{"id":218,"date":"2025-10-23T09:57:56","date_gmt":"2025-10-23T09:57:56","guid":{"rendered":"https:\/\/r229.rookiessportsbarny.com\/?p=218"},"modified":"2025-10-23T09:57:56","modified_gmt":"2025-10-23T09:57:56","slug":"zero-trust-in-managed-cloud-security-redefining-trust-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/r229.rookiessportsbarny.com\/?p=218","title":{"rendered":"Zero Trust in Managed Cloud Security: Redefining Trust in the Digital Age"},"content":{"rendered":"<p data-start=\"113\" data-end=\"414\">In the traditional IT world, security was built around a clear boundary \u2014 the corporate firewall. Anything inside the network was considered safe, and anything outside was not. But in the age of <strong data-start=\"308\" data-end=\"327\">cloud computing<\/strong>, <strong data-start=\"329\" data-end=\"344\">remote work<\/strong>, and <strong data-start=\"350\" data-end=\"379\">multi-cloud architectures<\/strong>, that perimeter has disappeared.<\/p>\n<p data-start=\"416\" data-end=\"595\">This shift has given rise to the <strong data-start=\"449\" data-end=\"469\">Zero Trust model<\/strong>, an approach that assumes no user, device, or application should ever be trusted \u2014 even if it\u2019s already inside the network.<\/p>\n<p data-start=\"597\" data-end=\"751\">For organizations leveraging <strong data-start=\"626\" data-end=\"661\">managed cloud security services<\/strong>, adopting a <strong data-start=\"674\" data-end=\"707\">Zero Trust Architecture (ZTA)<\/strong> is no longer optional \u2014 it\u2019s a necessity.<\/p>\n<hr data-start=\"753\" data-end=\"756\" \/>\n<h3 data-start=\"758\" data-end=\"783\">What Is Zero Trust?<\/h3>\n<p data-start=\"785\" data-end=\"872\"><strong data-start=\"785\" data-end=\"799\">Zero Trust<\/strong> is a cybersecurity framework built on a simple but powerful principle:<\/p>\n<blockquote data-start=\"873\" data-end=\"906\">\n<p data-start=\"875\" data-end=\"906\">\u201cNever trust, always verify.\u201d<\/p>\n<\/blockquote>\n<p data-start=\"908\" data-end=\"1046\">Instead of granting blanket access based on network location or credentials, Zero Trust continuously verifies every request, every time.<\/p>\n<p data-start=\"1048\" data-end=\"1078\">A Zero Trust model enforces:<\/p>\n<ul data-start=\"1079\" data-end=\"1292\">\n<li data-start=\"1079\" data-end=\"1142\">\n<p data-start=\"1081\" data-end=\"1142\"><strong data-start=\"1081\" data-end=\"1113\">Strict identity verification<\/strong> for all users and devices.<\/p>\n<\/li>\n<li data-start=\"1143\" data-end=\"1220\">\n<p data-start=\"1145\" data-end=\"1220\"><strong data-start=\"1145\" data-end=\"1171\">Least privilege access<\/strong> \u2014 users only get what they need, nothing more.<\/p>\n<\/li>\n<li data-start=\"1221\" data-end=\"1292\">\n<p data-start=\"1223\" data-end=\"1292\"><strong data-start=\"1223\" data-end=\"1248\">Continuous monitoring<\/strong> to detect abnormal activity in real time.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1294\" data-end=\"1397\">This model aligns perfectly with the <strong data-start=\"1331\" data-end=\"1365\">dynamic and distributed nature<\/strong> of modern cloud environments.<\/p>\n<hr data-start=\"1399\" data-end=\"1402\" \/>\n<h3 data-start=\"1404\" data-end=\"1454\">Why Zero Trust Is Critical in Cloud Security<\/h3>\n<p data-start=\"1456\" data-end=\"1711\">Cloud environments are inherently <strong data-start=\"1490\" data-end=\"1504\">borderless<\/strong> \u2014 data, workloads, and users operate across multiple platforms and geographies.<br data-start=\"1584\" data-end=\"1587\" \/>Attackers exploit this complexity to move laterally between systems once they breach a single account or misconfiguration.<\/p>\n<p data-start=\"1713\" data-end=\"1762\">A Zero Trust approach mitigates these risks by:<\/p>\n<ol data-start=\"1763\" data-end=\"2057\">\n<li data-start=\"1763\" data-end=\"1818\">\n<p data-start=\"1766\" data-end=\"1818\"><strong data-start=\"1766\" data-end=\"1796\">Eliminating implicit trust<\/strong> within the network.<\/p>\n<\/li>\n<li data-start=\"1819\" data-end=\"1888\">\n<p data-start=\"1822\" data-end=\"1888\"><strong data-start=\"1822\" data-end=\"1860\">Applying continuous authentication<\/strong> for every access attempt.<\/p>\n<\/li>\n<li data-start=\"1889\" data-end=\"1977\">\n<p data-start=\"1892\" data-end=\"1977\"><strong data-start=\"1892\" data-end=\"1924\">Enforcing micro-segmentation<\/strong> to isolate workloads and prevent lateral movement.<\/p>\n<\/li>\n<li data-start=\"1978\" data-end=\"2057\">\n<p data-start=\"1981\" data-end=\"2057\"><strong data-start=\"1981\" data-end=\"2030\">Monitoring every identity and device behavior<\/strong> for signs of compromise.<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"2059\" data-end=\"2253\">With managed service providers (MSPs) integrating Zero Trust into their offerings, organizations can now achieve this advanced protection <strong data-start=\"2197\" data-end=\"2250\">without building the entire architecture in-house<\/strong>.<\/p>\n<hr data-start=\"2255\" data-end=\"2258\" \/>\n<h3 data-start=\"2260\" data-end=\"2318\">Core Pillars of Zero Trust in Managed Cloud Security<\/h3>\n<div class=\"_tableContainer_1rjym_1\">\n<div class=\"group _tableWrapper_1rjym_13 flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"2320\" data-end=\"2922\">\n<thead data-start=\"2320\" data-end=\"2344\">\n<tr data-start=\"2320\" data-end=\"2344\">\n<th data-start=\"2320\" data-end=\"2329\" data-col-size=\"sm\">Pillar<\/th>\n<th data-start=\"2329\" data-end=\"2344\" data-col-size=\"md\">Description<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2370\" data-end=\"2922\">\n<tr data-start=\"2370\" data-end=\"2469\">\n<td data-start=\"2370\" data-end=\"2413\" data-col-size=\"sm\"><strong data-start=\"2372\" data-end=\"2412\">Identity and Access Management (IAM)<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2413\" data-end=\"2469\">Ensures only verified users and devices gain access.<\/td>\n<\/tr>\n<tr data-start=\"2470\" data-end=\"2553\">\n<td data-start=\"2470\" data-end=\"2499\" data-col-size=\"sm\"><strong data-start=\"2472\" data-end=\"2498\">Least Privilege Access<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2499\" data-end=\"2553\">Limits access to only what\u2019s necessary for a task.<\/td>\n<\/tr>\n<tr data-start=\"2554\" data-end=\"2639\">\n<td data-start=\"2554\" data-end=\"2579\" data-col-size=\"sm\"><strong data-start=\"2556\" data-end=\"2578\">Micro-Segmentation<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2579\" data-end=\"2639\">Divides networks into smaller zones to contain breaches.<\/td>\n<\/tr>\n<tr data-start=\"2640\" data-end=\"2737\">\n<td data-start=\"2640\" data-end=\"2682\" data-col-size=\"sm\"><strong data-start=\"2642\" data-end=\"2681\">Continuous Monitoring and Analytics<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2682\" data-end=\"2737\">Uses AI and behavior analytics to detect anomalies.<\/td>\n<\/tr>\n<tr data-start=\"2738\" data-end=\"2820\">\n<td data-start=\"2738\" data-end=\"2760\" data-col-size=\"sm\"><strong data-start=\"2740\" data-end=\"2759\">Data Protection<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2760\" data-end=\"2820\">Encrypts data at rest, in motion, and during processing.<\/td>\n<\/tr>\n<tr data-start=\"2821\" data-end=\"2922\">\n<td data-start=\"2821\" data-end=\"2861\" data-col-size=\"sm\"><strong data-start=\"2823\" data-end=\"2860\">Automation and Policy Enforcement<\/strong><\/td>\n<td data-col-size=\"md\" data-start=\"2861\" data-end=\"2922\">Applies consistent rules across all clouds automatically.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p data-start=\"2924\" data-end=\"3053\">Together, these principles make Zero Trust a <strong data-start=\"2969\" data-end=\"3017\">proactive, adaptive, and intelligence-driven<\/strong> model for securing cloud systems.<\/p>\n<hr data-start=\"3055\" data-end=\"3058\" \/>\n<h3 data-start=\"3060\" data-end=\"3123\">How Managed Service Providers (MSPs) Implement Zero Trust<\/h3>\n<p data-start=\"3125\" data-end=\"3244\"><strong data-start=\"3125\" data-end=\"3161\">Managed Cloud Security Providers<\/strong> help organizations deploy Zero Trust in a structured, scalable way by combining:<\/p>\n<ol data-start=\"3246\" data-end=\"4175\">\n<li data-start=\"3246\" data-end=\"3426\">\n<p data-start=\"3249\" data-end=\"3426\"><strong data-start=\"3249\" data-end=\"3279\">Identity-Centric Controls:<\/strong><br data-start=\"3279\" data-end=\"3282\" \/>Integration with cloud-native IAM tools (e.g., Azure AD, AWS IAM, Okta) to enforce user verification and multi-factor authentication (MFA).<\/p>\n<\/li>\n<li data-start=\"3428\" data-end=\"3559\">\n<p data-start=\"3431\" data-end=\"3559\"><strong data-start=\"3431\" data-end=\"3469\">Network and Workload Segmentation:<\/strong><br data-start=\"3469\" data-end=\"3472\" \/>Implementing micro-segmentation policies to limit communication between workloads.<\/p>\n<\/li>\n<li data-start=\"3561\" data-end=\"3668\">\n<p data-start=\"3564\" data-end=\"3668\"><strong data-start=\"3564\" data-end=\"3594\">Device Posture Management:<\/strong><br data-start=\"3594\" data-end=\"3597\" \/>Ensuring devices meet compliance standards before granting access.<\/p>\n<\/li>\n<li data-start=\"3670\" data-end=\"3811\">\n<p data-start=\"3673\" data-end=\"3811\"><strong data-start=\"3673\" data-end=\"3699\">Behavioral Monitoring:<\/strong><br data-start=\"3699\" data-end=\"3702\" \/>Using AI to detect deviations from normal activity patterns and block suspicious behavior automatically.<\/p>\n<\/li>\n<li data-start=\"3813\" data-end=\"3950\">\n<p data-start=\"3816\" data-end=\"3950\"><strong data-start=\"3816\" data-end=\"3849\">Unified Policy Orchestration:<\/strong><br data-start=\"3849\" data-end=\"3852\" \/>Applying consistent security policies across AWS, Azure, and GCP from a single control plane.<\/p>\n<\/li>\n<li data-start=\"3952\" data-end=\"4175\">\n<p data-start=\"3955\" data-end=\"4175\"><strong data-start=\"3955\" data-end=\"3990\">Integration with CNAPP and MDR:<\/strong><br data-start=\"3990\" data-end=\"3993\" \/>Combining <strong data-start=\"4006\" data-end=\"4020\">Zero Trust<\/strong> with <strong data-start=\"4026\" data-end=\"4035\">CNAPP<\/strong> and <strong data-start=\"4040\" data-end=\"4078\">Managed Detection &amp; Response (MDR)<\/strong> ensures full lifecycle protection \u2014 from identity verification to real-time incident response.<\/p>\n<\/li>\n<\/ol>\n<hr data-start=\"4177\" data-end=\"4180\" \/>\n<h3 data-start=\"4182\" data-end=\"4245\">Benefits of Adopting Zero Trust in Managed Cloud Security<\/h3>\n<h4 data-start=\"4247\" data-end=\"4304\">1. <strong data-start=\"4255\" data-end=\"4302\">Stronger Protection Against Insider Threats<\/strong><\/h4>\n<p data-start=\"4305\" data-end=\"4409\">Zero Trust continuously verifies access even for internal users, reducing the risk of insider attacks.<\/p>\n<h4 data-start=\"4411\" data-end=\"4447\">2. <strong data-start=\"4419\" data-end=\"4445\">Reduced Attack Surface<\/strong><\/h4>\n<p data-start=\"4448\" data-end=\"4539\">By enforcing least privilege and segmentation, the network becomes far harder to exploit.<\/p>\n<h4 data-start=\"4541\" data-end=\"4574\">3. <strong data-start=\"4549\" data-end=\"4572\">Improved Compliance<\/strong><\/h4>\n<p data-start=\"4575\" data-end=\"4712\">Zero Trust aligns with standards like <strong data-start=\"4613\" data-end=\"4629\">NIST 800-207<\/strong>, <strong data-start=\"4631\" data-end=\"4644\">ISO 27001<\/strong>, and <strong data-start=\"4650\" data-end=\"4658\">GDPR<\/strong>, helping organizations meet regulatory obligations.<\/p>\n<h4 data-start=\"4714\" data-end=\"4757\">4. <strong data-start=\"4722\" data-end=\"4755\">Seamless Multi-Cloud Security<\/strong><\/h4>\n<p data-start=\"4758\" data-end=\"4873\">Managed Zero Trust solutions unify identity and access control across multiple providers, simplifying governance.<\/p>\n<h4 data-start=\"4875\" data-end=\"4915\">5. <strong data-start=\"4883\" data-end=\"4913\">Enhanced Incident Response<\/strong><\/h4>\n<p data-start=\"4916\" data-end=\"5023\">With visibility into every identity, request, and action, analysts can detect and contain threats faster.<\/p>\n<h4 data-start=\"5025\" data-end=\"5065\">6. <strong data-start=\"5033\" data-end=\"5063\">Scalability and Automation<\/strong><\/h4>\n<p data-start=\"5066\" data-end=\"5197\">Cloud-native Zero Trust frameworks grow automatically with workloads, users, and regions \u2014 ensuring continuous security coverage.<\/p>\n<hr data-start=\"5199\" data-end=\"5202\" \/>\n<h3 data-start=\"5204\" data-end=\"5254\">Real-World Application: Zero Trust in Action<\/h3>\n<p data-start=\"5256\" data-end=\"5506\"><strong data-start=\"5256\" data-end=\"5291\">Scenario 1 \u2013 Financial Services<\/strong><br data-start=\"5291\" data-end=\"5294\" \/>A banking institution uses a managed Zero Trust framework to authenticate every employee and service connection via MFA and behavioral AI. Unauthorized access to customer data is immediately blocked and logged.<\/p>\n<p data-start=\"5508\" data-end=\"5723\"><strong data-start=\"5508\" data-end=\"5535\">Scenario 2 \u2013 Healthcare<\/strong><br data-start=\"5535\" data-end=\"5538\" \/>A hospital integrates Zero Trust into its cloud security to protect patient data. Every API call between applications is authenticated, and sensitive records are encrypted end-to-end.<\/p>\n<p data-start=\"5725\" data-end=\"5893\"><strong data-start=\"5725\" data-end=\"5752\">Scenario 3 \u2013 E-commerce<\/strong><br data-start=\"5752\" data-end=\"5755\" \/>An online retailer leverages managed Zero Trust to isolate workloads and prevent credential stuffing or lateral attacks between systems.<\/p>\n<hr data-start=\"5895\" data-end=\"5898\" \/>\n<h3 data-start=\"5900\" data-end=\"5939\">Zero Trust and AI-Driven Security<\/h3>\n<p data-start=\"5941\" data-end=\"6080\">AI enhances Zero Trust by continuously learning and adapting to evolving threats.<br data-start=\"6022\" data-end=\"6025\" \/>Modern managed platforms use <strong data-start=\"6054\" data-end=\"6074\">machine learning<\/strong> to:<\/p>\n<ul data-start=\"6081\" data-end=\"6294\">\n<li data-start=\"6081\" data-end=\"6117\">\n<p data-start=\"6083\" data-end=\"6117\">Detect anomalous login patterns.<\/p>\n<\/li>\n<li data-start=\"6118\" data-end=\"6159\">\n<p data-start=\"6120\" data-end=\"6159\">Predict potential account compromise.<\/p>\n<\/li>\n<li data-start=\"6160\" data-end=\"6200\">\n<p data-start=\"6162\" data-end=\"6200\">Adjust access policies in real time.<\/p>\n<\/li>\n<li data-start=\"6201\" data-end=\"6294\">\n<p data-start=\"6203\" data-end=\"6294\">Automate threat response through SOAR (Security Orchestration, Automation, and Response).<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6296\" data-end=\"6391\">This fusion of <strong data-start=\"6311\" data-end=\"6330\">Zero Trust + AI<\/strong> transforms reactive defense into <strong data-start=\"6364\" data-end=\"6388\">proactive prevention<\/strong>.<\/p>\n<hr data-start=\"6393\" data-end=\"6396\" \/>\n<h3 data-start=\"6398\" data-end=\"6441\">Challenges in Implementing Zero Trust<\/h3>\n<p data-start=\"6443\" data-end=\"6503\">Despite its advantages, Zero Trust adoption faces hurdles:<\/p>\n<ul data-start=\"6504\" data-end=\"6724\">\n<li data-start=\"6504\" data-end=\"6554\">\n<p data-start=\"6506\" data-end=\"6554\"><strong data-start=\"6506\" data-end=\"6529\">Complex integration<\/strong> across legacy systems.<\/p>\n<\/li>\n<li data-start=\"6555\" data-end=\"6611\">\n<p data-start=\"6557\" data-end=\"6611\"><strong data-start=\"6557\" data-end=\"6580\">Cultural resistance<\/strong> to stricter access controls.<\/p>\n<\/li>\n<li data-start=\"6612\" data-end=\"6659\">\n<p data-start=\"6614\" data-end=\"6659\"><strong data-start=\"6614\" data-end=\"6633\">Visibility gaps<\/strong> in hybrid environments.<\/p>\n<\/li>\n<li data-start=\"6660\" data-end=\"6724\">\n<p data-start=\"6662\" data-end=\"6724\"><strong data-start=\"6662\" data-end=\"6685\">Initial setup costs<\/strong> for identity and automation systems.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6726\" data-end=\"6914\">However, these challenges can be mitigated through <strong data-start=\"6777\" data-end=\"6808\">managed Zero Trust services<\/strong>, which provide the architecture, expertise, and continuous monitoring needed for a seamless transition.<\/p>\n<hr data-start=\"6916\" data-end=\"6919\" \/>\n<h3 data-start=\"6921\" data-end=\"6969\">The Future of Zero Trust in Cloud Security<\/h3>\n<p data-start=\"6971\" data-end=\"7157\">By 2027, Zero Trust will evolve into <strong data-start=\"7008\" data-end=\"7047\">autonomous identity defense systems<\/strong>, where AI-driven engines dynamically grant, restrict, or revoke access based on real-time risk assessments.<\/p>\n<p data-start=\"7159\" data-end=\"7183\">Future trends include:<\/p>\n<ul data-start=\"7184\" data-end=\"7440\">\n<li data-start=\"7184\" data-end=\"7230\">\n<p data-start=\"7186\" data-end=\"7230\"><strong data-start=\"7186\" data-end=\"7209\">Zero Trust for APIs<\/strong> and microservices.<\/p>\n<\/li>\n<li data-start=\"7231\" data-end=\"7300\">\n<p data-start=\"7233\" data-end=\"7300\"><strong data-start=\"7233\" data-end=\"7264\">Identity-based segmentation<\/strong> replacing network-based controls.<\/p>\n<\/li>\n<li data-start=\"7301\" data-end=\"7366\">\n<p data-start=\"7303\" data-end=\"7366\"><strong data-start=\"7303\" data-end=\"7331\">Predictive trust scoring<\/strong> for continuous access decisions.<\/p>\n<\/li>\n<li data-start=\"7367\" data-end=\"7440\">\n<p data-start=\"7369\" data-end=\"7440\"><strong data-start=\"7369\" data-end=\"7403\">Integration with CNAPP and XDR<\/strong> for complete cloud-native defense.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"7442\" data-end=\"7623\">As enterprises move toward a <strong data-start=\"7471\" data-end=\"7506\">Zero Trust-as-a-Service (ZTaaS)<\/strong> model, managed providers will play a key role in delivering scalable, context-aware, and policy-driven protection.<\/p>\n<hr data-start=\"7625\" data-end=\"7628\" \/>\n<h3 data-start=\"7630\" data-end=\"7646\">Conclusion<\/h3>\n<p data-start=\"7648\" data-end=\"7767\">The cloud has redefined how we build and scale digital systems \u2014 and <strong data-start=\"7717\" data-end=\"7764\">Zero Trust has redefined how we secure them<\/strong>.<\/p>\n<p data-start=\"7769\" data-end=\"7954\">By rejecting implicit trust and continuously verifying every interaction, <strong data-start=\"7843\" data-end=\"7883\">Zero Trust in Managed Cloud Security<\/strong> provides a resilient defense framework for today\u2019s borderless world.<\/p>\n<p data-start=\"7956\" data-end=\"8189\">When paired with <strong data-start=\"7973\" data-end=\"7982\">CNAPP<\/strong>, <strong data-start=\"7984\" data-end=\"7991\">MDR<\/strong>, and <strong data-start=\"7997\" data-end=\"8005\">CIEM<\/strong>, it forms a holistic strategy that empowers organizations to innovate confidently \u2014 knowing every user, device, and workload is authenticated, monitored, and protected at all times.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the traditional IT world, security was built around a clear boundary \u2014 the corporate firewall. Anything inside the network was considered safe, and anything outside was not. But in the age of cloud computing, remote work, and multi-cloud architectures,&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-218","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/posts\/218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=218"}],"version-history":[{"count":1,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/posts\/218\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=\/wp\/v2\/posts\/218\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r229.rookiessportsbarny.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}