{"id":119279,"date":"2025-07-31T12:24:45","date_gmt":"2025-07-31T04:24:45","guid":{"rendered":"https:\/\/version-2.com\/?p=119279"},"modified":"2025-07-30T12:25:52","modified_gmt":"2025-07-30T04:25:52","slug":"validating-internal-network-policies-access-control-and-encryption","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/07\/validating-internal-network-policies-access-control-and-encryption\/","title":{"rendered":"Validating Internal Network Policies: Access Control and Encryption"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"119279\" class=\"elementor elementor-119279\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-534888b post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"534888b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;80510b6&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40115d5\" data-id=\"40115d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca14f89 elementor-widget elementor-widget-text-editor\" data-id=\"ca14f89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field__item\"><p><script type=\"text\/javascript\" src=\"\/\/webform.onquanda.com\/static\/js\/webform\/embedded.min.js\"><\/script><\/p><p>With segmentation and core services covered, the focus now shifts to enforcing policies on usage, user behavior, and encryption to maintain visibility and ensure compliance across all layers of your network. These controls are critical for mitigating internal risks and upholding your secure communication standards.<\/p><p><a href=\"https:\/\/greycortex.com\/mendel\"><span style=\"color: black;\"><strong>GREYCORTEX <\/strong><\/span><span style=\"color: #ffb308;\"><strong>Mendel<\/strong><\/span><\/a> supports this effort by providing you with clear insights, alerting you about violations, and helping your teams validate whether your policies are being followed in practice.<\/p><blockquote class=\"blockquote\"><p style=\"font-size: 18px;\"><strong>Missed the beginning?\u00a0<\/strong><br \/>\ud83d\udd17 <a href=\"https:\/\/greycortex.com\/blog\/validating-internal-network-policies-mendel\"><strong>Read Part 1<\/strong><\/a> to explore how Mendel helps you enforce segmentation and control your core network services.<\/p><\/blockquote><p>\u00a0<\/p><h2>User Access Policies and Behavioral Violations<\/h2><p>Even trusted users and systems can introduce risk if policies are not clearly enforced. Monitoring what is allowed and what is not helps you uncover subtle violations that could otherwise go unnoticed.<\/p><h5>Policy violation: <strong>Forbidden protocols or apps <\/strong>(RDP, TeamViewer, Dropbox, etc.)<\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Some organizations prohibit remote-access tools or file-sharing apps to reduce risk and maintain control over their IT environments. When unauthorized protocols are used, they may introduce new attack vectors or enable remote exploitation.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel directly detects the use of unauthorized applications. Your analysts can filter for specific protocols to confirm whether a\u00a0session occurred and if it was successful, including details about session duration, data transfer volumes, and communication content. This helps you verify whether users violated your internal policies, and allows you to add legitimate usage to an exception list to avoid future alerts.<\/p><p>In our case, Mendel has identified and flagged multiple devices that have downloaded and used TeamViewer. Analysts can then investigate whether these hosts were authorized and, if appropriate, whitelist the IPs to prevent future alerts.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.png?itok=cd1rtAFE\" data-lg-id=\"d366ae3e-aaef-4106-b533-cb4bd7bb4dce\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.png?itok=cd1rtAFE\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><p>In another example, Mendel has captured a\u00a0potential RDP (Remote Desktop Protocol) session. By drilling down into the event, analysts can identify the user involved and review the session duration.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure9.png?itok=JlVefazA\" data-lg-id=\"9bcce86a-ea22-4139-82bf-91707765d26e\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure9.png?itok=JlVefazA\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure9.webp?itok=JlVefazA\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure10.png?itok=PmEaHw3d\" data-lg-id=\"822b02ce-ca36-4834-acfc-85b4671773f1\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure10.png?itok=PmEaHw3d\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure10.webp?itok=PmEaHw3d\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h5>Policy violation: <strong>Communication to forbidden destinations or services<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Certain destinations, such as foreign countries, blacklisted IPs, or unauthorized services, are often restricted to reduce risks. Detecting such traffic reveals overlooked exceptions or malicious tools trying to evade controls.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel detects and alerts you about communication with blacklisted IPs. Your analysts can use predefined or custom filters to review connections by source and destination IPs, traffic volume, and packet counts. The Network Analysis tab provides you with extensive filtering and search options, enabling your teams to conduct deep investigations across the entire network.<\/p><p>As an example, Mendel detected a\u00a0TeamViewer DNS request originating from host mx (192.168.2.42). By drilling down, analysts confirmed that a\u00a0connection was successfully established, indicating a\u00a0potential policy violation or unauthorized remote access.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure18.png?itok=zALAvcNa\" data-lg-id=\"25f9a05c-6ec3-4d8c-801a-6e252911d99c\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure18.png?itok=zALAvcNa\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure18.webp?itok=zALAvcNa\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><blockquote class=\"blockquote\"><p style=\"font-size: 18px;\">Mendel allows your analysts to identify which user is behind suspicious traffic. This helps you verify whether access to forbidden destinations or tools was legitimate or a\u00a0policy violation.<\/p><\/blockquote><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure19.png?itok=QP8SoXgt\" data-lg-id=\"440cace8-bf78-44f5-a958-ac993be8544b\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure19.png?itok=QP8SoXgt\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure19.webp?itok=QP8SoXgt\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h5>Policy violation: <strong>Excessive peer communication<\/strong><\/h5><p>Certain devices, like controllers in manufacturing or internal phone servers (PBXs), are expected to communicate with a\u00a0limited set of peers. New or unusual connections may signal misconfiguration or unauthorized activity.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel enables your analysts to define peer count limits for individual hosts or entire subnets, helping you to enforce expected communication boundaries.<\/p><p>For example, if a\u00a0PBX server communicates with more peers than its known SIP trunks and internal phones while inbound Internet traffic is restricted, Mendel will flag it for review.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure11.png?itok=Ole8Ldnz\" data-lg-id=\"423e7f18-b7a0-48f8-91e6-b3ff53b22a2d\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure11.png?itok=Ole8Ldnz\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure11.webp?itok=Ole8Ldnz\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h5>Policy violation: <strong>Unauthorized communication with honeypots<\/strong><\/h5><p>Honeypots are intentionally exposed systems used to detect suspicious activity inside the network. Typically, only predefined systems such as admin tools or security scanners should communicate with them. Any other connection attempt may indicate lateral movement or internal scanning.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel allows your teams to define which systems are authorized to communicate with honeypots and alerts your analysts to any unauthorized attempts.<\/p><p>In the example below, only the management PC is allowed to communicate with the honeypot at 192.168.2.36. When another device (192.168.2.28) initiates a\u00a0connection, Mendel triggers an\u00a0alert.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure13.png?itok=z-rKjDH9\" data-lg-id=\"0e058543-e7f1-406e-a2db-faa94b0c884b\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure13.png?itok=z-rKjDH9\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure13.webp?itok=z-rKjDH9\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><p>The peer graph confirms and visualizes that the honeypot was accessed by both permitted and unauthorized devices.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure14.png?itok=rGMsJNf-\" data-lg-id=\"a95aec83-fee6-48fb-88af-9dec1aa6a7ab\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure14.png?itok=rGMsJNf-\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure14.webp?itok=rGMsJNf-\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h2>Encryption Standards and TLS\u00a0Usage<\/h2><p>Cryptographic standards are a\u00a0foundational layer of secure communication. Monitoring certificate validity and protocol versions helps you identify weak encryption before it becomes a\u00a0vulnerability.<\/p><h5>Policy violation: <strong>Expired TLS certificates in\u00a0use<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>TLS certificates are a\u00a0critical part of trusted communication. If a\u00a0certificate has expired, systems may reject the connection, users may be exposed to spoofed services, or sensitive data may be transmitted without adequate encryption.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel alerts you when expired certificates are detected or when a\u00a0certificate is approaching its expiration date.<\/p><p>For example, Mendel has found one internal system using a\u00a0certificate that expired in May\u00a02021.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure20.png?itok=qsqNZ3Il\" data-lg-id=\"f06531ef-2e56-445f-8625-6a91ea61ba63\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure20.png?itok=qsqNZ3Il\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure20.webp?itok=qsqNZ3Il\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure21.png?itok=h9fBzf3x\" data-lg-id=\"27b1be81-782a-4d5c-afe7-2704d30894e2\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure21.png?itok=h9fBzf3x\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure21.webp?itok=h9fBzf3x\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><p>In another case, Mendel has flagged an upcoming expiration several days in advance, giving administrators time to respond before any disruption occurs.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure22.png?itok=kU32xIat\" data-lg-id=\"e908d5ec-ac49-46c2-944c-f81ed4dac098\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure22.png?itok=kU32xIat\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure22.webp?itok=kU32xIat\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure23.png?itok=SOYojbWs\" data-lg-id=\"6f540644-7b25-4894-9aeb-e34c1be92125\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure23.png?itok=SOYojbWs\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure23.webp?itok=SOYojbWs\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h5>Policy violation: <strong>Outdated TLS versions and cipher suites<\/strong><\/h5><p><span style=\"background-color: #4d8df4; color: white;\">Relevant for\u00a0NIS2<\/span><\/p><p>Obsolete TLS versions and weak cipher suites expose your encrypted traffic to known vulnerabilities. Regulatory frameworks like NIS2 urge organizations like yours to stop using TLS versions below 1.2 to reduce attack surfaces and ensure strong encryption standards.<\/p><h6>Validation with <span style=\"color: #ffb308;\">Mendel<\/span><\/h6><p>Mendel allows you to configure alerts when outdated TLS versions are used. To ensure secure communication, it is recommended to use TLS 1.2 or 1.3. Achieving this typically involves updating the operating system, browser, or other client software.<\/p><p>For example, an event has shown that one device was still communicating using TLSv1.0.<\/p><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure24.png?itok=o1umOzCp\" data-lg-id=\"d708494a-0405-45fe-9699-2b73a4880a76\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure24.png?itok=o1umOzCp\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure24.webp?itok=o1umOzCp\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><article class=\"media media--type-image media--view-mode-full\"><div class=\"image\"><a class=\"lightbox\" href=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure25_0.png?itok=13G8z7Ky\" data-lg-id=\"3dd078e2-bf40-4ea1-a6d6-73920e76f79b\"><br \/><picture> <source srcset=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure25_0.png?itok=13G8z7Ky\" type=\"image\/png\" \/><\/picture> <picture><img decoding=\"async\" class=\"img-fluid rounded\" src=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure25_0.webp?itok=13G8z7Ky\" alt=\"\" \/><\/picture> <\/a><\/div><\/article><h2>Strong Policies Require Strong Evidence<\/h2><p>Security policies do more than reduce risk. They help you demonstrate accountability to regulators, customers, and internal stakeholders alike. As expectations rise under frameworks like NIS2, proving that internal rules are applied consistently becomes a\u00a0core part of modern cybersecurity governance. It is no longer enough to assume policies are being followed. You need clarity and verifiable evidence.<\/p><p>Mendel helps organizations like yours move from assumption to evidence. It continuously validates how policies are enforced across the network, from encryption to identity controls, giving your team the visibility to act with clarity and confidence.<\/p><blockquote class=\"blockquote\"><p style=\"font-size: 18px;\">Need a\u00a0second opinion on your enforcement? <a href=\"https:\/\/greycortex.com\/solutions\/schedule-network-security-audit\"><strong>Request a\u00a0security audit<\/strong><\/a> with Mendel.<\/p><p>\u00a0<\/p><\/blockquote><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ead54a5 elementor-widget elementor-widget-shortcode\" data-id=\"ead54a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18179\" class=\"elementor elementor-18179\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About GREYCORTEX<br \/><\/strong>GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.<\/p>\n<p>MENDEL, GREYCORTEX\u2019s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.<\/p>\n<p>MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With segmentation and core services covered, the focus  [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,24,61],"tags":[23,435,1077],"class_list":["post-119279","post","type-post","status-publish","format-standard","hentry","category-1305","category-greycortex","category-press-release","tag-greycortex","tag-mendel","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Validating Internal Network Policies: Access Control and Encryption - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Validating Internal Network Policies: Access Control and Encryption - Version 2\" \/>\n<meta property=\"og:description\" content=\"With segmentation and core services covered, the focus [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-31T04:24:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/validating-internal-network-policies-access-control-and-encryption\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Validating Internal Network Policies: Access Control and Encryption\",\"datePublished\":\"2025-07-31T04:24:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/validating-internal-network-policies-access-control-and-encryption\\\/\"},\"wordCount\":1027,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure8.webp?itok=cd1rtAFE\",\"keywords\":[\"Greycortex\",\"MENDEL\",\"2025\"],\"articleSection\":[\"2025\",\"Greycortex\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/07\\\/validating-internal-network-policies-access-control-and-encryption\\\/\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption\",\"name\":\"Validating Internal Network Policies: Access Control and Encryption - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure8.webp?itok=cd1rtAFE\",\"datePublished\":\"2025-07-31T04:24:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#primaryimage\",\"url\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure8.webp?itok=cd1rtAFE\",\"contentUrl\":\"https:\\\/\\\/www.greycortex.com\\\/sites\\\/default\\\/files\\\/styles\\\/default\\\/public\\\/perm\\\/image\\\/figure8.webp?itok=cd1rtAFE\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.greycortex.com\\\/blog\\\/validating-internal-network-policies-access-control-and-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Validating Internal Network Policies: Access Control and Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Validating Internal Network Policies: Access Control and Encryption - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption","og_locale":"en_US","og_type":"article","og_title":"Validating Internal Network Policies: Access Control and Encryption - Version 2","og_description":"With segmentation and core services covered, the focus [&hellip;]","og_url":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption","og_site_name":"Version 2","article_published_time":"2025-07-31T04:24:45+00:00","og_image":[{"url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/07\/validating-internal-network-policies-access-control-and-encryption\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Validating Internal Network Policies: Access Control and Encryption","datePublished":"2025-07-31T04:24:45+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/07\/validating-internal-network-policies-access-control-and-encryption\/"},"wordCount":1027,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE","keywords":["Greycortex","MENDEL","2025"],"articleSection":["2025","Greycortex","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/07\/validating-internal-network-policies-access-control-and-encryption\/","url":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption","name":"Validating Internal Network Policies: Access Control and Encryption - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#primaryimage"},"image":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE","datePublished":"2025-07-31T04:24:45+00:00","breadcrumb":{"@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#primaryimage","url":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE","contentUrl":"https:\/\/www.greycortex.com\/sites\/default\/files\/styles\/default\/public\/perm\/image\/figure8.webp?itok=cd1rtAFE"},{"@type":"BreadcrumbList","@id":"https:\/\/www.greycortex.com\/blog\/validating-internal-network-policies-access-control-and-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Validating Internal Network Policies: Access Control and Encryption"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-v1R","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=119279"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119279\/revisions"}],"predecessor-version":[{"id":119283,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/119279\/revisions\/119283"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=119279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=119279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=119279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}