{"id":3761,"date":"2025-03-03T09:33:45","date_gmt":"2025-03-03T04:03:45","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=3761"},"modified":"2025-03-03T09:33:45","modified_gmt":"2025-03-03T04:03:45","slug":"6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/","title":{"rendered":"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A recent <\/span><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cloud-security\/ci-cd-security\/\"><span style=\"font-weight: 400;\">SentinelOne<\/span><\/a><span style=\"font-weight: 400;\"> survey found that 84% of companies know they must secure their Continuous Integration and Continuous Deployment (CI\/CD) pipelines. 20% have already faced a security breach in the past year! It\u2019s crucial to protect these systems before an attack happens.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Software supply chain attacks have increased by <\/span><a href=\"https:\/\/www.redhat.com\/en\/blog\/ask-openshift-admin-episode-117-security-considerations-while-designing-cicd-pipeline\"><span style=\"font-weight: 400;\">742% per year<\/span><\/a><span style=\"font-weight: 400;\"> over the last three years. Hackers are finding new ways to attack every part of the development process, including CI\/CD pipelines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a CI\/CD pipeline is hacked, attackers can inject bad code, steal important data, or disrupt production. This can lead to huge financial losses and serious damage to a company\u2019s reputation. Businesses must take these threats seriously and secure their pipelines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having said this, security vs speed is a constant debate. Developers want more speed; security teams want more protection. But can both be achieved? Here are a few important ways to secure a CI\/CD pipeline without losing the speed of deployment.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Implement Least Privilege Access<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Grant only the necessary access to minimize security risks. Regular audits and role-based controls prevent insider threats.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduce risks by granting only necessary access.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use Role-Based Access Control (RBAC) to streamline permissions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Regularly audit privileges and remove inactive accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prevent insider threats by limiting unnecessary access.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">2. Deploy Secrets Management<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hardcoding credentials is a security risk &#8211; store them securely instead. Automate secret management to maintain safety without disrupting workflows.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Store API keys, credentials, and tokens securely &#8211; never in code.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use tools like HashiCorp Vault or AWS Secrets Manager.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Rotate credentials frequently and monitor their usage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encrypt secrets at rest and in transit for added protection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate secret management to maintain security without slowing workflows.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">3. Automate Security Scanning<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Security scans should be proactive, not reactive. Automate vulnerability detection to strengthen application security.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate security scans into the development lifecycle.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use SAST (Static Application Security Testing) for early detection.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement DAST (Dynamic Application Security Testing) for runtime analysis.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Leverage SCA (Software Composition Analysis) to secure third-party libraries.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate security checks to avoid delays in development.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">4. Enforce Code Signing &amp; Integrity Checks<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Ensure only verified and untampered code gets deployed. Code signing and validation help prevent supply chain attacks.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verify code authenticity with cryptographic signatures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Block deployments if signature validation fails.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implement checksum verification to detect tampering.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure repositories with branch protection and mandatory code reviews.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Strengthen defenses against supply chain attacks.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">5. Monitor and Audit Everything<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Visibility is key to security. Continuous monitoring and real-time alerts help detect threats before they escalate.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Maintain full visibility from code commits to deployment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Log all activities securely for auditing purposes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use SIEM (Security Information and Event Management) tools to detect anomalies.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set up real-time alerts for unauthorized security bypass attempts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct regular log reviews and security audits.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">6. Involve the Team<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Security isn\u2019t just for security teams &#8211; it\u2019s everyone\u2019s responsibility. Training and feedback loops build a culture of secure coding.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Train developers in secure coding best practices.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perform regular security checks to identify weak spots.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gather team feedback to improve security processes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrate security seamlessly into daily workflows.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><i><span style=\"font-weight: 400;\">With CloudNow, when it comes to the security vs speed debate, you don\u2019t have to choose. Secure smarter, and deploy faster. Talk to us for more information.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent SentinelOne survey found that 84% of companies know they must secure their Continuous Integration and Continuous Deployment (CI\/CD) pipelines. 20% have already faced a security breach in the past year! It\u2019s crucial to protect these systems before an attack happens. Software supply chain attacks have increased by 742% per year over the last [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3762,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[278],"tags":[],"class_list":["post-3761","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agile-devops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"A recent SentinelOne survey found that 84% of companies know they must secure their Continuous Integration and Continuous Deployment (CI\/CD) pipelines. 20% have already faced a security breach in the past year! It\u2019s crucial to protect these systems before an attack happens. Software supply chain attacks have increased by 742% per year over the last [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-03T04:03:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1\",\"contentUrl\":\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1\",\"width\":1200,\"height\":628},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/\",\"name\":\"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#primaryimage\"},\"datePublished\":\"2025-03-03T04:03:45+00:00\",\"dateModified\":\"2025-03-03T04:03:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/","og_locale":"en_US","og_type":"article","og_title":"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster","og_description":"A recent SentinelOne survey found that 84% of companies know they must secure their Continuous Integration and Continuous Deployment (CI\/CD) pipelines. 20% have already faced a security breach in the past year! It\u2019s crucial to protect these systems before an attack happens. Software supply chain attacks have increased by 742% per year over the last [&hellip;]","og_url":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/","og_site_name":"Discover Better Value Faster","article_published_time":"2025-03-03T04:03:45+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1","contentUrl":"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1","width":1200,"height":628},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/","name":"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#primaryimage"},"datePublished":"2025-03-03T04:03:45+00:00","dateModified":"2025-03-03T04:03:45+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-ci-cd-pipelines-without-slowing-down-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Best Practices to Secure CI\/CD Pipelines Without Slowing Down Development"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2025\/03\/Blog-175.png?fit=1200%2C628&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3761","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=3761"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3761\/revisions"}],"predecessor-version":[{"id":3763,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/3761\/revisions\/3763"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/3762"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=3761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=3761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=3761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}