{"id":1678,"date":"2021-03-25T16:21:40","date_gmt":"2021-03-25T20:21:40","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1678"},"modified":"2021-03-25T16:21:44","modified_gmt":"2021-03-25T20:21:44","slug":"machine-identity-management-matters-in-security","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/","title":{"rendered":"Machine Identity Management Matters in Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-machine-identity-management-is-an-integral-part-of-ensuring-business-security-as-more-machines-are-created-and-digital-certificate-lifespans-shorten-machine-identity-management-will-become-even-more-important\">Machine identity management is an integral part of ensuring business security. As more machines are created and digital certificate lifespans shorten, machine identity management will become even more important.<\/h2>\n\n\n\n<p>When it comes to securing your business, understanding how <a href=\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\" target=\"_blank\" rel=\"noreferrer noopener\">credentials and access controls<\/a> work is a common topic of discussion. Those are incredibly important pieces of the security of your business, along with firewalls, geofences, VPN usage and other methods businesses commonly use. What business leaders do not realize, though, is that each machine that connects to the internet also has to have its own identity. This identity is what allows other machines to know that it is trustworthy. Machine identity management has long been a key piece of security, but now it\u2019s more important than ever.<\/p>\n\n\n\n<p>Machine identity is important because we need machines to trust each other. It\u2019s how we separate ourselves from the threat actors, how we know it\u2019s safe to use websites and applications. It\u2019s how we create trust. Even in zero trust networks, machine identity is what creates that trust. If machines don\u2019t trust each other, they won\u2019t communicate with each other, which means we may not have access to the information or applications we need to do our jobs and function in society.<\/p>\n\n\n\n<p>Every time a machine is created, whether physical or virtual, it is issued a digital certificate. These certificates are the identity of that specific machine, what allows other machines to know that it\u2019s safe.The problem is, there has been an over-reliance on the certificates that are supposed to be machine-specific. Frankly, they are supposed to be machine-to-machine specific. These certificates have a lifespan, however, and must be renewed from time to time. The lifespan of a digital certificate is shortening all the time, where they used to be valid for several years, security implications have forced browser-makers to shorten those lifespans. Some browser certificates were reduced to one year and it\u2019s possible we\u2019ll see that shrink to six months in the future.<\/p>\n\n\n\n<p>Unfortunately, what happens as the lifespan shortens and as more machines are assigned certificates that need monitoring, businesses simply can\u2019t keep up. Certificates have been re-used and shared across machines, they\u2019ve been exposed in code repositories or remained unchanged. When any of those things happen, a threat actor can use that weakness to gain access to your business systems.<\/p>\n\n\n\n<p>Does this result in companies needing more resources just to manage the same number of machines? Maybe. Far too many companies still manually role, issue and update certs. Compounding this problem is digital transformation, something that many businesses have in the works or are in the process of completing. Digital transformation typically involves cloud migration, which involves virtual machines galore. So how are businesses to keep up and ensure these certificates don\u2019t become a problem, without exhausting every resource at their disposal?<\/p>\n\n\n\n<p>Thankfully, someone already thought of that. We have password managers for our human credentials. For digital certificates, we have cert management, key management, and secrets management systems. These automated managers, provided by cloud providers, work in similar ways as password managers. They manage the certificates and keys for you, create unique keys and certificates for each machine-to-machine connection. You don\u2019t need to know what the key or certificate actually is, you just need to talk to the management system. This also prevents storing your keys in code, or other insecure places, for threat actors to exploit.<\/p>\n\n\n\n<p>As we move further into the cloud and have the need for increasing amounts of machines, these certificates will be increasingly important. Zero trust is rapidly coming to the forefront as the next big security practice due remote work and the need for deeper machine-to-machine verification. In addition to certs and keys, identifiers like manifests of software on the machine and other unique characteristics are used by a machine to determine if the next machine can be trusted, to understand if it has been tampered with or altered, and if it falls in a tier of limited access rather than full trust.<\/p>\n\n\n\n<p>Business leaders often overlook machine identity because it\u2019s not at the forefront of any security protocol. If you haven\u2019t looked at your machine identity management, now is the time. Hackers look to exploit any weakness they can find, so when you bring in an expert to review your security, make sure they have access to your machine identity process as well. Your business is only as strong as its weakest link.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.<\/p>\n","protected":false},"author":1,"featured_media":1695,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,5,14],"tags":[36,1910,31,2220,2218,2219,17,2221],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Machine Identity Management Matters in Security - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Machine Identity Management Matters in Security\" \/>\n<meta property=\"og:description\" content=\"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-25T20:21:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-25T20:21:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1199\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Machine Identity Management Matters in Security\",\"datePublished\":\"2021-03-25T20:21:40+00:00\",\"dateModified\":\"2021-03-25T20:21:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg\",\"keywords\":[\"Business\",\"CyberSec\",\"Cybersecurity\",\"Digital Certificates\",\"Machine Identity\",\"Machine Identity Management\",\"Security\",\"Zero Trust\"],\"articleSection\":[\"Business\",\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\",\"name\":\"Machine Identity Management Matters in Security - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg\",\"datePublished\":\"2021-03-25T20:21:40+00:00\",\"dateModified\":\"2021-03-25T20:21:44+00:00\",\"description\":\"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg\",\"width\":2560,\"height\":1199,\"caption\":\"Transport Layer Security. Protocols provide secured communications. Secure Socket Layer. TLS SSL\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Machine Identity Management Matters in Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Machine Identity Management Matters in Security - PWV Consultants","description":"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/","og_locale":"en_US","og_type":"article","og_title":"Machine Identity Management Matters in Security","og_description":"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-25T20:21:40+00:00","article_modified_time":"2021-03-25T20:21:44+00:00","og_image":[{"width":2560,"height":1199,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Machine Identity Management Matters in Security","datePublished":"2021-03-25T20:21:40+00:00","dateModified":"2021-03-25T20:21:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/"},"wordCount":762,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg","keywords":["Business","CyberSec","Cybersecurity","Digital Certificates","Machine Identity","Machine Identity Management","Security","Zero Trust"],"articleSection":["Business","Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/","url":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/","name":"Machine Identity Management Matters in Security - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg","datePublished":"2021-03-25T20:21:40+00:00","dateModified":"2021-03-25T20:21:44+00:00","description":"Machine identity management is vital to security. Business leaders should remember that digital certificates must be maintained.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Machine-Identity-Management-scaled.jpeg","width":2560,"height":1199,"caption":"Transport Layer Security. Protocols provide secured communications. Secure Socket Layer. TLS SSL"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/machine-identity-management-matters-in-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Machine Identity Management Matters in Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1678"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1678"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions"}],"predecessor-version":[{"id":1699,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions\/1699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1695"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}