{"id":43107,"date":"2025-07-24T16:04:20","date_gmt":"2025-07-24T08:04:20","guid":{"rendered":"https:\/\/www.asuscloud.com\/?p=43107"},"modified":"2025-08-25T16:24:49","modified_gmt":"2025-08-25T08:24:49","slug":"%e9%9b%b6%e4%bf%a1%e4%bb%bb%e6%99%82%e4%bb%a3%e4%be%86%e8%87%a8%ef%bc%8c%e7%95%b6%e4%bc%81%e6%a5%ad%e6%af%8f%e5%80%8b%e8%b3%87%e6%96%99%e5%8d%b3%e6%98%af%e9%82%8a%e7%95%8c%ef%bc%8c%e5%a6%82%e4%bd%95","status":"publish","type":"post","link":"https:\/\/www.asuscloud.com\/en\/20250724\/43107\/","title":{"rendered":"Zero-trust era has arrived. How can organizations build an ultimate security architecture?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43107\" class=\"elementor elementor-43107\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-512925f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"512925f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66f5239\" data-id=\"66f5239\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3206b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3206b3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-431ea19\" data-id=\"431ea19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cb0f0f elementor-widget elementor-widget-text-editor\" data-id=\"8cb0f0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With digital transformation, remote work, and cloud adoption blurring traditional \u201ctrust boundaries,\u201d Zero Trust has become the cornerstone of modern cybersecurity. Taiwan is moving fast: the Financial Supervisory Commission\u2019s Cybersecurity Action Plan 2.0 makes Zero Trust a core goal, while the National Cybersecurity Research Institute is urging top-tier government agencies to speed up adoption. Globally, Gartner reports that more than 60% of enterprises have already implemented Zero Trust. Yet many organizations still struggle with a lack of integrated defense services and cybersecurity expertise\u2014leaving them vulnerable to emerging threats.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-296a1c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"296a1c5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c7b100c\" data-id=\"c7b100c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c688f74 elementor-widget elementor-widget-heading\" data-id=\"c688f74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Never trust, always verify.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-307a9bb elementor-widget elementor-widget-text-editor\" data-id=\"307a9bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Traditional defenses such as firewalls, intrusion detection, and prevention systems are no longer sufficient, as enterprise boundaries now extend far beyond on-premises systems. Based on the principle of \u201cNever trust, always verify,\u201d Zero Trust assumes that threats may exist both inside and outside the network. No user, system, or device is trusted by default. Its core principles include:<\/span><br \/><span style=\"font-weight: 400;\">1.<b>Assume breach<\/b><span style=\"font-weight: 400;\">: Every network request is treated as a potential threat and must be verified.<br \/><span style=\"font-weight: 400;\">2.<\/span><b>Least privilege:<\/b><span style=\"font-weight: 400;\">Users and devices receive only the minimum access required.<\/span><br \/><span style=\"font-weight: 400;\">3.<\/span><b>Continuous monitoring:<\/b><span style=\"font-weight: 400;\">Access policies are dynamically adjusted through real-time detection.<\/span><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46d7d47 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46d7d47\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0378341\" data-id=\"0378341\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e539d4 elementor-widget elementor-widget-heading\" data-id=\"0e539d4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Challenges to Zero Trust Adoption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-013cfc8 elementor-widget elementor-widget-text-editor\" data-id=\"013cfc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Dr. Chase Cunningham, \u201cthe father of Zero Trust,\u201d highlights three major obstacles for enterprises:<\/span><\/p><p><b>1. Lack of interoperability:<\/b><span style=\"font-weight: 400;\">Existing infrastructure often cannot support identity, segmentation, and real-time monitoring integration.<\/span><br \/><b>2.High cost and resource demand:<\/b><span style=\"font-weight: 400;\">Deploying Zero Trust requires significant investment, especially for SMEs lacking expertise. Starting with high-risk areas like data access is recommended.<\/span><br \/><b>3.Cultural resistance:<\/b><span style=\"font-weight: 400;\">Zero Trust is a risk management strategy, not a sign of mistrust. Successful adoption requires leadership support, employee education, and clear communication.<\/span><\/p><p><span style=\"font-weight: 400;\">According to Fortinet\u2019s Zero Trust Report, enterprises relying on multiple legacy security products face higher risks of vulnerabilities and rising operational costs, slowing Zero Trust progress.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2868e43 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2868e43\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68d690e\" data-id=\"68d690e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38c0e5e elementor-widget elementor-widget-heading\" data-id=\"38c0e5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OmniStor: From Passive Defense to Proactive Governance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbd09bf elementor-widget elementor-widget-text-editor\" data-id=\"bbd09bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">To strengthen Zero Trust practices in data security, ASUS Cloud developed OmniStor, a Zero-Trust File Management System (ZTF). OmniStor delivers enterprise-grade private cloud architecture for multilayered data governance and protection. Covering identity authentication, data access, and threat defense, it offers flexible deployment models and a unified, compliant, and secure approach to file management.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b732ce elementor-widget elementor-widget-heading\" data-id=\"0b732ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OmniStor in Action: Mapping to Zero Trust Principles\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dbef4c elementor-widget elementor-widget-text-editor\" data-id=\"8dbef4c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Echoing the three core principles of Zero Trust \u2014 \u201cNever trust, always verify,\u201d \u201cLeast privilege,\u201d and \u201cContinuous monitoring\u201d \u2014 OmniStor provides the following corresponding features:<\/span><\/p><table style=\"border-collapse: collapse; width: 100%;\"><tbody><tr><td style=\"width: 20.8334%;\">Principles<\/td><td style=\"width: 79.1666%;\">OmniStor feactures<\/td><\/tr><tr><td style=\"width: 20.8334%;\"><span style=\"font-weight: 400;\">Never trust, always verify.<\/span><\/td><td style=\"width: 79.1666%;\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Two-factor authentication (2FA)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mobile PIN verification<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Login via DB, LDAP(s), SAML, or OIDC<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">BYOD controls with account-device binding<\/span><\/li><\/ul><\/td><\/tr><tr><td style=\"width: 20.8334%;\"><span style=\"font-weight: 400;\">Least Privilege<\/span><\/td><td style=\"width: 79.1666%;\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Role-based admin controls<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IP whitelisting for backend access<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Download\/export restrictions with approval workflows<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sharing controls with black\/whitelists<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">File format and privacy safeguards<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Configurable external access (e.g., FTP)<\/span><\/li><\/ul><\/td><\/tr><tr><td style=\"width: 20.8334%;\"><span style=\"font-weight: 400;\">Continuous Monitoring<\/span><\/td><td style=\"width: 79.1666%;\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data Protection Mechanism \u2014 If uploaded files contain viruses, the system will alert users and block storage or upload.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detailed audit logs (user activity, folder permissions, sharing records, admin changes)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regular security assessments, including vulnerability scans, code reviews, and penetration testing<\/span><\/li><\/ul><\/td><\/tr><\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d105d23 elementor-widget elementor-widget-text-editor\" data-id=\"d105d23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Interested in how OmniStor enables Zero Trust file management?<\/span><a href=\"https:\/\/www.asuscloud.com\/en\/omnistor\/\"><span style=\"font-weight: 400;\">https:\/\/www.asuscloud.com\/omnistor\/<\/span><\/a><\/p><p><span style=\"font-weight: 400;\">Need a free consultation for a Zero Trust file management solution? &gt;&gt;<\/span><a href=\"https:\/\/www.asuscloud.com\/en\/contact\/\"><span style=\"font-weight: 400;\">https:\/\/www.asuscloud.com\/contact\/<\/span><\/a><\/p><p><span style=\"font-weight: 400; font-size: 10pt;\">\u00a0<\/span><\/p><p><span style=\"font-weight: 400; font-size: 10pt;\">Reference sources:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 10pt;\"><a href=\"https:\/\/www.ithome.com.tw\/news\/167864#:~:text=%E5%9B%9B%E5%A4%A7%E6%94%AF%E6%9F%B1%E7%9A%84%E4%BA%92%E8%A3%9C%E8%88%87%E5%8D%94%E5%90%8C%E6%95%88%E6%87%89%20%E3%80%8A%E5%9C%8B%E5%AE%B6%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E6%88%B0%E7%95%A52025%E3%80%8B%E4%BB%A5%E5%9B%9B%E5%A4%A7%E6%94%AF%E6%9F%B1%E4%BD%9C%E7%82%BA%E5%9C%8B%E5%AE%B6%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E7%9A%84%E6%A0%B9%E5%9F%BA%EF%BC%8C%E5%88%86%E5%88%A5%E7%82%BA%EF%BC%9AResilience%EF%BC%88%E5%85%A8%E7%A4%BE%E6%9C%83%E9%98%B2%E8%A1%9B%E9%9F%8C%E6%80%A7%EF%BC%89%E3%80%81Infrastructure%EF%BC%88%E5%9C%8B%E5%9C%9F%E9%98%B2%E8%A1%9B%E8%88%87%E9%97%9C%E9%8D%B5%E5%9F%BA%E7%A4%8E%E8%A8%AD%E6%96%BD%EF%BC%89%E3%80%81Supply%20Chain%EF%BC%88%E9%97%9C%E9%8D%B5%E7%94%A2%E6%A5%AD%E8%88%87%E4%BE%9B%E6%87%89%E9%8F%88%EF%BC%89%E5%8F%8AEmerging%20Technology%EF%BC%88%E6%96%B0%E8%88%88%E7%A7%91%E6%8A%80%EF%BC%8C%E8%81%9A%E7%84%A6%E4%BA%BA%E5%B7%A5%E6%99%BA%E6%85%A7%E6%87%89%E7%94%A8%E8%88%87%E5%AE%89%E5%85%A8%EF%BC%89%EF%BC%8C%E9%80%99%E5%9B%9B%E5%A4%A7%E6%94%AF%E6%9F%B1%E5%90%88%E7%A8%B1%E7%82%BARISE%EF%BC%8C%E5%85%B6%E5%85%A7%E6%B6%B5%E4%B8%8D%E5%83%85%E6%B6%B5%E8%93%8B%E9%98%B2%E7%A6%A6%E8%88%87%E6%87%89%E8%AE%8A%E8%83%BD%E5%8A%9B%EF%BC%8C%E6%9B%B4%E5%BB%B6%E4%BC%B8%E5%88%B0%E8%B7%A8%E9%83%A8%E9%96%80%E3%80%81%E8%B7%A8%E7%94%A2%E6%A5%AD%E4%B9%83%E8%87%B3%E5%9C%8B%E9%9A%9B%E9%96%93%E7%9A%84%E5%90%88%E4%BD%9C%EF%BC%8C%E8%97%89%E6%AD%A4%E6%8F%90%E5%8D%87%E5%9C%8B%E5%AE%B6%E6%95%B4%E9%AB%94%E7%9A%84%E8%B3%87%E9%80%9A%E5%AE%89%E5%85%A8%E9%98%B2%E8%AD%B7%E6%B0%B4%E6%BA%96%E3%80%82\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">iThome<\/span><\/a><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/ec.ltn.com.tw\/article\/breakingnews\/4349593\" target=\"_blank\" rel=\"noopener\">https:\/\/ec.ltn.com.tw\/article\/breakingnews\/4349593<\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/cloud.google.com\/learn\/what-is-zero-trust?hl=zh-TW\" target=\"_blank\" rel=\"noopener\">https:\/\/cloud.google.com\/learn\/what-is-zero-trust?hl=zh-TW<\/a><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.informationsecurity.com.tw\/article\/article_detail.aspx?aid=10532\" target=\"_blank\" rel=\"noopener\">https:\/\/www.informationsecurity.com.tw\/article\/article_detail.aspx?aid=10532<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>As businesses undergo digital transformation, adopt remote work, and leverage cloud technologies, traditional \u201ctrust boundaries\u201d are becoming increasingly blurred.<\/p>","protected":false},"author":18,"featured_media":43108,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[76,136],"tags":[135],"class_list":["post-43107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-security","category-ai","tag-2025blog"],"_links":{"self":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/comments?post=43107"}],"version-history":[{"count":23,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43107\/revisions"}],"predecessor-version":[{"id":43333,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43107\/revisions\/43333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/media\/43108"}],"wp:attachment":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/media?parent=43107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/categories?post=43107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/tags?post=43107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}