{"id":361,"date":"2024-03-08T05:53:14","date_gmt":"2024-03-08T05:53:14","guid":{"rendered":"https:\/\/www2.apexsecurity.nl\/?p=361"},"modified":"2025-01-17T12:58:50","modified_gmt":"2025-01-17T12:58:50","slug":"wat-is-zero-trust-security","status":"publish","type":"post","link":"https:\/\/www.apexsecurity.nl\/en\/wat-is-zero-trust-security\/","title":{"rendered":"Wat is Zero Trust Security"},"content":{"rendered":"<p>In het hedendaagse digitale landschap, dat steeds meer onderling verbonden en complexer wordt, zijn traditionele beveiligingsmodellen niet langer toereikend om bescherming te bieden tegen evoluerende cyberbedreigingen. Dat is waar Zero Trust Security om de hoek komt kijken. Zero Trust is een beveiligingsmodel gebaseerd op het principe \u201cvertrouw nooit, controleer altijd\u201d, dat ervan uitgaat dat bedreigingen zowel binnen als buiten het netwerk kunnen bestaan. Laten we eens dieper ingaan op wat Zero Trust Security is en waarom het essentieel is voor moderne organisaties:<\/p>\n\n\n\n<p><strong>Wat is Zero Trust Security?<\/strong><br>Zero Trust Security is een cyberbeveiligingsraamwerk dat het traditionele perimetergebaseerde beveiligingsmodel uitdaagt door elke gebruiker, elk apparaat en elke netwerkbron als niet-vertrouwd te behandelen, ongeacht hun locatie. In een Zero Trust-architectuur zijn beslissingen over toegangscontrole gebaseerd op voortdurende authenticatie, toegang met de laagste rechten en informatie over bedreigingen in realtime, in plaats van statische netwerkperimeters.<\/p>\n\n\n\n<p>Belangrijkste principes van Zero Trust beveiliging<br>Continue authenticatie: Zero Trust Security vereist voortdurende authenticatie van gebruikers en apparaten om hun identiteit te verifi\u00ebren en hun betrouwbaarheid te beoordelen voordat toegang wordt verleend tot gevoelige bronnen. Dit zorgt ervoor dat alleen bevoegde gebruikers met geldige referenties toegang hebben tot kritieke gegevens en toepassingen.<\/p>\n\n\n\n<p><strong>Toegang met zo min mogelijk privileges<\/strong><br>Zero Trust Security volgt het principe van toegang met minimale privileges, waarbij gebruikers het minimale toegangsniveau krijgen dat nodig is om hun taken uit te voeren. Door de toegang te beperken tot alleen het noodzakelijke, kunnen organisaties het risico op onbevoegde toegang en datalekken verkleinen.<\/p>\n\n\n\n<p><strong>Microsegmentatie<\/strong><br>Zero Trust Security vertrouwt op microsegmentatie om netwerkbronnen op te delen in kleinere, ge\u00efsoleerde segmenten, elk met hun eigen beveiligingscontroles en toegangsbeleid. Dit beperkt de zijwaartse beweging van bedreigingen binnen het netwerk en sluit potenti\u00eble beveiligingslekken in.<\/p>\n\n\n\n<p>Informatie over bedreigingen in realtime<br>Zero Trust Security maakt gebruik van realtime informatie over bedreigingen en analyses om continu het netwerkverkeer te bewaken en potenti\u00eble beveiligingsrisico\u2019s te identificeren. Door gedragspatronen te analyseren en anomalie\u00ebn te detecteren, kunnen organisaties proactief reageren op opkomende bedreigingen en risico\u2019s in realtime beperken.<\/p>\n\n\n\n<p><strong>Voordelen van Zero Trust Security<\/strong><br>Verbeterde beveiliging: Zero Trust Security biedt uitgebreide bescherming tegen bedreigingen van binnenuit, externe aanvallers en zijwaartse bewegingen binnen het netwerk, waardoor het risico op gegevensinbreuken en ongeautoriseerde toegang wordt verkleind.<\/p>\n\n\n\n<p><strong>Verbeterde compliance<\/strong><br>Zero Trust Security helpt organisaties te voldoen aan wettelijke vereisten, zoals GDPR en HIPAA, door strenge toegangscontroles en voortdurende bewaking van gevoelige gegevens te implementeren.<\/p>\n\n\n\n<p><strong>Flexibiliteit en schaalbaarheid<\/strong><br>Zero Trust Security is flexibel en schaalbaar, zodat organisaties hun beveiligingsbeleid en toegangscontroles kunnen aanpassen aan veranderende bedreigingen en bedrijfsvereisten.<\/p>\n\n\n\n<p>Concluderend biedt Zero Trust Security een proactieve en adaptieve benadering van cyberbeveiliging, die ervoor zorgt dat organisaties hun waardevolle activa en gevoelige gegevens kunnen beschermen in het dynamische bedreigingslandschap van vandaag. Door Zero Trust-principes en best practices te implementeren, kunnen organisaties een robuuste beveiligingshouding instellen die prioriteit geeft aan voortdurende authenticatie, toegang met minimale rechten en informatie over bedreigingen in realtime.<\/p>\n\n\n\n<p>Vertaald met DeepL.com (gratis versie)<\/p>","protected":false},"excerpt":{"rendered":"<p>In het hedendaagse digitale landschap, dat steeds meer onderling verbonden en complexer wordt, zijn traditionele beveiligingsmodellen niet langer toereikend om bescherming te [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Wat is Zero Trust Security? | Apex Security<\/title>\n<meta name=\"description\" content=\"Zero Trust Security is een beveiligingsmodel dat ervan uitgaat dat bedreigingen zowel binnen als buiten het netwerk kunnen bestaan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apexsecurity.nl\/en\/wat-is-zero-trust-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wat is Zero Trust Security? | Apex Security\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Security is een beveiligingsmodel dat ervan uitgaat dat bedreigingen zowel binnen als buiten het netwerk kunnen bestaan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apexsecurity.nl\/en\/wat-is-zero-trust-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Apex Security Experts in Cyber\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-08T05:53:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-17T12:58:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Peter Landegent\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter Landegent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/\"},\"author\":{\"name\":\"Peter Landegent\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/e5569e7eb07cfcdf39b4daf071a3bb51\"},\"headline\":\"Wat is Zero Trust Security\",\"datePublished\":\"2024-03-08T05:53:14+00:00\",\"dateModified\":\"2025-01-17T12:58:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Blog-ZT-adoption.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/\",\"name\":\"Wat is Zero Trust Security? | Apex Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Blog-ZT-adoption.png\",\"datePublished\":\"2024-03-08T05:53:14+00:00\",\"dateModified\":\"2025-01-17T12:58:50+00:00\",\"description\":\"Zero Trust Security is een beveiligingsmodel dat ervan uitgaat dat bedreigingen zowel binnen als buiten het netwerk kunnen bestaan.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Blog-ZT-adoption.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Blog-ZT-adoption.png\",\"width\":1200,\"height\":600,\"caption\":\"Blog-ZT-adoption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wat-is-zero-trust-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wat is Zero Trust Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#website\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"name\":\"Apex Security\",\"description\":\"Fortifying Your Digital Future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apexsecurity.nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#organization\",\"name\":\"Apex Security\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.apexsecurity.nl\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Apex-logo.png\",\"width\":1272,\"height\":431,\"caption\":\"Apex Security\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/apex-security-b-v\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apexsecurity.nl\\\/#\\\/schema\\\/person\\\/e5569e7eb07cfcdf39b4daf071a3bb51\",\"name\":\"Peter Landegent\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g\",\"caption\":\"Peter Landegent\"},\"url\":\"https:\\\/\\\/www.apexsecurity.nl\\\/en\\\/author\\\/petlan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Zero Trust Security? | Apex Security","description":"Zero Trust Security is a security model that assumes that threats can exist both inside and outside the network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apexsecurity.nl\/en\/wat-is-zero-trust-security\/","og_locale":"en_US","og_type":"article","og_title":"Wat is Zero Trust Security? | Apex Security","og_description":"Zero Trust Security is een beveiligingsmodel dat ervan uitgaat dat bedreigingen zowel binnen als buiten het netwerk kunnen bestaan.","og_url":"https:\/\/www.apexsecurity.nl\/en\/wat-is-zero-trust-security\/","og_site_name":"Apex Security Experts in Cyber","article_published_time":"2024-03-08T05:53:14+00:00","article_modified_time":"2025-01-17T12:58:50+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png","type":"image\/png"}],"author":"Peter Landegent","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter Landegent","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#article","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/"},"author":{"name":"Peter Landegent","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/e5569e7eb07cfcdf39b4daf071a3bb51"},"headline":"Wat is Zero Trust Security","datePublished":"2024-03-08T05:53:14+00:00","dateModified":"2025-01-17T12:58:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/","url":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/","name":"What is Zero Trust Security? | Apex Security","isPartOf":{"@id":"https:\/\/www.apexsecurity.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#primaryimage"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png","datePublished":"2024-03-08T05:53:14+00:00","dateModified":"2025-01-17T12:58:50+00:00","description":"Zero Trust Security is a security model that assumes that threats can exist both inside and outside the network.","breadcrumb":{"@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#primaryimage","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Blog-ZT-adoption.png","width":1200,"height":600,"caption":"Blog-ZT-adoption"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apexsecurity.nl\/wat-is-zero-trust-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.apexsecurity.nl\/"},{"@type":"ListItem","position":2,"name":"Wat is Zero Trust Security"}]},{"@type":"WebSite","@id":"https:\/\/www.apexsecurity.nl\/#website","url":"https:\/\/www.apexsecurity.nl\/","name":"Apex Security","description":"Fortifying Your Digital Future","publisher":{"@id":"https:\/\/www.apexsecurity.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apexsecurity.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apexsecurity.nl\/#organization","name":"Apex Security","url":"https:\/\/www.apexsecurity.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","contentUrl":"https:\/\/www.apexsecurity.nl\/wp-content\/uploads\/2024\/03\/Apex-logo.png","width":1272,"height":431,"caption":"Apex Security"},"image":{"@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/apex-security-b-v"]},{"@type":"Person","@id":"https:\/\/www.apexsecurity.nl\/#\/schema\/person\/e5569e7eb07cfcdf39b4daf071a3bb51","name":"Peter Landegent:","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a8395cb7580c451a41bb5c51522635c91b02f87d4a9b5cc1ea2051144cfe7a6?s=96&d=mm&r=g","caption":"Peter Landegent"},"url":"https:\/\/www.apexsecurity.nl\/en\/author\/petlan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":5,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/361\/revisions"}],"predecessor-version":[{"id":8531,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/posts\/361\/revisions\/8531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media\/363"}],"wp:attachment":[{"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/categories?post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apexsecurity.nl\/en\/wp-json\/wp\/v2\/tags?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}