{"id":1692,"date":"2022-02-15T13:59:08","date_gmt":"2022-02-15T16:59:08","guid":{"rendered":"https:\/\/fcnuvem.com.br\/home\/?p=1692"},"modified":"2025-11-14T08:54:04","modified_gmt":"2025-11-14T11:54:04","slug":"blog-politicas-zero-trust","status":"publish","type":"post","link":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/","title":{"rendered":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o"},"content":{"rendered":"\r\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"205\" class=\"wp-image-1703\" src=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-FCnuvem-PoliticasZeroTrust.png\" alt=\"\" srcset=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-FCnuvem-PoliticasZeroTrust.png 730w, https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Blog-FCnuvem-PoliticasZeroTrust-300x84.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/>\r\n<figcaption><strong>Autor: <\/strong>Renato Azevedo Sant Anna<\/figcaption>\r\n<\/figure>\r\n\r\n\r\n\r\n<p>Zero Trust \u00e9 o conceito em que o constante monitoramento da rede corporativa para eventuais incidentes de seguran\u00e7a, por meio de algoritmos de intelig\u00eancia artificial para a detec\u00e7\u00e3o de anomalias, \u00e9 uma forma de garantir a prote\u00e7\u00e3o desses sistemas contra intrus\u00f5es n\u00e3o autorizadas.<\/p>\r\n\r\n\r\n\r\n<p>Por exemplo, na Internet das Coisas (IoT), com a prolifera\u00e7\u00e3o cada vez maior de sistemas embarcados, como por exemplo em elevadores em modernos pr\u00e9dios comerciais, que podem ser monitorados \u00e0 dist\u00e2ncia por meio dos sensores e em caso de emerg\u00eancia se pode at\u00e9 tentar prestar assist\u00eancia remota.<\/p>\r\n\r\n\r\n\r\n<p>Muitos desses sistemas ao terem acesso \u00e0 conectividade da Internet ficam expostos ao acesso n\u00e3o autorizado, com riscos de tentativas de invas\u00e3o trazerem impactos significativos na disponibilidade desses sistemas, assim como o acesso a dados que podem trazer problemas ao pr\u00f3prio neg\u00f3cio quanto problemas jur\u00eddicos em fun\u00e7\u00e3o das v\u00e1rias legisla\u00e7\u00f5es de prote\u00e7\u00e3o e privacidade de dados que existem atualmente no mundo, como a GDPR Europeia e a <a href=\"https:\/\/fcamara.com\/blog\/lgpd-gdpr\/\" target=\"_blank\" rel=\"noopener\">LGPD<\/a> no Brasil.<\/p>\r\n\r\n\r\n\r\n<p><strong>Pol\u00edticas Zero-Trust<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Para que isso possa ser tratado de forma condizente com a real dimens\u00e3o do problema e do risco potencial representado, uma estrat\u00e9gia multicamadas de seguran\u00e7a \u00e9 necess\u00e1ria de ser adotada, utilizando para isso de pol\u00edticas de acesso chamadas de \u201cZero Trust\u201d, ou seja, se estabelece o acesso autorizado de somente quem tem o devido direito para acessar e ainda apenas quando o acesso \u00e9 leg\u00edtimo para o uso ao qual foi previamente estipulado, sendo sempre realizada a checagem de qual recurso est\u00e1 sendo acessado, n\u00edvel de acesso e a sua finalidade dentro dos contextos previstos nas pol\u00edticas de uso e acesso autorizadas.<\/p>\r\n\r\n\r\n\r\n<p>Sendo assim, quaisquer outras tentativas de login ou acesso fora dos padr\u00f5es previamente estipulados nas pol\u00edticas de seguran\u00e7a s\u00e3o negados por padr\u00e3o. N\u00e3o importando se proveniente de um acesso remoto ou n\u00e3o, nem se dispositivo mobile ou um notebook conectado \u00e0 rede corporativa interna ou por uma rede encriptada, como VPNs (Redes Privadas Virtuais) por exemplo.<\/p>\r\n\r\n\r\n\r\n<p>Com isso, se pode estipular um monitoramento de toda e quaisquer tentativas de acesso e de uso devido dos ativos e recursos desses sistemas de acordo com os par\u00e2metros de seguran\u00e7a adequados e previamente estipulados nas pol\u00edticas de seguran\u00e7a de cada organiza\u00e7\u00e3o.<\/p>\r\n<p><strong>Confira tamb\u00e9m<\/strong>: Entenda a import\u00e2ncia da <a href=\"https:\/\/fcamara.com\/blog\/iso-56001\/\" target=\"_blank\" rel=\"noopener\">Certifica\u00e7\u00e3o ISO 56001<\/a>, que define os requisitos de SGI.<\/p>\r\n\r\n\r\n\r\n<p><strong> Arquitetura de Seguran\u00e7a Multicamadas <\/strong><\/p>\r\n\r\n\r\n\r\n<p>Uma abordagem de seguran\u00e7a multicamadas permite que os riscos sejam minimizados, mas sempre existe o risco das chamadas amea\u00e7as persistentes avan\u00e7adas que permanecem dormentes por longo per\u00edodo de tempo, uma vez que sistemas legados, muitos deles industriais, podem possuir brechas de seguran\u00e7a que podem ser exploradas por terceiros, todo cuidado \u00e9 pouco e segundo artigo publicado na ACM (Associa\u00e7\u00e3o de M\u00e1quinas Computacionais), onde \u00e9 relatado que em 2018, a ISA (Sociedade Internacional de Automa\u00e7\u00e3o) publicou uma s\u00e9rie de recomenda\u00e7\u00f5es materializadas na norma ISA\/IEC 62443, projetadas de forma a desenvolver padr\u00f5es de cyber seguran\u00e7a para aplica\u00e7\u00f5es industriais.<\/p>\r\n\r\n\r\n\r\n<p>Ainda segundo o mesmo artigo da ACM, o NIST (National Institute of Standards and Technology) dos EUA tamb\u00e9m publicou recomenda\u00e7\u00f5es em 2018 relacionadas a garantir a seguran\u00e7a da manufatura industrial focada em detec\u00e7\u00e3o de anomalias e usu\u00e1rios mal-intencionados, a partir de um conceito de detec\u00e7\u00e3o de anomalia comportamental.<\/p>\r\n\r\n\r\n\r\n<p>Por isso mesmo, que um mapeamento de todo o parque de sistemas instalados em parques industriais \u00e9 algo de extrema relev\u00e2ncia para garantir a confidencialidade, integridade e disponibilidade dos sistemas e sua opera\u00e7\u00e3o sem impactos nos processos industriais cr\u00edticos, com a cria\u00e7\u00e3o de uma Estrat\u00e9gia de Seguran\u00e7a de Informa\u00e7\u00e3o, como as oferecidas pela <a href=\"https:\/\/fcnuvem.com.br\/\" target=\"_blank\" rel=\"noreferrer noopener\">FC Nuvem<\/a>, que permita essa prote\u00e7\u00e3o multicamadas num ambiente com pol\u00edticas Zero-Trust.<\/p>\r\n\r\n\r\n\r\n<p>Refer\u00eancias:<\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust<\/a><\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/cacm.acm.org\/magazines\/2019\/10\/239666-protecting-industrial-control-systems\/fulltext\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cacm.acm.org\/magazines\/2019\/10\/239666-protecting-industrial-control-systems\/fulltext <\/a><\/p>\r\n\r\n\r\n\r\n<p><a href=\"https:\/\/blog.fcamara.com.br\/arquitetura-de-seguranca-multicamadas-com-o-uso-de-iiot-industrial\/\" target=\"_blank\" rel=\"noreferrer noopener\">Arquitetura de Seguran\u00e7a multicamadas com o uso de IIoT Industrial (fcamara.com.br)<\/a><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust \u00e9 o conceito em que o constante monitoramento da rede corporativa para eventuais incidentes de seguran\u00e7a,<\/p>\n","protected":false},"author":8,"featured_media":1704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[90],"tags":[405,406,263,394],"post_series":[],"class_list":["post-1692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-ciberseguranca","tag-politicas-zero-trust","tag-seguranca","tag-seguranca-da-informacao","tag-zero-trust","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o\" \/>\n<meta property=\"og:description\" content=\"Zero Trust \u00e9 o conceito em que o constante monitoramento da rede corporativa para eventuais incidentes de seguran\u00e7a,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog da FCamara\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-15T16:59:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T11:54:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png\" \/>\n\t<meta property=\"og:image:width\" content=\"260\" \/>\n\t<meta property=\"og:image:height\" content=\"205\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"fcnuvem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"fcnuvem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\"},\"author\":{\"name\":\"fcnuvem\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a\"},\"headline\":\"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o\",\"datePublished\":\"2022-02-15T16:59:08+00:00\",\"dateModified\":\"2025-11-14T11:54:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\"},\"wordCount\":701,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png\",\"keywords\":[\"pol\u00edticas zero trust\",\"Seguran\u00e7a\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"zero trust\"],\"articleSection\":[\"Cloud &amp; Ciberseguran\u00e7a\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\",\"url\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\",\"name\":\"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o\",\"isPartOf\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png\",\"datePublished\":\"2022-02-15T16:59:08+00:00\",\"dateModified\":\"2025-11-14T11:54:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage\",\"url\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png\",\"contentUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png\",\"width\":260,\"height\":205,\"caption\":\"zero trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/fcamara.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud &amp; Ciberseguran\u00e7a\",\"item\":\"https:\/\/fcamara.com\/blog\/categoria\/cloud-ciberseguranca\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fcamara.com\/blog\/#website\",\"url\":\"https:\/\/fcamara.com\/blog\/\",\"name\":\"Blog da FCamara\",\"description\":\"Esta \u00e9 a \u00e1rea de insights sobre o mercado de tecnologia.\",\"publisher\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fcamara.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\",\"name\":\"Blog da FCamara\",\"url\":\"https:\/\/fcamara.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp\",\"contentUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp\",\"width\":459,\"height\":68,\"caption\":\"Blog da FCamara\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a\",\"name\":\"fcnuvem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"fcnuvem\"},\"url\":\"https:\/\/fcamara.com\/blog\/author\/fcnuvem\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/","og_locale":"pt_BR","og_type":"article","og_title":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o","og_description":"Zero Trust \u00e9 o conceito em que o constante monitoramento da rede corporativa para eventuais incidentes de seguran\u00e7a,","og_url":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/","og_site_name":"Blog da FCamara","article_published_time":"2022-02-15T16:59:08+00:00","article_modified_time":"2025-11-14T11:54:04+00:00","og_image":[{"width":260,"height":205,"url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png","type":"image\/png"}],"author":"fcnuvem","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"fcnuvem","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#article","isPartOf":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/"},"author":{"name":"fcnuvem","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a"},"headline":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o","datePublished":"2022-02-15T16:59:08+00:00","dateModified":"2025-11-14T11:54:04+00:00","mainEntityOfPage":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/"},"wordCount":701,"commentCount":0,"publisher":{"@id":"https:\/\/fcamara.com\/blog\/#organization"},"image":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png","keywords":["pol\u00edticas zero trust","Seguran\u00e7a","seguran\u00e7a da informa\u00e7\u00e3o","zero trust"],"articleSection":["Cloud &amp; Ciberseguran\u00e7a"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/","url":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/","name":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o","isPartOf":{"@id":"https:\/\/fcamara.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png","datePublished":"2022-02-15T16:59:08+00:00","dateModified":"2025-11-14T11:54:04+00:00","breadcrumb":{"@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#primaryimage","url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png","contentUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/02\/Thumb-FCnuvem-PoliticasZeroTrust.png","width":260,"height":205,"caption":"zero trust"},{"@type":"BreadcrumbList","@id":"https:\/\/fcamara.com\/blog\/blog-politicas-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/fcamara.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud &amp; Ciberseguran\u00e7a","item":"https:\/\/fcamara.com\/blog\/categoria\/cloud-ciberseguranca\/"},{"@type":"ListItem","position":3,"name":"Zero Trust e a import\u00e2ncia dessas pol\u00edticas na Seguran\u00e7a da Informa\u00e7\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/fcamara.com\/blog\/#website","url":"https:\/\/fcamara.com\/blog\/","name":"Blog da FCamara","description":"Esta \u00e9 a \u00e1rea de insights sobre o mercado de tecnologia.","publisher":{"@id":"https:\/\/fcamara.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fcamara.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/fcamara.com\/blog\/#organization","name":"Blog da FCamara","url":"https:\/\/fcamara.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp","contentUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp","width":459,"height":68,"caption":"Blog da FCamara"},"image":{"@id":"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a","name":"fcnuvem","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"fcnuvem"},"url":"https:\/\/fcamara.com\/blog\/author\/fcnuvem\/"}]}},"lang":"br","translations":{"br":1692},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/comments?post=1692"}],"version-history":[{"count":3,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1692\/revisions"}],"predecessor-version":[{"id":8876,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1692\/revisions\/8876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/media\/1704"}],"wp:attachment":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/media?parent=1692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/categories?post=1692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/tags?post=1692"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/post_series?post=1692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}