{"id":18107,"date":"2021-08-31T06:50:00","date_gmt":"2021-08-31T06:50:00","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=18107"},"modified":"2021-08-31T06:50:00","modified_gmt":"2021-08-31T06:50:00","slug":"zero-trust-cloud-native-network-security-enabled-by-micro-segmentation","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/","title":{"rendered":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation"},"content":{"rendered":"\n<p>Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for segregation of deterministic networks or tenant networks.<\/p>\n\n\n\n<p>In cloud native environments, containers or microservices have a shorter lifecycle and change more frequently compared with traditional networks or tenant networks. Complex business access relationships are formed between microservices and will become unusually large and complicated especially when the workload reaches a certain level. Therefore, in cloud native environments, network segregation is not only segregation of physical networks and tenant networks at the resource layer, but also application-layer segregation between services.<\/p>\n\n\n\n<p>Therefore, with regard to network segregation, inter-microservice access segregation must be implemented in terms of business roles. Meanwhile, in consideration of business relationships, access control should be implemented on the basis of segregation to reduce lateral movement of network attacks. Besides, this kind of flexible and rapid network status change brings new segregation requirements and access control policy update requirements. Therefore, segregation policies and access control policies should be deployed and take effect in a rapid and efficient way to adapt to the rapidly changing business and networks.<\/p>\n\n\n\n<p>As a new product form, the micro-segmentation technology has no uniform product standard currently. The micro-segmentation mechanism at the IaaS layer is based on the virtualization technology (hypervisor) or network (overlay and SDN), or a host agent (Host-Agent). However, this mechanism is implemented otherwise in container environments.<\/p>\n\n\n\n<p>Firstly, since a host has many lightweight containers, it is costly and unpractical to deploy a host agent on each container.<\/p>\n\n\n\n<p>Secondly, the micro-segmentation technology, whether based on virtualization or the network, is implemented by deploying network access control policies to restrict subjects&#8217; access to objects. The only difference lies in the mechanism for interconnection to the IaaS system. In container environments, the standard CNI networking mechanism and network access control policies are already in place and can be integrated as a single solution.<\/p>\n\n\n\n<p>Finally, as cloud native environments involve a lot of microservices, micro-segmentation should focus more on microservices, not merely on containers. For instance, a sidecar reverse proxy in the service mesh architecture implements micro-segmentation of applications.<\/p>\n\n\n\n<p><strong>Related links:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/what-is-cloud-native-security\/\">What Is Cloud Native Security<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/security-risks-and-threats-of-containerized-infrastructure\/\">Security Risks and Threats of Containerized Infrastructure<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/security-visibility-augmented-by-cloud-native\/\">Security Visibility Augmented by Cloud Native<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for segregation of deterministic networks or tenant networks. In cloud native environments, containers or microservices have a shorter lifecycle and change more frequently compared with traditional networks or tenant networks. Complex business access relationships are [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":18108,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,15],"tags":[136,511,741,773],"class_list":["post-18107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-research-reports","tag-cloud-native-security","tag-microservice","tag-web-security","tag-zero-trust"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-31T06:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation\",\"datePublished\":\"2021-08-31T06:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/\"},\"wordCount\":382,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-security-2-1-e1647933296812.jpg\",\"keywords\":[\"Cloud Native Security\",\"microservice\",\"Web Security\",\"Zero-Trust\"],\"articleSection\":[\"Blog\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/\",\"name\":\"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-security-2-1-e1647933296812.jpg\",\"datePublished\":\"2021-08-31T06:50:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-security-2-1-e1647933296812.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/cloud-security-2-1-e1647933296812.jpg\",\"width\":450,\"height\":191,\"caption\":\"Hand drawing cloud computing concept diagram.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS","og_description":"Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for","og_url":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/","og_site_name":"NSFOCUS","article_published_time":"2021-08-31T06:50:00+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS","twitter_description":"Traditional networks or virtual networks have employed network segregation technologies like VLAN or VPC which are, however, more often used for","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation","datePublished":"2021-08-31T06:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/"},"wordCount":382,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","keywords":["Cloud Native Security","microservice","Web Security","Zero-Trust"],"articleSection":["Blog","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/","url":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/","name":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","datePublished":"2021-08-31T06:50:00+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/08\/cloud-security-2-1-e1647933296812.jpg","width":450,"height":191,"caption":"Hand drawing cloud computing concept diagram."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/zero-trust-cloud-native-network-security-enabled-by-micro-segmentation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Zero-Trust Cloud Native Network Security Enabled by Micro-segmentation"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18107"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/18107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/18108"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}