{"id":487,"date":"2023-12-04T10:00:00","date_gmt":"2023-12-04T10:00:00","guid":{"rendered":"https:\/\/jacar.es\/zero-trust-fundamentos\/"},"modified":"2023-12-04T10:00:00","modified_gmt":"2023-12-04T10:00:00","slug":"zero-trust-fundamentos","status":"publish","type":"post","link":"https:\/\/jacar.es\/en\/zero-trust-fundamentos\/","title":{"rendered":"Zero Trust: Principles to Stop Trusting the Network"},"content":{"rendered":"<p><strong>Zero Trust<\/strong> has become one of the most vendor-sold terms in security in recent years. Every product presents itself as \u201cthe definitive Zero Trust solution\u201d. Reality is that Zero Trust <strong>isn\u2019t a product<\/strong>, it\u2019s an <strong>architecture<\/strong> implemented with many pieces. We cover the real principles behind the name, the difference from perimeter security, and typical mistakes in adoption.<\/p>\n<h2 id=\"the-paradigm-shift\">The Paradigm Shift<\/h2>\n<p>Classic perimeter security assumes:<\/p>\n<ul>\n<li>There\u2019s a \u201c<strong>trusted internal network<\/strong>\u201d behind the firewall.<\/li>\n<li>A \u201c<strong>dangerous external network<\/strong>\u201d outside.<\/li>\n<li>If you\u2019re inside, you\u2019re trusted; if outside, you authenticate to enter.<\/li>\n<\/ul>\n<p>This model has been around for decades. Worked in offices with wired desktops and local datacenter. But fails in 2023:<\/p>\n<ul>\n<li>Employees working from home, caf\u00e9s, travel \u2014 the \u201cperimeter\u201d disappears.<\/li>\n<li>SaaS and cloud \u2014 critical resources live outside the firewall.<\/li>\n<li>Attackers who compromise a single endpoint inside the perimeter and move laterally with implicit trust.<\/li>\n<li>Insider leaks \u2014 the \u201cinside = trusted\u201d model doesn\u2019t protect against legitimate abuse of valid credentials.<\/li>\n<\/ul>\n<p>Zero Trust eliminates the assumption of trust by location. <strong>Every request is verified as if it came from an untrusted network<\/strong>, regardless of where it originates.<\/p>\n<h2 id=\"the-five-principles\">The Five Principles<\/h2>\n<p>Different sources formulate Zero Trust slightly differently. A clear synthesis:<\/p>\n<h3 id=\"verify-explicitly\">1. Verify Explicitly<\/h3>\n<p>Every access requires strong authentication and authorisation. There are no implicit \u201ctrust tickets\u201d. Combine user identity, device identity, context (time, location, behaviour), and assessed risk.<\/p>\n<p>In practice: MFA always, not just at initial login; short-lived tokens; reauthentication for sensitive actions.<\/p>\n<h3 id=\"least-privilege\">2. Least Privilege<\/h3>\n<p>Each identity receives the minimum permissions necessary for its current function, no more. And it receives them <strong>just-in-time<\/strong> \u2014 granted when needed, removed after.<\/p>\n<p>In practice: granular roles, temporary permissions for administrative tasks, periodic review of accumulated permissions.<\/p>\n<h3 id=\"assume-compromise\">3. Assume Compromise<\/h3>\n<p>Design thinking there\u2019s already an attacker inside the network. The question isn\u2019t \u201chow do I prevent them entering?\u201d but \u201cwhat can an attacker who\u2019s already in do before I detect them?\u201d.<\/p>\n<p>In practice: microsegmentation, lateral-movement monitoring, behavioural-anomaly detection.<\/p>\n<h3 id=\"validate-the-device\">4. Validate the Device<\/h3>\n<p>It\u2019s not enough that the user is legitimate \u2014 the device they access from must also be in known, compliant state. Without critical patch, without antivirus, without disk encryption: restricted or denied access.<\/p>\n<p>In practice: MDM\/EDR reporting device posture; access policies conditioned on that posture.<\/p>\n<h3 id=\"continuous-visibility-and-analytics\">5. Continuous Visibility and Analytics<\/h3>\n<p>Without rich telemetry and continuous analysis, the previous principles are aspirations. Centralised logs, normal-behaviour metrics, alerts on deviations.<\/p>\n<p>In practice: SIEM, UEBA (User and Entity Behavior Analytics), automated response to clear indicators.<\/p>\n<h2 id=\"googles-beyondcorp-case\">Google\u2019s BeyondCorp Case<\/h2>\n<p><a href=\"https:\/\/cloud.google.com\/beyondcorp\">BeyondCorp<\/a> is the most documented and referenced Zero Trust implementation. Google built it after the 2009 incident (Operation Aurora). Practical principles:<\/p>\n<ul>\n<li><strong>Eliminated VPN<\/strong> for internal employees. Access to internal applications happens over the Internet with strong authentication.<\/li>\n<li><strong>Device identity<\/strong> checked at every access (x509 certificates installed on every corporate device).<\/li>\n<li><strong>Conditional access<\/strong> based on device posture, user identity, context.<\/li>\n<li><strong>No \u201ctrusted network\u201d<\/strong>. The internal corporate network gets the same treatment as the public Internet.<\/li>\n<\/ul>\n<p>For Google it worked because they had scale to build the infrastructure. For smaller companies, products like Cloudflare Access, Tailscale, ZScaler, or Microsoft Entra Conditional Access offer similar layers without building from scratch.<\/p>\n<h2 id=\"common-adoption-mistakes\">Common Adoption Mistakes<\/h2>\n<p>After several projects, the mistakes most repeated:<\/p>\n<ul>\n<li><strong>Buy a product and declare Zero Trust<\/strong>. No product gives you Zero Trust. Implementation involves changes in identity, devices, network, applications, and processes.<\/li>\n<li><strong>Start with everything at once<\/strong>. Covering every application with Zero Trust policies from day one collapses the team. Start with one critical application or a user group.<\/li>\n<li><strong>Forget the human factor<\/strong>. Aggressive MFA and frequent reauthentications can be legitimate but also enrage users. Find the balance \u2014 friction where it matters, not everywhere.<\/li>\n<li><strong>MFA without device verification<\/strong>. MFA on a compromised device remains vulnerable. If you only add MFA, you\u2019re not doing complete Zero Trust.<\/li>\n<li><strong>No behaviour telemetry<\/strong>. Without continuous visibility, principles are theoretical. Investment in logging and analysis is fundamental.<\/li>\n<li><strong>Not protecting services from each other<\/strong>. Microservices that trust each other because \u201cthey\u2019re in the same VPC\u201d reproduce the perimeter model at internal scale. Service-to-service also needs mutual authentication (mTLS) and authorisation.<\/li>\n<\/ul>\n<h2 id=\"pragmatic-roadmap\">Pragmatic Roadmap<\/h2>\n<p>A reasonable sequence to start:<\/p>\n<ol type=\"1\">\n<li><strong>Universal MFA<\/strong> for all employees, all services. The most impactful piece with the most manageable effort.<\/li>\n<li><strong>Centralised Single Sign-On<\/strong> (Authentik, Okta, Microsoft Entra) \u2014 reduces friction and enables consistent policies.<\/li>\n<li><strong>Device identity<\/strong> via MDM and certificates.<\/li>\n<li><strong>Eliminate VPN for internal web apps<\/strong> via an identity proxy (Cloudflare Access, Authentik with forward auth).<\/li>\n<li><strong>Internal-network microsegmentation<\/strong> with explicit policies \u2014 start by separating production from development.<\/li>\n<li><strong>Service-to-service mTLS<\/strong> via service mesh (Istio, Linkerd) or manual sidecar.<\/li>\n<li><strong>SIEM and continuous detection<\/strong> over all of the above.<\/li>\n<\/ol>\n<p>Each step is a project in itself. An average organisation takes 2-4 years to cover the full roadmap.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>Zero Trust is a cultural and architectural change, not a purchase. Well implemented, it drastically reduces the blast radius of incidents and adapts better to distributed-work and cloud reality. Poorly implemented \u2014 buying a product and declaring victory \u2014 it just adds friction without improving protection. Start with the principle most impactful in your context, measure, and advance incrementally.<\/p>\n<p>Follow us on jacar.es for more on security architecture, identity, and modern defence models.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust isn&#8217;t a product, it&#8217;s an architecture. The five principles governing a model where nothing is trusted by default, not even the internal network.<\/p>\n","protected":false},"author":1,"featured_media":508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[276,278,277,279,137,138],"class_list":["post-487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-beyondcorp","tag-device-trust","tag-mfa","tag-microsegmentacion","tag-seguridad","tag-zero-trust"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"en","enabled_languages":["es","en"],"languages":{"es":{"title":true,"content":true,"excerpt":true},"en":{"title":true,"content":true,"excerpt":true}}},"gutentor_comment":0,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust: Principles to Stop Trusting the Network - Jacar<\/title>\n<meta name=\"description\" content=\"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacar.es\/zero-trust-fundamentos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust: Principles to Stop Trusting the Network - Jacar\" \/>\n<meta property=\"og:description\" content=\"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacar.es\/zero-trust-fundamentos\/\" \/>\n<meta property=\"og:site_name\" content=\"Jacar\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2020\/09\/favicon.png\" \/>\n\t<meta property=\"og:image:width\" content=\"252\" \/>\n\t<meta property=\"og:image:height\" content=\"229\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"javi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"javi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/\"},\"author\":{\"name\":\"javi\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/person\\\/54a7f7b4224b38fafc9866eb3e614208\"},\"headline\":\"Zero Trust: Principles to Stop Trusting the Network\",\"datePublished\":\"2023-12-04T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/\"},\"wordCount\":1898,\"publisher\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/20000425\\\/jwp-1325074-16169.jpg\",\"keywords\":[\"beyondcorp\",\"device trust\",\"mfa\",\"microsegmentaci\u00f3n\",\"seguridad\",\"zero trust\"],\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/\",\"url\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/\",\"name\":\"Zero Trust: Principles to Stop Trusting the Network - Jacar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/20000425\\\/jwp-1325074-16169.jpg\",\"datePublished\":\"2023-12-04T10:00:00+00:00\",\"description\":\"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/20000425\\\/jwp-1325074-16169.jpg\",\"contentUrl\":\"https:\\\/\\\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/20000425\\\/jwp-1325074-16169.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Cerradura digital sobre c\u00f3digo binario representando seguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jacar.es\\\/zero-trust-fundamentos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/jacar.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust: principios para dejar de confiar en la red\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#website\",\"url\":\"https:\\\/\\\/jacar.es\\\/\",\"name\":\"Jacar\",\"description\":\"Passion for Technology\",\"publisher\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jacar.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#organization\",\"name\":\"Jacar\",\"url\":\"https:\\\/\\\/jacar.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/jacar.es\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/jacar.es\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/favicon.png\",\"width\":252,\"height\":229,\"caption\":\"Jacar\"},\"image\":{\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/javiercanetearroyo\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jacar.es\\\/#\\\/schema\\\/person\\\/54a7f7b4224b38fafc9866eb3e614208\",\"name\":\"javi\",\"sameAs\":[\"https:\\\/\\\/jacar.es\"],\"url\":\"https:\\\/\\\/jacar.es\\\/en\\\/author\\\/javi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust: Principles to Stop Trusting the Network - Jacar","description":"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacar.es\/zero-trust-fundamentos\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust: Principles to Stop Trusting the Network - Jacar","og_description":"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.","og_url":"https:\/\/jacar.es\/zero-trust-fundamentos\/","og_site_name":"Jacar","article_published_time":"2023-12-04T10:00:00+00:00","og_image":[{"width":252,"height":229,"url":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2020\/09\/favicon.png","type":"image\/png"}],"author":"javi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"javi","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#article","isPartOf":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/"},"author":{"name":"javi","@id":"https:\/\/jacar.es\/#\/schema\/person\/54a7f7b4224b38fafc9866eb3e614208"},"headline":"Zero Trust: Principles to Stop Trusting the Network","datePublished":"2023-12-04T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/"},"wordCount":1898,"publisher":{"@id":"https:\/\/jacar.es\/#organization"},"image":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#primaryimage"},"thumbnailUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2023\/12\/20000425\/jwp-1325074-16169.jpg","keywords":["beyondcorp","device trust","mfa","microsegmentaci\u00f3n","seguridad","zero trust"],"articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US"},{"@type":["WebPage","ItemPage"],"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/","url":"https:\/\/jacar.es\/zero-trust-fundamentos\/","name":"Zero Trust: Principles to Stop Trusting the Network - Jacar","isPartOf":{"@id":"https:\/\/jacar.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#primaryimage"},"image":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#primaryimage"},"thumbnailUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2023\/12\/20000425\/jwp-1325074-16169.jpg","datePublished":"2023-12-04T10:00:00+00:00","description":"Zero Trust explained: the five fundamental principles, difference with perimeter security, practical cases, and common adoption mistakes.","breadcrumb":{"@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacar.es\/zero-trust-fundamentos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#primaryimage","url":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2023\/12\/20000425\/jwp-1325074-16169.jpg","contentUrl":"https:\/\/jcs-wp-jacar-es.fsn1.your-objectstorage.com\/wp-content\/uploads\/2023\/12\/20000425\/jwp-1325074-16169.jpg","width":1200,"height":800,"caption":"Cerradura digital sobre c\u00f3digo binario representando seguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/jacar.es\/zero-trust-fundamentos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/jacar.es\/"},{"@type":"ListItem","position":2,"name":"Zero Trust: principios para dejar de confiar en la red"}]},{"@type":"WebSite","@id":"https:\/\/jacar.es\/#website","url":"https:\/\/jacar.es\/","name":"Jacar","description":"Passion for Technology","publisher":{"@id":"https:\/\/jacar.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacar.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacar.es\/#organization","name":"Jacar","url":"https:\/\/jacar.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacar.es\/#\/schema\/logo\/image\/","url":"https:\/\/jacar.es\/wp-content\/uploads\/2020\/09\/favicon.png","contentUrl":"https:\/\/jacar.es\/wp-content\/uploads\/2020\/09\/favicon.png","width":252,"height":229,"caption":"Jacar"},"image":{"@id":"https:\/\/jacar.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/javiercanetearroyo\/"]},{"@type":"Person","@id":"https:\/\/jacar.es\/#\/schema\/person\/54a7f7b4224b38fafc9866eb3e614208","name":"javi","sameAs":["https:\/\/jacar.es"],"url":"https:\/\/jacar.es\/en\/author\/javi\/"}]}},"_links":{"self":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts\/487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/comments?post=487"}],"version-history":[{"count":0,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/posts\/487\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/media\/508"}],"wp:attachment":[{"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/media?parent=487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/categories?post=487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacar.es\/en\/wp-json\/wp\/v2\/tags?post=487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}