人工ç¥èœïŒAIïŒã¯ãDevSecOpsããŒã ã«ãããœãããŠã§ã¢ã®æ§ç¯æ¹æ³ã倧ããå€ããå¯èœæ§ãç§ããŠããŸãããŸããITãªãŒããŒã¯ãAIã®å°å ¥ã«ãã£ãŠåŸãããã¡ãªãããæå€§éã«åŒãåºããããã«ãããŒã ããµããŒãã§ããç«å Žã«ãããŸããå¹çæ§ã®åäžãããããããŒã®æ¥åè² æ ã®è»œæžããããŠäººãšäººã®ã³ã©ãã¬ãŒã·ã§ã³ã眮ãæããã®ã§ã¯ãªãããããä¿é²ãããšãã芳ç¹ããããã¯ãããžãŒã®æŽ»çšã«æ³šåããããšãæ±ããããŸãã
GitLabã®ããããããŒåèæŽ»åããã°ã©ã ãããŒãžã£ãŒã§ããAbubakar Siddiq Angoã¯ã次ã®ããã«è¿°ã¹ãŠããŸãããããããããŒãå¹çããä»äºãé²ããããã®é©åãªããŒã«ãæã£ãŠããã°ãæºè¶³åºŠãé«ãŸããã¹ãã¬ã¹ã軜æžãããŸãããããŠãããããããŒã®æºè¶³åºŠãé«ããªããã¹ãã¬ã¹ãå°ãªããªããçãå°œãçå矀ã«ãªãã«ãããªãã°ãããè¯ãä»äºãã§ããããã«ãªããä»ã®è·å Žãžã®è»¢è·ãèããããšãå°ãªããªããŸããã€ãŸããçç£æ§ãšå®ççã®åäžã«ã€ãªãããšããããšã§ããããã¯éåžžã«å€§ããªææã§ããã
ãšã³ãããŒãšã³ãã®DevSecOpsãã©ãããã©ãŒã ã«çµã¿èŸŒãŸããAIæ©èœã¯ãããããããŒããµããŒãããå¹çããåããããã«ããããã®ãã®ã§ããAIã¯æ¬¡äžä»£ã®èªååãšæããããšãã§ããããããããŒã奜ããªäŸ¡å€ããä»äºãã€ãŸã驿°çãªã³ãŒããæžããšããäœæ¥ã«å°å¿µã§ããããã«ããŸãã
ããã§ã¯ãDevSecOpsããŒã ãAIãæŽ»çšããŠåãæ¹ãå€é©ããŠããããã®5ã€ã®æ¹æ³ãã玹ä»ããŸãã
1. AIãã¬ãŒãã³ã°ã§ããããããŒã®èªä¿¡ãé«ãã
çµå¶å±€ãããŒã ã®ããã«ã§ããæãæå¹ãªãµããŒããšããŠãã«ãŒãã³ã¿ã¹ã¯ã®èªååãšãåé¡è§£æ±ºã®è¿ éåãšå¹çåãæããããŸããããã«ãããããããããŒã®æ¥åãã·ã³ãã«ã«ãªãããããããçãŸããã¹ãã¬ã¹ã軜æžãããŸãããããŠããŸãã«ãããããAIã®åŸæåéã§ãã
ã³ãŒãææ¡ãè匱æ§ã®èŠçŽãã³ãŒãã®èª¬æãšãã£ãAIããŒã«ã掻çšããããšã§ãããããããŒã¯å調ã§å埩çããã€æéã®ãããäœæ¥ã«è²»ããæéã粟ç¥çãšãã«ã®ãŒãå€§å¹ ã«åæžã§ããŸãããã®çµæãè² æ ã倧ãã軜æžãããææç©ã®è³ªãåäžããŸãã
ãããã¯ééããªãããããããŒã®ä»äºãæ¹åããã§ãããããšAngoã¯èªããŸãããç§ã®äœæ¥æéã®ãã¡ã70%ã¯é¢æ°ãã°ãŒã°ã«ã§æ€çŽ¢ããããäœãã調ã¹ããããããšã«äœ¿ãããŠããŸãããããæ°ç§ã§çè§£ã§ãããªãããã®åãã¹ãŠã®æéãšãšãã«ã®ãŒãã³ãŒããæžãããšã«äœ¿ããŸããAIãé¢åãªäœæ¥ãåŒãåããŠãããããããã人éã¯ãã£ãšéèŠãªããšã«éäžã§ããã®ã§ããã
DevSecOpsããŒã ã®ã¡ã³ããŒã«ãšã£ãŠAIã®å°å ¥ãæ°ããªã¹ãã¬ã¹ã«ãªããªãããã«ããããã«ã¯ããããŒãžã£ãŒãçµå¶å±€ããã¡ã³ããŒãå®å¿ããŠAIæ©èœã掻çšããããã«å¿ èŠãªãã¬ãŒãã³ã°ãæäŸããããšãéèŠã§ããå®éãGitLabã®èª¿æ»ã§ã¯ãåçè ã®çŽ3åã®1ãã€ãŸã31%ãããAIã䜿ãããªãããã®ã¹ãã«ããåºåãè§£éããã¹ãã«ãèªåã«ã¯äžè¶³ããŠããã®ã§ã¯ãªããããšäžå®ãæããŠããããšãåãããŸããããã¡ããããã¬ãŒãã³ã°ã¯åžžã«éèŠã§ãããAIã®ããã«æ°ããæè¡ã«å¯ŸããŠã¯ãã¡ã³ããŒãèªä¿¡ãšæåŸ ãæã£ãŠäœ¿ãå§ããããããããªãŒããŒãç©æ¥µçã«è¡åããŠãµããŒãããå¿ èŠããããŸãã
2. ããŒã ãšé£æºããŠãAIãæŠç¥çã«å°å ¥ãã
æäœæ¥ã«ãããæéãæžãã°ãããããããŒã¯æ¬¡ã®ãããžã§ã¯ãã®ã€ãã¬ãŒã·ã§ã³ã§æ°ããæ©èœãæ§ç¯ããããå€§èŠæš¡ãªãœãããŠã§ã¢ã®ãã¶ã€ã³ã«åãçµãã ãããæéã確ä¿ã§ããŸãããŸããæéçãªå¶çŽã®ããã«åŸåãã«ãªã£ãŠãããããžã§ã¯ãã«ãåã³çæã§ããããã«ããªããŸãã
AIãæŽ»çšããŠã³ãŒãã®ææ¡ã説æãèªåçæããããAIã«ããæ ¹æ¬åå åæã«ãã£ãŠåé¡ã®åå ãç¹å®ãããããããšã§ãããããããŒã¯ãããžã§ã¯ããåã«é²ããããã®æéã確ä¿ãããã倧ããªèŠç¹ã§ã®ããŒãºã«éäžã§ããããã«ãªããŸãã
ãçµå¶é£ãITãªãŒããŒã¯ã人ã ãAIã䜿ã£ãŠããå€ãã®ä»äºãããªããããã«ãµããŒãããŠããç«å Žã«ããããšãçè§£ããå¿ èŠããããšæããŸãããšèªãã®ã¯ãGitLabã®ã·ãã¢ãœãªã¥ãŒã·ã§ã³ã¢ãŒããã¯ããKaren Kwentusã§ãããAIã®æ©èœã«ãã£ãŠãç¹°ãè¿ãã®äœæ¥ãæé€ãããŸããéçºäžãç§ã¯äœæéããããŠåé¡ã®åå ãçªãæ¢ããããšããããšããããŸããããAIãã³ãŒããææ¡ããŠãããããè匱æ§ãèŠçŽããŠããããããã°ããã®äœæ¥ã«æéãåãããããšããªããªããäœæéãç¯çŽã§ãããã§ããæ°ã¥ãã°ãåãæéå ã§ããå€ãã®ããšãã§ããŠããããšããããšã«ãªãã§ããããã
ãAIã«ãã£ãŠããœãããŠã§ã¢ã®ãã«ããã»ãã¥ãªãã£ã®ç¢ºä¿ããããã€ã®å¹çæ§ãé«ãŸããšæããŸãããšAngoã¯ä»ãå ããŸãã
ãªãŒããŒã¯å©çšå¯èœãªAIæ©èœãåžžã«ææ¡ããAIã䜿ã£ãŠãŸãã©ã®ãããªã¯ãŒã¯ãããŒãç°¡çŽ åãã¹ãããããŒã ãšååããŠææ¡ããå¿ èŠããããŸããã§ã¯ãããããããŒã®è² æ ã軜æžããæ¥åå¹çãåäžãããããã«ã¯ãã©ã®ãããªå Žé¢ã§AIãæŽ»çšã§ããã®ã§ãããããAIãœãªã¥ãŒã·ã§ã³ãå°å ¥ãããããããããŒããã©ã¹ã®çµæãåŸãããããã«ãªãã°ããããŒãžã£ãŒã¯ããŒã ãšååããŠããããŸã§é ããŠãããããžã§ã¯ããåŸåãã«ãªã£ãŠããåãçµã¿ãèŠçŽããåªå é äœãã€ããŠåå§åã«åããèšç»ãç«ãŠãããšãã§ããŸãã
3. 人ãšäººã®ã³ã©ãã¬ãŒã·ã§ã³ã®éèŠæ§ã匷調ãã
DevSecOpsãã©ãããã©ãŒã ãå°å ¥ããããšã«ãã倧ããªå©ç¹ã®ã²ãšã€ã¯ãå調æ§ã®ããç°å¢ãä¿é²ãããããšã§ããDevSecOpsããŒã å ã®ã¡ã³ããŒã ãã§ãªããä»éšçœ²ã®ã¡ã³ããŒã«ããœãããŠã§ã¢éçºã©ã€ããµã€ã¯ã«å šäœãå¯èŠåãããããšã§ãç°ãªãããŒã å士ãäºãã®é²è¡ç¶æ³ãææ¡ããé害ã®åé¿çãå ±æããããæ¥åå¹çã®åäžã«ã€ãªããææ¡ãè¡ã£ããã§ããããã«ãªããŸãã
AIæ©èœã¯ãããããã³ã©ãã¬ãŒã·ã§ã³ãä¿é²ããŸãã
ãååãããªãã®æžããã³ãŒãã«ã³ã¡ã³ãããŠãããŠãããããåãåã£ãŠã¡ãããšçè§£ããæéããªããã°æå³ããããŸããããšAngoã¯èšããŸããã誰ããã¬ãã¥ãŒãäŸé ŒãããšããAIã¯ãã®ãªã¯ãšã¹ããèŠçŽã§ããŸãããããŠãã¬ãã¥ãŒå 容ã«ã€ããŠãAIãã³ã¡ã³ãããŸãšããŠãããã®ã§ãããªãã®ãããžã§ã¯ãã«ã€ããŠä»ã®äººãäœãèšã£ãŠããã®ããããã«ææ¡ã§ããŸããAIã¯äººãšäººãåãé¢ãã®ã§ã¯ãªãããããã€ãªã圹å²ãæããã®ã§ããã
Angoã¯æ¬¡ã®ããã«ä»ãå ããŸãããã¯ãŒã¯ãããŒã¯AIã«ãã£ãŠæ¯ããããAIã«ãã£ãŠæ¹åããããã®ã§ãã£ãŠãAIã«ãã£ãŠçœ®ãæãããããã®ã§ã¯ãããŸãããã
AIã¯åã«äœæ¥ãèªååããã ãã§ã¯ãããŸãããããŒã ã¡ã³ããŒå士ã®ã³ãã¥ãã±ãŒã·ã§ã³ãåæ»ã«ããããšã§ã人ãšäººã®ã³ã©ãã¬ãŒã·ã§ã³ã®æ©äŒãåºããåããããŸãããªãŒããŒã¯ãããŒã å ã§ã®ã³ãã¥ãã±ãŒã·ã§ã³ãšé£æºãä¿ãç°å¢ãäœããAIãããããã€ãªãããåŸæŒãããŠããããšãã¡ã³ããŒã«äŒããããšã§ãããŒã ãæ¯ããããšãã§ããŸãã
4. ã»ãã¥ãªãã£ã®è²¬ä»»ãããŒã å šäœã§æ ãããšã奚å±ãã
AIã«ããè匱æ§ã®èŠçŽã掻çšããããšã§ãã³ãŒãã®ã»ãã¥ãªãã£å¯Ÿçã¯ããå¹ççã«ã粟ç¥çãªè² æ ãå°ãªããã¹ããŒãã£ãŒã«è¡ããããã«ãªããŸãã
ããšãã°ãããããããŒãã³ãŒããããã·ã¥ããŠãSQLæ¿å ¥ãæ€åºãããŸããããšããã¢ã©ãŒããåãåã£ããšããŠãããã®æç¹ã§èªåã®ã³ãŒããã©ã圱é¿ãåããŠããããããã«çè§£ã§ãããšã¯éããŸããããããAIã䜿ãã°ããã®è匱æ§ãäœã§ããã®ããã³ãŒãã«ã©ã圱é¿ããã®ãããœãããŠã§ã¢å šäœã«ã©ã圱é¿ããã®ããããã«ã¯ãã®ä¿®æ£æ¹æ³ãŸã§ãç°¡åã«èª¬æãåããããŸãã
ãAIãè匱æ§ã説æããä¿®æ£ãææ¡ã§ãããªããããã¯ãŸãã«ç§ãæãã§ãããã®ã§ãããšKwentusã¯èšããŸãããæçµçã«ä¿®æ£ãè¡ã責任ã¯ããããããŒãã»ãã¥ãªãã£ããŒã ã«ãããŸãããAIã«ããå ·äœçãªææ¡ãã³ã³ããã¹ãã説æã®æäŸãããã°ã倧ãã«åœ¹ç«ã€ã§ããããããå€ãã®æ å ±ãåŸãããšã§ããŠãŒã¶ãŒã¯åé¡ãããè¿ éã«ããªã¢ãŒãžããŠä¿®æ£ã§ããŸããã
DevSecOpsããŒã ãèªååãããã»ãã¥ãªãã£ãã³ã³ãã©ã€ã¢ã³ã¹ã«é¢ãããã¹ããã¢ã©ãŒããé©åã«æŽ»çšããŠãããã確èªããäžã§ãITãªãŒããŒã¯éèŠãªåœ¹å²ãæ ã£ãŠããŸããåæ§ã«ããè匱æ§ã®èª¬æããªã©ãã»ãã¥ãªãã£é¢é£ã®AIããŒã«ãããŒã ãæŽ»çšã§ããŠãããã©ããã確èªãã責任ããããŸããäžæ¹ã§ãããŒã ã¡ã³ããŒã®éã§ã¯ãã»ãã¥ãªãã£ã®è²¬ä»»ã¯å šå¡ã§æ ãã¹ãã§ããããšããèªèãé«ãŸãã€ã€ãããŸããã€ãŸãããããžã§ã¯ãã®çµç€ã«ã»ãã¥ãªãã£ããŒã ããã¹ãŠã®åé¡ãäžæã«åŒãåããã®ã§ã¯ãªããã³ãŒããæžããŠããããããããŒèªèº«ããAIæ©èœã掻çšããŠåé¡ãçè§£ããçºèŠããæç¹ã§ããã«ä¿®æ£ããŠããã¹ãã ãšããèãæ¹ã§ãã
AIãDevOpsããŒã ã®ã»ãã¥ãªãã£åŒ·åã«ã©ã圹ç«ã€ãããããŠçæAIãDevSecOpsç°å¢ã§ã©ã掻çšã§ãããã«ã€ããŠã詳ããã芧ãã ããã
5. ããŒã ã®äžã«AIæšé²åœ¹ãèŠã€ãã
çµå¶é£ã¯ãDevSecOpsãã©ãããã©ãŒã ã®AIæ©èœãšãããããã©ã®ããã«æ¥åã®è² æ ã軜æžã§ããã®ãã«ã€ããŠãããŒã ãšè©±ãåãæéããã¡ããšèšããã¹ãã§ãããèªåãã¡ã®ç®æšãäœãªã®ããããŒã ã«äŒããŠãã ããããšKwentusã¯èšããŸãããæ å ±ãäžããŠãæéãšç²Ÿç¥çãšãã«ã®ãŒãã©ãç¯çŽã§ãããã«ã€ããŠè©±ããŸããããè匱æ§ã®èª¿æ»ã«ãããæéãæžãããŠãã³ãŒããæžãæéãå¢ãããããšãäŒããŸãããã圌ãã¯æ¬æ¥ããããã£ãåšèŸºäœæ¥ãããããã«ãã®ä»äºãéžãã ããã§ã¯ãããŸããã圌ããæãã§ããã®ã¯ã³ãŒããæžãããšãAIã䜿ãããšã§ããã®ããã®æéãå¢ããã®ã§ããã
ãããŠãã¯ãŒã¯ããŒããã¹ãã¬ã¹ã軜æžãããã°ãããããããŒã®ä»äºãžã®æºè¶³åºŠãé«ãŸããŸããæºè¶³åºŠãäžããã°é¢è·çãäžãããDevSecOpsããŒã ã¯ããå®å®ããçµå¶åŽã®è² æ ãå°ãªããªããŸãã
ãããããããŒã¯ãäœããæãéããããšããŠããã®ã«ããã®ãã³ã«ããã«ããã¯ã«ã¶ã€ãããšãã¹ãã¬ã¹ãæãããã®ã§ãããšAngoã¯èšããŸããããã®ããã«ããã¯ãåãé€ãã°ãã¹ãã¬ã¹ãããŒã³ã¢ãŠãã®ãªã¹ã¯ãæžããŸãããçµæãšããŠå šå¡ã®ä»äºã楜ã«ãªããŸããã
ãã¡ããITãªãŒããŒã¯ãDevSecOpsãã©ãããã©ãŒã ã®AIæ©èœã«ã€ããŠããŒã ãšãªãŒãã³ã«å¯Ÿè©±ãããããã®æ©èœãæ¥åãã©ã楜ã«ããŠããããã説æããå¹ççãã€èªä¿¡ãæã£ãŠäœ¿ãããªããããã«å¿ èŠãªãã¬ãŒãã³ã°ãæäŸããããšãæèãã¹ãã§ãã
ãããã察話ãããã¹ã ãŒãºã«é²ããããã«ã¯ãããŒã ã®äžããAIã«ååããªã圱é¿åã®ãã人ãèŠã€ããŠãã»ãã®äººã«AIã®å©çšãä¿ãæšé²åœ¹ãšãªã£ãŠããããããããµããŒãããã®ã广çã§ããæ¥åãæ¥œã«ããããŒã«ã ãã§ãªããããã䜿ãããªãããã®ç¥èããå°å ¥ãæšå¥šããç°å¢ãããŒã ã¡ã³ããŒã«äžããããšã§ãããããããŒã¯ä»ãããã£ãšä»äºã«æºè¶³æãæããããããã«ãªãã¯ãã§ãã
次ã®ã¹ããã
Source Lp The Ultimate Playbook For High Performing Devsecops Teams
ä»ããã¢ã¯ã»ã¹äž»èŠãªãã€ã³ã
- ã«ãŒãã³ã¿ã¹ã¯ã®èªååãã³ãŒãææ¡ãšãã£ãããŒã«ã®éçšãªã©ãAIã®æŽ»çšã¯ããããããŒã®å¹çæ§ãé«ããã¹ãã¬ã¹ã軜æžããŸããããã«ãããä»äºãžã®æºè¶³åºŠãåäžããå®ççã®æ¹åãæåŸ ã§ããŸãã
- AIããŒã«ãæŠç¥çã«å°å ¥ããããšã§ãããããããŒã¯åªå 床ã®é«ããããžã§ã¯ãã«éäžã§ããããã«ãªããŸãã
- AIæ©èœã掻çšããŠã³ãŒãã¬ãã¥ãŒããã£ã¹ã«ãã·ã§ã³ãèŠçŽããããšã§ãããŒã å šäœãé²è¡äžã®ãããžã§ã¯ãã®ç¶æ³ãææ¡ãããããªãã誰ãã容æã«é¢äžã§ããããã«ãªããŸããæçµçã«ã¯ãããŒã ã®å調æ§ãé«ãŸãã飿ºã®åããè·å Žç°å¢ã®æ§ç¯ã«ã€ãªãããŸãã

