    <meta property="twitter:title" content="Zero Trust for Applications: Verifying Access Between Workloads" />
    <meta property="twitter:description" content="Verifying and limiting network access between hosts, virtual machines, and containers is critical to every Zero Trust initiative for applications. Verifying and limiting network access between hosts, virtual machines, and containers is critical to every Zero Trust initiative for applications." />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/www.prismacloud.io\/blog","author_name":"Blaithin Underhill","author_url":"https:\/\/www.prismacloud.io\/blog\/author\/blaithin-underhill\/","title":"Zero Trust for Applications: Verifying Access Between Workloads","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"DMPH5hbvwb\"><a href=\"https:\/\/www.prismacloud.io\/blog\/cloud-security\/zero-trust-for-applications-access\/\">Zero Trust for Applications: Verifying Access Between Workloads<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.prismacloud.io\/blog\/cloud-security\/zero-trust-for-applications-access\/embed\/#?secret=DMPH5hbvwb\" width=\"600\" height=\"338\" title=\"&#8220;Zero Trust for Applications: Verifying Access Between Workloads&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"DMPH5hbvwb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.prismacloud.io\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.in\/blog\/wp-content\/uploads\/2022\/01\/Professional.jpg","thumbnail_width":400,"thumbnail_height":300,"description":"Verifying and limiting network access between hosts, virtual machines, and containers is critical to every Zero Trust initiative for applications. Verifying and limiting network access between hosts, virtual machines, and containers is critical to every Zero Trust initiative for applications."}