{"id":31644,"date":"2023-08-17T10:00:00","date_gmt":"2023-08-17T16:00:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=31644"},"modified":"2025-12-10T06:03:57","modified_gmt":"2025-12-10T13:03:57","slug":"%eb%b3%b4%ec%95%88-%ec%9e%90%eb%8f%99%ed%99%94%eb%a5%bc-%ec%9c%84%ed%95%9c-%ec%a0%9c%eb%a1%9c-%ed%8a%b8%eb%9f%ac%ec%8a%a4%ed%8a%b8-%ec%9d%98%eb%ac%b4%ed%99%94","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/","title":{"rendered":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ub3c4\uc785 \uc2dc\ud55c\uc774 \ub2e4\uac00\uc624\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc758 \ubcf4\uc548 \uc6b4\uc601\ud300\uc740 \uc900\ube44\ub418\uc5c8\uc2b5\ub2c8\uae4c?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Zero Trust Mandate for security automation\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/ZERO_TRUST_MASTHEAD.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/ZERO_TRUST_MASTHEAD-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/ZERO_TRUST_MASTHEAD-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/ZERO_TRUST_MASTHEAD-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-08-17T10:00:00-06:00\">8\uc6d4 17, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?<\/h1>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Cody_Cornell\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Headshot.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tCody Cornell\t\t<\/span>\n\t<\/div>\n<\/a>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('The%20Zero%20Trust%20Clock%20is%20Ticking%3A%20Are%20Your%20SecOps%20Teams%20Ready%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fzero-trust-mandate-for-security-automation%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=The%20Zero%20Trust%20Clock%20is%20Ticking%3A%20Are%20your%20SecOps%20Teams%20ready%3F&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fzero-trust-mandate-for-security-automation%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fzero-trust-mandate-for-security-automation%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fzero-trust-mandate-for-security-automation%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<p><span style=\"font-weight: 400;\">As a nation we\u2019ve found ourselves at a pivotal cybersecurity crossroads. We see advanced persistent threats (APTs) pose risk to vital infrastructure. Nation-state threats continue to increase in frequency and sophistication. It is only a matter of time until offensive artificial intelligence (AI) becomes common. With this complex threat landscape, it&#8217;s no wonder that cybersecurity is universally recognized as a matter of national security and is the spotlight.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In early 2022, the Biden Administration issued <\/span><a href=\"https:\/\/swimlane.com\/blog\/executive-order-security-orchestration-automation-response-soar\/\"><span style=\"font-weight: 400;\">M-22-09<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/swimlane.com\/resources\/white-papers\/executive-order-m-21-31\/\"><span style=\"font-weight: 400;\">M-21-31<\/span><\/a><span style=\"font-weight: 400;\"> which required that all <a href=\"https:\/\/swimlane.com\/solutions\/industries\/federal-government\/\">federal agencies<\/a> comply with Zero Trust standards by the end of fiscal year 2024. Implementing security orchestration automation and response (SOAR) technology is one of the standards required by the administration. The clock is ticking on the 2024 deadline, the question is &#8211; are we ready?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We partnered with Dimensional Research, a leading independent research firm, to answer this very question. We surveyed over 100 security professionals and executives at U.S. federal agencies in order to understand how confident they are in their ability to meet the Zero Trust executive order. <\/span><b>Highlights from the survey include:\u00a0<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">67% of federal government agencies are confident or very confident they are prepared to meet the Zero Trust requirements laid out by the U.S. government.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">64% of federal agencies said they are choosing low-code <a href=\"https:\/\/swimlane.com\/solutions\/security-automation\">security automation solutions.<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Keep reading below for key takeaways and download the <a href=\"https:\/\/swimlane.com\/resources\/reports\/security-automation-federal-agencies\">2023 Report on Security Automation for Federal Agencies<\/a> to unveil why security automation is a necessity. And connect with me on <\/span><a href=\"https:\/\/www.linkedin.com\/in\/codycornell\/\"><span style=\"font-weight: 400;\">LinkedIn<\/span><\/a><span style=\"font-weight: 400;\"> to share your perspectives.<\/span><\/p>\n<h2>Key Takeaways for U.S Federal Agencies<\/h2>\n<h3>Federal Security Teams Are Understaffed<\/h3>\n<p><span style=\"font-weight: 400;\">It comes as no surprise that our research validated that SecOps teams within the federal government are understaffed. They are expected to investigate and remediate thousands of alerts on a day to day basis, while doing their best to keep stay informed with evolving mandates and regulations. Many public sector security leaders have come to the conclusion that it is highly unlikely they will fill the open positions on their teams.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">83% of federal agencies have security team positions currently open.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">64% of federal agencies said it takes longer to fill a security position than it did two years ago.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">35% of federal agencies don\u2019t think their security team will ever be fully staffed.<\/span><\/li>\n<\/ul>\n<h3>Security Automation is a Necessity<\/h3>\n<p><span style=\"font-weight: 400;\">I spent a significant portion of my career in IT and security roles at the Department of Homeland Security (DHS) and the U.S. Defense Information Systems Agency (DISA). This experience is an underlying reason why I have so much conviction in the fact that security automation is required for effective <a href=\"https:\/\/swimlane.com\/solutions\/assess-secops-efficacy\/\">SecOps<\/a>. This isn\u2019t just my personal opinion. Security automation capabilities are considered a &#8220;practical necessity&#8221; for enhancing overall cybersecurity effectiveness in the Biden Administration\u2019s M-22-09.\u00a0<\/span><\/p>\n<h3>Not all Security Automation is Created Equal\u00a0<\/h3>\n<p><span style=\"font-weight: 400;\">The survey revealed that 64% of federal agencies are choosing low-code security automation solutions to meet the <a href=\"https:\/\/swimlane.com\/blog\/what-is-soar\/\">SOAR requirements<\/a> in the <a href=\"https:\/\/swimlane.com\/blog\/executive-order-security-orchestration-automation-response-soar\/\">Zero Trust executive order<\/a>. Low-code technology combines the simple user experience of a visual programming language with the power of python scripting. This approach to security automation offers many benefits that 99% of federal agency survey respondents agree on. See the diagram below for details.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-31894 aligncenter\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Screenshot-2023-08-17-at-3.18.39-PM-300x121.png\" alt=\"Advantages of low-code security automation\" width=\"352\" height=\"142\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2023-08-17-at-3.18.39-PM-300x121.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2023-08-17-at-3.18.39-PM-1024x414.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2023-08-17-at-3.18.39-PM-768x311.png 768w, https:\/\/swimlane.com\/wp-content\/uploads\/\/Screenshot-2023-08-17-at-3.18.39-PM.png 1374w\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" \/><\/p>\n<h3>The Benefits of Low-Code Automation for Federal Agencies<\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">49% of participants said it leads to less reliance on coding to automate.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">40% of participants said they were able to address all security automation requirements.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">38% of participants said that the capabilities of these solutions scale with the experience of their security team.<\/span><\/li>\n<\/ul>\n<h3>Start Your Security Automation Journey<\/h3>\n<p><span style=\"font-weight: 400;\">It\u2019s not too late to get started with low-code security automation and meet the Zero Trust executive order deadline. When you\u2019re ready, reach out to us and we will share best practices learned from our federal customers and show you a demo of <\/span><a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\"><span style=\"font-weight: 400;\">Swimlane Turbine<\/span><\/a><span style=\"font-weight: 400;\"> in action.<\/span><\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-1ab8ac16a981df8d284605d7b5244b2d4116af68 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-1ab8ac16a981df8d284605d7b5244b2d4116af68 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/FEDRAL_SEC_AUTO_PR.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h5 class=\"wp-block-heading\" id=\"h-2023-security-automation-report-for-federal-agencies\">2023 Security Automation Report for Federal Agencies<\/h5>\n\n\n\n<p>Get insights from this survey of over 100 security professionals and executives at U.S. federal agencies on the challenges of meeting the 2024 deadline to meet the Zero Trust executive order from the Biden Administration.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-508fb9219e24c3165874d51bda364c9a393c4614\"><style>.bs-pro-button-p-btn-508fb9219e24c3165874d51bda364c9a393c4614 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/gartner-soc-model-guide\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/grc\/'><span class='tag-content'>GRC<\/span><\/a><a href='https:\/\/swimlane.com\/ko\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e7fef85ed27 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/zero-trust-security\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 17, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How to Implement a Zero Trust Security Model<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e7fef86018b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/ready-for-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 5, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>How do you know if you\u2019re ready for SOAR?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69e7fef8618bd bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/swimlane-open-sources-graphish\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>6\uc6d4 19, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Swimlane open-sources graphish to help SecOps Teams<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":66,"featured_media":31647,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":31647,"learn_more_label":"","image_alt_text":"Cody Cornell, co-founder, Swimlane, Inc.","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89,204],"resource-type":[67],"resource-topic":[133,136],"resource-industry":[192],"blog-category":[75,71],"class_list":["post-31644","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","tag-grc","resource-type-blogs","resource-topic-research","resource-topic-soar","resource-industry-federal","blog-category-security-automation","blog-category-soar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Zero Trust Clock is Ticking: Are your SecOps Teams Ready?<\/title>\n<meta name=\"description\" content=\"APTs &amp; nation-state risks are rising. Biden&#039;s Zero Trust Executive Order compels federal agencies to adopt Zero Trust standards by 2024.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc790\ub3d9\ud654\ub97c-\uc704\ud55c-\uc81c\ub85c-\ud2b8\ub7ec\uc2a4\ud2b8-\uc758\ubb34\ud654\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Zero Trust Clock is Ticking: Are your SecOps Teams ready?\" \/>\n<meta property=\"og:description\" content=\"Our latest research report on security automation for federal agencies unveils why security automation is a necessity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc790\ub3d9\ud654\ub97c-\uc704\ud55c-\uc81c\ub85c-\ud2b8\ub7ec\uc2a4\ud2b8-\uc758\ubb34\ud654\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T13:03:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO-TRUST-MANDATE.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"The Zero Trust Clock is Ticking: Are your SecOps Teams ready?\" \/>\n<meta name=\"twitter:description\" content=\"Our latest research report on security automation for federal agencies unveils why security automation is a necessity.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/\",\"name\":\"The Zero Trust Clock is Ticking: Are your SecOps Teams Ready?\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png\",\"datePublished\":\"2023-08-17T16:00:00+00:00\",\"dateModified\":\"2025-12-10T13:03:57+00:00\",\"description\":\"APTs & nation-state risks are rising. Biden's Zero Trust Executive Order compels federal agencies to adopt Zero Trust standards by 2024.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png\",\"width\":1120,\"height\":666,\"caption\":\"Zero Trust Mandate for security automation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ub3c4\uc785 \uc2dc\ud55c\uc774 \ub2e4\uac00\uc624\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc758 \ubcf4\uc548 \uc6b4\uc601\ud300\uc740 \uc900\ube44\ub418\uc5c8\uc2b5\ub2c8\uae4c?","description":"APT \uacf5\uaca9\uacfc \uad6d\uac00 \uc8fc\ub3c4\ud615 \uc704\ud611\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ubc14\uc774\ub4e0 \ub300\ud1b5\ub839\uc758 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ud589\uc815 \uba85\ub839\uc740 \uc5f0\ubc29 \uae30\uad00\ub4e4\uc774 2024\ub144\uae4c\uc9c0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ud45c\uc900\uc744 \ucc44\ud0dd\ud558\ub3c4\ub85d \uc758\ubb34\ud654\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc790\ub3d9\ud654\ub97c-\uc704\ud55c-\uc81c\ub85c-\ud2b8\ub7ec\uc2a4\ud2b8-\uc758\ubb34\ud654\/","og_locale":"ko_KR","og_type":"article","og_title":"The Zero Trust Clock is Ticking: Are your SecOps Teams ready?","og_description":"Our latest research report on security automation for federal agencies unveils why security automation is a necessity.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/\ubcf4\uc548-\uc790\ub3d9\ud654\ub97c-\uc704\ud55c-\uc81c\ub85c-\ud2b8\ub7ec\uc2a4\ud2b8-\uc758\ubb34\ud654\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T13:03:57+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO-TRUST-MANDATE.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"The Zero Trust Clock is Ticking: Are your SecOps Teams ready?","twitter_description":"Our latest research report on security automation for federal agencies unveils why security automation is a necessity.","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/","url":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/","name":"\uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ub3c4\uc785 \uc2dc\ud55c\uc774 \ub2e4\uac00\uc624\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc5ec\ub7ec\ubd84\uc758 \ubcf4\uc548 \uc6b4\uc601\ud300\uc740 \uc900\ube44\ub418\uc5c8\uc2b5\ub2c8\uae4c?","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png","datePublished":"2023-08-17T16:00:00+00:00","dateModified":"2025-12-10T13:03:57+00:00","description":"APT \uacf5\uaca9\uacfc \uad6d\uac00 \uc8fc\ub3c4\ud615 \uc704\ud611\uc774 \uc99d\uac00\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ubc14\uc774\ub4e0 \ub300\ud1b5\ub839\uc758 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ud589\uc815 \uba85\ub839\uc740 \uc5f0\ubc29 \uae30\uad00\ub4e4\uc774 2024\ub144\uae4c\uc9c0 \uc81c\ub85c \ud2b8\ub7ec\uc2a4\ud2b8 \ud45c\uc900\uc744 \ucc44\ud0dd\ud558\ub3c4\ub85d \uc758\ubb34\ud654\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/ZERO_TRUST_MASTHEAD.png","width":1120,"height":666,"caption":"Zero Trust Mandate for security automation"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/zero-trust-mandate-for-security-automation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"The Zero Trust Clock is Ticking: Are Your SecOps Teams Ready?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/31644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/31644\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/31647"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=31644"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=31644"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=31644"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=31644"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=31644"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=31644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}