{"id":89995,"date":"2019-10-23T12:00:33","date_gmt":"2019-10-23T19:00:33","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89995"},"modified":"2023-09-26T09:39:57","modified_gmt":"2023-09-26T16:39:57","slug":"perimeter-based-network-defense-transform-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/","title":{"rendered":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model"},"content":{"rendered":"

Digital transformation has made the traditional perimeter-based network defense obsolete. Your employees and partners expect to be able to collaborate and access organizational resources from anywhere, on virtually any device, without impacting their productivity. Customers expect personalized experiences that demonstrate you understand them and can adapt quickly to their evolving interests. Companies need to be able to move with agility, adapting quickly to changing market conditions and take advantage of new opportunities. Companies embracing this change are thriving, leaving those who don\u2019t in their wake.<\/p>\n

As organizations drive their digital transformation efforts, it quickly becomes clear that the approach to securing the enterprise needs to be adapted to the new reality. The security perimeter is no longer just around the on-premises network. It now extends to SaaS applications used for business critical workloads, hotel and coffee shop networks your employees are using to access corporate resources while traveling, unmanaged devices your partners and customers are using to collaborate and interact with, and IoT devices installed throughout your corporate network and inside customer locations. The traditional perimeter-based security model is no longer enough.<\/p>\n

The traditional firewall (VPN security model) assumed you could establish a strong perimeter, and then trust that activities within that perimeter were \u201csafe.\u201d The problem is today\u2019s digital estates typically consist of services and endpoints managed by public cloud providers, devices owned by employees, partners, and customers, and web-enabled smart devices that the traditional perimeter-based model was never built to protect. We\u2019ve learned from both our own experience, and the customers we\u2019ve supported in their own journeys, that this model is too cumbersome, too expensive, and too vulnerable to keep going.<\/p>\n

We can\u2019t assume there are \u201cthreat free\u201d environments. As we digitally transform our companies, we need to transform our security model to one which assumes breach, and as a result, explicitly verifies activities and automatically enforces security controls using all available signal and employs the principle of least privilege access. This model is commonly referred to as \u201cZero Trust.\u201d<\/p>\n

Today, we\u2019re publishing a new white paper to help you understand the core principles of Zero Trust along with a maturity model, which breaks down requirements across the six foundational elements, to help guide your digital transformation journey.<\/p>\n

\"\"<\/a>Download the Microsoft Zero Trust Maturity Model<\/a> today!<\/p>\n

Learn more about Zero Trust and Microsoft Security<\/a>.<\/p>\n

Also, bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. And follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n

To learn more about how you can protect your time and empower your team, check out the\u00a0cybersecurity awareness page<\/a>\u00a0this month.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Digital transformation has made the traditional perimeter-based network defense obsolete. A new white paper helps you understand the core principles of a Zero Trust approach.<\/p>\n","protected":false},"author":96,"featured_media":90030,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3679,3689],"products":[],"threat-intelligence":[],"tags":[3822],"coauthors":[1845,2183,2186,2188,2187],"class_list":["post-89995","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-network-security","topic-zero-trust","tag-microsoft-security-insights"],"yoast_head":"\nTraditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model<\/title>\n<meta name=\"description\" content=\"A new white paper helps you understand the core principles of a Zero Trust approach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model\" \/>\n<meta property=\"og:description\" content=\"A new white paper helps you understand the core principles of a Zero Trust approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-23T19:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-26T16:39:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alex Weinert, Sinead O'Donovan, Dilip Radhakrishnan, Yair Tor, Alex Esibov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Weinert, Sinead O'Donovan, Dilip Radhakrishnan, Yair Tor, Alex Esibov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alex-weinert\/\",\"@type\":\"Person\",\"@name\":\"Alex Weinert\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/sinead-odonovan\/\",\"@type\":\"Person\",\"@name\":\"Sinead O'Donovan\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/dilip-radhakrishnan\/\",\"@type\":\"Person\",\"@name\":\"Dilip Radhakrishnan\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/yair-tor\/\",\"@type\":\"Person\",\"@name\":\"Yair Tor\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alex-esibov\/\",\"@type\":\"Person\",\"@name\":\"Alex Esibov\"}],\"headline\":\"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model\",\"datePublished\":\"2019-10-23T19:00:33+00:00\",\"dateModified\":\"2023-09-26T16:39:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\"},\"wordCount\":455,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\",\"keywords\":[\"Microsoft Security Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\",\"name\":\"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\",\"datePublished\":\"2019-10-23T19:00:33+00:00\",\"dateModified\":\"2023-09-26T16:39:57+00:00\",\"description\":\"A new white paper helps you understand the core principles of a Zero Trust approach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg\",\"width\":960,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model","description":"A new white paper helps you understand the core principles of a Zero Trust approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/","og_locale":"en_US","og_type":"article","og_title":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model","og_description":"A new white paper helps you understand the core principles of a Zero Trust approach.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-10-23T19:00:33+00:00","article_modified_time":"2023-09-26T16:39:57+00:00","og_image":[{"width":960,"height":500,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","type":"image\/jpeg"}],"author":"Alex Weinert, Sinead O'Donovan, Dilip Radhakrishnan, Yair Tor, Alex Esibov","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","twitter_misc":{"Written by":"Alex Weinert, Sinead O'Donovan, Dilip Radhakrishnan, Yair Tor, Alex Esibov","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alex-weinert\/","@type":"Person","@name":"Alex Weinert"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/sinead-odonovan\/","@type":"Person","@name":"Sinead O'Donovan"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/dilip-radhakrishnan\/","@type":"Person","@name":"Dilip Radhakrishnan"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/yair-tor\/","@type":"Person","@name":"Yair Tor"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/alex-esibov\/","@type":"Person","@name":"Alex Esibov"}],"headline":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model","datePublished":"2019-10-23T19:00:33+00:00","dateModified":"2023-09-26T16:39:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/"},"wordCount":455,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","keywords":["Microsoft Security Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/","name":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","datePublished":"2019-10-23T19:00:33+00:00","dateModified":"2023-09-26T16:39:57+00:00","description":"A new white paper helps you understand the core principles of a Zero Trust approach.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/10\/ZeroTrust-vision-full-size.jpg","width":960,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/23\/perimeter-based-network-defense-transform-zero-trust-model\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Traditional perimeter-based network defense is obsolete\u2014transform to a Zero Trust model"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89995"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89995"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89995\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90030"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89995"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89995"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89995"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=89995"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=89995"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}