{"id":41816,"date":"2024-11-07T08:16:03","date_gmt":"2024-11-07T13:16:03","guid":{"rendered":"https:\/\/netfoundry.io\/?p=41816"},"modified":"2024-11-07T08:19:10","modified_gmt":"2024-11-07T13:19:10","slug":"accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security","status":"publish","type":"post","link":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/","title":{"rendered":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"41816\" class=\"elementor elementor-41816\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29f327ee e-flex e-con-boxed e-con e-parent\" data-id=\"29f327ee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43f6bdb3 elementor-widget elementor-widget-text-editor\" data-id=\"43f6bdb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">If you\u2019ve ever been in the trenches of DevOps, you know the drill: move fast, maintain reliability, and\u2014somehow\u2014don\u2019t break security in the process. I&#8217;ve been doing this for over a decade, and I\u2019ve lost count of the number of times my team and I had to juggle priorities, feeling the pressure of meeting deadlines while knowing every open port or IP address could be an attack vector waiting to happen. Here\u2019s how I\u2019m finally able to move faster and sleep better, thanks to the zero trust connectivity we\u2019ve built at NetFoundry with Ziti.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d73cda0 e-grid e-con-full e-con e-child\" data-id=\"2d73cda0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10d060c5 elementor-widget elementor-widget-image\" data-id=\"10d060c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64c15dee elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"64c15dee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7df69ae7 elementor-widget elementor-widget-image\" data-id=\"7df69ae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-953eedf e-flex e-con-boxed e-con e-parent\" data-id=\"953eedf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c91f20a elementor-widget elementor-widget-text-editor\" data-id=\"c91f20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>The Real DevOps Struggle: Moving Fast Without Creating Vulnerabilities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">DevOps isn\u2019t just about building and deploying software; it\u2019s about creating connectivity between systems: development environments, production servers, monitoring tools, CI\/CD systems, data warehouses, even different cloud providers. Every time we \u201cconnect\u201d something, we open another door for attackers to get in. Over the years, I\u2019ve seen VPNs, VPC peering, MPLS connections, you name it. All of these solutions are SLOW to implement, difficult to manage, and they all have the common problem of heavily exposing one site to another the moment you connect them together.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take VPNs, for instance. They\u2019re great for creating a secure tunnel, but they\u2019re still just a tunnel\u2014everything on both ends is exposed. When you start adding multiple cloud regions or VPCs into the mix, you end up with a tangled mess of network configurations that\u2019s a pain to secure and scale. And don\u2019t even get me started on managing IPs, firewall rules, and access controls across clusters in Kubernetes. It was clear: if we were going to get serious about DevOps at scale, we needed a different approach.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8e41f65 e-grid e-con-full e-con e-child\" data-id=\"8e41f65\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e6fae85 elementor-widget elementor-widget-image\" data-id=\"e6fae85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd36bf2 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fd36bf2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9196ed1 elementor-widget elementor-widget-image\" data-id=\"9196ed1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc58e9b e-flex e-con-boxed e-con e-parent\" data-id=\"dc58e9b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54926c2 elementor-widget elementor-widget-text-editor\" data-id=\"54926c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>Why Traditional Networking Slows DevOps Down<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To connect our various systems, we were constantly having to open ports, configure firewalls, or set up VPNs to create the connectivity that we needed. Traditional network security is built around static systems that don\u2019t change, but that\u2019s not the world we live in anymore. Every time we open a port or punch a hole in a firewall, we introduce risk. As the Head of Devops, I had to ensure that the developers had access to the resources they needed without opening the entire production environment to everyone. It felt like every tool we added\u2014monitoring, CI\/CD, data management\u2014added another layer of complexity and potential exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some key challenges I kept hitting were:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>VPN Limitations<\/b><span style=\"font-weight: 400;\">: VPNs made us feel secure, but they slowed everything down and weren\u2019t flexible. Managing VPN access across our multi-cloud setup was clunky and constantly prone to configuration issues.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>VPC Peering Concerns<\/b><span style=\"font-weight: 400;\">: AWS\u2019s VPC peering is straightforward at first, but it\u2019s region specific, and as soon as you peer them together, your security is only as good as the weakest link. One compromised VPC will compromise them all.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Multi-Cloud Complexity<\/b><span style=\"font-weight: 400;\">: As we started using multiple clouds, things got even messier. Peering and direct connections didn\u2019t cover all our needs, and adding load balancers or complex mesh networking solutions only made things more fragile. The more environments we connected, the harder it was to keep everything secure and running smoothly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Kubernetes Networking Headaches<\/b><span style=\"font-weight: 400;\">: Managing networking and security within Kubernetes felt like a nightmare at times. Each cluster and pod communication required specific configurations and opened up potential vulnerabilities. Ensuring the right access for internal and external traffic was anything but simple.<\/span><\/li>\n<\/ol>\n<p>\u00a0<\/p>\n<p><span style=\"font-weight: 400;\">Every tool we used was supposed to help us move faster, but the underlying infrastructure we had to build around them was slowing us down and constantly raising new security concerns.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9135641 e-grid e-con-full e-con e-child\" data-id=\"9135641\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b9354b elementor-widget elementor-widget-image\" data-id=\"3b9354b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd18e82 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd18e82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3377a8 elementor-widget elementor-widget-image\" data-id=\"c3377a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b0825e6 e-flex e-con-boxed e-con e-parent\" data-id=\"b0825e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-291c207 elementor-widget elementor-widget-text-editor\" data-id=\"291c207\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>Moving Faster with Zero Trust: How Ziti Changes the Game<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Then came Ziti, NetFoundry\u2019s zero trust platform. With Ziti, I could connect systems without worrying about exposing them. It\u2019s what we call \u201cmaking it dark\u201d\u2014there are no exposed IPs or open ports; every connection is identity-based and encrypted. Suddenly, it didn\u2019t matter where something was deployed or how many environments we had, because everything was \u201cinvisible\u201d to the outside world, and so much simpler to manage.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s how it\u2019s improved our workflows:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>No More Open Ports or Exposed IPs<\/b><span style=\"font-weight: 400;\">: Ziti eliminates open ports and uses identity-based access instead. This means I don\u2019t have to leave holes in our firewall or worry about IP whitelisting. Every connection is authenticated and encrypted, so I\u2019m not constantly second-guessing if we\u2019ve secured our environment properly.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Policy-Driven Access Management<\/b><span style=\"font-weight: 400;\">: Managing access used to mean configuring networks, assigning VPNs, and juggling firewall rules. Now, with Ziti, I just assign policies to specific identities\u2014like users, services, or even applications. Policies control who gets access to what, and they\u2019re way easier to adjust as we grow or change setups. A policy can be as simple as \u201c#devops identities can access \u201c#devops services\u201d.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effortless Multi-Cloud and Multi-Cluster Connections<\/b><span style=\"font-weight: 400;\">: With Ziti, I can connect workloads across AWS, Azure, and GCP without needing VPNs, peering, or load balancers. It\u2019s all seamless and managed through Ziti, which lets me focus on running the applications instead of managing connections. I get the same zero trust security across environments without the hassle.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure, Scalable Kubernetes Networking<\/b><span style=\"font-weight: 400;\">: Kubernetes networking can be a headache, but Ziti makes it simple by embedding zero trust right into the clusters. Whether it\u2019s ingress or egress traffic, it\u2019s all secured without open ports. I can scale up clusters or add new ones without worrying about the networking nightmares that usually come with it.<\/span><\/li>\n<\/ol>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37295fc e-grid e-con-full e-con e-child\" data-id=\"37295fc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d5829cd elementor-widget elementor-widget-image\" data-id=\"d5829cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-137515e elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"137515e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f62fd86 elementor-widget elementor-widget-image\" data-id=\"f62fd86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9cbc638 e-flex e-con-boxed e-con e-parent\" data-id=\"9cbc638\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c30c26d elementor-widget elementor-widget-text-editor\" data-id=\"c30c26d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>Six Use Cases Where Ziti is a Game-Changer for Us<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Since switching to Ziti, I\u2019ve seen the benefits across everything we do in DevOps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>CI\/CD<\/b><span style=\"font-weight: 400;\">: I can secure our CI\/CD pipelines so that only authorized entities can access each stage of deployment, preventing accidental exposures in our code deployment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Monitoring<\/b><span style=\"font-weight: 400;\">: Our monitoring tools are \u201cdark\u201d now, so all data is transmitted without opening any ports, eliminating the risk of data leaks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>ETL<\/b><span style=\"font-weight: 400;\">: We can centrally manage all of our ETL jobs without adding any new exposure to our database connections.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data Warehouses<\/b><span style=\"font-weight: 400;\">: Ziti ensures that only authenticated users can access our data warehouses, preventing unauthorized data extraction.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Configuration Management<\/b><span style=\"font-weight: 400;\">: Configuration management tools can reach into distributed locations easily without ever opening up a port to the outside world.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Developer Access<\/b><span style=\"font-weight: 400;\">: Devs get least-privilege access via Ziti, so they can work on production issues without risking broader exposure.<\/span><\/li>\n<\/ul>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16f3d95 e-grid e-con-full e-con e-child\" data-id=\"16f3d95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdb9de1 elementor-widget elementor-widget-image\" data-id=\"cdb9de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c200f6 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6c200f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf49dcd elementor-widget elementor-widget-image\" data-id=\"cf49dcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"24\" height=\"24\" src=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-endpoint-gray.svg\" class=\"attachment-large size-large wp-image-36613\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd910bc e-flex e-con-boxed e-con e-parent\" data-id=\"cd910bc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca83bd6 elementor-widget elementor-widget-text-editor\" data-id=\"ca83bd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<h3><b>Moving with Speed and Security, Thanks to Ziti<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With Ziti, I\u2019m finally able to create the connectivity I need at speed without sacrificing a strong security model. We don\u2019t have to slow down for complex network setups or worry about exposed services or ports. Ziti\u2019s zero trust approach is secure by default, so I can focus on building and deploying rather than fighting with access control lists.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, if you\u2019re in DevOps and tired of the network hassle, take a look at zero trust with Ziti. It might just change how you work.<\/span><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>If you\u2019ve ever been in the trenches of DevOps, you know the drill: move fast, maintain reliability, and\u2014somehow\u2014don\u2019t break security in the process. I&#8217;ve been doing this for over a decade, and I\u2019ve lost count of the number of times my team and I had to juggle priorities, feeling the pressure of meeting deadlines while [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":41818,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[541],"tags":[896,891,544,895,894,496,700,854,545,819],"class_list":["post-41816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","tag-ci-cd-security","tag-cybersecurity","tag-devops","tag-identity-based-access","tag-kubernetes","tag-multi-cloud-security","tag-netfoundry-platform","tag-network-security","tag-zero-trust","tag-ziti-platform"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security<\/title>\n<meta name=\"description\" content=\"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security\" \/>\n<meta property=\"og:description\" content=\"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/\" \/>\n<meta property=\"og:site_name\" content=\"NetFoundry\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/netfoundry.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-07T13:16:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-07T13:19:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"804\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Guthrie\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:site\" content=\"@netfoundry\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Guthrie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/\"},\"author\":{\"name\":\"Mike Guthrie\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/6e7b1c206427af71adc3268f77d4154e\"},\"headline\":\"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security\",\"datePublished\":\"2024-11-07T13:16:03+00:00\",\"dateModified\":\"2024-11-07T13:19:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/accelerating-devops-with-zero-trust.jpg\",\"keywords\":[\"CI\\\/CD Security\",\"Cybersecurity\",\"DevOps\",\"Identity-Based Access\",\"Kubernetes\",\"Multi-cloud Security\",\"NetFoundry Platform\",\"Network Security\",\"Zero Trust\",\"Ziti Platform\"],\"articleSection\":[\"DevOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/\",\"name\":\"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/accelerating-devops-with-zero-trust.jpg\",\"datePublished\":\"2024-11-07T13:16:03+00:00\",\"dateModified\":\"2024-11-07T13:19:10+00:00\",\"description\":\"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/accelerating-devops-with-zero-trust.jpg\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/accelerating-devops-with-zero-trust.jpg\",\"width\":1536,\"height\":804,\"caption\":\"NetFoundry | Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/devops\\\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/netfoundry.io\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#website\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"name\":\"NetFoundry\",\"description\":\"Identity-First\u2122 Networking\",\"publisher\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/netfoundry.io\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#organization\",\"name\":\"NetFoundry\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"contentUrl\":\"https:\\\/\\\/netfoundry.io\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/netfoundry-icon-color.png\",\"width\":512,\"height\":512,\"caption\":\"NetFoundry\"},\"image\":{\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/netfoundry.io\",\"https:\\\/\\\/x.com\\\/netfoundry\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netfoundry\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCGN6PFj1rZu50yme9YsICmg\",\"https:\\\/\\\/www.instagram.com\\\/netfoundry.io\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/netfoundry.io\\\/#\\\/schema\\\/person\\\/6e7b1c206427af71adc3268f77d4154e\",\"name\":\"Mike Guthrie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g\",\"caption\":\"Mike Guthrie\"},\"url\":\"https:\\\/\\\/netfoundry.io\\\/author\\\/mike-guthrie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security","description":"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/","og_locale":"en_US","og_type":"article","og_title":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security","og_description":"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.","og_url":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/","og_site_name":"NetFoundry","article_publisher":"https:\/\/www.facebook.com\/netfoundry.io","article_published_time":"2024-11-07T13:16:03+00:00","article_modified_time":"2024-11-07T13:19:10+00:00","og_image":[{"width":1536,"height":804,"url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg","type":"image\/jpeg"}],"author":"Mike Guthrie","twitter_card":"summary_large_image","twitter_creator":"@netfoundry","twitter_site":"@netfoundry","twitter_misc":{"Written by":"Mike Guthrie","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#article","isPartOf":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/"},"author":{"name":"Mike Guthrie","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/6e7b1c206427af71adc3268f77d4154e"},"headline":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security","datePublished":"2024-11-07T13:16:03+00:00","dateModified":"2024-11-07T13:19:10+00:00","mainEntityOfPage":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"image":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg","keywords":["CI\/CD Security","Cybersecurity","DevOps","Identity-Based Access","Kubernetes","Multi-cloud Security","NetFoundry Platform","Network Security","Zero Trust","Ziti Platform"],"articleSection":["DevOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/","url":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/","name":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security","isPartOf":{"@id":"https:\/\/netfoundry.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#primaryimage"},"image":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#primaryimage"},"thumbnailUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg","datePublished":"2024-11-07T13:16:03+00:00","dateModified":"2024-11-07T13:19:10+00:00","description":"Accelerate DevOps with Zero Trust. Discover how NetFoundry\u2019s Ziti enables secure, fast, identity-based connections without open ports.","breadcrumb":{"@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#primaryimage","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/11\/accelerating-devops-with-zero-trust.jpg","width":1536,"height":804,"caption":"NetFoundry | Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security"},{"@type":"BreadcrumbList","@id":"https:\/\/netfoundry.io\/devops\/accelerating-devops-with-zero-trust-moving-faster-without-sacrificing-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netfoundry.io\/"},{"@type":"ListItem","position":2,"name":"Accelerating DevOps with Zero Trust: Moving Faster Without Sacrificing Security"}]},{"@type":"WebSite","@id":"https:\/\/netfoundry.io\/#website","url":"https:\/\/netfoundry.io\/","name":"NetFoundry","description":"Identity-First\u2122 Networking","publisher":{"@id":"https:\/\/netfoundry.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netfoundry.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netfoundry.io\/#organization","name":"NetFoundry","url":"https:\/\/netfoundry.io\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/","url":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","contentUrl":"https:\/\/netfoundry.io\/wp-content\/uploads\/2024\/08\/netfoundry-icon-color.png","width":512,"height":512,"caption":"NetFoundry"},"image":{"@id":"https:\/\/netfoundry.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/netfoundry.io","https:\/\/x.com\/netfoundry","https:\/\/www.linkedin.com\/company\/netfoundry\/","https:\/\/www.youtube.com\/channel\/UCGN6PFj1rZu50yme9YsICmg","https:\/\/www.instagram.com\/netfoundry.io"]},{"@type":"Person","@id":"https:\/\/netfoundry.io\/#\/schema\/person\/6e7b1c206427af71adc3268f77d4154e","name":"Mike Guthrie","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2a9713413ad0c016591786e569a70c1b7da50a5d88a5afbae99289bae2b6168d?s=96&d=mm&r=g","caption":"Mike Guthrie"},"url":"https:\/\/netfoundry.io\/author\/mike-guthrie\/"}]}},"_links":{"self":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/41816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/comments?post=41816"}],"version-history":[{"count":0,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/posts\/41816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media\/41818"}],"wp:attachment":[{"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/media?parent=41816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/categories?post=41816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netfoundry.io\/wp-json\/wp\/v2\/tags?post=41816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}