{"id":41086,"date":"2024-10-12T15:36:23","date_gmt":"2024-10-12T19:36:23","guid":{"rendered":"https:\/\/netfoundry.io\/?post_type=resources&#038;p=41086"},"modified":"2026-01-29T12:15:22","modified_gmt":"2026-01-29T17:15:22","slug":"netfoundry-and-zero-trust-outcomes-in-isa-iec-62443","status":"publish","type":"resources","link":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/","title":{"rendered":"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41086\" class=\"elementor elementor-41086\" data-elementor-post-type=\"resources\">\n\t\t\t\t<main class=\"elementor-element elementor-element-b7dad45 e-con-full e-flex e-con e-parent\" data-id=\"b7dad45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-34a0920 e-grid e-con-boxed e-con e-child\" data-id=\"34a0920\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a068ac elementor-widget elementor-widget-global elementor-global-31993 elementor-widget-jet-breadcrumbs\" data-id=\"1a068ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-jet-breadcrumbs jet-blocks\">\n\t\t<div class=\"jet-breadcrumbs\">\n\t\t<div class=\"jet-breadcrumbs__content\">\n\t\t<div class=\"jet-breadcrumbs__wrap\"><div class=\"jet-breadcrumbs__item\"><a href=\"https:\/\/netfoundry.io\/\" class=\"jet-breadcrumbs__item-link is-home\" rel=\"home\" title=\"NetFoundry\">NetFoundry<\/a><\/div>\n\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30df123 elementor-widget elementor-widget-heading\" data-id=\"30df123\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afdb130 elementor-widget elementor-widget-jet-listing-dynamic-terms\" data-id=\"afdb130\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"jet-listing-dynamic-terms.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"jet-listing jet-listing-dynamic-terms\"><a href=\"https:\/\/netfoundry.io\/resource-categories\/solution\/\" class=\"jet-listing-dynamic-terms__link\">Solution Brief<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d35d8e e-grid e-con-boxed e-con e-child\" data-id=\"0d35d8e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cc00323 e-grid e-con-full e-con e-child\" data-id=\"cc00323\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-680b055 e-con-full e-flex e-con e-child\" data-id=\"680b055\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3f1b80 elementor-widget elementor-widget-image\" data-id=\"a3f1b80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"804\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg\" class=\"attachment-1536x1536 size-1536x1536 wp-image-41082\" alt=\"NetFoundry | NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg 1536w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443-300x157.jpg 300w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443-1024x536.jpg 1024w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443-768x402.jpg 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20eb1fd gray elementor-widget elementor-widget-text-editor\" data-id=\"20eb1fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Introduction to ISA\/IEC 62443 Standards<\/strong><\/h2>\n<p><a href=\"https:\/\/isagca.org\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ISAGCA<\/span><\/a><span style=\"font-weight: 400;\"> has published a paper titled<\/span><a href=\"https:\/\/www.isasecure.org\/hubfs\/2023%20ISA%20Website%20Redesigns\/ISAGCA\/PDFs\/ISAGCA%20Zero%20Trust.pdf?hsLang=en\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">Zero Trust Outcomes Using ISA\/IEC 62443 Standards<\/span><\/a><span style=\"font-weight: 400;\">. This paper investigates the intersection of IEC 62443 and Zero Trust principles and the benefits of various roles of the adoption of Zero Trust concepts to enhance ISA\/IEC 62443-based security practices. Specifically, the paper identifies some of the direct overlap between Zero Trust and the requirements of the IEC 62443 specification. NetFoundry can enable these requirements at the network level as part of an overall security design, and we will explain how.<\/span><span style=\"font-weight: 400;\"><\/span><\/p>\n<p><\/p>\n<p><a href=\"https:\/\/netfoundry.io\"><span style=\"font-weight: 400;\">NetFoundry Cloud<\/span><\/a><span style=\"font-weight: 400;\">, powered by NetFoundry\u2019s Ziti architecture and the<\/span><a href=\"https:\/\/openziti.io\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">OpenZiti<\/span><\/a><span style=\"font-weight: 400;\"> open source, is a software-defined networking solution, designed to provide secure connectivity and enable Zero Trust architectures, providing full network operations capabilities. It is well suited for use in the OT\/ICS space as it does not assume a human user-to-application use case, as many solutions do, though it can serve that need.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The network layer focus of the solution allows it to be used in much more resource-constrained environments and in a broad set of use cases, many of which are applicable to the industrial space. It also has a focus on availability which is critical for safety first, can run in air gapped networks, and can support L2 and real-time communications all of which are critical for running in OT environments which need to comply to 62443 and other regulations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d30388a e-con-full e-flex e-con e-child\" data-id=\"d30388a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-272edba e-con-full e-flex e-con e-child\" data-id=\"272edba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e837ac3 elementor-widget elementor-widget-heading\" data-id=\"e837ac3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Zero Trust Framework<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0681c5 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"e0681c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"39353b6c-4b87-4332-8d37-d304e5a8b680\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"89b28d57-ef19-4cfe-aa4f-4403219517e0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Explore how NetFoundry enhances IEC 62443 security through Zero Trust principles and architecture.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d689615 e-grid e-con-full e-con e-child\" data-id=\"d689615\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55df81c elementor-widget elementor-widget-shortcode\" data-id=\"55df81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5058f39 e-grid e-con-boxed e-con e-child\" data-id=\"5058f39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b9d2f66 e-grid e-con-full e-con e-child\" data-id=\"b9d2f66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-78c016f e-con-full e-flex e-con e-child\" data-id=\"78c016f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9436d4a elementor-widget elementor-widget-heading\" data-id=\"9436d4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Secure OT Framework<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6969c4b elementor-widget elementor-widget-text-editor\" data-id=\"6969c4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"31e28c4e-f36e-4c50-bdc6-94ec4559d7a0\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"46fa86ef-efbf-4a2e-83d8-367b095c2a28\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Integrating NetFoundry\u2019s Zero Trust with IEC 62443 standards for enhanced security.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4df39c3 e-con-full e-grid e-con e-child\" data-id=\"4df39c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1934416 elementor-widget elementor-widget-heading\" data-id=\"1934416\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISA\/IEC 62443 Overview<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47b49d9 gray elementor-widget elementor-widget-text-editor\" data-id=\"47b49d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Exploring the integration of NetFoundry\u2019s Zero Trust principles within ISA\/IEC 62443 security standards.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d14505 elementor-widget elementor-widget-image\" data-id=\"8d14505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/isa-iec-62443-overview.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"NetFoundry | ISA\/IEC 62443 Overview\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6NDEwOTAsInVybCI6Imh0dHBzOlwvXC9uZXRmb3VuZHJ5LmlvXC93cC1jb250ZW50XC91cGxvYWRzXC8yMDI0XC8xMFwvaXNhLWllYy02MjQ0My1vdmVydmlldy5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"739\" height=\"336\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/isa-iec-62443-overview.png\" class=\"attachment-large size-large wp-image-41090\" alt=\"NetFoundry | ISA\/IEC 62443 Overview\" srcset=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/isa-iec-62443-overview.png 739w, https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/isa-iec-62443-overview-300x136.png 300w\" sizes=\"auto, (max-width: 739px) 100vw, 739px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e4df31 gray elementor-widget elementor-widget-text-editor\" data-id=\"8e4df31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">SOURCE: <\/span><a href=\"https:\/\/www.isasecure.org\/hubfs\/2023%20ISA%20Website%20Redesigns\/ISAGCA\/PDFs\/ISAGCA%20Zero%20Trust.pdf?hsLang=en\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Zero Trust Outcomes Using ISA\/IEC 62443 Standards<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b6aa53 e-grid e-con-full e-con e-child\" data-id=\"6b6aa53\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca9af06 elementor-widget elementor-widget-shortcode\" data-id=\"ca9af06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e575ec3 e-grid e-con-boxed e-con e-child\" data-id=\"e575ec3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8a7f2d9 e-grid e-con-full e-con e-child\" data-id=\"8a7f2d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a9eebdf e-con-full e-grid e-con e-child\" data-id=\"a9eebdf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3285674 elementor-widget elementor-widget-heading\" data-id=\"3285674\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect Surface, Network Flow \/ Zones, Conduits<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b0d614 gray elementor-widget elementor-widget-text-editor\" data-id=\"5b0d614\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The ISA\/IEC 62443 concept of a zone is a grouping of 1 or more nodes that share a set of security requirements.\u00a0 Zero Trust refers to these as segments, network segments, that can be protected as a unit to enforce certain security requirements. As the number of hosts or applications approaches one, these are referred to as microsegments. A microsegmented network provides a more generally secure environment, limiting many attack vectors allowing for lateral movement within an environment.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">NetFoundry has made their Ziti Platform available via open source in the OpenZiti project. OpenZiti software and the SDKs used to embed the solution into applications allows for many forms of segmentation, including application specific microsegmentation &#8211; or <\/span><a href=\"https:\/\/netfoundry.io\/appnets\/appnets\/\"><span style=\"font-weight: 400;\">\u2018AppNets\u2019<\/span><\/a><span style=\"font-weight: 400;\">. There are 3 general architectures for deploying Ziti technology. It is important to note that these are not mutually exclusive, and all 3 can be deployed within the same network and even overlapping, depending on the requirements of the given situation. You can read more <\/span><a href=\"https:\/\/openziti.io\/docs\/learn\/core-concepts\/zero-trust-models\/overview\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>ZTNA<\/strong> &#8211; Zero Trust Network Access: A common term in Zero Trust discussions, ZTNA deployments utilize the Ziti network for most of the path, with the first and\/or last &#8220;mile&#8221; outside the actual Ziti network. This is also commonly referred to as a gateway model. While the least secure, this offers many benefits in terms of simplicity, and to deal with situations where being on host or embedded is simply not an option due to the nature of the connected devices. This model uses external security configuration, simple access control lists, to prevent access to any resources other than via the authorized Ziti network components &#8211; which we can refer to as having zero trust of the external WAN network.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>ZTHA<\/strong> &#8211; Zero Trust Host Access:A more microsegmented approach, ZTHA provides a secure path from or to the host compute node. In many cases, embedding the software with Ziti technology is not an option, as it is owned by a third party or is not under active development. The use of host based access controls similar to network ACLs can prevent any unauthorized access to the node, while easily allowing the secured Ziti network connectivity. Blocking all inbound communications while allowing outbound enables the functionality while being simple to manage. In higher security requirement environments, the controls can whiltelist the Ziti network components specifically outbound. This, of course, brings additional operational requirements, and should be decided based on the risk analysis.- This model extends zero trust principles to the external WAN as well as internal LAN network.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>ZTAA<\/strong> &#8211; Zero Trust Application Access:The most microsegmented deployment model is ZTAA. The software development kits (SDKs) provided by the OpenZiti project allows the secure connectivity to be built into the applications themselves. This can then be used as the sole network connectivity option for the application, ensuring it always initializes into a secure network state, or can be built as an option, based on configuration, like the<\/span><a href=\"https:\/\/caddyserver.com\/\"> <span style=\"font-weight: 400;\">Caddy<\/span><\/a><span style=\"font-weight: 400;\"> project providing a configurable option for a<\/span><a href=\"https:\/\/blog.openziti.io\/put-some-ziti-in-your-caddy\"> <span style=\"font-weight: 400;\">Ziti interface<\/span><\/a><span style=\"font-weight: 400;\">. This model ensures the app has no listening ports on any underlay network, WAN, LAN, or host OS network, rendering all conventional network threats immediately useless.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Whether the zone is served as a subnet\/VLAN in a ZTNA gateway model, a host, or an application, the connections between that zone and any others meet all the requirements of a secured conduit per IEC 62443. They are individually encrypted and routed, and only authenticated and authorized identities can dial the circuits (channels) within the conduit. As the entire path between identities is encrypted, it passes over the existing physical network infrastructure as a virtual conduit from initiating to the target zone.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc2e5be e-con-full e-flex e-con e-child\" data-id=\"fc2e5be\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a662a1c elementor-widget elementor-widget-heading\" data-id=\"a662a1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Microsegmentation Strategies<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d110a11 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"d110a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"2818e684-e099-4d65-9cac-46a58884fd46\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Integrating ISA\/IEC 62443 zones and NetFoundry\u2019s Zero Trust for enhanced security solutions.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36dd451 e-grid e-con-full e-con e-child\" data-id=\"36dd451\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56d2975 elementor-widget elementor-widget-shortcode\" data-id=\"56d2975\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f26ce2c e-grid e-con-boxed e-con e-child\" data-id=\"f26ce2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ecbd7e3 e-grid e-con-full e-con e-child\" data-id=\"ecbd7e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9a1f230 e-con-full e-flex e-con e-child\" data-id=\"9a1f230\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6dce183 elementor-widget elementor-widget-heading\" data-id=\"6dce183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Trusted Authentication Framework<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b3fa25 elementor-widget elementor-widget-text-editor\" data-id=\"3b3fa25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"39735a24-91a3-45e3-8682-74061254bd06\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>OpenZiti utilizes X.509 certificates for secure device authentication and identity management.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ef703e3 e-con-full e-grid e-con e-child\" data-id=\"ef703e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d73fb2 elementor-widget elementor-widget-heading\" data-id=\"9d73fb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strong Identity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbc938f gray elementor-widget elementor-widget-text-editor\" data-id=\"fbc938f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin: 0px 0px calc(23.2px); color: #434c5e; font-family: 'Open Sans', sans-serif; text-wrap: wrap;\" data-sider-select-id=\"d9bceebb-f4bf-4b8d-a499-d91c502dbd76\"><span style=\"font-weight: 400;\">OpenZiti uses X.509 certificates as the root of trust for authentication. Cryptographically signed by the Network Controller &#8211; see 5 part blog on \u2018<\/span><a href=\"http:\/\/t-part-1-encryption-everywhere\" target=\"_blank\" rel=\"noopener\" data-wplink-url-error=\"true\"><span style=\"font-weight: 400;\">Bootstrapping Trust<\/span><\/a><span style=\"font-weight: 400;\">\u2019 &#8211; or imported into the network instance for use cases <\/span><a href=\"https:\/\/openziti.io\/docs\/learn\/core-concepts\/security\/authentication\/external-jwt-signers\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">involving external certificate authorities<\/span><\/a><span style=\"font-weight: 400;\"> like those installed when the device is manufactured, the certificate can be protected in a number of ways. By default, the certificate is in the file system. The permissions applied to the file can be restricted as necessary, provided the Ziti application can read if for the necessary operations. For higher security applications, Ziti supports PKCS11 interfaces, so the certificate material and all necessary operations can use a hardware security module or similar device. The certificate authenticates the device&#8217;s identity, so by itself it is meaningless, the device must also have a configured identity in the network, which can be modified or removed.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"> Having a standardized cryptographically secured authenticator meets the highest level of strength for identities, and the protection model of that authenticator is an implementation choice, depending on the requirements of the environment. This identity only allows network access to those configured services, and does not provide any access to the applications themselves that are defined as services. Also, ensuring the identity is sovereign to the endpoint ensures that no one else has the ability to decrypt\/inspect on the data plane, even if the data plane is hosted by a 3rd party.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0cc2e6 e-grid e-con-full e-con e-child\" data-id=\"d0cc2e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd7c199 elementor-widget elementor-widget-shortcode\" data-id=\"bd7c199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0990264 e-grid e-con-boxed e-con e-child\" data-id=\"0990264\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-88ef4fb e-grid e-con-full e-con e-child\" data-id=\"88ef4fb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-876eecc e-con-full e-grid e-con e-child\" data-id=\"876eecc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b9412f elementor-widget elementor-widget-heading\" data-id=\"9b9412f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure Comms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4c52ff gray elementor-widget elementor-widget-text-editor\" data-id=\"e4c52ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin: 0px 0px calc(23.2px); color: #434c5e; font-family: 'Open Sans', sans-serif; text-wrap: wrap;\" data-sider-select-id=\"cecad02f-2cbf-425b-991e-ddcbdb1714b0\"><span style=\"font-weight: 400;\">As noted previously, all communications across the <\/span><a href=\"https:\/\/openziti.io\/docs\/learn\/core-concepts\/security\/connection-security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Ziti network are encrypted<\/span><\/a><span style=\"font-weight: 400;\">, double encrypted &#8220;on the wire&#8221;, as the circuit is encrypted end to end, and the channels or links that carry them are independently encrypted as well. The use of device or host based options to protect the local physical connection is a design point of the overall system, as Ziti does not natively provide protection at that point. These decisions also affect whether or not the device allows any nonZiti access to the device, and should be taken into consideration. Appropriate to the risk level, Ziti can be used to allow low friction access to and from devices, while maintaining the necessary security, allowing only authenticated and authorized persons or processes to send or receive data to and from the device. OpenZiti encryption is built for extensibility which allows \u2018crypto agility\u2019 &#8211; e.g., towards quantum encryption &#8211; which are increasingly important topics in OT and critical infrastructure covered by 62443. It should also be noted that Ziti separately encrypts and routes each AppNet.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-85aeea4 e-con-full e-flex e-con e-child\" data-id=\"85aeea4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b35e90c elementor-widget elementor-widget-heading\" data-id=\"b35e90c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enhanced Encryption Standards<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4af8475 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"4af8475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"3bcc0366-b0a8-4a2e-a122-8122b41a5ba6\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Ziti employs double encryption for secure communications, ensuring robust protection across devices.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-72c14fe e-grid e-con-full e-con e-child\" data-id=\"72c14fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d72430f elementor-widget elementor-widget-shortcode\" data-id=\"d72430f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0180b92 e-grid e-con-boxed e-con e-child\" data-id=\"0180b92\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-defbd58 e-grid e-con-full e-con e-child\" data-id=\"defbd58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-20e6a1f e-con-full e-flex e-con e-child\" data-id=\"20e6a1f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-917996d elementor-widget elementor-widget-heading\" data-id=\"917996d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dynamic Access Control<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5949a93 elementor-widget elementor-widget-text-editor\" data-id=\"5949a93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"be2755e9-b3ec-4ced-967f-1b9327cbb91c\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Ziti leverages policies for secure connectivity, enabling real-time management and monitoring.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6c210e e-con-full e-grid e-con e-child\" data-id=\"c6c210e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bc0285 elementor-widget elementor-widget-heading\" data-id=\"9bc0285\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Flow Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-757a7a4 gray elementor-widget elementor-widget-text-editor\" data-id=\"757a7a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Ziti uses policy to allow connectivity between identities and services. A single service can be allowed to be hosted by a single identity, with another single identity accessing it, even in a large network. The use of attribute tags can allow for groups of identities to be allowed to access groups of services, or to host services via an addressing system. Built-in tools, such as the policy advisor, can be used to verify accessibility, taking into account all the applied policies, and the APIs can be utilized to extract the information for auditing or other external purposes.<\/span><\/p><p><span style=\"font-weight: 400;\">The API and event driven nature of Ziti also allows for dynamic updates to the configuration. It is straightforward to create a<\/span><a href=\"https:\/\/blog.openziti.io\/business-rule-driven-just-in-time-network-access\" target=\"_blank\" rel=\"noopener\"> <span style=\"font-weight: 400;\">solution for tying access to business and other rule sets in real time<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Beyond the ability to manage these policies, Ziti also provides detailed event and metric data to allow for the auditing of the connectivity, an important use case in forensics and incident response, as well as behavioral analysis and other monitoring. The access of any identity to a service is emitted, and the data volume transferred is emitted every minute (by default, configurable). The ingestion of these records by a UEBA or other system can allow for immediate actions to terminate connectivity. The removal of authorization to a service will result in the termination of current connections, as well as prevent any new ones. These changes are effective within seconds of the change being made.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">As you can see, not only can Ziti create and enforce appropriate data flow policies, it enables the monitoring and appropriate response to anomalous behaviors, or changes in business rules with real time effect.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4ed5216 e-grid e-con-full e-con e-child\" data-id=\"4ed5216\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-478ab57 elementor-widget elementor-widget-shortcode\" data-id=\"478ab57\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb51125 e-grid e-con-boxed e-con e-child\" data-id=\"cb51125\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e786063 e-grid e-con-full e-con e-child\" data-id=\"e786063\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2ff9a06 e-con-full e-grid e-con e-child\" data-id=\"2ff9a06\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0cbfe5e elementor-widget elementor-widget-heading\" data-id=\"0cbfe5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Least Privilege Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd3c9af gray elementor-widget elementor-widget-text-editor\" data-id=\"dd3c9af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Least privilege generally concerns privileges granted within an application. Ziti does not act above the data plane, so does not affect the permissions directly. However, the available specificity of network connections can enhance a least privilege model by controlling who can reach the application at all. Depending on the complete design, involving many of the concepts above, even individuals with physical access to a network port can be blocked from accessing the information or device without proper authentication and authorization. Individual network service on the same device can also be separately managed, allowing access to a UI, for example, to the appropriate personnel, while allowing access to a ssh port to administrators only. <\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"> While OpenZiti does not provide features for least privilege in the most common usage, it certainly can enforce least connectivity as a part of the overall strategy.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2421254 e-con-full e-flex e-con e-child\" data-id=\"2421254\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8739fc3 elementor-widget elementor-widget-heading\" data-id=\"8739fc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enhanced Least Privilege<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58ad77f blue-med elementor-widget elementor-widget-text-editor\" data-id=\"58ad77f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"aa5d75b8-5282-4501-9495-95102437584b\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>Ziti supports least privilege by controlling network access, enhancing application security strategies.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d5c960 e-grid e-con-full e-con e-child\" data-id=\"2d5c960\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2e69a7 elementor-widget elementor-widget-shortcode\" data-id=\"e2e69a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"container\" data-elementor-id=\"32650\" class=\"elementor elementor-32650\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-11b3293 e-grid e-con-boxed e-con e-child\" data-id=\"11b3293\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd342e2 elementor-widget elementor-widget-image\" data-id=\"bd342e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cf2ccc elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8cf2ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d93106 elementor-widget elementor-widget-image\" data-id=\"4d93106\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ce215c e-grid e-con-boxed e-con e-child\" data-id=\"3ce215c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa2a7f5 e-grid e-con-full e-con e-child\" data-id=\"aa2a7f5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-330acd4 e-con-full e-flex e-con e-child\" data-id=\"330acd4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e09438f elementor-widget elementor-widget-heading\" data-id=\"e09438f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Continuous Monitoring Solutions\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97f9372 blue-med elementor-widget elementor-widget-text-editor\" data-id=\"97f9372\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"9e17e399-4100-427a-b6f8-d8e75d215990\" data-message-model-slug=\"gpt-4o-mini\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert dark\"><p>OpenZiti enables ongoing authentication and behavioral analysis for enhanced security oversight.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc56a25 e-con-full e-grid e-con e-child\" data-id=\"fc56a25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e4434f elementor-widget elementor-widget-heading\" data-id=\"3e4434f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Continuous Monitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-276b847 gray elementor-widget elementor-widget-text-editor\" data-id=\"276b847\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">There are 2 current forms of continuous monitoring, depending on definition. Continuous authentication, verifying that the user\u2019s session continues to be allowable based on the rules sets, and behavioral analysis.<\/span><\/p><p><span style=\"font-weight: 400;\">Using the authentication policies defined in OpenZiti, the simplest form of continuous authentication is MFA via one-time tokens (with many other posture checks supported and being developed). <\/span><a href=\"https:\/\/openziti.io\/docs\/learn\/core-concepts\/security\/authorization\/posture-checks\/#mfa\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">These posture checks can be configured based on time, and\/or events such as a laptop being \u201cwoken up\u201d, or unlocked.<\/span><\/a><span style=\"font-weight: 400;\"> This ensures that the authenticated user is still in control of the device prior to allowing access to any services.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">As noted in the Data flow policy section above, OpenZiti can be configured to output a wide range of information. These events and metrics can indicate the operations of the network in general, as well as highly specific information about its usage. Every connection (circuit) within the network is logged at creation and deletion, giving the initiating identity, service, hosting identity, and the path through the network.\u00a0 Every circuit is authorized by a session created when the identity attaches to the network, and this session is also logged for creation and deletion. This record contains the Network Controller&#8217;s view of the IP address the device is attaching from, the time of the event, etc. Even when the deployment model is ZTNA, and an Edge Router is operating as a gateway to a nonZiti portion of the network, initiating or terminating, the socket information (IP:PORT) is collected and reported in the events. This allows for correlation of translated addresses or nonZiti clients with other systems in auditing or forensic investigations.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"> All changes made to the network model, services, identities, policies, and entities are also emitted as events, allowing the monitoring of changes made to the network in real time or as an audit function. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4d1e94 e-grid e-con-boxed e-con e-child\" data-id=\"d4d1e94\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ec6c6b elementor-widget__width-inherit elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"9ec6c6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\" role=\"navigation\" aria-label=\"Post Navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/netfoundry-zero-trust-for-ot-and-iot-secure-simple-and-flexible\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-left\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M31.7 239l136-136c9.4-9.4 24.6-9.4 33.9 0l22.6 22.6c9.4 9.4 9.4 24.6 0 33.9L127.9 256l96.4 96.4c9.4 9.4 9.4 24.6 0 33.9L201.7 409c-9.4 9.4-24.6 9.4-33.9 0l-136-136c-9.5-9.4-9.5-24.6-.1-34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Previous<\/span><span class=\"post-navigation__prev--title\">NetFoundry Zero Trust for OT and IIoT<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/netfoundry.io\/resources\/solution-guide-securing-aws-zero-trust-access-to-s3-buckets-with-python-vpc-and-ziti-sdk\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Next<\/span><span class=\"post-navigation__next--title\">Solution Guide: Securing AWS Zero Trust Access to S3 Buckets with Python, VPC, and Ziti SDK<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/main>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>NetFoundry White Papers Introduction to ISA\/IEC 62443 Standards ISAGCA has published a paper titled Zero Trust Outcomes Using ISA\/IEC 62443 Standards. This paper investigates the intersection of IEC 62443 and Zero Trust principles and the benefits of various roles of the adoption of Zero Trust concepts to enhance ISA\/IEC 62443-based security practices. Specifically, the paper [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":41082,"menu_order":0,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"feature":[],"resource-tags":[801,802,800,778,803,706,746,744,722,804],"resource-categories":[986],"class_list":["post-41086","resources","type-resources","status-publish","format-standard","has-post-thumbnail","hentry","resource-tags-ics-compliance","resource-tags-industrial-networks","resource-tags-isa-iec-62443","resource-tags-microsegmentation","resource-tags-network-monitoring","resource-tags-openziti","resource-tags-ot-security","resource-tags-secure-connectivity","resource-tags-zero-trust","resource-tags-ztna","resource-categories-solution"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443<\/title>\n<meta name=\"description\" content=\"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\/ICS, aligning with ISA\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443\" \/>\n<meta property=\"og:description\" content=\"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\/ICS, aligning with ISA\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-29T17:15:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/\",\"name\":\"NetFoundry and Zero Trust Outcomes in ISA\\\/IEC 62443\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg\",\"datePublished\":\"2024-10-12T19:36:23+00:00\",\"dateModified\":\"2026-01-29T17:15:22+00:00\",\"description\":\"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\\\/ICS, aligning with ISA\\\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | NetFoundry and Zero Trust Outcomes in ISA\\\/IEC 62443\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/resources\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NetFoundry and Zero Trust Outcomes in ISA\\\/IEC 62443\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443","description":"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\/ICS, aligning with ISA\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/","og_locale":"en_US","og_type":"article","og_title":"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443","og_description":"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\/ICS, aligning with ISA\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.","og_url":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_modified_time":"2026-01-29T17:15:22+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@netfoundry","twitter_misc":{"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/","url":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/","name":"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg","datePublished":"2024-10-12T19:36:23+00:00","dateModified":"2026-01-29T17:15:22+00:00","description":"NetFoundry\u2019s platform and OpenZiti enables Zero Trust for OT\/ICS, aligning with ISA\/IEC 62443 standards for secure, segmented, and compliant industrial connectivity.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443.jpg","width":1536,"height":804,"caption":"NetFoundry | NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/resources\/netfoundry-and-zero-trust-outcomes-in-isa-iec-62443\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/netfoundry.io\/resources\/"},{"@type":"ListItem","position":3,"name":"NetFoundry and Zero Trust Outcomes in ISA\/IEC 62443"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/resources"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/90"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resources\/41086\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/41082"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=41086"}],"wp:term":[{"taxonomy":"feature","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/feature?post=41086"},{"taxonomy":"resource-tags","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-tags?post=41086"},{"taxonomy":"resource-categories","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/resource-categories?post=41086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}