{"id":3054,"date":"2015-02-06T14:05:40","date_gmt":"2015-02-06T14:05:40","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3054"},"modified":"2015-02-06T21:40:33","modified_gmt":"2015-02-06T21:40:33","slug":"13-reasons-cloud-security-projects-will-always-fail","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/","title":{"rendered":"13 reasons why some cloud security projects will always fail"},"content":{"rendered":"<p>Yes.<a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-615\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\" alt=\"cloud security\" width=\"237\" height=\"212\" \/><\/a><\/p>\n<p>I know.<\/p>\n<p>I subscribe too.<\/p>\n<p>&#8216;<em>Failure is an event not the person.&#8217; <\/em><\/p>\n<p><em>&#8216;Failure is critical to success.&#8217; <\/em><\/p>\n<p>And my favorite<em>, <\/em><\/p>\n<p><em>&#8216;fail forward.&#8217;<\/em><\/p>\n<p>But if your cloud security project fail, you will have hell to pay.<\/p>\n<p>Nobody wants to pay hell.<\/p>\n<p>Nobody.<\/p>\n<p>Have you considered what your hell will look and feel like if your <a href=\"http:\/\/searchcloudsecurity.techtarget.com\/essentialguide\/How-to-evaluate-choose-and-work-securely-with-cloud-service-providers\">cloud security\u00a0 <\/a>project fails?<\/p>\n<p style=\"padding-left: 90px;\"><em><span style=\"color: #ff0000;\">Further reading: <a style=\"color: #ff0000;\" href=\"http:\/\/www.cloudcomputing-news.net\/news\/2014\/nov\/25\/four-key-ways-overcome-security-concerns-cloud\/\">Four key ways to overcome security concerns in the cloud.<\/a><\/span><\/em><\/p>\n<p>\u00a0Because remote computing\u00a0 opens up new possibilities for cloud security breaches, failure to address the following 13 concerns\u00a0 with your cloud service provider (CSP) spells doom.<\/p>\n<h4>Neglecting to ask these 13 questions guarantee IT cloud security failure.<\/h4>\n<ul>\n<li>\u00a0\u00a0 What security services are included in the offering (s)<\/li>\n<li>\u00a0\u00a0\u00a0 Governance<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. What kind of IT Security policies are in place?<\/p>\n<p style=\"padding-left: 60px;\">b. How will the CSP engage with your organization to ensure that offerings comply with security policies?<\/p>\n<ul>\n<li>\u00a0Encryption:<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. What encryption technology is used?<\/p>\n<p><strong>Has the encryption technology been granted a National institute of Standards and Technology (NIST) Cryptographic Module validation Program (CMVP) certificate?<\/strong><\/p>\n<p style=\"padding-left: 60px;\">b. What encryption options are available?<\/p>\n<p style=\"padding-left: 60px;\">c. What encryption algorithm is used and what is the key size?<\/p>\n<p style=\"padding-left: 60px;\">d. Who stores the keys?<\/p>\n<ul>\n<li>Incidents<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. What are the security incident response policies and procedures?<\/p>\n<p style=\"padding-left: 60px;\">b. How will the CSP engage your organization security incident response team?<\/p>\n<ul>\n<li>\u00a0Reporting:<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. What kind of proactive monitoring\/support is available?<\/p>\n<p style=\"padding-left: 60px;\">b. How are requests for information or data about IT security addressed?<\/p>\n<ul>\n<li>Monitoring:<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. What kind of proactive monitoring\/support is available?<\/p>\n<p style=\"padding-left: 60px;\">b.\u00a0 To what extent is it possible for your organization to monitor security in the cloud environment?<\/p>\n<ul>\n<li>Firewalls:<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a. How are firewalls managed?<\/p>\n<p style=\"padding-left: 60px;\">b.\u00a0 Can your organization require firewalls in the cloud environment?<\/p>\n<ul>\n<li>Can the CSP segment or isolate data and, if so, under what circumstances?<\/li>\n<\/ul>\n<ul>\n<li>How is Virtualization Security addressed?<\/li>\n<\/ul>\n<ul>\n<li>\u00a0What levels and types of IT security have other entities within your industry adopted for cloud services?<\/li>\n<\/ul>\n<ul>\n<li>\u00a0For CSPs that do not share application, system, or security logs but make a console available to view the status of services:<\/li>\n<\/ul>\n<p style=\"padding-left: 90px;\">a.\u00a0 What views are available? If possible, ask for samples to the response.<\/p>\n<p style=\"padding-left: 90px;\">b.\u00a0 What, if any, customization of views is possible?<\/p>\n<p style=\"padding-left: 90px;\">c.\u00a0 If the visibility to actual provider infrastructure is limited, how does this the impact the ability to identify security incidents and security trouble shooting?<\/p>\n<ul>\n<li>Does the CSP conduct penetration testing\u00a0 (Pen tests)?<\/li>\n<\/ul>\n<p style=\"padding-left: 90px;\">\u00a0a.\u00a0 Are these tests conducted by the CSP or by a third party?<\/p>\n<p style=\"padding-left: 90px;\">\u00a0b.\u00a0 What is the frequency of PEN testing?<\/p>\n<ul>\n<li>Can the CSP conduct vulnerability scans?<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">a.\u00a0 What is the vulnerability scanning and remediation process?<\/p>\n<p style=\"padding-left: 60px;\">b.\u00a0 What platforms\/services do the vulnerability scans address?<\/p>\n<p style=\"padding-left: 60px;\">c.\u00a0 Does the CSP report vulnerability scan results to the customer?<\/p>\n<p>\u00a0Every CIO has cloud security on their radar. The federal government has taken this concern even further by creating the Federal Risk And Authorization Program ( FEDRAMP).<\/p>\n<p>What is FEDRAMP?<\/p>\n<p>Think of it as the police for cloud security.<\/p>\n<p>Officially, it is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.<\/p>\n<p>Not government?<\/p>\n<p>Consider the 13 ways mentioned above to vet your CSP for your cloud security project.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Further\u00a0 Reading:<\/em><\/p>\n<ul>\n<li><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/cloud-consciousness-check-pulse-part-2\/\">Cloud Consciousness. Check your pulse. <\/a><\/li>\n<li><a href=\"http:\/\/searchcloudsecurity.techtarget.com\/essentialguide\/How-to-evaluate-choose-and-work-securely-with-cloud-service-providers\">CSA STAR promises a means to evaluate provider security<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Yes. I know. I subscribe too. &#8216;Failure is an event not the person.&#8217; &#8216;Failure is critical to success.&#8217; And my favorite, &#8216;fail forward.&#8217; But if your cloud security project fail, you will have hell to pay. Nobody wants to pay hell. Nobody. Have you considered what your hell will look and feel like if your [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[31],"class_list":["post-3054","post","type-post","status-publish","format-standard","hentry","category-cloud","tag-cloud-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>13 reasons why some cloud security projects will always fail - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"13 reasons why some cloud security projects will always fail - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-06T14:05:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-06T21:40:33+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"13 reasons why some cloud security projects will always fail\",\"datePublished\":\"2015-02-06T14:05:40+00:00\",\"dateModified\":\"2015-02-06T21:40:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\"},\"wordCount\":552,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\",\"keywords\":[\"Cloud Security\"],\"articleSection\":[\"Cloud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\",\"name\":\"13 reasons why some cloud security projects will always fail - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\",\"datePublished\":\"2015-02-06T14:05:40+00:00\",\"dateModified\":\"2015-02-06T21:40:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage\",\"url\":\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\",\"contentUrl\":\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"13 reasons why some cloud security projects will always fail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"13 reasons why some cloud security projects will always fail - TechTonic Times","description":"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/","og_locale":"en_US","og_type":"article","og_title":"13 reasons why some cloud security projects will always fail - TechTonic Times","og_description":"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/","og_site_name":"TechTonic Times","article_published_time":"2015-02-06T14:05:40+00:00","article_modified_time":"2015-02-06T21:40:33+00:00","og_image":[{"url":"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg","type":"","width":"","height":""}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"13 reasons why some cloud security projects will always fail","datePublished":"2015-02-06T14:05:40+00:00","dateModified":"2015-02-06T21:40:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/"},"wordCount":552,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage"},"thumbnailUrl":"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg","keywords":["Cloud Security"],"articleSection":["Cloud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/","name":"13 reasons why some cloud security projects will always fail - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage"},"thumbnailUrl":"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg","datePublished":"2015-02-06T14:05:40+00:00","dateModified":"2015-02-06T21:40:33+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Cloud security, while not a sexy topic is critical. Here are 13 security considerations if you plan to venture into the cloud.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#primaryimage","url":"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg","contentUrl":"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2011\/07\/imagesCAH9QC7O.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/13-reasons-cloud-security-projects-will-always-fail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"13 reasons why some cloud security projects will always fail"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3054"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3054\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}