{"id":9192,"date":"2024-12-04T16:01:48","date_gmt":"2024-12-04T19:01:48","guid":{"rendered":"https:\/\/acrisure.com.br\/insights\/?p=9192"},"modified":"2025-12-16T13:59:38","modified_gmt":"2025-12-16T16:59:38","slug":"zero-trust","status":"publish","type":"post","link":"https:\/\/acrisure.com.br\/insights\/zero-trust\/","title":{"rendered":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Post&#8221; _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Conte\u00fado&#8221; _builder_version=&#8221;4.27.3&#8243; _module_preset=&#8221;default&#8221; text_letter_spacing=&#8221;1px&#8221; custom_margin=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>O modelo Zero Trust (confian\u00e7a zero, em ingl\u00eas) \u00e9 uma abordagem de seguran\u00e7a cibern\u00e9tica baseada no princ\u00edpio de <strong>&#8220;nunca confiar, sempre verificar&#8221;<\/strong>. Em vez de assumir que os sistemas internos s\u00e3o confi\u00e1veis, ele parte do pressuposto de que todas as redes, dispositivos e usu\u00e1rios representam potenciais amea\u00e7as.<\/p>\n<p>Essa l\u00f3gica foi popularizada e definida como um modelo de seguran\u00e7a pelo analista da Forrester Research, <a href=\"https:\/\/www.virtualstarmedia.com\/downloads\/Forrester_zero_trust_DNA.pdf\" target=\"_blank\" rel=\"noopener\">John Kindervag<\/a>, em 2010. No entanto, a ideia por tr\u00e1s desse conceito j\u00e1 existia h\u00e1 algum tempo.<\/p>\n<p><a href=\"https:\/\/scholar.google.co.uk\/citations?view_op=view_citation&amp;hl=en&amp;user=Qz73wh4AAAAJ&amp;citation_for_view=Qz73wh4AAAAJ:u5HHmVD_uO8C\" target=\"_blank\" rel=\"noopener\">Stephen Paul Marsh<\/a> \u00e9 creditado por ter cunhado o termo &#8220;confian\u00e7a zero&#8221; em sua tese de doutorado em 1994. Kindervag, por sua vez, utilizou o termo para descrever uma abordagem mais estruturada e abrangente, que se tornou amplamente adotada por empresas e organiza\u00e7\u00f5es.<\/p>\n<h2><strong>Por que o Zero Trust se tornou t\u00e3o importante?<\/strong><\/h2>\n<p>A ado\u00e7\u00e3o do trabalho remoto e o uso de dispositivos pessoais para acessar redes corporativas t\u00eam desafiado os modelos de seguran\u00e7a tradicionais, pois ampliam os pontos de vulnerabilidade e dificultam o controle centralizado.<\/p>\n<p>Esse <a href=\"https:\/\/www.cisoadvisor.com.br\/inseguranca-cibernetica-e-desinformacao-lideram-riscos-globais\/\" target=\"_blank\" rel=\"noopener\">cen\u00e1rio tem impulsionado os ataques cibern\u00e9ticos<\/a>, cada vez mais sofisticados e direcionados, o que exige uma abordagem mais proativa e rigorosa para proteger dados e sistemas.<\/p>\n<p>Em resposta a essa realidade, governos e \u00f3rg\u00e3os reguladores t\u00eam exigido que as organiza\u00e7\u00f5es adotem pr\u00e1ticas de seguran\u00e7a mais robustas, com destaque para o modelo Zero Trust.<\/p>\n<h5><strong>Princ\u00edpios b\u00e1sicos do Zero Trust:<\/strong><\/h5>\n<ul>\n<li><strong>N\u00e3o confiar, sempre verificar:<\/strong> cada solicita\u00e7\u00e3o de acesso a recursos deve ser autenticada e autorizada, independentemente da origem.<\/li>\n<\/ul>\n<ul>\n<li><strong>M\u00ednimo privil\u00e9gio: <\/strong>os usu\u00e1rios devem ter acesso apenas aos recursos estritamente necess\u00e1rios para realizar suas tarefas.<\/li>\n<\/ul>\n<ul>\n<li><strong>Seguran\u00e7a em camadas:<\/strong> m\u00faltiplas camadas de seguran\u00e7a devem ser implementadas para proteger dados e sistemas.<\/li>\n<\/ul>\n<ul>\n<li><strong>Microsegmenta\u00e7\u00e3o: <\/strong>a rede deve ser dividida em segmentos menores, limitando o impacto de uma poss\u00edvel viola\u00e7\u00e3o.<\/li>\n<\/ul>\n<h3>Leia tamb\u00e9m<\/h3>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/empresa-ataques-ciberneticos\/\" target=\"_blank\" rel=\"noopener\">A sua empresa pode ser o pr\u00f3ximo alvo de ataques cibern\u00e9ticos<\/a><\/li>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/seguranca-virtual-nas-empresas\/\">5 dicas para aumentar a seguran\u00e7a virtual nas empresas<\/a><\/li>\n<li><a href=\"https:\/\/acrisure.com.br\/insights\/byod-riscos-ciberseguranca\/\">BYOD e os riscos para a ciberseguran\u00e7a corporativa<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><strong>Desafios do Zero Trust<\/strong><\/h3>\n<p>Embora promissor, o modelo Zero Trust apresenta desafios na sua implementa\u00e7\u00e3o. A <strong>complexidade t\u00e9cnica<\/strong> \u00e9 um dos principais, pois exige a integra\u00e7\u00e3o de diversas ferramentas e a reestrutura\u00e7\u00e3o dos processos internos para garantir a aplica\u00e7\u00e3o rigorosa de controles de seguran\u00e7a.<\/p>\n<p>Al\u00e9m disso, os <strong>custos iniciais<\/strong> podem ser um impeditivo, j\u00e1 que a ado\u00e7\u00e3o desse modelo demanda investimentos substanciais em tecnologia e no treinamento da equipe para lidar com as novas ferramentas e protocolos.<\/p>\n<p>Por fim, a <strong>resist\u00eancia cultural<\/strong> tamb\u00e9m \u00e9 um desafio, uma vez que muitos funcion\u00e1rios podem se opor a pr\u00e1ticas que dificultam o acesso inicial aos sistemas, impactando a produtividade no curto prazo.<\/p>\n<h3><strong>Como superar esses obst\u00e1culos?<\/strong><\/h3>\n<p>Apesar dos obst\u00e1culos, o modelo Zero Trust pode ser adaptado \u00e0s especificidades de cada empresa. A implementa\u00e7\u00e3o exige um <strong>planejamento cuidadoso<\/strong>, <strong>abordagem gradual<\/strong> e <strong>forte apoio da lideran\u00e7a<\/strong>.<\/p>\n<p>Ao transformar a seguran\u00e7a em uma prioridade cont\u00ednua, as empresas podem construir uma postura de defesa mais proativa e resiliente contra as <a href=\"https:\/\/acrisure.com.br\/insights\/category\/riscos-ciberneticos\/\" target=\"_blank\" rel=\"noopener\">amea\u00e7as cibern\u00e9ticas<\/a> em constante evolu\u00e7\u00e3o.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de &#8220;nunca confiar&#8221;.<\/p>\n","protected":false},"author":1,"featured_media":11828,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[42],"tags":[19],"class_list":["post-9192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-riscos-ciberneticos","tag-gestao-de-riscos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?<\/title>\n<meta name=\"description\" content=\"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de &quot;nunca confiar&quot;.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acrisure.com.br\/insights\/zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?\" \/>\n<meta property=\"og:description\" content=\"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de &quot;nunca confiar&quot;.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acrisure.com.br\/insights\/zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Insights \/ Acrisure\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itsseg\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-04T19:01:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T16:59:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"publishouse\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"publishouse\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/\"},\"author\":{\"name\":\"publishouse\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"headline\":\"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?\",\"datePublished\":\"2024-12-04T19:01:48+00:00\",\"dateModified\":\"2025-12-16T16:59:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/\"},\"wordCount\":659,\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/cyber.png\",\"keywords\":[\"Gest\u00e3o de Riscos\"],\"articleSection\":[\"Riscos cibern\u00e9ticos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/\",\"name\":\"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/cyber.png\",\"datePublished\":\"2024-12-04T19:01:48+00:00\",\"dateModified\":\"2025-12-16T16:59:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\"},\"description\":\"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de \\\"nunca confiar\\\".\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/cyber.png\",\"contentUrl\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/wp-content\\\/uploads\\\/cyber.png\",\"width\":1920,\"height\":640,\"caption\":\"Miniaturas de t\u00e9cnicos reparando cabo de rede\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#website\",\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/\",\"name\":\"Insights \\\/ Acrisure\",\"description\":\"Portal de Not\u00edcias e Conte\u00fado\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/#\\\/schema\\\/person\\\/ae285068bde2d94bbb6b0692760fb361\",\"name\":\"publishouse\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g\",\"caption\":\"publishouse\"},\"sameAs\":[\"https:\\\/\\\/acrisure.com.br\\\/insights\"],\"url\":\"https:\\\/\\\/acrisure.com.br\\\/insights\\\/author\\\/publishouse\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?","description":"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de \"nunca confiar\".","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acrisure.com.br\/insights\/zero-trust\/","og_locale":"pt_BR","og_type":"article","og_title":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?","og_description":"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de \"nunca confiar\".","og_url":"https:\/\/acrisure.com.br\/insights\/zero-trust\/","og_site_name":"Insights \/ Acrisure","article_publisher":"https:\/\/www.facebook.com\/itsseg\/","article_published_time":"2024-12-04T19:01:48+00:00","article_modified_time":"2025-12-16T16:59:38+00:00","og_image":[{"width":1920,"height":640,"url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png","type":"image\/png"}],"author":"publishouse","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"publishouse","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#article","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/"},"author":{"name":"publishouse","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"headline":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?","datePublished":"2024-12-04T19:01:48+00:00","dateModified":"2025-12-16T16:59:38+00:00","mainEntityOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/"},"wordCount":659,"image":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png","keywords":["Gest\u00e3o de Riscos"],"articleSection":["Riscos cibern\u00e9ticos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/","url":"https:\/\/acrisure.com.br\/insights\/zero-trust\/","name":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?","isPartOf":{"@id":"https:\/\/acrisure.com.br\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png","datePublished":"2024-12-04T19:01:48+00:00","dateModified":"2025-12-16T16:59:38+00:00","author":{"@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361"},"description":"Os ataques cibern\u00e9ticos tem impulsionado o Zero Trust, uma abordagem de seguran\u00e7a virtual baseada no princ\u00edpio de \"nunca confiar\".","breadcrumb":{"@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acrisure.com.br\/insights\/zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#primaryimage","url":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png","contentUrl":"https:\/\/acrisure.com.br\/insights\/wp-content\/uploads\/cyber.png","width":1920,"height":640,"caption":"Miniaturas de t\u00e9cnicos reparando cabo de rede"},{"@type":"BreadcrumbList","@id":"https:\/\/acrisure.com.br\/insights\/zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/acrisure.com.br\/insights\/"},{"@type":"ListItem","position":2,"name":"Zero Trust: por que nunca mais confiar em ningu\u00e9m na sua rede?"}]},{"@type":"WebSite","@id":"https:\/\/acrisure.com.br\/insights\/#website","url":"https:\/\/acrisure.com.br\/insights\/","name":"Insights \/ Acrisure","description":"Portal de Not\u00edcias e Conte\u00fado","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acrisure.com.br\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/acrisure.com.br\/insights\/#\/schema\/person\/ae285068bde2d94bbb6b0692760fb361","name":"publishouse","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/28cbb1595e2bba31bae82123e62ffe5e807440c64f2e05ed85a7bd654289e026?s=96&d=mm&r=g","caption":"publishouse"},"sameAs":["https:\/\/acrisure.com.br\/insights"],"url":"https:\/\/acrisure.com.br\/insights\/author\/publishouse\/"}]}},"_links":{"self":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/9192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/comments?post=9192"}],"version-history":[{"count":6,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/9192\/revisions"}],"predecessor-version":[{"id":16659,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/posts\/9192\/revisions\/16659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media\/11828"}],"wp:attachment":[{"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/media?parent=9192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/categories?post=9192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acrisure.com.br\/insights\/wp-json\/wp\/v2\/tags?post=9192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}