{"id":139359,"date":"2021-08-03T01:13:08","date_gmt":"2021-08-03T08:13:08","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=139359"},"modified":"2021-08-03T01:13:08","modified_gmt":"2021-08-03T08:13:08","slug":"nist-nccoe-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/08\/nist-nccoe-zero-trust-architecture\/?lang=ja","title":{"rendered":"\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u304c\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306b\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u3092\u9078\u5b9a"},"content":{"rendered":"<p>\u30d0\u30a4\u30c7\u30f3\u653f\u6a29\u304c2021\u5e745\u6708\u306b\u767a\u8868\u3057\u305f<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" rel=\"nofollow,noopener\">\u300cExecutive Order on Improving the Nation\u2019s Cybersecurity (\u56fd\u5bb6\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u4e0a\u306b\u95a2\u3059\u308b\u5927\u7d71\u9818\u4ee4)\u300d<\/a>\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306b\u7c73\u56fd\u653f\u5e9c\u304c\u3068\u308b\u3079\u304d\u4e00\u9023\u306e\u884c\u52d5\u304c\u793a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u306e\u4e2d\u3067\u3082\u7279\u306b\u4e3b\u305f\u308b\u53d6\u308a\u7d44\u307f\u3068\u3057\u3066\u6ce8\u76ee\u3092\u96c6\u3081\u305f\u306e\u304c\u3001\u5404\u7701\u5e81\u306b\u5bfe\u3059\u308b ZTA\uff08Zero Trust Architecture \u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\uff09\u5b9f\u88c5\u306b\u5411\u3051\u305f\u6226\u7565\u7b56\u5b9a\u3092\u6c42\u3081\u308b\u6761\u9805\u3067\u3059\u3002<\/p>\n<p>\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u91cd\u8981\u6982\u5ff5\u3067\u3059\u304c\u305d\u306e\u5b9f\u88c5\u306b\u3064\u3044\u3066\u306f\u307e\u3060\u7406\u89e3\u304c\u3058\u3085\u3046\u3076\u3093\u306b\u8ffd\u3044\u3064\u3044\u3066\u306f\u3044\u307e\u305b\u3093\u3002\u3053\u306e\u6e9d\u3092\u57cb\u3081\u3001\u9023\u90a6\u653f\u5e9c\u306e\u305f\u3069\u308b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3078\u306e\u9053\u884c\u304d\u3092\u652f\u63f4\u3059\u308b\u306b\u3042\u305f\u308a\u3001\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u306eNational Cybersecurity Center of Excellence\uff08NCCoE\uff09\u306f\u65b0\u305f\u306b<a href=\"https:\/\/www.nccoe.nist.gov\/projects\/building-blocks\/zero-trust-architecture\" rel=\"nofollow,noopener\">Implementing a Zero Trust Architecture\uff08\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u5b9f\u88c5<\/a>\uff09\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u4eca\u56de\u3053\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3078\u306e\u5354\u529b\u4f1a\u793e\u306e 1 \u3064\u306b\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304c\u9078\u51fa\u3055\u308c\u3001NCCoE\u306b\u5354\u529b\u3057\u3066\u3044\u304f\u904b\u3073\u3068\u306a\u3063\u305f\u3053\u3068\u3092\u5927\u5909\u5149\u6804\u306b\u601d\u3044\u307e\u3059\u3002\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u306f NCCoE \u306b\u5c55\u958b\u3055\u308c\u3001<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf\" rel=\"nofollow,noopener\">NIST SP 800-207\u300eZero Trust Architecture (NIST SP 800-207 \u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3)\u300f<\/a>\u306b\u8a18\u8f09\u3055\u308c\u305f\u7406\u5ff5\u30fb\u539f\u5247\u306b\u5247\u3063\u305f\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u8a2d\u8a08\u306e\u305f\u3081\u306e\u5b9f\u7528\u7684\u306a\u76f8\u4e92\u904b\u7528\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u958b\u767a\u3057\u3066\u307e\u3044\u308a\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30f3\u30c7\u30df\u30c3\u30af\u306e\u5f71\u97ff\u3067\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30af\u3078\u306e\u79fb\u884c\u304c\u9032\u3080\u306a\u304b\u3001\u653f\u5e9c\u6a5f\u95a2\u306f\u30af\u30e9\u30a6\u30c9\u3078\u306e\u79fb\u884c\u3092\u5287\u7684\u306b\u52a0\u901f\u3055\u305b\u3066\u304d\u307e\u3057\u305f\u3002\u3044\u307e\u79c1\u305f\u3061\u306f\u81ea\u5b85\u3084\u30aa\u30d5\u30a3\u30b9\u306a\u3069\u306e\u3055\u307e\u3056\u307e\u306a\u5834\u6240\u3067\u50cd\u304f\u300c\u30cf\u30a4\u30d6\u30ea\u30c3\u30c9\u30ef\u30fc\u30af\u300d\u306e\u65b0\u305f\u306a\u9032\u5316\u3092\u76ee\u306e\u5f53\u305f\u308a\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3092\u53d7\u3051\u3001\u3069\u306e\u3088\u3046\u306a\u30c7\u30b8\u30bf\u30eb\u74b0\u5883\u3067\u3082\u4e00\u8cab\u3057\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3092\u5b9f\u65bd\u3059\u308b\u305f\u3081\u306b\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u63a1\u7528\u3078\u306e\u6a5f\u904b\u304c\u3055\u3089\u306b\u9ad8\u307e\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3068\u30af\u30e9\u30a6\u30c9\u3092\u307e\u305f\u3050\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u305f\u3081\u306e\u3053\u306e\u6226\u7565\u7684\u8981\u8acb\u306f\u3001\u300c\u53ef\u8996\u6027\u300d\u3001\u3059\u306a\u308f\u3061\u300c\u7d44\u7e54\u306e\u9732\u51fa\u3057\u305fIT\u30a4\u30f3\u30d5\u30e9\u30b9\u30c8\u30e9\u30af\u30c1\u30e3\u5168\u4f53\u3068\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u7279\u5b9a\u3059\u308b\u300d\u3068\u3044\u3046\u6a5f\u80fd\u304b\u3089\u59cb\u3081\u306d\u3070\u306a\u308a\u307e\u305b\u3093\u3002<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/05\/time-for-zero-trust\/?lang=ja\">\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u30a2\u30d7\u30ed\u30fc\u30c1<\/a>\u3067\u306f\u3001\u30e6\u30fc\u30b6\u30fc\u3084\u30c7\u30d0\u30a4\u30b9\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u3069\u3053\u306b\u5b58\u5728\u3057\u3088\u3046\u3068\u3082\u3001\u5e38\u6642\u78ba\u5b9f\u306b\u8b58\u5225\u3067\u304d\u308b\u3088\u3046\u306b\u30bc\u30ed\u304b\u3089\u8a2d\u8a08\u3055\u308c\u305f\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u6c42\u3081\u3089\u308c\u307e\u3059\u3002\u305d\u3046\u3057\u305f\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3067\u3042\u308c\u3070\u3001\u653f\u5e9c\u6a5f\u95a2\u306eIT\u30c1\u30fc\u30e0\u304c\u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u30d9\u30fc\u30b9\u30dd\u30ea\u30b7\u30fc\u3092\u653f\u5e9c\u6a5f\u95a2\u5168\u4f53\u306b\u4e00\u8cab\u3057\u3066\u9069\u7528\u3067\u304d\u308b\u305f\u3081\u3001\u653f\u5e9c\u6a5f\u95a2\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3084\u30c7\u30fc\u30bf\u3078\u306e\u30a2\u30af\u30bb\u30b9\u3092\u5e38\u306b\u78ba\u8a8d\u3057\u3001\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b6\u30af\u30b7\u30e7\u30f3\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u78ba\u4fdd\u3067\u304d\u307e\u3059\u3002\u307e\u305f\u3001User-ID\u3001App-ID\u3001Device-ID\u3001\u30dd\u30ea\u30b7\u30fc\u30d9\u30fc\u30b9\u8a8d\u8a3c\u306a\u3069\u306e\u6a5f\u80fd\u306f\u3001\u653f\u5e9c\u6a5f\u95a2\u306b\u3088\u308b\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3084\u30e6\u30fc\u30b6\u30fc\u4fdd\u8b77\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u5b9f\u88c5\u3092\u652f\u63f4\u3057\u3066\u304f\u308c\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u5927\u7d71\u9818\u4ee4\u306f\u3001NIST\u304c\u7b56\u5b9a\u3057\u305f\u6a19\u6e96\u3068\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u6d3b\u7528\u3057\u3001\u9023\u90a6\u653f\u5e9c\u306e\u3059\u3079\u3066\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3068\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u306b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3092\u5b9f\u88c5\u3059\u308b\u91cd\u8981\u6027\u3092\u5f37\u8abf\u3057\u3066\u3044\u307e\u3059\u3002\u73fe\u5728\u69cb\u7bc9\u4e2d\u306e NIST\/NCCoE \u30e9\u30dc\u74b0\u5883\u3067\u306f\u3001NCCoE \u306b\u3088\u308b\u30cf\u30a4\u30ec\u30d9\u30eb\u306a\u62bd\u8c61\u7684\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u3059\u3079\u3066\u306e\u30b3\u30a2\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8 (\u30dd\u30ea\u30b7\u30fc\u30a8\u30f3\u30d5\u30a9\u30fc\u30b9\u30dd\u30a4\u30f3\u30c8\u3001\u30dd\u30ea\u30b7\u30fc\u30a8\u30f3\u30b8\u30f3\u3001\u30dd\u30ea\u30b7\u30fc\u7ba1\u7406\u8005) \u304a\u3088\u3073\u6a5f\u80fd\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8 (\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001 \u30a2\u30a4\u30c7\u30f3\u30c6\u30a3\u30c6\u30a3\u304a\u3088\u3073\u30a2\u30af\u30bb\u30b9\u7ba1\u7406\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30ca\u30ea\u30c6\u30a3) \u306e\u3044\u305a\u308c\u306b\u3064\u3044\u3066\u3082\u3001\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u306b\u3088\u308b\u5bfe\u5fdc\u304c\u53ef\u80fd\u3067\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306f\u3053\u308c\u307e\u3067 5 \u5e74\u4ee5\u4e0a\u306b\u308f\u305f\u308a\u3001\u4f01\u696d\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u3084\u30af\u30e9\u30a6\u30c9\u74b0\u5883\u3078\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u5b9f\u88c5\u3092\u652f\u63f4\u3059\u308b\u30c6\u30af\u30ce\u30ed\u30b8\u3092\u751f\u307f\u51fa\u3057\u3066\u304d\u307e\u3057\u305f\u3002\u5927\u7d71\u9818\u4ee4\u306b\u3088\u308a\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3078\u306e\u6ce8\u76ee\u304c\u9ad8\u307e\u308b\u306a\u304b\u3001NCCoE\u306e\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306b\u5f0a\u793e\u306e\u5b9f\u52d9\u7d4c\u9a13\u3068\u5c02\u9580\u77e5\u8b58\u3092\u5c55\u958b\u3057\u300c\u9023\u90a6\u653f\u5e9c\u6a5f\u95a2\u306e\u91cd\u8981\u30df\u30c3\u30b7\u30e7\u30f3\u4fdd\u8b77\u306e\u305f\u3081\u306b\u5fc5\u8981\u306a\u30ac\u30a4\u30c0\u30f3\u30b9\u3084\u30c4\u30fc\u30eb\u3092\u63d0\u4f9b\u3059\u308b\u300d\u3068\u3044\u3046\u5f0a\u793e\u306e\u53d6\u308a\u7d44\u307f\u3092\u3055\u3089\u306b\u5f37\u5316\u3057\u3066\u3044\u3051\u308b\u3053\u3068\u3092\u5927\u5909\u5149\u6804\u306b\u601d\u3044\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30d0\u30a4\u30c7\u30f3\u653f\u6a29\u304c2021\u5e745\u6708\u306b\u767a\u8868\u3057\u305f\u300cExecutive Order on Improving the Nation\u2019s Cybersecurity (\u56fd\u5bb6\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5411\u4e0a\u306b\u95a2\u3059\u308b\u5927\u7d71\u9818\u4ee4)\u300d\u3067\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u9632\u5fa1\u3092\u5f37\u5316\u3059\u308b\u305f\u3081\u306b\u7c73\u56fd\u653f\u5e9c\u304c\u3068\u308b\u3079\u304d\u4e00\u9023\u306e\u884c\u52d5\u304c\u793a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u305d\u306e\u4e2d\u3067\u3082\u7279\u306b\u4e3b\u305f\u308b\u53d6\u308a\u7d44\u307f\u3068\u3057\u3066\u6ce8\u76ee\u3092\u96c6\u3081\u305f\u306e\u304c\u3001\u5404\u7701\u5e81\u306b\u5bfe\u3059\u308b ZTA\uff08Zero Trust Architecture \u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\uff09\u5b9f\u88c5\u306b\u5411\u3051\u305f\u6226\u7565\u7b56\u5b9a\u3092\u6c42\u3081\u308b\u6761\u9805\u3067\u3059\u3002 \u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u91cd\u8981\u6982\u5ff5\u3067\u3059\u304c\u305d\u306e\u5b9f\u88c5\u306b\u3064\u3044\u3066\u306f\u307e\u3060\u7406\u89e3\u304c\u3058\u3085\u3046\u3076\u3093\u306b\u8ffd\u3044\u3064\u3044\u3066\u306f\u3044\u307e\u305b\u3093\u3002\u3053\u306e\u6e9d\u3092\u57cb\u3081\u3001\u9023\u90a6\u653f\u5e9c\u306e\u305f\u3069\u308b\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u3078\u306e\u9053\u884c\u304d\u3092\u652f\u63f4\u3059\u308b\u306b\u3042\u305f\u308a\u3001\u7c73\u56fd\u56fd\u7acb\u6a19\u6e96\u6280\u8853\u7814\u7a76\u6240\uff08NIST\uff09\u306eNational Cybersecurity Center of Excellence\uff08NCCoE\uff09\u306f\u65b0\u305f\u306bImplementing a Zero Trust Architecture\uff08\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u5b9f\u88c5\uff09\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u4eca\u56de\u3053\u306e\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3078\u306e\u5354\u529b\u4f1a\u793e\u306e 1 \u3064\u306b\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u304c\u9078\u51fa\u3055\u308c\u3001NCCoE\u306b\u5354\u529b\u3057\u3066\u3044\u304f\u904b\u3073\u3068\u306a\u3063\u305f\u3053\u3068\u3092\u5927\u5909\u5149\u6804\u306b\u601d\u3044\u307e\u3059\u3002\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u306f NCCoE \u306b\u5c55\u958b\u3055\u308c\u3001NIST SP 800-207\u300eZero Trust Architecture (NIST SP 800-207 &hellip;<\/p>\n","protected":false},"author":129,"featured_media":138899,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7486,7044],"tags":[7337,7904,7905,7906,7131],"coauthors":[1179],"class_list":["post-139359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement-ja","category-public-sector-ja","tag-government","tag-nccoe-ja","tag-nist-ja","tag-public-sector-ja","tag-zero-trust-ja"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/07\/Looking-Closely-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/129"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=139359"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139359\/revisions"}],"predecessor-version":[{"id":139361,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/139359\/revisions\/139361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/138899"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=139359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=139359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=139359"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=139359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}