{"id":43348,"date":"2025-09-12T15:51:05","date_gmt":"2025-09-12T07:51:05","guid":{"rendered":"https:\/\/www.asuscloud.com\/?p=43348"},"modified":"2025-09-12T16:18:47","modified_gmt":"2025-09-12T08:18:47","slug":"%e5%be%9e%e9%98%b2%e7%a6%a6%e5%88%b0%e9%a9%97%e8%ad%89%ef%bc%8c%e7%9c%8b%e9%87%91%e8%9e%8d%e6%a5%ad%e5%a6%82%e4%bd%95%e5%9b%9e%e6%87%89%e8%b3%87%e5%ae%89%e6%96%b0%e9%a2%a8%e9%9a%aa%ef%bc%8c%e5%8a%a0","status":"publish","type":"post","link":"https:\/\/www.asuscloud.com\/en\/20250912\/43348\/","title":{"rendered":"How the financial industry is accelerating the implementation of Zero Trust?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43348\" class=\"elementor elementor-43348\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-512925f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"512925f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-66f5239\" data-id=\"66f5239\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3206b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3206b3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-431ea19\" data-id=\"431ea19\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cb0f0f elementor-widget elementor-widget-text-editor\" data-id=\"8cb0f0f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In today\u2019s era of rapidly developing digital finance, incidents such as data breaches, ransomware attacks, and account takeovers are occurring with alarming frequency, posing unprecedented cybersecurity challenges for the financial sector. Faced with cross-border compliance issues and increasingly diverse threats, the traditional 'perimeter-based defense' model is no longer sufficient. Following the release of the Zero Trust Implementation Guidelines by the Financial Supervisory Commission (FSC) last year, this year the FSC has gone further by promoting the Financial Cloud Security Monitoring Standards, establishing new security benchmarks for the industry. According to iThome, cybersecurity investment in the financial sector grew by 11.2% in 2024 compared to the previous year, with nearly 40% of institutions beginning to invest in Zero Trust identity and device authentication. Zero Trust is rapidly becoming a core strategy for financial institutions worldwide to strengthen cybersecurity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-296a1c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"296a1c5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c7b100c\" data-id=\"c7b100c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c688f74 elementor-widget elementor-widget-heading\" data-id=\"c688f74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why does the financial industry need to adopt a Zero Trust architecture\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-307a9bb elementor-widget elementor-widget-text-editor\" data-id=\"307a9bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">\"The cybersecurity risks currently facing the financial industry can largely be divided into two dimensions. First, with the widespread adoption of digital office and remote collaboration models, along with the industry\u2019s increasingly close interactions with multiple vendors and partners, the frequency of external collaboration and data exchange has surged. As a result, enterprise boundaries have become increasingly blurred, making it far more difficult to securely manage external members and devices.<\/span>\n\n<span style=\"font-weight: 400;\">Secondly, the vulnerabilities within internal environments cannot be overlooked. Once a gap emerges in the enterprise\u2019s cybersecurity defenses, attackers may infiltrate the intranet. Traditional internal networks often lack strict verification and monitoring, creating an issue of 'over-trusting' authorized members and devices. This makes the internal environment the weakest link in the security defense chain.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-46d7d47 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"46d7d47\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0378341\" data-id=\"0378341\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0e539d4 elementor-widget elementor-widget-heading\" data-id=\"0e539d4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Reassess cybersecurity policies with a zero-trust mindset<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-013cfc8 elementor-widget elementor-widget-text-editor\" data-id=\"013cfc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">In light of the aforementioned risks and challenges, enterprises should re-examine their internal cybersecurity policies and architectural processes with a zero-trust mindset, focusing on the following three areas:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Outside-in: Reduce the attack surface and increase defense depth.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inside-out: Expand the protection surface while limiting the impact of potential damage.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhanced visibility: Continuous monitoring and verification.<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">According to the Zero Trust Maturity Model published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Zero Trust capabilities consist of five pillars: identity, devices, network, applications, and data. Enterprises should gradually implement the core principles of Zero Trust across these domains, including never trust by default, continuous verification, and least-privilege access, evolving from manual configurations to full automation, and shifting from passive security policies to proactive governance. The recommended assessment approach is as follows:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identity: Two-factor authentication (2FA), dynamic attribute-based access control, etc.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Devices: Device health and compliance management, such as OS updates and antivirus software updates.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network: End-to-end encrypted transmission, properly segmented network zones, and network connections based on the principle of least privilege.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Applications: Security settings for internal and external applications, adhering to the least-privilege principle.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data: Encryption of sensitive data at rest, data loss prevention, and real-time monitoring of data access activities.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Enterprises can start with high-risk areas and ensure the five pillars work in coordination to build a comprehensive security strategy, continuously verifying all users, devices, applications, and access requests. This layered approach makes it harder for attackers to penetrate, helping reduce the risk of attacks and better protecting valuable corporate secrets and data.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2868e43 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2868e43\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-68d690e\" data-id=\"68d690e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-38c0e5e elementor-widget elementor-widget-heading\" data-id=\"38c0e5e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Beyond Zero Trust Architecture, 4 Key Focus Areas for Financial Institutions in the Future<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbd09bf elementor-widget elementor-widget-text-editor\" data-id=\"bbd09bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The Pros and Cons of AI in Information Security:<\/b><span style=\"font-weight: 400;\">The emergence of AI has made cyber threats and attack techniques increasingly complex, with numerous AI-driven financial fraud incidents reported in recent years. However, when applied to threat detection, automated response, and vulnerability management, AI can significantly enhance both efficiency and security for enterprises. According to iThome, in 2024, 50% of financial institutions began evaluating the feasibility of generative AI applications in finance, while actively raising employees\u2019 cybersecurity awareness when using AI.<\/span><\/li>\n \t<li><b>New Regulations on Electronic Signatures and Identity Verification:<\/b><span style=\"font-weight: 400;\">In response to the expansion of online services, an eKYC-level and business risk mapping has been established. Electronic signatures are now legally equivalent to handwritten signatures, and in the event of private key data leakage or loss, notifications must be issued.<\/span><\/li>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Strengthening Supply Chain Cybersecurity and Compliance Risk Management:<\/b><span style=\"font-weight: 400;\">Financial institutions work with numerous vendors and often face cybersecurity challenges, including lack of information transparency, multi-layered outsourcing, and insufficient security budgets. These issues can create security gaps and hidden risks. Establishing secure data exchange mechanisms and comprehensive activity tracking is essential to ensure cybersecurity compliance and prevent supply chain data risks from impacting business operations.<\/span><\/li>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Post-Quantum Cryptography (PQC) Challenges<\/b><span style=\"font-weight: 400;\">PQC refers to encryption algorithms designed to withstand attacks from large-scale quantum computers. Although such quantum computers are still under development, the \"Harvest Now, Decrypt Later\" (HNDL) threat model means that organizations must begin planning for a quantum-safe future immediately. Financial sectors in countries including the United States, Japan, and Singapore have already started initiating PQC migration projects.<\/span><\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b732ce elementor-widget elementor-widget-heading\" data-id=\"0b732ce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">OmniStor Responds to Financial Sector Zero-Trust Needs with a \u201cData-as-the-Perimeter\u201d<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dbef4c elementor-widget elementor-widget-text-editor\" data-id=\"8dbef4c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">ASUS OmniStor Zero-Trust File Management System leverages multiple layers of data security defenses to provide the financial sector\u2014handling vast amounts of sensitive information\u2014with an integrated, centralized data management platform. By addressing hidden internal and external data threats, it delivers applications that combine robust protection with comprehensive audit trails, extending zero-trust principles to every node while enforcing core concepts such as least privilege and continuous verification. OmniStor offers solutions that safeguard both internal and external data, including:<\/span><\/p><p><span style=\"font-weight: 400;\">A. Internal Strengthened Controls<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate member accounts and credentials to enhance login security.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access permissions control to ensure data does not leave the system.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comprehensive activity tracking to ensure compliance and monitoring.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">B. External Proactive Defense<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data security settings to prevent confidential information from leaking.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypted storage and transmission for safer file exchanges.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ransomware detection to halt synchronization upon abnormal behavior.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">In addition, ASUS Group recently announced that its independently developed post-quantum cryptography (PQC) algorithm has officially passed the validation and standardization by the U.S. National Institute of Standards and Technology (NIST). Moving forward, it will be widely integrated across ASUS product lines, providing enterprises and individual users worldwide with cutting-edge quantum-resistant cybersecurity solutions, continuously enhancing the resilience of financial security.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d105d23 elementor-widget elementor-widget-text-editor\" data-id=\"d105d23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Want to learn more about the OmniStor Zero Trust File Management System? &gt;&gt;<\/span><a href=\"https:\/\/www.asuscloud.com\/en\/omnistor\/\"><span style=\"font-weight: 400;\">https:\/\/www.asuscloud.com\/omnistor\/<\/span><\/a><br \/><span style=\"font-weight: 400;\">Need a free consultation for a Zero Trust file management solution? &gt;&gt;<\/span><a href=\"https:\/\/www.asuscloud.com\/en\/contact\/\"><span style=\"font-weight: 400;\">https:\/\/www.asuscloud.com\/contact\/<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18917cb elementor-widget elementor-widget-text-editor\" data-id=\"18917cb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400; font-size: 8pt;\">Reference sources:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 8pt;\"><span style=\"font-weight: 400;\">iThome: <\/span><a href=\"https:\/\/www.ithome.com.tw\/article\/162261\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/www.ithome.com.tw\/article\/162261<\/span><\/a><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 8pt;\"><span style=\"font-weight: 400;\">\u201cEmpowering Trust to Co-Create a New Digital Ecosystem\u201d \u2013 2025 Taiwan Digital Trust Forum<\/span><span style=\"font-weight: 400;\">PPT<\/span><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-size: 8pt;\"><span style=\"font-weight: 400;\">ASUS Pressroom:<\/span><a href=\"https:\/\/press.asus.com\/tw\/news\/press-releases\/asus-post-quantum-cryptography-cavp\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/press.asus.com\/tw\/news\/press-releases\/asus-post-quantum-cryptography-cavp\/<\/span><\/a><\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s rapidly evolving digital finance landscape, data breaches and ransomware attacks are occurring with increasing frequency, presenting unprecedented cybersecurity challenges for the financial sector.<\/p>","protected":false},"author":18,"featured_media":43353,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[78,76],"tags":[135],"class_list":["post-43348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industrial-application","category-data-security","tag-2025blog"],"_links":{"self":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/comments?post=43348"}],"version-history":[{"count":11,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43348\/revisions"}],"predecessor-version":[{"id":43360,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/posts\/43348\/revisions\/43360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/media\/43353"}],"wp:attachment":[{"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/media?parent=43348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/categories?post=43348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asuscloud.com\/en\/wp-json\/wp\/v2\/tags?post=43348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}