{"id":667,"date":"2020-05-11T00:00:00","date_gmt":"2020-05-11T00:00:00","guid":{"rendered":""},"modified":"2025-06-30T01:37:02","modified_gmt":"2025-06-30T08:37:02","slug":"automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/","title":{"rendered":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In our day-to-day work, we focus on helping customers advance the security of their digital estate using the native capabilities of Azure. In the process, we frequently find that using Azure to improve an organization\u2019s cybersecurity posture can also help these customers achieve compliance more rapidly.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Today, many of our customers in regulated industries are adopting a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noopener\">Zero Trust<\/a> architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to \u201cnever trust, always verify.\u201d In a Zero Trust model, every access request is strongly authenticated, authorized within policy constraints, and inspected for anomalies before granting access. This approach can aid the process of achieving compliance for industries that use NIST-based controls including financial services, defense industrial base, and government.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end-to-end strategy, across three primary principles: (1) verify explicitly, (2) enforce least privilege access, and (3) assume breach.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"use-the-azure-blueprint-for-faster-configuration-of-zero-trust\">Use the Azure blueprint for faster configuration of Zero Trust<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The Azure blueprint for Zero Trust enables application developers and security administrators to more easily create hardened environments for their application workloads. Essentially, the blueprint will help you implement Zero Trust controls across six foundational elements: identities, devices, applications, data, infrastructure, and networks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Using the Azure Blueprints service, the Zero Trust blueprint will first configure your VNET to deny all network traffic by default, enabling you to extend it and\/or set rules for selective traffic based on your business needs. In addition, the blueprint will enforce and maintain Azure resource behaviors and configuration in compliance with specific NIST SP 800-53 security control requirements using Azure Policy.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The blueprint includes Azure Resource Manager templates to deploy and configure Azure resources such as Virtual Network, Network Security Groups, Azure Key Vault, Azure Monitor, Azure Security Center, and more. If you\u2019re working with applications that need to comply with FedRAMP High or DoD Impact Level 4 requirements or just want to improve the security posture of your cloud deployment, the blueprint for Zero Trust is designed to help you get there faster.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Azure blueprint for Zero Trust is currently in preview with limited support. To learn more and find instructions to deploy into Azure, see <a href=\"https:\/\/aka.ms\/zerotrust-blueprint\" target=\"_blank\" rel=\"noopener\">Azure blueprint for Zero Trust<\/a>. For more information, questions, and feedback, please contact us at <a href=\"https:\/\/aka.ms\/zerotrust-blueprint-feedback\" target=\"_blank\" rel=\"noopener\">Zero Trust blueprint feedback<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In addition to this new blueprint, we\u2019re announcing two new integrations with Azure to bring faster authorization and increased flexibility to the public sector and regulated industries:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"accelerate-risk-management-for-azure-deployments-with-xacta\">Accelerate risk management for Azure deployments with Xacta<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Increasing the speed with which cloud-based initiatives achieve authorization is a critical part of modernization. Often this process is highly manual and lacks the ability to provide a clear picture for continuous monitoring<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.telos.com\/cyber-risk-management\/xacta\/\" target=\"_blank\" rel=\"noopener\">Xacta<\/a> now integrates with Azure Policy and Azure Blueprints, enabling customers to centrally manage compliance policies, track their compliance status, and more easily enforce policies to ensure ongoing compliance. For example, Xacta streamlines and automates many labor-intensive tasks associated with key security frameworks such as the NIST Risk Management Framework (RMF), NIST Cybersecurity Framework (CSF), FedRAMP, and ISO 27001.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Through this new integration, Azure Policy automatically generates a significant portion of the required accreditation package directly into Xacta, instantiating a risk management framework and reducing the manual effort required of risk professionals, freeing up their time to focus on critical risk decisions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"enable-continuous-monitoring-of-containers-using-anchore\">Enable continuous monitoring of containers using Anchore<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Customers using containers to achieve greater flexibility within regulated environments commonly encounter security and governance challenges. To address those challenges, <a href=\"https:\/\/anchore.com\/\" target=\"_blank\" rel=\"noopener\">Anchore<\/a> recently announced their support for Windows containers, delivering more choice for public sector agencies and enterprises developing container-based applications and implementing broad DevSecOps initiatives. Anchore Enterprise 2.3 performs deep image inspection of Windows container images, helping teams establish policy-based approaches to container compliance without compromising velocity.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Whether you\u2019re using containers today or evaluating services, such as Azure Kubernetes Service, you can count on us to continue to provide world-class cybersecurity technology, controls, and best practices to help you accelerate both security and compliance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about how to implement Zero Trust architecture on Azure, read the <a href=\"https:\/\/devblogs.microsoft.com\/azuregov\/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6\/\" target=\"_blank\" rel=\"noopener\">six-part blog series<\/a> on the Azure Government Dev blog. You may also want to bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a> to keep up with our coverage on security matters and follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1456,1482,1457],"tags":[1811],"audience":[3053,3056],"content-type":[1497],"product":[1533,1798,1602],"tech-community":[],"topic":[],"coauthors":[296],"class_list":["post-667","post","type-post","status-publish","format-standard","hentry","category-devops","category-management-and-governance","category-networking","tag-zero-trust","audience-it-decision-makers","audience-it-implementors","content-type-partnerships","product-azure-monitor","product-azure-security-center","product-virtual-network","review-flag-1680286581-295","review-flag-1-1680286581-825","review-flag-2-1680286581-601","review-flag-3-1680286581-173","review-flag-4-1680286581-250","review-flag-alway-1680286580-106","review-flag-and-o-1680286581-349","review-flag-dod-1680286582-9","review-flag-never-1680286580-606","review-flag-new-1680286579-546"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-11T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T08:37:02+00:00\" \/>\n<meta name=\"author\" content=\"Lily Kim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lily Kim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/lily-kim\/\",\"@type\":\"Person\",\"@name\":\"Lily Kim\"}],\"headline\":\"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations\",\"datePublished\":\"2020-05-11T00:00:00+00:00\",\"dateModified\":\"2025-06-30T08:37:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\"},\"wordCount\":772,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"keywords\":[\"Zero Trust\"],\"articleSection\":[\"DevOps\",\"Management and governance\",\"Networking\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\",\"name\":\"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2020-05-11T00:00:00+00:00\",\"dateModified\":\"2025-06-30T08:37:02+00:00\",\"description\":\"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevOps\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/devops\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog","description":"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/","og_locale":"en_US","og_type":"article","og_title":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog","og_description":"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2020-05-11T00:00:00+00:00","article_modified_time":"2025-06-30T08:37:02+00:00","author":"Lily Kim","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Lily Kim","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/lily-kim\/","@type":"Person","@name":"Lily Kim"}],"headline":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations","datePublished":"2020-05-11T00:00:00+00:00","dateModified":"2025-06-30T08:37:02+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/"},"wordCount":772,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"keywords":["Zero Trust"],"articleSection":["DevOps","Management and governance","Networking"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/","name":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2020-05-11T00:00:00+00:00","dateModified":"2025-06-30T08:37:02+00:00","description":"Today, many of our customers in regulated industries are adopting a Zero Trust architecture, moving to a security model that more effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they\u2019re located.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/automating-cybersecurity-guardrails-with-new-zero-trust-blueprint-and-azure-integrations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"DevOps","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/devops\/"},{"@type":"ListItem","position":3,"name":"Automating cybersecurity guardrails with new Zero Trust blueprint and Azure integrations"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=667"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/667\/revisions"}],"predecessor-version":[{"id":44413,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/667\/revisions\/44413"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=667"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=667"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=667"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=667"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=667"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=667"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}