{"id":11855,"date":"2025-12-16T17:11:30","date_gmt":"2025-12-16T20:11:30","guid":{"rendered":"https:\/\/www.flane.com.pa\/blog\/?p=11855"},"modified":"2025-12-16T17:13:39","modified_gmt":"2025-12-16T20:13:39","slug":"framework-seguranca-para-ia-cisco","status":"publish","type":"post","link":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/","title":{"rendered":"Framework de seguran\u00e7a para IA: o que \u00e9 e como aplicar um modelo integrado na empresa"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes - <\/span><\/span><section class=\"l-section wpb_row height_small\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p data-start=\"524\" data-end=\"849\">O que \u00e9 um framework de seguran\u00e7a para IA?<br data-start=\"570\" data-end=\"573\" \/>\u00c9 uma estrutura que ajuda a entender, classificar e operacionalizar riscos de IA \u2014 desde ataques e falhas t\u00e9cnicas at\u00e9 danos por conte\u00fado e uso indevido \u2014 para que a empresa adote IA com controles reais, n\u00e3o apenas com boas inten\u00e7\u00f5es.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"851\" data-end=\"1113\">A IA deixou de ser experimento e virou camada operacional do neg\u00f3cio. Ao mesmo tempo, muita lideran\u00e7a se sente segura falando de ciberseguran\u00e7a \u201ctradicional\u201d, mas percebe a seguran\u00e7a de IA como um territ\u00f3rio novo e inst\u00e1vel.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"1115\" data-end=\"1414\">E os n\u00fameros ajudam a explicar essa sensa\u00e7\u00e3o. Segundo o Cisco 2025 AI Readiness Index, apenas 29% das empresas acreditam estar prontas para se defender de amea\u00e7as de IA, e s\u00f3 33% t\u00eam um plano formal de gest\u00e3o de mudan\u00e7as para uma ado\u00e7\u00e3o respons\u00e1vel.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"1416\" data-end=\"1528\">Por isso, frameworks pr\u00e1ticos viram pe\u00e7a-chave. Eles criam linguagem comum, prioriza\u00e7\u00e3o e caminho para execu\u00e7\u00e3o.<\/p>\n<h4 data-start=\"1535\" data-end=\"1581\">Por que \u201cseguran\u00e7a de IA\u201d ficou fragmentada<\/h4>\n<p data-start=\"1583\" data-end=\"1836\">Nos \u00faltimos anos, surgiram v\u00e1rias refer\u00eancias \u00fateis. Algumas descrevem t\u00e1ticas adversariais em ML, outras listam riscos em LLMs e agentes, e outras trazem princ\u00edpios de safety adotados por laborat\u00f3rios de fronteira.<\/p>\n<p data-start=\"1583\" data-end=\"1836\">O problema \u00e9 que, na pr\u00e1tica, esses recortes n\u00e3o cobrem o cen\u00e1rio de ponta a ponta.<\/p>\n<p data-start=\"1923\" data-end=\"1972\">O que faltava era um modelo \u00fanico que conectasse:<\/p>\n<ul data-start=\"1974\" data-end=\"2300\">\n<li data-start=\"1974\" data-end=\"2034\">\n<p data-start=\"1976\" data-end=\"2034\">seguran\u00e7a e safety, sem tratar como trilhas paralelas;<\/p>\n<\/li>\n<li data-start=\"2035\" data-end=\"2096\">\n<p data-start=\"2037\" data-end=\"2096\">runtime e supply chain, sem ignorar onde o risco nasce;<\/p>\n<\/li>\n<li data-start=\"2097\" data-end=\"2178\">\n<p data-start=\"2099\" data-end=\"2178\">comportamento do modelo e do sistema, porque o risco n\u00e3o mora s\u00f3 no prompt;<\/p>\n<\/li>\n<li data-start=\"2179\" data-end=\"2300\">\n<p data-start=\"2181\" data-end=\"2300\">entrada maliciosa e sa\u00edda danosa, porque o impacto \u00e9 o que machuca o neg\u00f3cio.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2302\" data-end=\"2387\">Em outras palavras: o mundo real n\u00e3o separa esses dom\u00ednios. E advers\u00e1rios tamb\u00e9m n\u00e3o.<\/p>\n<h4 data-start=\"2394\" data-end=\"2468\">O que a Cisco prop\u00f5e: um framework integrado de AI Security + AI Safety<\/h4>\n<p data-start=\"2470\" data-end=\"2776\">A Cisco apresenta o Integrated AI Security and Safety Framework como um modelo vendor-agnostic para entender como sistemas modernos de IA falham, como advers\u00e1rios exploram essas falhas e como empresas podem construir defesas que evoluem junto com a tecnologia.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"2778\" data-end=\"2853\">A proposta \u00e9 tratar \u201cAI Security Framework\u201d como uma estrutura para cobrir:<\/p>\n<ul data-start=\"2855\" data-end=\"3147\">\n<li data-start=\"2855\" data-end=\"2878\">\n<p data-start=\"2857\" data-end=\"2878\">amea\u00e7as adversariais;<\/p>\n<\/li>\n<li data-start=\"2879\" data-end=\"2913\">\n<p data-start=\"2881\" data-end=\"2913\">falhas de seguran\u00e7a de conte\u00fado;<\/p>\n<\/li>\n<li data-start=\"2914\" data-end=\"2966\">\n<p data-start=\"2916\" data-end=\"2966\">comprometimento de modelo e cadeia de suprimentos;<\/p>\n<\/li>\n<li data-start=\"2967\" data-end=\"3080\">\n<p data-start=\"2969\" data-end=\"3080\">comportamentos agentivos e riscos de ecossistema (incluindo abuso de orquestra\u00e7\u00e3o e coordena\u00e7\u00e3o entre agentes);<\/p>\n<\/li>\n<li data-start=\"3081\" data-end=\"3147\">\n<p data-start=\"3083\" data-end=\"3147\">governan\u00e7a organizacional.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<h4 data-start=\"3154\" data-end=\"3220\">AI Security vs AI Safety: defini\u00e7\u00f5es que ajudam a tomar decis\u00e3o<\/h4>\n<p data-start=\"3222\" data-end=\"3283\">A Cisco diferencia (e ao mesmo tempo conecta) dois conceitos:<\/p>\n<p data-start=\"3285\" data-end=\"3520\">AI security: disciplina de assegurar responsabilidade e proteger sistemas de IA contra uso n\u00e3o autorizado, ataques de disponibilidade e comprometimento de integridade ao longo do ciclo de vida. <span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><a class=\"flex h-4.5 overflow-hidden rounded-xl px-2 text-&#091;9px&#093; font-medium transition-colors duration-150 ease-in-out text-token-text-secondary! bg-&#091;#F4F4F4&#093;! dark:bg-&#091;#303030&#093;!\" href=\"https:\/\/blogs.cisco.com\/ai\/security-framework\" target=\"_blank\" rel=\"noopener\"><span class=\"relative start-0 bottom-0 flex h-full w-full items-center\"><span class=\"flex h-4 w-full items-center justify-between overflow-hidden\"><span class=\"max-w-&#091;15ch&#093; grow truncate overflow-hidden text-center\">Cisco Blogs<\/span><\/span><\/span><\/a><\/span><\/span><\/p>\n<p data-start=\"3522\" data-end=\"3692\">AI safety: garantir que sistemas de IA se comportem de forma \u00e9tica, confi\u00e1vel, justa, transparente e alinhada a valores humanos.<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"3694\" data-end=\"3898\">O ponto central \u00e9: security e safety s\u00e3o dimens\u00f5es complementares do mesmo risco. Tratar juntas aumenta a chance de criar IA robusta e, ao mesmo tempo, confi\u00e1vel.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"3905\" data-end=\"3965\">Os 5 elementos de design que tornam o framework diferente<\/h4>\n<p data-start=\"3967\" data-end=\"4119\">A Cisco constr\u00f3i o framework a partir de cinco elementos que refletem o cen\u00e1rio atual (e o que vem pela frente).\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"4121\" data-end=\"4182\">1) Integra\u00e7\u00e3o entre amea\u00e7as t\u00e9cnicas e danos por conte\u00fado<\/h4>\n<p data-start=\"4183\" data-end=\"4427\">O framework parte do princ\u00edpio de que AI security e AI safety s\u00e3o insepar\u00e1veis. Um ataque t\u00e9cnico pode terminar em uma falha de safety, como vazamento de dados, conte\u00fado nocivo ou outputs indesejados.<\/p>\n<\/div><\/div><div class=\"g-cols wpb_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><ul>\n<li>\n<h4><strong><a href=\"https:\/\/www.flane.com.pa\/pt\/cyber-security\" target=\"_blank\" rel=\"noopener\">Torne-se um expert em Cyber Security com os treinamentos e certifica\u00e7\u00f5es que Fast Lane oferece\u00a0<\/a><\/strong><\/h4>\n<\/li>\n<li>\n<h4><a href=\"https:\/\/www.flane.com.pa\/blog\/pt\/newsletter\/\" target=\"_blank\" rel=\"noopener\">Assine a newsletter da TechTalk e fique informado de tudo.<\/a><\/h4>\n<\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h4 data-start=\"4429\" data-end=\"4470\">2) Consci\u00eancia do ciclo de vida de IA<\/h4>\n<p data-start=\"4471\" data-end=\"4766\">Risco muda conforme a fase: coleta e preparo de dados, treino, deploy, integra\u00e7\u00e3o, uso de ferramentas e opera\u00e7\u00e3o em runtime. Algo irrelevante no desenvolvimento pode virar cr\u00edtico quando o modelo ganha ferramentas, mem\u00f3ria ou intera\u00e7\u00e3o com outros agentes.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"4768\" data-end=\"4813\">3) Coordena\u00e7\u00e3o e orquestra\u00e7\u00e3o multiagente<\/h4>\n<p data-start=\"4814\" data-end=\"5108\">O framework considera riscos quando sistemas colaboram: padr\u00f5es de orquestra\u00e7\u00e3o, protocolos de comunica\u00e7\u00e3o, mem\u00f3ria compartilhada e tomada de decis\u00e3o conjunta. Ele inclui amea\u00e7as que passam despercebidas em modelos criados para gera\u00e7\u00f5es anteriores de IA.<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"5110\" data-end=\"5177\">4) Multimodalidade como realidade (e como superf\u00edcie de ataque)<\/h4>\n<p data-start=\"5178\" data-end=\"5490\">A amea\u00e7a n\u00e3o chega s\u00f3 por texto. Pode vir por \u00e1udio, imagem, v\u00eddeo, c\u00f3digo, sinais em sensores e outras entradas. Por isso, tratar esses vetores de modo consistente \u00e9 essencial, especialmente em cen\u00e1rios como rob\u00f3tica, ve\u00edculos aut\u00f4nomos, CX e monitoramento em tempo real.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"5492\" data-end=\"5541\">5) \u201cB\u00fassola\u201d de seguran\u00e7a adaptada ao p\u00fablico<\/h4>\n<p data-start=\"5542\" data-end=\"5854\">O framework serve para p\u00fablicos diferentes. Executivos enxergam objetivos e impactos. L\u00edderes de seguran\u00e7a enxergam t\u00e9cnicas. Times t\u00e9cnicos e red teams descem em sub-t\u00e9cnicas e procedimentos. Assim, todos compartilham o mesmo modelo mental e reduzem ru\u00eddo na comunica\u00e7\u00e3o.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"5861\" data-end=\"5931\">Por dentro do framework: uma taxonomia unificada para amea\u00e7as de IA<\/h4>\n<p data-start=\"5933\" data-end=\"6012\">Uma parte cr\u00edtica do framework \u00e9 a taxonomia estruturada em quatro camadas:<\/p>\n<ol data-start=\"6014\" data-end=\"6231\">\n<li data-start=\"6014\" data-end=\"6055\">\n<p data-start=\"6017\" data-end=\"6055\">Objetivos (o \u201cporqu\u00ea\u201d do ataque)<\/p>\n<\/li>\n<li data-start=\"6056\" data-end=\"6084\">\n<p data-start=\"6059\" data-end=\"6084\">T\u00e9cnicas (o \u201ccomo\u201d)<\/p>\n<\/li>\n<li data-start=\"6085\" data-end=\"6139\">\n<p data-start=\"6088\" data-end=\"6139\">Subt\u00e9cnicas (varia\u00e7\u00f5es espec\u00edficas do \u201ccomo\u201d)<\/p>\n<\/li>\n<li data-start=\"6140\" data-end=\"6231\">\n<p data-start=\"6143\" data-end=\"6231\">Procedimentos (implementa\u00e7\u00f5es no mundo real)\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<\/ol>\n<p data-start=\"6233\" data-end=\"6307\">Isso cria rastreabilidade: do risco executivo at\u00e9 o passo a passo t\u00e9cnico.<\/p>\n<p data-start=\"6309\" data-end=\"6567\">A Cisco cita que o framework identifica 19 objetivos de ataque, indo de jailbreaks e \u201cgoal hijacking\u201d at\u00e9 viola\u00e7\u00f5es de privacidade, escalonamento de privil\u00e9gio, gera\u00e7\u00e3o de conte\u00fado nocivo e manipula\u00e7\u00e3o ciberf\u00edsica.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"6569\" data-end=\"6870\">Al\u00e9m disso, h\u00e1 mais de 150 t\u00e9cnicas e subt\u00e9cnicas, incluindo prompt injection (direta e indireta), jailbreaks, manipula\u00e7\u00e3o multiagente, corrup\u00e7\u00e3o de mem\u00f3ria, adultera\u00e7\u00e3o de supply chain, evas\u00e3o sens\u00edvel ao ambiente e explora\u00e7\u00e3o de ferramentas, entre outras.<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<p data-start=\"6872\" data-end=\"7120\">E o componente de safety tamb\u00e9m \u00e9 amplo: o framework inclui 25 categorias de conte\u00fado danoso, cobrindo desde abuso em ciberseguran\u00e7a at\u00e9 comprometimento de propriedade intelectual e ataques \u00e0 privacidade.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"7127\" data-end=\"7167\">E onde entram MCP, A2A e supply chain<\/h4>\n<p data-start=\"7169\" data-end=\"7249\">Como agentes e integra\u00e7\u00f5es crescem, o framework incorpora taxonomias adicionais:<\/p>\n<ul data-start=\"7251\" data-end=\"7730\">\n<li data-start=\"7251\" data-end=\"7367\">\n<p data-start=\"7253\" data-end=\"7367\">MCP (Model Context Protocol): atualmente com 14 tipos de amea\u00e7a.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"7368\" data-end=\"7505\">\n<p data-start=\"7370\" data-end=\"7505\">A2A: atualmente com 17 tipos de amea\u00e7a, ligada a riscos em comunica\u00e7\u00e3o entre agentes.<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<li data-start=\"7506\" data-end=\"7730\">\n<p data-start=\"7508\" data-end=\"7730\">Supply chain de IA: taxonomia com 22 amea\u00e7as distintas, reconhecendo que depend\u00eancias, pesos de modelo e componentes podem introduzir backdoors e riscos dif\u00edceis de observar.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p data-start=\"7732\" data-end=\"7907\">A Cisco tamb\u00e9m destaca que o framework se integra ao Cisco AI Defense, conectando amea\u00e7as a indicadores e estrat\u00e9gias de mitiga\u00e7\u00e3o.\u00a0<span class=\"\" data-state=\"closed\"><span class=\"ms-1 inline-flex max-w-full items-center relative top-&#091;-0.094rem&#093; animate-&#091;show_150ms_ease-in&#093;\" data-testid=\"webpage-citation-pill\"><\/span><\/span><\/p>\n<h4 data-start=\"7914\" data-end=\"7955\">Como usar esse framework no mundo real<\/h4>\n<p data-start=\"7957\" data-end=\"8021\">Se voc\u00ea quer transformar framework em execu\u00e7\u00e3o, use esta l\u00f3gica:<\/p>\n<ol data-start=\"8023\" data-end=\"8592\">\n<li data-start=\"8023\" data-end=\"8127\">\n<p data-start=\"8026\" data-end=\"8127\">Alinhe linguagem com o board: comece pelos objetivos e impactos (risco, reputa\u00e7\u00e3o, compliance).<\/p>\n<\/li>\n<li data-start=\"8128\" data-end=\"8246\">\n<p data-start=\"8131\" data-end=\"8246\">Mapeie o ciclo de vida: identifique onde sua IA coleta dados, treina, integra ferramentas e roda em produ\u00e7\u00e3o.<\/p>\n<\/li>\n<li data-start=\"8247\" data-end=\"8358\">\n<p data-start=\"8250\" data-end=\"8358\">Escolha \u201ctop riscos\u201d por objetivo: priorize 3\u20135 objetivos de ataque que mais amea\u00e7am seu neg\u00f3cio hoje.<\/p>\n<\/li>\n<li data-start=\"8359\" data-end=\"8471\">\n<p data-start=\"8362\" data-end=\"8471\">Traduza para t\u00e9cnicas: defina controles e detec\u00e7\u00f5es ligados \u00e0s t\u00e9cnicas mais prov\u00e1veis no seu contexto.<\/p>\n<\/li>\n<li data-start=\"8472\" data-end=\"8592\">\n<p data-start=\"8475\" data-end=\"8592\">Inclua agentes e multimodalidade: se j\u00e1 existe agentic workflow, trate isso como superf\u00edcie de ataque dedicada.<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"8594\" data-end=\"8678\">Assim, voc\u00ea evita listas gen\u00e9ricas e cria uma jornada que o time consegue sustentar.<\/p>\n<\/div><\/div><div class=\"w-separator size_small\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p><span>Texto original de<\/span><a href=\"https:\/\/blogs.cisco.com\/ai\/security-framework\"><span>\u00a0<\/span>Cisco Blog<\/a><span>\u00a0\u2013 Introducing Cisco\u2019s Integrated AI Security and Safety Framework\u00a0escrito por <a title=\"Postagens de Amy Chang\" href=\"https:\/\/blogs.cisco.com\/author\/changamy\" rel=\"author\"><span dir=\"auto\">Amy Chang<\/span><\/a><\/span><a title=\"Posts by Mark Stephens\" href=\"https:\/\/blogs.cisco.com\/author\/mstephen\" rel=\"author\">ns.<\/a><\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"O que \u00e9 um framework de seguran\u00e7a para IA?\u00c9 uma estrutura que ajuda a entender, classificar e operacionalizar riscos de IA \u2014 desde ataques e falhas t\u00e9cnicas at\u00e9 danos por conte\u00fado e uso indevido \u2014 para que a empresa adote IA com controles reais, n\u00e3o apenas com boas inten\u00e7\u00f5es.\u00a0 A IA deixou de ser experimento...","protected":false},"author":2,"featured_media":11856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1866,1877],"tags":[3976,4827,4825,4843,1848,3839,4823,3457,3317,4837,4829,4841,4833,4831,3841,4821,4835,4839,2484],"class_list":["post-11855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-pt","category-cisco-splunk-pt","tag-agentes-de-ia","tag-ai-safety","tag-ai-security","tag-boas-praticas-em-ia","tag-ciberseguranca-pt","tag-compliance","tag-framework-de-seguranca","tag-gestao-de-riscos","tag-governanca-de-ia","tag-politicas-de-seguranca","tag-privacidade-de-dados","tag-produtividade-em-tecnologia","tag-prompt-injection","tag-protecao-de-modelos","tag-seguranca-corporativa","tag-seguranca-de-ia","tag-seguranca-em-llm","tag-ti-e-inovacao","tag-transformacao-digital-pt"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety<\/title>\n<meta name=\"description\" content=\"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety\" \/>\n<meta property=\"og:description\" content=\"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTalk powered by Fast Lane LATAM\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FastLane.br\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-16T20:11:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-16T20:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fast Lane TechTalk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FastLaneBr\" \/>\n<meta name=\"twitter:site\" content=\"@FastLaneBr\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fast Lane TechTalk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\"},\"author\":{\"name\":\"Fast Lane TechTalk\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/61993dd05b6199ccdb547e2504fae2aa\"},\"headline\":\"Framework de seguran\u00e7a para IA: o que \u00e9 e como aplicar um modelo integrado na empresa\",\"datePublished\":\"2025-12-16T20:11:30+00:00\",\"dateModified\":\"2025-12-16T20:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\"},\"wordCount\":1300,\"publisher\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png\",\"keywords\":[\"agentes de IA\",\"AI safety\",\"AI security\",\"boas pr\u00e1ticas em IA\",\"Ciberseguran\u00e7a\",\"compliance\",\"framework de seguran\u00e7a\",\"gest\u00e3o de riscos\",\"governan\u00e7a de IA\",\"pol\u00edticas de seguran\u00e7a\",\"privacidade de dados\",\"produtividade em tecnologia\",\"prompt injection\",\"prote\u00e7\u00e3o de modelos\",\"seguran\u00e7a corporativa\",\"seguran\u00e7a de IA\",\"seguran\u00e7a em LLM\",\"TI e inova\u00e7\u00e3o\",\"transforma\u00e7\u00e3o digital\"],\"articleSection\":[\"Artificial Intelligence\",\"Cisco + Splunk\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\",\"name\":\"Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety\",\"isPartOf\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png\",\"datePublished\":\"2025-12-16T20:11:30+00:00\",\"dateModified\":\"2025-12-16T20:13:39+00:00\",\"description\":\"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png\",\"contentUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.flane.com.pa\/blog\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Framework de seguran\u00e7a para IA: o que \u00e9 e como aplicar um modelo integrado na empresa\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#website\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/\",\"name\":\"TechTalk powered by Fast Lane LATAM\",\"description\":\"Sharing ideas and knowledge on IT training and certification\",\"publisher\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.flane.com.pa\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#organization\",\"name\":\"Fast Lane Brasil\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png\",\"contentUrl\":\"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png\",\"width\":209,\"height\":31,\"caption\":\"Fast Lane Brasil\"},\"image\":{\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FastLane.br\",\"https:\/\/x.com\/FastLaneBr\",\"https:\/\/www.instagram.com\/fastlane.br\/\",\"https:\/\/www.linkedin.com\/company\/fastlanebr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/61993dd05b6199ccdb547e2504fae2aa\",\"name\":\"Fast Lane TechTalk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9943f25452073eb03e55f0e7e5c63ade3c1f051b706e0afa24bb9800c46ea9ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9943f25452073eb03e55f0e7e5c63ade3c1f051b706e0afa24bb9800c46ea9ce?s=96&d=mm&r=g\",\"caption\":\"Fast Lane TechTalk\"},\"sameAs\":[\"http:\/\/www.flane.com.pa\"],\"url\":\"https:\/\/www.flane.com.pa\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety","description":"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/","og_locale":"pt_BR","og_type":"article","og_title":"Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety","og_description":"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.","og_url":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/","og_site_name":"TechTalk powered by Fast Lane LATAM","article_publisher":"https:\/\/www.facebook.com\/FastLane.br","article_published_time":"2025-12-16T20:11:30+00:00","article_modified_time":"2025-12-16T20:13:39+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png","type":"image\/png"}],"author":"Fast Lane TechTalk","twitter_card":"summary_large_image","twitter_creator":"@FastLaneBr","twitter_site":"@FastLaneBr","twitter_misc":{"Escrito por":"Fast Lane TechTalk","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#article","isPartOf":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/"},"author":{"name":"Fast Lane TechTalk","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/61993dd05b6199ccdb547e2504fae2aa"},"headline":"Framework de seguran\u00e7a para IA: o que \u00e9 e como aplicar um modelo integrado na empresa","datePublished":"2025-12-16T20:11:30+00:00","dateModified":"2025-12-16T20:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/"},"wordCount":1300,"publisher":{"@id":"https:\/\/www.flane.com.pa\/blog\/#organization"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage"},"thumbnailUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png","keywords":["agentes de IA","AI safety","AI security","boas pr\u00e1ticas em IA","Ciberseguran\u00e7a","compliance","framework de seguran\u00e7a","gest\u00e3o de riscos","governan\u00e7a de IA","pol\u00edticas de seguran\u00e7a","privacidade de dados","produtividade em tecnologia","prompt injection","prote\u00e7\u00e3o de modelos","seguran\u00e7a corporativa","seguran\u00e7a de IA","seguran\u00e7a em LLM","TI e inova\u00e7\u00e3o","transforma\u00e7\u00e3o digital"],"articleSection":["Artificial Intelligence","Cisco + Splunk"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/","url":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/","name":"Framework de seguran\u00e7a para IA: como o modelo integrado da Cisco unifica AI Security e AI Safety","isPartOf":{"@id":"https:\/\/www.flane.com.pa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage"},"thumbnailUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png","datePublished":"2025-12-16T20:11:30+00:00","dateModified":"2025-12-16T20:13:39+00:00","description":"Entenda o framework integrado da Cisco para seguran\u00e7a e safety em IA: riscos, ciclo de vida, agentes, multimodalidade e uma taxonomia completa para orientar governan\u00e7a e prote\u00e7\u00e3o.","breadcrumb":{"@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#primaryimage","url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png","contentUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2025\/12\/Framework-de-seguranca-para-IA-o-que-e-e-como-aplicar-um-modelo-integrado-na-empresa.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.flane.com.pa\/blog\/pt\/framework-seguranca-para-ia-cisco\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.flane.com.pa\/blog\/es\/"},{"@type":"ListItem","position":2,"name":"Framework de seguran\u00e7a para IA: o que \u00e9 e como aplicar um modelo integrado na empresa"}]},{"@type":"WebSite","@id":"https:\/\/www.flane.com.pa\/blog\/#website","url":"https:\/\/www.flane.com.pa\/blog\/","name":"TechTalk powered by Fast Lane LATAM","description":"Sharing ideas and knowledge on IT training and certification","publisher":{"@id":"https:\/\/www.flane.com.pa\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.flane.com.pa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.flane.com.pa\/blog\/#organization","name":"Fast Lane Brasil","url":"https:\/\/www.flane.com.pa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png","contentUrl":"https:\/\/www.flane.com.pa\/blog\/wp-content\/uploads\/2019\/10\/fast-lane-ng3.png","width":209,"height":31,"caption":"Fast Lane Brasil"},"image":{"@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FastLane.br","https:\/\/x.com\/FastLaneBr","https:\/\/www.instagram.com\/fastlane.br\/","https:\/\/www.linkedin.com\/company\/fastlanebr"]},{"@type":"Person","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/61993dd05b6199ccdb547e2504fae2aa","name":"Fast Lane TechTalk","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.flane.com.pa\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9943f25452073eb03e55f0e7e5c63ade3c1f051b706e0afa24bb9800c46ea9ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9943f25452073eb03e55f0e7e5c63ade3c1f051b706e0afa24bb9800c46ea9ce?s=96&d=mm&r=g","caption":"Fast Lane TechTalk"},"sameAs":["http:\/\/www.flane.com.pa"],"url":"https:\/\/www.flane.com.pa\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/comments?post=11855"}],"version-history":[{"count":1,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11855\/revisions"}],"predecessor-version":[{"id":11857,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/posts\/11855\/revisions\/11857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/media\/11856"}],"wp:attachment":[{"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/media?parent=11855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/categories?post=11855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.flane.com.pa\/blog\/wp-json\/wp\/v2\/tags?post=11855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}