e9%9b%b2%e7%ab%af%e8%b3%87%e5%ae%89%ef%bc%9a%e9%87%8d%e8%a6%81%e8%a7%80%e5%bf%b5%e3%80%81%e5%a8%81%e8%84%85%e8%88%87%e8%a7%a3%e6%b1%ba%e6%96%b9%e6%a1%88","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=64474","title":{"rendered":"\u96f2\u7aef\u8cc7\u5b89\uff1a\u91cd\u8981\u89c0\u5ff5\u3001\u5a01\u8105\u8207\u89e3\u6c7a\u65b9\u6848"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u96f2\u7aef\u958b\u767c\u4eba\u54e1\u7684\u8cc7\u5b89\u8cac\u4efb\u70ba\u4f55\uff1f\u4ed6\u5011\u8a72\u5982\u4f55\u7dad\u8b77\u96f2\u7aef\u5167\u7684\u5b89\u5168\uff1f\u9019\u4efd\u6307\u5357\u8aaa\u660e\u96f2\u7aef\u8cc7\u5b89\u7684\u4e00\u4e9b\u91cd\u8981\u89c0\u5ff5\uff0c\u4ee5\u53ca\u6709\u54ea\u4e9b\u9818\u57df\u9700\u8981\u5f48\u6027\u3001\u5168\u65b9\u4f4d\u7684\u8cc7\u5b89\u89e3\u6c7a\u65b9\u6848\u4f86\u52a0\u4ee5\u4fdd\u8b77\u3002<\/p><\/blockquote>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud-Security-101-cover.png\" alt=\"\"\/><\/figure>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u5168\u7403\u4f01\u696d\u90fd\u5728\u7d93\u6b77\u4e00\u5834\u6240\u8b02\u7684\u6578\u4f4d\u8f49\u578b\u9769\u547d\uff0c\u4ed6\u5011\u7d1b\u7d1b\u958b\u59cb\u63a1\u7528\u3001\u79fb\u8f49\u3001\u4e26\u9010\u6f38\u719f\u6089\u7576\u4eca\u5404\u7a2e\u8907\u96dc\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/the-cloud-what-it-is-and-what-it-s-for\" target=\"_blank\" rel=\"noreferrer noopener\">\u96f2\u7aef\u5f0f\u6280\u8853<\/a>\u3002<\/p>\n\n\n\n<p>\u96f2\u7aef\u904b\u7b97\u74b0\u5883\u7684\u8cc7\u5b89\u7ba1\u7406\u5c0d\u65bc\u8cc7\u5b89\u9577 (CSO) \u8207\u96f2\u7aef IT \u5718\u968a\u6216\u7cfb\u7d71\u7ba1\u7406\u54e1\u4f86\u8aaa\uff0c\u53ef\u80fd\u76f8\u7576\u6c89\u91cd\uff0c\u539f\u56e0\u5c31\u5728\u65bc\u96f2\u7aef\u670d\u52d9\u7684\u6613\u7528\u6027\u3001\u5f48\u6027\u8207\u7d44\u614b\u53ef\u8f15\u6613\u8abf\u6574\u3002\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u5fc5\u9808\u5c0d\u5176\u4f01\u696d\u7684\u96f2\u7aef\u4f7f\u7528\u65b9\u5f0f\u6709\u6df1\u5165\u7684\u638c\u63e1\uff0c\u624d\u80fd\u8a2d\u5b9a\u9069\u7576\u7684\u8cc7\u5b89\u653f\u7b56\u548c\u6a19\u6e96\uff0c\u4e26\u59a5\u5584\u5b89\u6392\u653f\u7b56\u57f7\u884c\u8005\u8207\u8cac\u4efb\u6b78\u5c6c\u3002<\/p>\n\n\n\n<p>\u96d6\u7136\u50b3\u7d71\u7684\u7db2\u8def\u9632\u8b77\u6280\u8853\u548c\u6a5f\u5236\uff0c\u7121\u6cd5\u8f15\u9b06\u7121\u7e2b\u79fb\u8f49\u81f3\u96f2\u7aef\uff0c\u4f46\u7db2\u8def\u7cfb\u7d71\u7ba1\u7406\u54e1\u6240\u9762\u81e8\u7684\u8cc7\u5b89\u554f\u984c\u537b\u5927\u81f4\u76f8\u540c\uff1a<em>\u5982\u4f55\u9632\u7bc4\u7db2\u8def\u906d\u5230\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\u4e26\u907f\u514d\u8cc7\u6599\u5916\u6d29\uff1f\u5982\u4f55\u78ba\u4fdd\u904b\u8f49\u7387\uff1f\u5982\u4f55\u5c07\u901a\u8a0a\u52a0\u5bc6\u4ee5\u53ca\u8a8d\u8b49\u96f2\u7aef\u4f7f\u7528\u8005\uff1f\u5982\u4f55\u8f15\u9b06\u5075\u6e2c\u5a01\u8105\u4e26\u767c\u6398\u81ea\u5bb6\u958b\u767c\u7684\u61c9\u7528\u7a0b\u5f0f\u7576\u4e2d\u7684\u6f0f\u6d1e\uff1f<\/em><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u4e86\u89e3\u5171\u540c\u5206\u64d4\u7684\u8cac\u4efb<\/h2>\n\n\n\n<p><br>\u57fa\u672c\u4e0a\uff0c\u300c\u96f2\u7aef\u672c\u8eab\u7684\u5b89\u5168\u300d\u8207\u300c\u96f2\u7aef\u5167\u7684\u5b89\u5168\u300d\u9019\u5169\u500b\u662f\u4e0d\u540c\u7684<a rel=\"noreferrer noopener\" href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\" target=\"_blank\">\u6982\u5ff5<\/a>\uff0c\u6700\u65e9\u63d0\u51fa\u9019\u500b\u770b\u6cd5\u7684\u662f Amazon\uff0c\u5176\u76ee\u7684\u662f\u8981\u91d0\u6e05\u5ee0\u5546\u8207\u5ba2\u6236\u4e4b\u9593\u5728\u96f2\u7aef\u5b89\u5168\u8207\u6cd5\u898f\u9075\u5faa\u4e0a\u5404\u81ea\u61c9\u8a72\u5206\u64d4\u7684\u8cac\u4efb\u3002\u96f2\u7aef\u5ee0\u5546\u8a72\u8ca0\u8cac\u7684\u662f\u96f2\u7aef\u670d\u52d9\u7684\u5e95\u5c64\u786c\u9ad4\u8207\u7db2\u8def\u57fa\u790e\u67b6\u69cb\uff0c\u800c\u5ba2\u6236\u5247\u662f\u6839\u64da\u5176\u6240\u63a1\u7528\u670d\u52d9\u4f86\u6c7a\u5b9a\u4ed6\u5011\u9808\u76f4\u63a5\u627f\u64d4\u591a\u5c11\u7a0b\u5ea6\u7684\u8cc7\u5b89\u8cac\u4efb\u3002<\/p>\n\n\n\n<p><em>\u300c\u7576\u60a8\u8207\u786c\u9ad4\u8d8a\u8fd1\uff0c\u60a8\u627f\u64d4\u7684\u8cac\u4efb\u5c31\u8d8a\u5927\u3002\u300d<\/em><em>\u2014 <\/em><em>Mark Nunnikhoven<\/em><br><em>\u526f\u7e3d\u88c1\uff0c\u96f2\u7aef\u7814\u7a76\uff0c\u8da8\u52e2\u79d1\u6280<\/em><\/p>\n\n\n\n<p>\u66f4\u78ba\u5207\u4e00\u9ede\uff0c\u5982\u540c\u8da8\u52e2\u79d1\u6280\u5728\u300c<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=62453\" target=\"_blank\" rel=\"noreferrer noopener\">\u96f2\u7aef\u662f\u4ec0\u9ebc\u8207\u7528\u4f86\u505a\u4ec0\u9ebc<\/a>\u300d(The Cloud: What It Is and What It&#8217;s For) \u4e00\u6587\u7576\u4e2d\u6240\u8aaa\uff0c\u4e0d\u540c\u7684\u96f2\u7aef\u670d\u52d9\u578b\u614b\uff1a\u57fa\u790e\u67b6\u69cb\u670d\u52d9 (IaaS)\u3001\u5e73\u53f0\u670d\u52d9 (PaaS) \u6216\u8edf\u9ad4\u670d\u52d9 (SaaS)\uff0c\u6c7a\u5b9a\u4e86\u54ea\u4e9b\u5143\u7d20 (\u5f9e\u96f2\u7aef\u5e95\u5c64\u786c\u9ad4\u57fa\u790e\u67b6\u69cb\u4e00\u8def\u5230\u96f2\u7aef\u4e0a\u7522\u751f\u3001\u8655\u7406\u53ca\u5132\u5b58\u7684\u8cc7\u6599) \u8a72\u7531\u5ee0\u5546\u6216\u5ba2\u6236\u4f86\u8ca0\u8d77\u4fdd\u8b77\u7684\u8cac\u4efb\u3002<\/p>\n\n\n\n<p>\u8b6c\u5982\uff0c\u5728\u4e00\u500b PaaS \u74b0\u5883\u4e2d (\u5982 Google App Engine\u3001Microsoft Azure PaaS \u6216 Amazon Web Services Lambda)\uff0c\u958b\u767c\u4eba\u54e1\u53ef\u63a1\u8cfc\u4e00\u4e9b\u8cc7\u6e90\u7136\u5f8c\u5728\u4e0a\u9762\u958b\u767c\u3001\u6e2c\u8a66\u3001\u57f7\u884c\u5404\u7a2e\u8edf\u9ad4\u3002\u5728\u9019\u6a23\u7684\u74b0\u5883\u4e0b\uff0c\u4f7f\u7528\u8005\u8a72\u8ca0\u8cac\u7684\u5927\u81f4\u4e0a\u5c31\u662f\u61c9\u7528\u7a0b\u5f0f\u548c\u8cc7\u6599\uff0c\u800c\u96f2\u7aef\u5ee0\u5546\u8a72\u8ca0\u8cac\u7684\u662f\u78ba\u4fdd\u5bb9\u5668\u57fa\u790e\u67b6\u69cb\u8207\u4f5c\u696d\u7cfb\u7d71\u7684\u5b89\u5168\u3002\u4e0d\u904e\uff0c\u5982\u524d\u9762\u6240\u8b1b\u7684\uff0c\u8996\u5ba2\u6236\u63a1\u7528\u7684\u670d\u52d9\u800c\u5b9a\uff0c\u5176\u8cac\u4efb\u4e5f\u6703\u6709\u4e0d\u540c\u7a0b\u5ea6\u7684\u5dee\u5225\uff0c\u4e14\u5dee\u7570\u66f4\u70ba\u7d30\u81a9\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud%20Security%20101-fig-1-a.gif\" alt=\"\"\/><figcaption>\u5716 1\uff1a\u300c\u96f2\u7aef\u672c\u8eab\u7684\u5b89\u5168\u300d\u8207\u300c\u96f2\u7aef\u5167\u7684\u5b89\u5168\u300d\u3002<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\u96f2\u7aef\u672c\u8eab\u7684\u5b89\u5168\u662f\u96f2\u7aef\u5ee0\u5546\u7684\u8cac\u4efb\uff0c\u4e26\u4e14\u900f\u904e\u5408\u7d04\u898f\u7bc4\u548c\u7fa9\u52d9\u4f86\u78ba\u4fdd\uff0c\u4f8b\u5982\u5ee0\u5546\u8207\u5ba2\u6236\u4e4b\u9593\u7684\u670d\u52d9\u7b49\u7d1a\u5354\u8b70 (SLA) \u5c31\u662f\u4e00\u4f8b\u3002\u6b64\u5916\uff0c\u9084\u6709\u4e00\u4e9b\u6548\u80fd\u6307\u6a19\uff0c\u5982\uff1a\u904b\u8f49\u7387\u8207\u5ef6\u9072\u3001\u554f\u984c\u89e3\u6c7a\u901f\u5ea6\u3001\u5167\u5efa\u7684\u8cc7\u5b89\u529f\u80fd\uff0c\u751a\u81f3\u662f\u6548\u80fd\u4e0d\u5f70\u7684\u7f70\u6b3e\uff0c\u901a\u5e38\u90fd\u6709\u4e00\u5957\u96d9\u65b9\u90fd\u63a5\u53d7\u7684\u6a19\u6e96\u3002<\/p>\n\n\n\n<p>\u6240\u4ee5\uff0c\u5c0d\u65bc\u5ee3\u5927\u7684\u96f2\u7aef\u4f7f\u7528\u8005\u4f86\u8aaa\uff0c\u9019\u4efd\u6307\u5357\u6240\u8981\u63a2\u8a0e\u7684\u5176\u5be6\u662f\u300c\u96f2\u7aef\u5167\u7684\u5b89\u5168\u300d\uff0c\u5305\u62ec\uff1a\u6311\u6230\u3001\u5a01\u8105\u7b49\u7b49\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u8cc7\u5b89\u4e3b\u8981\u6311\u6230<\/h2>\n\n\n\n<p>\u4f01\u696d\u6216\u8a31\u6b63\u5728\u5c07\u67d0\u4e9b\u9700\u6c42\u79fb\u8f49\u81f3\u96f2\u7aef\uff0c\u6216\u8005\u6b63\u5728\u958b\u59cb\u5168\u9762\u96f2\u7aef\u5316 (\u4e5f\u5c31\u662f\u300c\u96f2\u7aef\u539f\u751f\u300d)\uff0c\u4e5f\u6216\u8a31\u5df2\u9010\u6f38\u638c\u63e1\u96f2\u7aef\u8cc7\u5b89\u7b56\u7565\u7684\u7cbe\u96a8\u3002\u4f46\u4e0d\u8ad6\u4f01\u696d\u6b63\u8655\u5728\u96f2\u7aef\u8f49\u578b\u7684\u54ea\u500b\u968e\u6bb5\uff0c\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u6240\u9700\u57f7\u884c\u7684\u8cc7\u5b89\u4f5c\u696d\u5927\u540c\u5c0f\u7570\uff0c\u4f8b\u5982\uff1a\u6f0f\u6d1e\u7ba1\u7406\u3001\u5075\u6e2c\u7db2\u8def\u91cd\u8981\u4e8b\u4ef6\u3001\u56de\u61c9\u4e8b\u4ef6\u3001\u8490\u96c6\u5a01\u8105\u60c5\u5831\u4e26\u63a1\u53d6\u884c\u52d5\uff0c\u4ee5\u53ca\u8b93\u5404\u500b\u74b0\u7bc0\u9075\u5f9e\u76f8\u95dc\u7684\u7522\u696d\u6a19\u6e96\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u7ba1\u7406\u8907\u96dc\u6027<\/h3>\n\n\n\n<p>\u96f2\u7aef\u90e8\u7f72\u6240\u8981\u9762\u5c0d\u7684\u57fa\u790e\u67b6\u69cb\u6709\u5225\u65bc\u4f01\u696d\u5167\u7db2\u8def\u3002\u5728\u96f2\u7aef\u88e1\uff0c\u670d\u52d9\u7684\u591a\u5143\u5316\u4f7f\u5f97\u4f01\u696d\u5f88\u96e3\u627e\u5230\u4e00\u5957\u9023\u8cab\u7684\u8cc7\u5b89\u89e3\u6c7a\u65b9\u6848\u3002\u4e0d\u8ad6\u4efb\u4f55\u6642\u5019\uff0c\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u6240\u9762\u5c0d\u7684\u90fd\u662f\u4e00\u500b\u6df7\u5408\u5f0f\u74b0\u5883\u3002\u4f46\u8b93\u4e8b\u60c5\u8907\u96dc\u7684\u662f\uff0c\u96f2\u7aef\u904b\u7b97\u7684\u98a8\u96aa\u53d6\u6c7a\u65bc\u6bcf\u500b\u96f2\u7aef\u90e8\u7f72\u7b56\u7565\u672c\u8eab\u3002\u800c\u9019\u53c8\u53d6\u6c7a\u65bc\u96f2\u7aef\u7528\u6236\u7684\u500b\u5225\u9700\u6c42\u4ee5\u53ca\u5176\u53ef\u63a5\u53d7\u6216\u9858\u610f\u627f\u64d4\u7684\u98a8\u96aa\u3002\u9019\u6b63\u662f\u70ba\u4f55\u98a8\u96aa\u8a55\u4f30\u662f\u4e00\u9805\u91cd\u8981\u7df4\u7fd2\uff0c\u4e0d\u80fd\u53ea\u662f\u4e00\u5473\u7167\u6284\u73fe\u6210\u7684\u6700\u4f73\u5be6\u52d9\u539f\u5247\u6216\u6cd5\u898f\u3002\u4f46\u6cd5\u898f\u9084\u662f\u53ef\u4ee5\u7576\u6210\u4e00\u9805\u57fa\u6e96\u6216\u67b6\u69cb\uff0c\u8b93\u60a8\u5728\u8a55\u4f30\u98a8\u96aa\u6642\u80fd\u8003\u616e\u5230\u4e00\u4e9b\u771f\u6b63\u7684\u554f\u984c\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u638c\u63e1\u72c0\u6cc1<\/h3>\n\n\n\n<p>\u96f2\u7aef\u8a02\u95b1\u7684\u65b9\u4fbf\u6027\u8b93\u4f01\u696d\u7684\u8173\u6b65\u52a0\u5feb\uff0c\u4f7f\u5f97\u63a1\u8cfc\u55ae\u4f4d\u7684\u6c7a\u7b56\u7a81\u7136\u4e0d\u53d7 IT \u90e8\u9580\u7ba1\u8f44\u3002\u7136\u800c\uff0cIT \u90e8\u9580\u537b\u4ecd\u5fc5\u9808\u8ca0\u8cac\u4fdd\u8b77\u96f2\u7aef\u4e0a\u958b\u767c\u7684\u61c9\u7528\u7a0b\u5f0f\u3002\u56e0\u6b64 IT \u7684\u6311\u6230\u8b8a\u6210\u5982\u4f55\u5728\u4e0d\u5f71\u97ff\u4f01\u696d\u8173\u6b65\u8207\u7a0b\u5f0f\u958b\u767c\u6548\u7387\u7684\u60c5\u6cc1\u4e0b\uff0c\u78ba\u5be6\u638c\u63e1\u4e26\u4fdd\u8b77\u96f2\u7aef\u5167\u7684\u6240\u6709\u6d3b\u52d5\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u96f2\u7aef\u5167\u7684\u8cc7\u5b89\u98a8\u96aa\u8207\u5a01\u8105<\/h2>\n\n\n\n<p>\u6839\u64da\u8da8\u52e2\u79d1\u6280\u4e00\u4efd\u91dd\u5c0d\u96f2\u7aef\u5efa\u7f6e\u6700\u5e38\u898b\u7684\u8cc7\u5b89\u9677\u9631\u6240\u505a\u7684\u7814\u7a76\u300c<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=63900\" target=\"_blank\" rel=\"noreferrer noopener\">\u89e3\u69cb\u932f\u7d9c\u8907\u96dc\u7684\u96f2\u7aef\u8cc7\u5b89\u5a01\u8105<\/a>\u300d(Untangling the Web of Cloud Security Threats) \u6307\u51fa\uff0c\u7d44\u614b\u8a2d\u5b9a\u932f\u8aa4\u4f9d\u7136\u662f\u96f2\u7aef\u5ba2\u6236\u6700\u5e38\u51fa\u73fe\u7684\u8cc7\u5b89\u5f31\u9ede\u3002\u9019\u610f\u5473\u8457\uff0c\u7576\u96f2\u7aef\u5ba2\u6236\u5728\u8a2d\u5b9a\u81ea\u5df1\u7684\u96f2\u7aef\u904b\u7b97\u5be6\u9ad4\u6216\u670d\u52d9\u6642\uff0c\u7d93\u5e38\u5ffd\u7565\u4e86\u4e00\u4e9b\u91cd\u8981\u8a2d\u5b9a\uff0c\u6216\u8005\u56e0\u4fee\u6539\u8a2d\u5b9a\u800c\u5e36\u4f86\u4e86\u98a8\u96aa\u3002<\/p>\n\n\n\n<p><em>\u300c\u60a8\u96f2\u7aef\u5167\u7684\u8cc7\u6599\u8207\u61c9\u7528\u7a0b\u5f0f\u5b89\u5168\u5b8c\u5168\u638c\u63e1\u5728\u60a8\u81ea\u5df1\u624b\u4e2d\uff0c\u4eca\u65e5\u5df2\u6709\u8db3\u5920\u7684\u5de5\u5177\u4f86\u8b93\u60a8\u82b1\u8cbb\u5927\u91cf IT \u7d93\u8cbb\u5efa\u7f6e\u7684\u96f2\u7aef\u74b0\u5883\u81f3\u5c11\u8207\u60a8\u820a\u5f0f\u7684\u975e\u96f2\u7aef\u7cfb\u7d71\u4e00\u6a23\u5b89\u5168\u3002\u300d<\/em><em>\u2014 <\/em><em>Greg Young<\/em><br><em>\u7db2\u8def\u8cc7\u5b89\u526f\u7e3d\u88c1\uff0c\u8da8\u52e2\u79d1\u6280<\/em><\/p>\n\n\n\n<p>\u99ed\u5ba2\u6703\u8a66\u5716\u641c\u5c0b\u9019\u4e9b\u7d44\u614b\u8a2d\u5b9a\u932f\u8aa4\uff0c\u7136\u5f8c\u5229\u7528\u9019\u4e9b\u932f\u8aa4\u4f86\u767c\u52d5\u5404\u5f0f\u5404\u6a23\u7684\u60e1\u610f\u653b\u64ca\uff0c\u5305\u62ec\u4e00\u4e9b\u9ad8\u5ea6\u91dd\u5c0d\u6027\u3001\u9396\u5b9a\u7279\u5b9a\u6a5f\u69cb\u7684\u7db2\u8def\u653b\u64ca (\u4e0d\u8ad6\u8a72\u6a5f\u69cb\u662f\u4ed6\u5011\u7684\u6700\u5f8c\u76ee\u6a19\u6216\u8005\u53ea\u662f\u4ed6\u5011\u5165\u4fb5\u5176\u4ed6\u7db2\u8def\u7684\u8df3\u677f) \u4ee5\u53ca\u4e00\u4e9b\u7d14\u7cb9\u4e82\u69cd\u6253\u9ce5\u7684\u653b\u64ca\u3002\u9664\u4e86\u7d44\u614b\u8a2d\u5b9a\u932f\u8aa4\u4e4b\u5916\uff0c\u99ed\u5ba2\u9084\u53ef\u80fd\u5229\u7528\u5077\u4f86\u7684\u767b\u5165\u6191\u8b49\u3001\u4e0d\u8096\u7684\u5bb9\u5668\uff0c\u4ee5\u53ca\u4efb\u4f55\u4e00\u500b\u8edf\u9ad4\u5c64\u7684\u6f5b\u5728\u6f0f\u6d1e\u4f86\u99ed\u5165\u96f2\u7aef\u90e8\u7f72\u74b0\u5883\u3002<\/p>\n\n\n\n<p>\u5be6\u969b\u7684\u653b\u64ca\u6848\u4f8b\u5df2\u7d93\u70ba\u4f01\u696d\u5e36\u4f86\u4e86\u8ca1\u52d9\u6216\u5176\u4ed6\u640d\u5931\uff0c\u4ee5\u4e0b\u662f\u4e00\u4e9b\u53ef\u80fd\u5c0d\u4f01\u696d\u9020\u6210\u5f71\u97ff\u7684\u96f2\u7aef\u7db2\u8def\u653b\u64ca\uff1a<\/p>\n\n\n\n<ul><li>\u865b\u64ec\u52a0\u5bc6\u8ca8\u5e63\u6316\u7926\uff1a\u99ed\u5ba2\u53ef\u80fd\u6697\u4e2d\u5229\u7528\u7aca\u4f01\u696d\u7684\u96f2\u7aef\u904b\u7b97\u8cc7\u6e90\u4f86\u5077\u5077\u6316\u7926\uff0c\u9019\u4e0d\u50c5\u6703\u5360\u7528\u5927\u91cf\u8cc7\u6e90\uff0c\u800c\u4e14\u53ef\u80fd\u9020\u6210\u7db2\u8def\u6d41\u91cf\u66b4\u589e\uff0c<a href=\"https:\/\/www.justice.gov\/usao-wdwa\/press-release\/file\/1207986\/download\" target=\"_blank\" rel=\"noreferrer noopener\">\u4f01\u696d\u7684\u5e33\u55ae\u91d1\u984d\u4e5f\u56e0\u800c\u98c6\u9ad8<\/a>\u3002<\/li><li>\u7db2\u8def\u76dc\u5361\uff1a\u99ed\u5ba2\u53ef\u80fd\u99ed\u5165\u4f01\u696d\u7684\u7db2\u7ad9\u61c9\u7528\u7a0b\u5f0f\uff0c<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/magecart-skimming-attack-targets-mobile-users-of-hotel-chain-booking-websites\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u6ce8\u5165\u60e1\u610f\u7a0b\u5f0f\u78bc<\/a>\u4f86\u8490\u96c6\u7db2\u7ad9\u8a2a\u5ba2\u7684\u5237\u5361\u8cc7\u8a0a\uff0c\u4e0d\u50c5\u9020\u6210\u6d88\u8cbb\u8005\u7684\u91cd\u5927\u8ca1\u640d\uff0c\u540c\u6642\u4e5f\u640d\u5bb3\u4f01\u696d\u5546\u8b7d\u3002<\/li><li>\u672a\u7d93\u6388\u6b0a\u7684\u5b58\u53d6\uff1a\u53ef\u80fd\u5c0e\u81f4\u8cc7\u6599\u906d\u5230\u7be1\u6539\u3001\u5916\u6d29\u6216\u640d\u6bc0\uff0c\u6b79\u5f92\u53ef\u5c07\u5077\u5230\u7684\u8cc7\u6599\u7528\u65bc\u5404\u7a2e\u4e0d\u6cd5\u7528\u9014\uff0c\u4f8b\u5982\u7aca\u53d6\u4f01\u696d\u7684\u5ba2\u6236\u8cc7\u6599\u5eab\uff0c\u7136\u5f8c\u5c07\u8cc7\u6599\u62ff\u5230\u7db2\u8def\u72af\u7f6a\u5730\u4e0b\u5e02\u5834\u8ca9\u552e\uff0c\u6216\u662f<a href=\"https:\/\/www.forbes.com\/sites\/martingiles\/2020\/01\/03\/cloud-computing-security-cloud-hopper\/?ss=cio-network#4cd5ec554552\" target=\"_blank\" rel=\"noreferrer noopener\">\u7aca\u53d6\u5546\u696d\u6a5f\u5bc6<\/a>\u3002<\/li><\/ul>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u96f2\u7aef\u5167\u9700\u8981\u8cc7\u5b89\u9632\u8b77\u7684\u74b0\u7bc0<\/h2>\n\n\n\n<p>\u7576\u96f2\u7aef\u958b\u767c\u4eba\u54e1\u5728\u898f\u5283\u5176\u96f2\u7aef\u9700\u6c42\u6642\uff0c\u61c9\u540c\u6642\u8d81\u9019\u6a5f\u6703\u5c07\u9632\u8b77\u4e00\u958b\u59cb\u5c31\u5167\u5efa\u81f3\u96f2\u7aef\u90e8\u7f72\u7576\u4e2d\uff0c\u5982\u6b64\u624d\u80fd\u907f\u514d\u524d\u9762\u6240\u63d0\u7684\u5404\u7a2e\u5a01\u8105\u548c\u98a8\u96aa\u3002\u85c9\u7531\u78ba\u4fdd\u6bcf\u500b\u76f8\u95dc\u74b0\u7bc0\u7684\u5b89\u5168\uff0cIT \u5718\u968a\u5c31\u80fd\u5f9e\u5bb9\u5730\u61c9\u4ed8\u7576\u524d\u53ca\u8207\u672a\u4f86\u7684\u96f2\u7aef\u74b0\u5883\u3002\u800c\u9019\u4e5f\u662f <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html?modal=r1a-btn-gartner-learn-more-4bb353\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner 2020 \u5e74\u96f2\u7aef\u5de5\u4f5c\u8ca0\u8f09\u9632\u8b77\u5e73\u53f0\u5e02\u5834\u6307\u5357<\/a> (Market Guide for Cloud Workload Protection Platforms) \u5831\u544a\u4e2d\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u7db2\u8def (\u6d41\u91cf\u6aa2\u67e5\u3001\u865b\u64ec\u4fee\u88dc)<\/h3>\n\n\n\n<p>\u7db2\u8def\u6d41\u91cf\u6aa2\u67e5\u662f\u8cc7\u5b89\u5f88\u91cd\u8981\u7684\u4e00\u9053\u9632\u7dda\uff0c\u9019\u9053\u9632\u7dda\u4e0d\u50c5\u80fd\u9632\u7bc4\u96f6\u6642\u5dee\u653b\u64ca\u8207\u5df2\u77e5\u6f0f\u6d1e\u653b\u64ca\uff0c\u9084\u80fd\u63d0\u4f9b\u865b\u64ec\u4fee\u88dc\u9632\u8b77\u3002\u96f2\u7aef\u4e0a\u7684\u9632\u706b\u7246\u6709\u5225\u65bc\u50b3\u7d71\u7684\u9632\u706b\u7246\uff0c\u56e0\u70ba\u5be6\u52d9\u4e0a\u7684\u6311\u6230\u4e3b\u8981\u9084\u662f\u8981\u5728\u4e0d\u5e72\u64fe\u7db2\u8def\u9023\u7dda\u6216\u73fe\u6709\u61c9\u7528\u7a0b\u5f0f\u7684\u60c5\u6cc1\u4e0b\u90e8\u7f72\u9632\u706b\u7246\uff0c\u4e0d\u8ad6\u90e8\u7f72\u5728\u865b\u64ec\u79c1\u6709\u96f2\u5167\uff0c\u6216\u90e8\u7f72\u5728\u96f2\u7aef\u7db2\u8def\u4e0a\u3002<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud%20Security%20101-fig-2-01.png\" alt=\"\"\/><figcaption>\u5716 2\uff1a\u96f2\u7aef\u5167\u7684\u7db2\u8def\u9632\u8b77\u5fc5\u9808\u80fd\u5920\u300c\u770b\u898b\u300d\u4f01\u696d\u7684\u6240\u6709\u6d41\u91cf\uff0c\u4e0d\u8ad6\u4f86\u6e90\u70ba\u4f55\u3002<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u96f2\u7aef\u904b\u7b97\u5be6\u9ad4 (\u57f7\u884c\u6642\u671f\u5de5\u4f5c\u8ca0\u8f09\u9632\u8b77)<\/h3>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u8cc7\u5b89\u7684\u8a5e\u5f59\u8207\u5178\u7bc4\u6703\u96a8\u8457\u4eba\u5011\u8a8d\u70ba\u9700\u8981\u4fdd\u8b77\u7684\u5143\u4ef6\u800c\u6539\u8b8a\uff0c\u6240\u8b02\u7684\u96f2\u7aef\u300c\u5de5\u4f5c\u8ca0\u8f09\u300d\uff0c\u662f\u6307\u4e00\u500b\u96f2\u7aef\u904b\u7b97\u5be6\u9ad4\u6240\u8ca0\u8cac\u7684\u529f\u80fd\u6216\u5de5\u4f5c\u3002\u5c0d\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u4f86\u8aaa\uff0c\u59a5\u5584\u4fdd\u8b77\u5de5\u4f5c\u8ca0\u8f09\u4ee5\u9632\u7bc4\u6f0f\u6d1e\u653b\u64ca\u3001\u60e1\u610f\u7a0b\u5f0f\u4ee5\u53ca\u672a\u7d93\u6388\u6b0a\u7684\u8b8a\u66f4\uff0c\u662f\u4e00\u9805\u8271\u96e3\u6311\u6230\uff0c\u56e0\u70ba\u9019\u4e9b\u5de5\u4f5c\u8ca0\u8f09\u53ef\u80fd\u4f4d\u65bc\u4f3a\u670d\u5668\u3001\u96f2\u7aef\u6216\u5bb9\u5668\u74b0\u5883\u7576\u4e2d\u3002\u5de5\u4f5c\u8ca0\u8f09\u53ef\u4ee5\u96a8\u6642\u8996\u9700\u6c42\u800c\u52d5\u614b\u555f\u52d5\uff0c\u4f46\u6bcf\u4e00\u500b\u904b\u7b97\u5be6\u9ad4\u90fd\u5fc5\u9808\u80fd\u88ab\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u6240\u638c\u63e1\uff0c\u4e26\u7b26\u5408\u8cc7\u5b89\u653f\u7b56\u7684\u8981\u6c42\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud%20Security%20101-fig-3-01.png?v1\" alt=\"\"\/><figcaption>\u5716 3\uff1a\u5de5\u4f5c\u8ca0\u8f09\u5fc5\u9808\u53d7\u5230\u76e3\u63a7\u4ee5\u9632\u5404\u7a2e\u8cc7\u5b89\u5a01\u8105\uff0c\u4e0d\u8ad6\u5a01\u8105\u7684\u6027\u8cea\u548c\u4f86\u6e90\u70ba\u4f55\u3002<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"\" alt=\"\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DevOps (\u5bb9\u5668\u9632\u8b77)<\/h3>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\u8fd1\u5e74\u4f86\u6700\u592f\u7684\u96f2\u7aef\u904b\u7b97\u670d\u52d9\u8edf\u9ad4\u55ae\u5143\uff0c\u5c31\u662f\u6240\u8b02\u7684\u300c<a rel=\"noreferrer noopener\" href=\"https:\/\/blog.trendmicro.com.tw\/?p=60814\" target=\"_blank\">\u5bb9\u5668<\/a>\u300d\u3002\u4f7f\u7528\u5bb9\u5668\u53ef\u78ba\u4fdd\u8edf\u9ad4\u4e0d\u8ad6\u5be6\u969b\u6240\u8655\u7684\u904b\u7b97\u74b0\u5883\u70ba\u4f55\u90fd\u80fd\u53ef\u9760\u7684\u57f7\u884c\uff0c\u56e0\u70ba\u7576\u7a0b\u5f0f\u7684\u67d0\u4e9b\u7a0b\u5f0f\u78bc\u3001\u5de5\u5177\u3001\u7cfb\u7d71\u7a0b\u5f0f\u5eab\uff0c\u751a\u81f3\u6240\u9700\u7684\u8edf\u9ad4\u7248\u672c\u90fd\u6709\u81ea\u5df1\u7684\u8981\u6c42\u6642\uff0c\u5c31\u5f88\u96e3\u8907\u88fd\u51fa\u76f8\u540c\u7684\u74b0\u5883\u3002<\/p>\n\n\n\n<figure class=\"wp-block-image is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/documents.trendmicro.com\/images\/TEx\/articles\/Cloud%20Security%20101-fig-4-01.png\" alt=\"\" width=\"580\" height=\"290\"\/><figcaption>\u5716 4\uff1a\u5bb9\u5668\u662f\u7531\u4e0d\u540c\u7684\u7a0b\u5f0f\u78bc\u5806\u758a\u8207\u5143\u4ef6\u6240\u69cb\u6210\uff0c\u56e0\u6b64\u5fc5\u9808\u7d93\u904e\u60e1\u610f\u7a0b\u5f0f\u8207\u6f0f\u6d1e\u6383\u63cf\u3002<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>\u5728\u8edf\u9ad4\u958b\u767c\u968e\u6bb5\u5c31\u5c07\u8cc7\u5b89\u878d\u5165\uff0c\u5c0d\u958b\u767c\u4eba\u54e1\u8207\u71df\u904b\u5718\u968a\u4f86\u8aaa\u5c24\u5176\u91cd\u8981\uff0c\u56e0\u70ba\u96f2\u7aef\u512a\u5148\u7684\u61c9\u7528\u7a0b\u5f0f\u958b\u767c\u6b63\u9010\u6f38\u5d1b\u8d77\u3002\u9019\u610f\u5473\u8457\uff0c\u5bb9\u5668\u5fc5\u9808\u5148\u7d93\u904e\u6383\u7784\u4f86\u78ba\u5b9a\u5bb9\u5668\u5167\u6c92\u6709\u60e1\u610f\u7a0b\u5f0f\u3001\u6f0f\u6d1e (\u9023\u540c\u76f8\u4f9d\u7684\u8edf\u9ad4\u5728\u5167)\u3001\u6a5f\u5bc6\u8cc7\u6599\u6216\u91d1\u9470\uff0c\u751a\u81f3\u662f\u6cd5\u898f\u9075\u5faa\u554f\u984c\u3002\u800c\u4e14\u80fd\u8d8a\u65e9\u5728\u8edf\u9ad4\u5efa\u69cb\u6d41\u7a0b\u7576\u4e2d\u57f7\u884c\u9019\u4e9b\u8cc7\u5b89\u6aa2\u67e5\u8d8a\u597d\uff0c\u6700\u597d\u662f\u878d\u5165\u6301\u7e8c\u6574\u5408\/\u6301\u7e8c\u4ea4\u4ed8 (CI\/CD) \u7684\u5de5\u4f5c\u6d41\u7a0b\u7576\u4e2d\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u61c9\u7528\u7a0b\u5f0f (\u7121\u4f3a\u670d\u5668\u3001API\u3001\u7db2\u7ad9\u61c9\u7528\u7a0b\u5f0f)<\/h3>\n\n\n\n<p>\u50b3\u7d71\u7684\u8cc7\u5b89\u9632\u8b77\u7121\u6cd5\u90e8\u7f72\u5728\u67d0\u4e9b\u7121\u4f3a\u670d\u5668 (Serverless) \u6216\u5bb9\u5668\u5e73\u53f0\u5167\uff0c\u4f46\u61c9\u7528\u7a0b\u5f0f\u672c\u8eab\u5c31\u50cf\u5176\u4ed6\u74b0\u7bc0\u4e00\u6a23\u5fc5\u9808\u53d7\u5230\u56b4\u5bc6\u9632\u8b77\uff0c\u4e0d\u8ad6\u61c9\u7528\u7a0b\u5f0f\u7c21\u55ae\u6216\u8907\u96dc\u3002\u5c0d\u8a31\u591a\u4f01\u696d\u4f86\u8aaa\uff0c\u80fd\u5920\u5feb\u901f\u800c\u6709\u6548\u7387\u5730\u958b\u767c\u8207\u90e8\u7f72\u65b0\u7684\u61c9\u7528\u7a0b\u5f0f\uff0c\u662f\u4ed6\u5011\u9081\u5411\u96f2\u7aef\u4e3b\u8981\u52d5\u529b\u3002\u7136\u800c\u9019\u4e9b\u61c9\u7528\u7a0b\u5f0f\u537b\u662f\u5a01\u8105\u5165\u4fb5\u7db2\u7ad9\u7684\u91cd\u8981\u5165\u53e3\uff0c\u99ed\u5ba2\u53ef\u80fd\u7684\u624b\u6cd5\u5305\u62ec\uff1a\u7a0b\u5f0f\u78bc\u6ce8\u5165\u3001\u81ea\u52d5\u5316\u653b\u64ca\u3001\u9060\u7aef\u6307\u4ee4\u57f7\u884c\u7b49\u7b49\u3002\u56e0\u6b64\u4e00\u65e6\u767c\u751f\u653b\u64ca\u4e8b\u4ef6\uff0c\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u5fc5\u9808\u8981\u80fd\u6df1\u5165\u638c\u63e1\u653b\u64ca\u7684\u8a73\u7d30\u72c0\u6cc1\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u6a94\u6848\u5132\u5b58<\/h3>\n\n\n\n<p>\u4f01\u696d\u9081\u5411\u96f2\u7aef\u7684\u4e3b\u8981 (\u6216\u90e8\u5206) \u539f\u56e0\uff0c\u662f\u5e0c\u671b\u80fd\u6e1b\u8f15\u4f01\u696d\u5167\u5132\u5b58\u7684\u58d3\u529b\u3002\u4f46\u96f2\u7aef\u6a94\u6848\u6216\u7269\u4ef6\u5132\u5b58\u5f88\u53ef\u80fd\u6210\u70ba\u611f\u67d3\u4f86\u6e90\uff0c\u5982\u679c\u6709\u4efb\u4f55\u5df2\u77e5\u7684\u60e1\u610f\u6a94\u6848\u88ab\u4e0a\u50b3\u81f3\u96f2\u7aef\u7684\u8a71\u3002\u56e0\u6b64\uff0c\u4f01\u696d\u5fc5\u9808\u8981\u80fd\u6383\u7784\u6240\u6709\u985e\u578b\u7684\u6a94\u6848\uff0c\u4e0d\u8ad6\u6a94\u6848\u5927\u5c0f\u3002\u800c\u4e14\u6700\u7406\u60f3\u7684\u65b9\u5f0f\u662f\u5728\u6a94\u6848\u5132\u5b58\u4e4b\u524d\u5c31\u9810\u5148\u6383\u7784\uff0c\u4ee5\u964d\u4f4e\u5176\u4ed6\u4f7f\u7528\u8005\u5b58\u53d6\u548c\u57f7\u884c\u5230\u60e1\u610f\u6a94\u6848\u7684\u98a8\u96aa (\u5982\u679c\u4e8b\u5f8c\u624d\u6383\u7784\u7684\u8a71)\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\u6cd5\u898f\u9075\u5faa\u8207\u4f01\u696d\u6cbb\u7406<\/h3>\n\n\n\n<p>\u4e00\u4e9b\u50cf<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/eu-general-data-protection-regulation-gdpr\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e00\u822c\u8cc7\u6599\u4fdd\u8b77\u898f\u5247&nbsp;General Data Protection Regulation (GDPR)<\/a> \u7684\u8cc7\u6599\u96b1\u79c1\u6cd5\u898f\u8207<a href=\"https:\/\/go.trendmicro.com\/sem\/sem\/www.trendmicro.com\/us\/business\/cloud-data\/pci-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u652f\u4ed8\u5361\u7522\u696d\u8cc7\u6599\u5b89\u5168\u6a19\u6e96 (PCI-DSS)<\/a> \u7b49\u7522\u696d\u6a19\u6e96\uff0c\u9084\u6709<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/capabilities\/solutions-for\/healthcare.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u5065\u5eb7\u4fdd\u96aa\u53ef\u651c\u6027\u8207\u8cac\u4efb\u6cd5\u6848 (HIPAA)<\/a> \u7b49\u7acb\u6cd5\uff0c\u5c0d\u65bc\u5fc5\u9808\u8490\u96c6\u3001\u8655\u7406\u3001\u5132\u5b58\u8cc7\u6599 (\u5c24\u5176\u5728\u96f2\u7aef\u5167) \u7684\u4f01\u696d\u4f86\u8aaa\uff0c\u6709\u8457\u6538\u95dc\u4f01\u696d\u751f\u5b58\u7684\u5f71\u97ff\u3002\u96f2\u7aef\u7cfb\u7d71\u7ba1\u7406\u54e1\u5fc5\u9808\u5728\u6cd5\u898f\u9075\u5faa\u8981\u6c42\u8207\u96f2\u7aef\u9748\u6d3b\u6027\u6548\u76ca\u4e4b\u9593\u6c42\u53d6\u5e73\u8861\u3002\u4f01\u696d\u61c9\u501f\u52a9\u4e00\u4e9b\u9632\u8b77\u6280\u8853\u4f86\u78ba\u4fdd\u5176\u90e8\u7f72\u74b0\u5883\u7b26\u5408\u8cc7\u5b89\u6700\u4f73\u5be6\u52d9\u539f\u5247\uff0c\u82e5\u4e0d\u9019\u9ebc\u505a\uff0c\u4f01\u696d\u5f88\u53ef\u80fd\u5728\u4e0d\u77e5\u60c5\u7684\u72c0\u6cc1\u4e0b\u9055\u53cd\u4e86\u6cd5\u898f\u800c\u906d\u81f4\u7f70\u9370\uff0c\u800c\u9019\u4e9b\u7f70\u9370\u5f88\u5bb9\u6613\u5c31\u8b93\u597d\u4e0d\u5bb9\u6613\u7701\u4e0b\u7684\u6210\u672c\u5fb9\u5e95\u88ab\u62b9\u715e\u3002<\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u96f2\u7aef\u9632\u8b77\u6280\u8853<\/h2>\n\n\n\n<p>\u7531\u65bc\u727d\u6d89\u524d\u8ff0\u9019\u9ebc\u591a\u7684\u74b0\u7bc0\uff0c\u56e0\u6b64\u4f01\u696d\u5728\u601d\u8003\u81ea\u5df1\u7684\u96f2\u7aef\u7b56\u7565\u6642\uff0c\u52d9\u5fc5\u8a2d\u6cd5\u8b93\u4e00\u4e9b\u5fc5\u8981\u7684\u9632\u8b77\u6280\u8853\u76e1\u53ef\u80fd\u7c21\u5316\u3002\u5f9e\u60e1\u610f\u7a0b\u5f0f\u9632\u8b77\u8207\u5165\u4fb5\u9632\u8b77\u3001\u5230\u6f0f\u6d1e\u7ba1\u7406\u8207\u7aef\u9ede\u5075\u6e2c\u53ca\u56de\u61c9\uff0c\u6574\u5957\u8cc7\u5b89\u9632\u8b77\u89e3\u6c7a\u65b9\u6848\u5fc5\u9808\u76e1\u91cf\u6e1b\u5c11\u5e73\u5e38 IT \u4eba\u54e1\u5728\u57f7\u884c\u5206\u6790\u6642\u6240\u5fc5\u9808\u7528\u5230\u7684\u5de5\u5177\u3001\u5100\u8868\u677f\u3001\u4ecb\u9762\u7b49\u7b49\u3002\u540c\u6642\uff0c\u9084\u5fc5\u9808\u8981\u80fd\u4ee5\u8996\u89ba\u5316\u65b9\u5f0f\u5fe0\u5be6\u5448\u73fe\u4f01\u696d\u6574\u9ad4\u96f2\u7aef\u71df\u904b\u74b0\u5883\u7684\u62bd\u8c61\u7db2\u8def\u908a\u754c\uff0c\u4e0d\u8ad6\u67d0\u9805\u6d3b\u52d5\u662f\u5426\u7531 IT \u6240\u6279\u51c6 (\u4f8b\u5982\u67d0\u540d\u958b\u767c\u4eba\u54e1\u4e00\u6642\u8208\u8d77\u6240\u64b0\u5beb\u7684\u5de5\u5177)\u3002<\/p>\n\n\n\n<p>\u8da8\u52e2\u79d1\u6280\u53ef\u5354\u52a9 <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/devops\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps<\/a> \u5718\u968a\u5229\u7528<a href=\"https:\/\/www.trendmicro.tw\/tw\/business\/cloud-data\/index.html\">Hybrid Cloud Security(\u6df7\u5408\u96f2\u9632\u8b77)<\/a> \u6df7\u5408\u96f2\u9632\u8b77\u89e3\u6c7a\u65b9\u6848\u5efa\u69cb\u5b89\u5168\u3001\u5feb\u901f\u4ea4\u4ed8\u3001\u96a8\u8655\u57f7\u884c\u7684\u61c9\u7528\u7a0b\u5f0f\u3002\u9019\u5957\u89e3\u6c7a\u65b9\u6848\u63d0\u4f9b\u4e86\u5f37\u5927\u3001\u7c21\u5316\u3001\u81ea\u52d5\u5316\u7684<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/security-teams.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u9632\u8b77<\/a>\u4f86\u8b93\u4f01\u696d\u5c07\u9632\u8b77\u878d\u5165 <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/development-operations.html\" target=\"_blank\" rel=\"noreferrer noopener\">DevOps \u6d41\u7a0b<\/a>\u7576\u4e2d\uff0c\u85c9\u7531\u591a\u91cd\u7684 <a href=\"https:\/\/www.trendmicro.tw\/business\/xgen-security.html\">XGen<\/a> \u5a01\u8105\u9632\u79a6\u6280\u5de7\u4f86\u4fdd\u969c\u5be6\u9ad4\u3001\u865b\u64ec\u53ca\u96f2\u7aef\u5de5\u4f5c\u8ca0\u8f09\u7684\u5b89\u5168\u3002\u900f\u904e Cloud One<sup>TM<\/sup> SaaS \u670d\u52d9\u5e73\u53f0\u8b93\u4f01\u696d\u5f9e\u55ae\u4e00\u4ecb\u9762\u4fdd\u8b77\u6574\u500b\u6df7\u5408\u96f2\u74b0\u5883\uff0c\u64c1\u6709\u5373\u6642\u7684\u8cc7\u5b89\u9632\u8b77\uff0c\u5305\u542b\u4ee5\u4e0b\u670d\u52d9\uff1a<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-one-network-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">Network Security<\/a>\u3001<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-one-workload-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">Workload Security<\/a>\u3001<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud\/smart-check-image-scanning.html\" target=\"_blank\" rel=\"noreferrer noopener\">Container Security<\/a>\u3001<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-one-application-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">Application Security<\/a>\u3001<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-one-file-storage-security.html\" target=\"_blank\" rel=\"noreferrer noopener\">File Storage Security<\/a> \u4ee5\u53ca <a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-one-conformity.html\" target=\"_blank\" rel=\"noreferrer noopener\">Conformity<\/a>\u3002<\/p>\n\n\n\n<p>\u5c0d\u65bc\u6b63\u5728\u5c0b\u627e\u57f7\u884c\u6642\u671f\u5de5\u4f5c\u8ca0\u8f09\u3001\u5bb9\u5668\u6620\u50cf\u4ee5\u53ca\u6a94\u6848\u8207\u7269\u4ef6\u5132\u5b58\u9632\u8b77\u8edf\u9ad4\u7684\u4f01\u696d\uff0c<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/cloud-migration-security.html\">Deep Security<\/a>\u8207<a href=\"https:\/\/www.trendmicro.com\/zh_tw\/business\/products\/hybrid-cloud\/smart-check-image-scanning.html\" target=\"_blank\" rel=\"noreferrer noopener\"> Deep Security Smart Check<\/a> \u7684\u642d\u914d\uff0c\u53ef\u8b93\u60a8\u5728\u958b\u767c\u6d41\u7a0b\u7576\u4e2d\u96a8\u6642\u6383\u7784\u5de5\u4f5c\u8ca0\u8f09\u8207\u5bb9\u5668\u6620\u50cf\u662f\u5426\u542b\u6709\u60e1\u610f\u7a0b\u5f0f\u53ca\u6f0f\u6d1e\uff0c\u5728\u5de5\u4f5c\u8ca0\u8f09\u8207\u5bb9\u5668\u6620\u50cf\u90e8\u7f72\u4e4b\u524d\u9810\u5148\u9632\u7bc4\u5a01\u8105\u3002<\/p>\n\n\n\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/cloud-security-key-concepts-threats-and-solutions\">Cloud Security:Key Concepts, Threats, and Solutions<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u96f2\u7aef\u958b\u767c\u4eba\u54e1\u7684\u8cc7\u5b89\u8cac\u4efb\u70ba\u4f55\uff1f\u4ed6\u5011\u8a72\u5982\u4f55\u7dad\u8b77\u96f2\u7aef\u5167\u7684\u5b89\u5168\uff1f\u9019\u4efd\u6307\u5357\u8aaa\u660e\u96f2\u7aef\u8cc7\u5b89\u7684\u4e00\u4e9b\u91cd\u8981\u89c0\u5ff5\uff0c\u4ee5\u53ca\u6709\u54ea\u4e9b\u9818\u57df\u9700\u8981 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[4513,4],"tags":[262,4562,2282],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/64474"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=64474"}],"version-history":[{"count":2,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/64474\/revisions"}],"predecessor-version":[{"id":64476,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/64474\/revisions\/64476"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=64474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=64474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=64474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}