{"id":3700,"date":"2024-03-15T15:50:55","date_gmt":"2024-03-15T10:20:55","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=3700"},"modified":"2024-08-01T16:15:06","modified_gmt":"2024-08-01T10:45:06","slug":"from-devops-to-devsecops-seamless-transition-tactics-for-businesses","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/","title":{"rendered":"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3701\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?resize=1140%2C760&#038;ssl=1\" alt=\"\" width=\"1140\" height=\"760\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?w=1140&amp;ssl=1 1140w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?resize=750%2C500&amp;ssl=1 750w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/>DevOps is essentially a collaborative model that brings together software development and operations. DevSecOps integrates security throughout the software development life cycle. The two have a lot in common in the sense they both use automation to improve the development process and business, eliminating bottlenecks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With DevOps, automation allows updates to be deployed more quickly, while with DevSecOps, automation provides secure processes automatically, reducing overhead and human error. Similarly, in DevOps, active monitoring involves early testing to ensure quick updates while in DevSecOps, active monitoring involves keeping watch for malicious logins and unauthorized access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DevOps is focused on efficiency, while DevSecOps brings security into the mix.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Here\u2019s how you can plan your transition to a DevSecOps Strategy<\/span><\/h3>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adopt a security-first culture that integrates security into every aspect of the application lifecycle.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide ongoing security training for developers, operations personnel, security teams, and everyone involved in the CI\/CD pipeline, as this will help stay updated with the latest security practices and technologies.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Maintain a proactive approach to the evolving threat landscape and emerging practices to prevent and mitigate emerging threats. Embed security measures throughout the software development lifecycle, conducting threat modeling, security testing, and secure code deployment.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Modernize cloud-based and cloud-native microservices architecture to enhance scalability, flexibility, and security so that vulnerabilities are fixed without disruption to operations.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Only select secure DevOps tools that align with CI\/CD security requirements and then regularly review and update these tools to ensure they remain secure and up to date.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate security testing with tools such as static analysis security testing, dynamic analysis security testing, and software composition analysis (SCA). Also regularly review and update security policies and procedures to align with industry standards and regulatory frameworks.<\/span><\/li>\n<\/ol>\n<h3><span style=\"font-weight: 400;\">Let\u2019s look at the example of Paypal\u2019s DevSecOps Implementation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In 2017, PayPal had 4,500 developers, 1 million builds per month, 2,600 apps, and 42,000 batch executions a day, which is why the company embedded repeatable proactive security practices in their product life cycle too, according to their security strategist, \u201cmake it incredibly hard for developers to shoot themselves in the foot when it comes to security\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cChange champions\u201d and \u201ctransformation team members\u201d were assigned to help the organization through the process, which they wanted to complete in less than a year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Paypal also created actionable security stories in developer lingo, not security lingo, added clear usage guidelines, provided secure code snippets, and gave developers the autonomy to implement approved security controls. And of course, it led to improved efficiency too.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Cultural and technical challenges in DevSecOps, and their solutions<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Resistance:<\/b><span style=\"font-weight: 400;\"> Siloed organizational structures can hinder the transition to DevSecOps. The solution here would be to encourage open communication.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Legacy:<\/b><span style=\"font-weight: 400;\"> Outdated processes may not easily integrate with DevSecOps practices, but gradual modernization and implementation of automated security controls can help with the transition to a modern environment.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tools:<\/b><span style=\"font-weight: 400;\"> The array of security tools and technologies available can be overwhelming but choosing the right one that integrates with existing workflows and provides comprehensive security coverage is essential. Also, invest in training to ensure teams are proficient in using these tools.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Tools and tech to power your transition to a DevSecOps strategy<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Static Application Security Testing<\/b><span style=\"font-weight: 400;\"> identifies security vulnerabilities in source code during the development phase<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dynamic Application Security Testing<\/b><span style=\"font-weight: 400;\"> simulates attacks and runs applications for vulnerabilities<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Container Security Scanning<\/b><span style=\"font-weight: 400;\"> checks container images for vulnerabilities and misconfigurations before deployment<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Infrastructure as Code (IaC) Security<\/b><span style=\"font-weight: 400;\"> ensures security best practices using automation tools like Terraform or AWS CloudFormation<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Measuring success in your DevSecOps Implementation<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">It requires a combination of quantitative and qualitative metrics. Some of them are\u2026<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Application change time:<\/b><span style=\"font-weight: 400;\"> Includes the time used to build, test, and release an update. Shorter times can suggest more efficient development pipelines. Similarly, application deployment frequency or the number of deployments to production in a period could suggest problems with the team or workflow.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Change failure rate or percentage of failed production deployments:<\/b><span style=\"font-weight: 400;\"> A high failure rate could indicate a problem with team skills or the deployment process.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mean time to recovery (MTTR):<\/b><span style=\"font-weight: 400;\"> This is the time between a failed deployment and subsequent full restoration of production operations. Short MTTR metrics indicate strong control of the deployment environment.<\/span>&nbsp;<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Patch time:<\/b><span style=\"font-weight: 400;\"> This is the time between identifying a vulnerability and successful production deployment of a patch. It\u2019s indicative of DevSecOps developers\u2019 ability to find and fix a software defect.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">Transitioning from DevOps to DevSecOps is critical for businesses today and if you are looking for a way to adopt the right tools and technologies to integrate security into every aspect of the development lifecycle, give us a call at CloudNow.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DevOps is essentially a collaborative model that brings together software development and operations. DevSecOps integrates security throughout the software development life cycle. The two have a lot in common in the sense they both use automation to improve the development process and business, eliminating bottlenecks. With DevOps, automation allows updates to be deployed more quickly, [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3701,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-3700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-others"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster<\/title>\n<meta name=\"description\" content=\"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-15T10:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-01T10:45:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"760\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1\",\"width\":1140,\"height\":760},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/\",\"name\":\"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#primaryimage\"},\"datePublished\":\"2024-03-15T10:20:55+00:00\",\"dateModified\":\"2024-08-01T10:45:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"description\":\"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster","description":"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/","og_locale":"en_US","og_type":"article","og_title":"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster","og_description":"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.","og_url":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/","og_site_name":"Discover Better Value Faster","article_published_time":"2024-03-15T10:20:55+00:00","article_modified_time":"2024-08-01T10:45:06+00:00","og_image":[{"width":1140,"height":760,"url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1","width":1140,"height":760},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/","name":"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#primaryimage"},"datePublished":"2024-03-15T10:20:55+00:00","dateModified":"2024-08-01T10:45:06+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"description":"Learn seamless tactics for transitioning to DevSecOps with expert insights. Integrate security into your development lifecycle effectively.","breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/from-devops-to-devsecops-seamless-transition-tactics-for-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"From DevOps to DevSecOps: Seamless Transition Tactics for Businesses"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2024\/03\/Blog-154.png?fit=1140%2C760&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=3700"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3700\/revisions"}],"predecessor-version":[{"id":3727,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3700\/revisions\/3727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/3701"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=3700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=3700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=3700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}