{"id":861,"date":"2020-09-30T10:00:00","date_gmt":"2020-09-30T14:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=861"},"modified":"2020-09-29T21:25:27","modified_gmt":"2020-09-30T01:25:27","slug":"the-importance-of-iam-controls","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/","title":{"rendered":"The Importance of IAM Controls"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">IAM Controls are an integral part of your security protocols. Utilizing least privilege, among other things, reduces the likelihood of a breach.<\/h2>\n\n\n\n<p>Identity Access Management (IAM) controls are used to give employees access to specific systems and processes in your business. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/cloud-security-best-practices-for-all-business-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">We have always stated that least privilege is the best way to set thost controls<\/a>. Only give employees access to the specific systems they need to do their jobs effectively and efficiently. The fewer people who have access to internal systems, the smaller your surface area is for an attack. The smaller the target, the easier it is to miss.\u00a0<\/p>\n\n\n\n<p>Another key piece of IAM controls is ensuring that user IDs and passwords are unique, meaning the user doesn\u2019t use the same credentials for multiple systems. This is something a federal agency learned last week when it suffered a breach. From <a href=\"https:\/\/threatpost.com\/feds-cyberattack-data-stolen\/159541\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\u201cA federal agency has suffered a successful espionage-related cyberattack that led to a backdoor and multistage malware being dropped on its network.<\/p><p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar20-268a\">issued an alert<\/a> on Thursday, not naming the agency but providing technical details of the attack. Hackers, it said, gained initial access by using employees\u2019 legitimate Microsoft Office 365 log-in credentials to sign onto an agency computer remotely.<\/p><p>\u201cThe cyber-threat actor had valid access credentials for multiple users\u2019 Microsoft Office 365 (O365) accounts and domain administrator accounts,\u201d according to CISA. \u201cFirst, the threat actor logged into a user\u2019s O365 account from Internet Protocol (IP) address 91.219.236[.]166 and then browsed pages on a SharePoint site and downloaded a file. The cyber-threat actor connected multiple times by Transmission Control Protocol (TCP) from IP address 185.86.151[.]223 to the victim organization\u2019s virtual private network (VPN) server.\u201d\u201d<\/p><\/blockquote>\n\n\n\n<p>As stated above, the bad actor had valid access for multiple users. This means that there was likely an effective phishing scheme executed at some point, or the agency\u2019s inability to patch a known vulnerability created the exposure. Regardless, this is a prime example of why IAM controls matter, why passwords should be changed every 30-60 days for especially sensitive systems, why <a href=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">MFA\/2FA are so important to employ<\/a>.<\/p>\n\n\n\n<p>With the access the hackers gained from the initial credentials, they were able to infiltrate systems, including the VPS, and bypass anti-malware protections that were in place. They established an SSH tunnel\/reverse SOCKS proxy backdoor. They then deployed their malware, which opened a port that is typically closed, and exfiltrated data. The attack has been remediated, although it\u2019s unknown when it actually took place.<\/p>\n\n\n\n<p>Aside from implementing stringent IAM controls, it is crucial for businesses to train their employees on the importance of strong passwords and phishing schemes. People have so many passwords to try and remember, it\u2019s common for them to be re-used for various sites, even at work. Encourage the use of a <a href=\"https:\/\/www.pwvconsultants.com\/blog\/password-managers-keep-your-information-secure\/\" target=\"_blank\" rel=\"noreferrer noopener\">password manager<\/a>, require password changes, use MFA where you can. But the absolute best thing you can do for your business is use least privilege. If someone doesn\u2019t need access to a system in order to do their job, don\u2019t give it to them!<\/p>\n\n\n\n<p>If you\u2019re a startup, or even an existing business, which needs to ensure the security of systems and processes, as well as protect sensitive information from nefarious actions, do your research. If it\u2019s something you question or don\u2019t fully understand, always consult an expert. When you do that, ensure that your expert is teaching you everything along the way. They may not be there to hold your hand forever, so it is important that you understand what goes into protecting your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Setting proper IAM controls is incredibly important for every business. Employing least privilege is always the way to go to reduce the likelihood of a breach.<\/p>\n","protected":false},"author":1,"featured_media":880,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4],"tags":[709,51,25,686,31,1065,1745,15,1843],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Importance of IAM Controls - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Setting proper IAM controls is incredibly important. Employing least privilege is always the way to go to reduce the likelihood of a breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Importance of IAM Controls\" \/>\n<meta property=\"og:description\" content=\"Setting proper IAM controls is incredibly important for every business. Employing least privilege is always the way to go to reduce the likelihood of a breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-30T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-30T01:25:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"The Importance of IAM Controls\",\"datePublished\":\"2020-09-30T14:00:00+00:00\",\"dateModified\":\"2020-09-30T01:25:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\"},\"wordCount\":609,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg\",\"keywords\":[\"breach\",\"Credentials\",\"cyber attack\",\"cyber sec\",\"Cybersecurity\",\"IAM controls\",\"malware\",\"MFA\",\"VPS\"],\"articleSection\":[\"Cyber Security\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\",\"name\":\"The Importance of IAM Controls - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg\",\"datePublished\":\"2020-09-30T14:00:00+00:00\",\"dateModified\":\"2020-09-30T01:25:27+00:00\",\"description\":\"Setting proper IAM controls is incredibly important. Employing least privilege is always the way to go to reduce the likelihood of a breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg\",\"width\":1920,\"height\":1238,\"caption\":\"Image by mohamed Hassan from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Importance of IAM Controls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Importance of IAM Controls - PWV Consultants","description":"Setting proper IAM controls is incredibly important. Employing least privilege is always the way to go to reduce the likelihood of a breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/","og_locale":"en_US","og_type":"article","og_title":"The Importance of IAM Controls","og_description":"Setting proper IAM controls is incredibly important for every business. Employing least privilege is always the way to go to reduce the likelihood of a breach.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-30T14:00:00+00:00","article_modified_time":"2020-09-30T01:25:27+00:00","og_image":[{"width":1920,"height":1238,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"The Importance of IAM Controls","datePublished":"2020-09-30T14:00:00+00:00","dateModified":"2020-09-30T01:25:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/"},"wordCount":609,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg","keywords":["breach","Credentials","cyber attack","cyber sec","Cybersecurity","IAM controls","malware","MFA","VPS"],"articleSection":["Cyber Security","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/","url":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/","name":"The Importance of IAM Controls - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg","datePublished":"2020-09-30T14:00:00+00:00","dateModified":"2020-09-30T01:25:27+00:00","description":"Setting proper IAM controls is incredibly important. Employing least privilege is always the way to go to reduce the likelihood of a breach.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/office-4857268_1920.jpg","width":1920,"height":1238,"caption":"Image by mohamed Hassan from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Importance of IAM Controls"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/861"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=861"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/861\/revisions"}],"predecessor-version":[{"id":890,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/861\/revisions\/890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/880"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}