{"id":41610,"date":"2024-10-20T12:52:26","date_gmt":"2024-10-20T16:52:26","guid":{"rendered":"https:\/\/netfoundry.io\/?p=41610"},"modified":"2024-11-10T21:50:49","modified_gmt":"2024-11-11T02:50:49","slug":"security-by-design-in-software-development-embedding-zero-trust-connectivity","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/","title":{"rendered":"Security by Design in Software Development: Embedding Zero Trust Connectivity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41610\" class=\"elementor elementor-41610\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29f327ee e-flex e-con-boxed e-con e-parent\" data-id=\"29f327ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43f6bdb3 elementor-widget elementor-widget-text-editor\" data-id=\"43f6bdb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Product Companies: Stop Depending On Your Customer\u2019s Security<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">In the fast-evolving world of software development, <\/span><b>security by design in software development<\/b><span style=\"font-weight: 400;\"> is no longer just a best practice\u2014it&#8217;s a necessity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rise of connected products, IoT, and increasingly complex digital ecosystems means that product providers can no longer safely rely on the security measures of their customers when they deploy their products. Instead, companies must <\/span><a href=\"https:\/\/www.linkedin.com\/pulse\/develop-once-deploy-anywhere-deliver-everywhere-galeal-zino-mf5ze\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">embed security directly into their products<\/span><\/a><span style=\"font-weight: 400;\"> from the start, ensuring that they don\u2019t introduce vulnerabilities into customer networks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where <\/span><b>NetFoundry<\/b><span style=\"font-weight: 400;\"> comes in. If you\u2019re a software company or a manufacturer of smart connected products, we can help make your products secure by design. The NetFoundry platform is a <\/span><b>secure networking platform with <\/b><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/netfoundry-edge\/\"><b>SDKs<\/b><\/a><span style=\"font-weight: 400;\"> that enable <\/span><b>zero trust connectivity<\/b><span style=\"font-weight: 400;\"> and secure networking to be embedded directly into applications and products. With NetFoundry, you can rapidly create an<\/span><a href=\"https:\/\/netfoundry.io\/appnets\/appnets\/\"><span style=\"font-weight: 400;\"> AppNet\u2122<\/span><\/a><span style=\"font-weight: 400;\">, a microsegmented, zero trust overlay network, that can then be embedded into your application for secure connectivity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d73cda0 e-grid e-con-full e-con e-child\" data-id=\"2d73cda0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10d060c5 elementor-widget elementor-widget-image\" data-id=\"10d060c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64c15dee elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"64c15dee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df69ae7 elementor-widget elementor-widget-image\" data-id=\"7df69ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-953eedf e-flex e-con-boxed e-con e-parent\" data-id=\"953eedf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91f20a elementor-widget elementor-widget-text-editor\" data-id=\"c91f20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><strong>Embeddable Networking as Code: The Next Big Trend<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">As the industry embraces <\/span><b>Infrastructure as Code<\/b><span style=\"font-weight: 400;\"> (IaC) and <\/span><a href=\"https:\/\/www.splunk.com\/en_us\/blog\/learn\/network-as-code.html\" target=\"_blank\" rel=\"noopener\"><b>Networking as Code (NaC)<\/b><\/a><span style=\"font-weight: 400;\"> to automate and streamline IT operations and infrastructure management, a new trend is emerging\u2014 <\/span><b>Embedded Networking as Code<\/b><span style=\"font-weight: 400;\"> (ENaC). This shift allows developers to leverage secure networking in application design and development, making it easy to use zero trust networks for connectivity programmatically.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With NetFoundry\u2019s SDKs, product companies can now integrate <\/span><b>Embedded Networking as Code<\/b><span style=\"font-weight: 400;\"> into their development processes, enabling secure communication between products, systems, and services without relying on external security measures, such as VPNs or firewalls. This approach aligns perfectly with the principles of <\/span><b>security by design in software development<\/b><span style=\"font-weight: 400;\">, where security is built-in and embedded within the software from the outset rather than bolted on later.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e41f65 e-grid e-con-full e-con e-child\" data-id=\"8e41f65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fae85 elementor-widget elementor-widget-image\" data-id=\"e6fae85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd36bf2 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fd36bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9196ed1 elementor-widget elementor-widget-image\" data-id=\"9196ed1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc58e9b e-flex e-con-boxed e-con e-parent\" data-id=\"dc58e9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54926c2 elementor-widget elementor-widget-text-editor\" data-id=\"54926c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><strong>Why Product Providers Must Embrace Security by Design<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Many product companies deploy their solutions on customer networks, but the reality is that these networks often have their own vulnerabilities. Relying on customer bolted-on network security exposes companies to unnecessary risks. Product providers must take security into their own hands, and that responsibility starts during the product design and <\/span><b>software development process<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\"><b>NetFoundry\u2019s platform<\/b><\/a><span style=\"font-weight: 400;\"> helps companies achieve this by allowing them to integrate <\/span><b>zero trust<\/b><span style=\"font-weight: 400;\"> principles directly into their applications. This eliminates the need for insecure methods like VPN access or opening holes in firewalls. By embedding security features directly into the product, companies not only protect themselves but also ensure that they aren\u2019t introducing vulnerabilities into their customers\u2019 environments.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9135641 e-grid e-con-full e-con e-child\" data-id=\"9135641\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b9354b elementor-widget elementor-widget-image\" data-id=\"3b9354b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd18e82 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd18e82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3377a8 elementor-widget elementor-widget-image\" data-id=\"c3377a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0825e6 e-flex e-con-boxed e-con e-parent\" data-id=\"b0825e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-291c207 elementor-widget elementor-widget-text-editor\" data-id=\"291c207\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><strong>Zero Trust Connectivity: Secure by Design<\/strong><\/h3>\n<p><b>Zero trust connectivity<\/b><span style=\"font-weight: 400;\"> means that no device or user is trusted by default, even if they are within the network perimeter. This concept is at the core of <\/span><b>NetFoundry&#8217;s &#8220;secure by design&#8221;<\/b><span style=\"font-weight: 400;\"> approach. By leveraging NetFoundry\u2019s platform, companies can build secure, programmable, and scalable networks that ensure secure access only for verified identities and devices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With <\/span><a href=\"https:\/\/netfoundry.io\/zero-trust\/the-five-pillars-of-zero-trust-security\/\"><b>zero trust principles<\/b><\/a><b> embedded<\/b><span style=\"font-weight: 400;\"> from the start, companies can confidently deploy products without worrying about external security measures or the reliability of their customers\u2019 networks. This is particularly crucial for providers of physical systems or software who need to ensure that their solutions are secure, reliable, and scalable across various environments.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37295fc e-grid e-con-full e-con e-child\" data-id=\"37295fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5829cd elementor-widget elementor-widget-image\" data-id=\"d5829cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-137515e elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"137515e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f62fd86 elementor-widget elementor-widget-image\" data-id=\"f62fd86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cbc638 e-flex e-con-boxed e-con e-parent\" data-id=\"9cbc638\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c30c26d elementor-widget elementor-widget-text-editor\" data-id=\"c30c26d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><strong>Transforming Product Design for the Future<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">To stay competitive and protect both themselves and their customers, product providers must take control of security at every level, starting from the product design phase. This shift towards <\/span><b>security by design in software development<\/b><span style=\"font-weight: 400;\"> enables companies to future-proof their products, ensuring that they are resilient to modern cyber threats. As more product companies adopt <\/span><b>Embedded Networking as Code<\/b><span style=\"font-weight: 400;\"> and <\/span><b>zero trust<\/b><span style=\"font-weight: 400;\"> principles, this integrated, proactive approach to security will become the industry standard.<\/span><\/p>\n<p><a href=\"https:\/\/netfoundry.io\/why-netfoundry\/\"><span style=\"font-weight: 400;\">NetFoundry\u2019s unique approach<\/span><\/a><span style=\"font-weight: 400;\">, a secure networking software platform, is at the forefront of this transformation, providing the tools product providers need to create secure, smart connected products. By embedding <\/span><b>zero trust connectivity<\/b><span style=\"font-weight: 400;\"> directly into the fabric of their products, companies can ensure secure, seamless networking from development to deployment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this <\/span><b>recent LinkedIn post from our CEO<\/b><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.linkedin.com\/pulse\/develop-once-deploy-anywhere-deliver-everywhere-galeal-zino-mf5ze\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Develop Once, Deploy Anywhere, Deliver Everywhere<\/span><\/a><span style=\"font-weight: 400;\">, Galeal Zino emphasizes integrating secure networking directly into developer platforms, just as AWS did with compute, Twilio with communications, and GitHub with DevOps. He criticizes traditional models of bolted-on security and proprietary WANs as disconnected from application development, leading to security vulnerabilities. He also advocates for a transformative model where secure networking becomes part of the developer ecosystem, enabling seamless development, deployment, and delivery with built-in security, performance, and control\u2014ultimately <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Secure_by_design\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">making products secure by design<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16f3d95 e-grid e-con-full e-con e-child\" data-id=\"16f3d95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb9de1 elementor-widget elementor-widget-image\" data-id=\"cdb9de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c200f6 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6c200f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf49dcd elementor-widget elementor-widget-image\" data-id=\"cf49dcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd910bc e-flex e-con-boxed e-con e-parent\" data-id=\"cd910bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca83bd6 elementor-widget elementor-widget-text-editor\" data-id=\"ca83bd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>Conclusion: Security by Design in Software Development<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">In today\u2019s interconnected world, <\/span><b>security by design in software development<\/b><span style=\"font-weight: 400;\"> is essential. Product companies can no longer rely on their customers\u2019 networks for protection. Instead, they must embed security into their products, starting from the design phase and continuing through development. NetFoundry\u2019s platform, with its SDKs and <\/span><b>zero trust connectivity<\/b><span style=\"font-weight: 400;\">, empowers companies to take control of their security, ensuring that their products are not only secure but also scalable and resilient for the future. As the industry embraces <\/span><b>embeddable secure networking<\/b><span style=\"font-weight: 400;\">, those who adopt <\/span><b>security by design<\/b><span style=\"font-weight: 400;\"> will lead the way in building safer, more secure applications and systems.<\/span><\/p>\n<p><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-pricing\/\"><b>Start<\/b><\/a><b> embedding security into your products today with <\/b><a href=\"https:\/\/netfoundry.io\/products\/netfoundry-platform\/\"><b>NetFoundry\u2019s platform<\/b><\/a><b>. <\/b><span style=\"font-weight: 400;\">There\u2019s a <a href=\"https:\/\/netfoundry.io\/products\/netfoundry-cloud-30-day-free-trial\/\">30 day free trial<\/a> available, a perfect way to learn more about the platform, SKDs and start prototyping.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3f0fae9 e-flex e-con-boxed e-con e-parent\" data-id=\"3f0fae9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Product Companies: Stop Depending On Your Customer\u2019s Security In the fast-evolving world of software development, security by design in software development is no longer just a best practice\u2014it&#8217;s a necessity.\u00a0 The rise of connected products, IoT, and increasingly complex digital ecosystems means that product providers can no longer safely rely on the security measures of [&hellip;]<\/p>\n","protected":false},"author":85,"featured_media":41612,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[859],"tags":[852,856,876,700,874,528,877,872,875,873,712],"class_list":["post-41610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-by-design","tag-application-security","tag-embedded-security","tag-iot-security","tag-netfoundry-platform","tag-networking-as-code","tag-openziti","tag-product-development-security","tag-secure-by-design","tag-secure-software-development","tag-security-by-design","tag-zero-trust-connectivity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security by Design in Software Development: Embedding Zero Trust Connectivity<\/title>\n<meta name=\"description\" content=\"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry&#039;s platform for connected products.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security by Design in Software Development: Embedding Zero Trust Connectivity\" \/>\n<meta property=\"og:description\" content=\"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry&#039;s platform for connected products.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-20T16:52:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-11T02:50:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Pearl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Pearl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/\"},\"author\":{\"name\":\"Michael Pearl\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/e98f05dc74131ca9de631b67783e37b9\"},\"headline\":\"Security by Design in Software Development: Embedding Zero Trust Connectivity\",\"datePublished\":\"2024-10-20T16:52:26+00:00\",\"dateModified\":\"2024-11-11T02:50:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/security-by-design-in-software-development.jpg\",\"keywords\":[\"Application Security\",\"Embedded Security\",\"IoT Security\",\"NetFoundry Platform\",\"Networking as Code\",\"OpenZiti\",\"Product Development Security\",\"Secure By Design\",\"Secure Software Development\",\"Security by Design\",\"Zero Trust Connectivity\"],\"articleSection\":[\"Secure By Design\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/\",\"name\":\"Security by Design in Software Development: Embedding Zero Trust Connectivity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/security-by-design-in-software-development.jpg\",\"datePublished\":\"2024-10-20T16:52:26+00:00\",\"dateModified\":\"2024-11-11T02:50:49+00:00\",\"description\":\"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry's platform for connected products.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/security-by-design-in-software-development.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/security-by-design-in-software-development.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry |Security by Design in Software Development: Embedding Zero Trust Connectivity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/secure-by-design\\\/security-by-design-in-software-development-embedding-zero-trust-connectivity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security by Design in Software Development: Embedding Zero Trust Connectivity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/e98f05dc74131ca9de631b67783e37b9\",\"name\":\"Michael Pearl\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g\",\"caption\":\"Michael Pearl\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/michael-pearl\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security by Design in Software Development: Embedding Zero Trust Connectivity","description":"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry's platform for connected products.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/","og_locale":"en_US","og_type":"article","og_title":"Security by Design in Software Development: Embedding Zero Trust Connectivity","og_description":"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry's platform for connected products.","og_url":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-10-20T16:52:26+00:00","article_modified_time":"2024-11-11T02:50:49+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg","type":"image\/jpeg"}],"author":"Michael Pearl","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Michael Pearl","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/"},"author":{"name":"Michael Pearl","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/e98f05dc74131ca9de631b67783e37b9"},"headline":"Security by Design in Software Development: Embedding Zero Trust Connectivity","datePublished":"2024-10-20T16:52:26+00:00","dateModified":"2024-11-11T02:50:49+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/"},"wordCount":902,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg","keywords":["Application Security","Embedded Security","IoT Security","NetFoundry Platform","Networking as Code","OpenZiti","Product Development Security","Secure By Design","Secure Software Development","Security by Design","Zero Trust Connectivity"],"articleSection":["Secure By Design"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/","url":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/","name":"Security by Design in Software Development: Embedding Zero Trust Connectivity","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg","datePublished":"2024-10-20T16:52:26+00:00","dateModified":"2024-11-11T02:50:49+00:00","description":"Learn how security by design in software development and Networking as Code enable secure, zero trust connectivity with NetFoundry's platform for connected products.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/10\/security-by-design-in-software-development.jpg","width":1536,"height":804,"caption":"NetFoundry |Security by Design in Software Development: Embedding Zero Trust Connectivity"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/secure-by-design\/security-by-design-in-software-development-embedding-zero-trust-connectivity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Security by Design in Software Development: Embedding Zero Trust Connectivity"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/e98f05dc74131ca9de631b67783e37b9","name":"Michael Pearl","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d52b6ec1be5f775a6efc70e89a29a2e36863e71279a7bdaeab11ca7b12a261a4?s=96&d=mm&r=g","caption":"Michael Pearl"},"url":"https:\/\/netfoundry.io\/author\/michael-pearl\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/41610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=41610"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/41610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/41612"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=41610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=41610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=41610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}