{"id":73927,"date":"2019-12-28T04:26:06","date_gmt":"2019-12-28T04:26:06","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=73927"},"modified":"2020-08-31T12:56:26","modified_gmt":"2020-08-31T12:56:26","slug":"google-cloud-security-features","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/google-cloud-security-features\/","title":{"rendered":"Understanding Security Features in Google Cloud Platform"},"content":{"rendered":"<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The significance of <a href=\"https:\/\/www.whizlabs.com\/blog\/cloud-security-for-beginners\/\" target=\"_blank\" rel=\"noopener noreferrer\">cloud data security<\/a> is evident as one of the critical elements for the adoption of cloud computing. Different threats to the cloud and emerging vulnerabilities present critical issues for business owners aspiring for cloud migration. The assurance of\u00a0Google cloud security\u00a0is one of the prominent reasons for the increasing adoption of <a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-platform\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud platform<\/a>. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">According to the <a href=\"https:\/\/www.isc2.org\/-\/media\/ISC2\/Landing-Pages\/2019-Cloud-Security-Report-ISC2.ashx?la=en&amp;hash=06133FF277FCCFF720FC8B96DF505CA66A7CE565\" target=\"_blank\" rel=\"noopener noreferrer\">2019 Cloud Security Report<\/a>, data loss and leakage is the most prominent cloud security concern for cybersecurity professionals. The most notable vulnerability to cloud security is evident in unauthorized access through inappropriate access controls and misuse of employee credentials. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Other prominent issues such as misconfiguration of the cloud platform, insecure interfaces and APIs, compliance, and lack of transparency in infrastructure security. The experience of Google and\u00a0Google Cloud Platform security features provide safeguards to business owners against these cloud security threats. Let us take a look at the different security features found on GCP.\u00a0<\/span><\/p>\n<blockquote><p>Follow the comprehensive guide for <a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-professional-cloud-security-engineer-certification-preparation\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud professional cloud security engineer certification preparation<\/a> and get ready to pass the exam!<\/p><\/blockquote>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Various IT leaders and managers are nervous regarding the migration of their legacy systems to cloud computing. The prime reason for this being cloud security concerns, the features of\u00a0Google cloud security tend to provide relief. IT security managers have to understand that security breaches in the GCP infrastructure are extremely rare. Google retails responsibility for security of infrastructure of Apps services alongside allocating responsibility to customers for safeguarding their instance of the service. The shared responsibility model serves as the foundation of security on GCP.\u00a0<\/span><\/p>\n<h2 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Trust Principles of Google Cloud Platform Security<\/span><\/h2>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Prior to an understanding of\u00a0Google cloud platform security features, let us reflect on the trust principles for Google Cloud Platform.\u00a0<\/span><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">The priority on security is the foremost trust principle that Google Cloud Platform adheres to. Google offers prompt notifications to system administrators and IT security engineers regarding any security breaches that could have compromised data.\u00a0<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">GCP security\u00a0offers complete control over data to customers at all times. Customers can remove or access the data on the Google Cloud Platform at any time. Google processes customer data only according to the instructions of the customer.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">It is a clear, evident fact that Google makes a large share of its revenue from advertising. However, Google maintains a strict demarcation between the data on the Google cloud and data used for advertising.\u00a0<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Information regarding locations of Google\u2019s data center is publicly available, thereby providing transparency regarding the storage of customer data on Google cloud. Furthermore, the distribution of Google\u2019s data centers throughout the world offers promising safeguards against natural disasters, especially for providing higher availability.\u00a0<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Independent auditors evaluate, certify, and validate\u00a0Google cloud security\u00a0practices. Therefore, compliance with international security and privacy standards further strengthens the assurance of security on Google Cloud Platform.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Most important of all, Google does not provide \u2018backdoor\u2019 access to customer data to any government agency or entity. Google publishes a report regarding government requests for access to customer data.\u00a0<\/span><\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Now, let us take a closer look at the GCP security features. Google is known for its global scale technical infrastructure that provides exceptional security throughout the complete information processing lifecycle. Google uses its infrastructure for secure service deployment, secure data storage with end-user privacy controls, secure intra-service communication, and safe operation by administrators. Furthermore, the infrastructure is also ideal for building Google internet services, including enterprise services such as Google Cloud Platform and consumer services such as Gmail.\u00a0<\/span><\/p>\n<blockquote><p>Aspired to get a Google Cloud certification to take your career one level up? Check out <a href=\"https:\/\/www.whizlabs.com\/google-cloud-certifications\/\" target=\"_blank\" rel=\"noopener noreferrer follow\" data-wpel-link=\"internal\">Google Cloud certification training courses<\/a>.<\/p><\/blockquote>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Layer-wise design of Google Cloud Platform Security<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The most notable highlight of\u00a0Google Cloud security\u00a0is the infrastructure design in progressive layers. The security layers start from the physical security at data centers and also encompass the hardware and software in the infrastructure. Furthermore, the security layers also focus on technical restrictions and processes for ensuring operational security. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Google invests profoundly in the security of its infrastructure, thereby providing the assurance of reliability with\u00a0GCP security. Multiple engineers work for security and privacy throughout the globe, including many recognized industry authorities, for ensuring maximum performance of Google Cloud Platform Security. An understanding of features in Google cloud platform security could expand further with an investigation of Google infrastructure security layers.<\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Here are the six layers in the\u00a0Google Cloud security\u00a0infrastructure.<\/span><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">Hardware infrastructure.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Service deployment.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">User identity.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Storage services.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Internet communication.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Operational security.<\/span><\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The Google cloud platform security has distinct functions at each level of this infrastructure. For example, the layer of user identity primarily involves the function of login abuse safeguards and authentication.<\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><strong><span class=\"s1\">The functions of the hardware infrastructure layer are:<\/span><\/strong><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">Security of physical premises.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Hardware design and provenance.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Security of Boot Stack and Machine Identity.<\/span><\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><strong><span class=\"s1\">The functions of the service deployment layer are:<\/span><\/strong><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">Access management for End User Data.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Inter-service communication encryption.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Inter-service access management.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Service identity, integrity, and isolation.<\/span><\/li>\n<\/ol>\n<p><strong><span class=\"s1\">The functions of the user identity layer are:<\/span><\/strong><\/p>\n<ol>\n<li>Authentication.<\/li>\n<li>Login abuse protection.<\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><strong><span class=\"s1\">The functions of the storage services layer are:<\/span><\/strong><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">Encryption at rest.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Data deletion.<\/span><\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><strong><span class=\"s1\">The functions of the internet communication layer are:<\/span><\/strong><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">DoS protection.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Google Front End.<\/span><\/li>\n<\/ol>\n<p class=\"p1\" style=\"text-align: justify;\"><strong><span class=\"s1\">The functions of the operational security layer are:<\/span><\/strong><\/p>\n<ol class=\"ol1\" style=\"text-align: justify;\">\n<li class=\"li1\"><span class=\"s1\">Reduction of insider risk.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Safe software development.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Security of employee devices and credentials.<\/span><\/li>\n<li class=\"li1\"><span class=\"s1\">Breach detection.<\/span><\/li>\n<\/ol>\n<blockquote><p>Google Cloud Platform promises to be better in the coming years. Let\u2019s explore what\u2019s next the Google Cloud will bring i.e. what are the <a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-trends\/\" target=\"_blank\" rel=\"noopener noreferrer follow\" data-wpel-link=\"internal\">upcoming Google Cloud Trends<\/a>!<\/p><\/blockquote>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Top Features of Google Cloud Platform Security<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">So, Google cloud platform security is a credible factor for business owners to consider the prospects of cloud migration. What do the features of Google\u2019s infrastructure security offer towards the security of customer data on Google Cloud Platform? The following section regarding security features on the GCP can shed additional light on this discussion.<\/span><\/p>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\">\n<h4><span class=\"s1\">Security on a physical level<\/span><\/h4>\n<\/li>\n<\/ul>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The physical security of GCP data centers has been a recurring theme in this discussion. A particular fraction of employees ever get the chance to visit GCP data centers. The exceptional security level of the data centers includes biometric detectors, security lasers, cameras, and alarms.\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\">\n<h4><span class=\"s1\">Safeguards from privileged access attacks<\/span><\/h4>\n<\/li>\n<\/ul>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The design of every single element of\u00a0Google Cloud security\u00a0in-house is another one of its notable features. As a result, customer data stays safe from privileged access attacks that generally occur through boot loader, the OS image, or the hypervisor. Google data centers have thousands of servers connected with a local network. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Furthermore, Google chooses and verifies building components from different vendors and designs custom, secure server boards, and networking devices. In addition, the cryptographic signatures on all low-level components such as base OS, BIOS, kernel and bootloader help in ensuring that the correct software stack boots up.\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\">\n<h4><span class=\"s1\">Data disposal features<\/span><\/h4>\n<\/li>\n<\/ul>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Data disposal is possible through thorough, logical wiping of persistent disks and other storage devices frequently. The data disposal process also involves inspection of the wiped disk by another authorized individual alongside logging and storing the outcomes of the disk wiping. The wiped driver is then sent for reuse. If the disk is found with damages, then it is stored safely and is not subject to reuse. All the facilities for data disposal involve a weekly audit.\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\">\n<h4><span class=\"s1\">Encryption of data<\/span><\/h4>\n<\/li>\n<\/ul>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">One of the prominent and\u00a0top google cloud security features\u00a0is data encryption. As a default measure, GCP provides encryption for all customer data at rest and in motion. The user does not have to do anything with the facility of automatic encryption on Google cloud platform security. For example, AES-256 serves encryption for persistent disks with the facility of encryption of the keys with master keys. Google handles the management of keys and rotation.\u00a0<\/span><\/p>\n<ul>\n<li class=\"p1\" style=\"text-align: justify;\">\n<h4><span class=\"s1\">Service deployment security<\/span><\/h4>\n<\/li>\n<\/ul>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Regarding service deployment,\u00a0Google Cloud Security\u00a0provides the assurance of three essential attributes for security service deployment. Every service on Google infrastructure has a service account identity. Therefore, each service has to provide cryptographic credentials associated with it to prove its identity during remote procedure calls (RPC). <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Clients use such identities for connecting to an intended server and restricting access to data and methods for specific clients. In addition, service deployment also involves integrity as one of the top features in google cloud platform security. The cryptographic authentication and authorization technique of Google for providing strong access control at the abstraction level is definitely a promising cloud security feature.\u00a0<\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Other security features on the Google cloud platform to ensure the integrity of customer data and GCP services are ingress and egress filtering facility at different points in the Google network to prevent IP spoofing. Another notable highlight among features for Google Cloud platform security in secure deployment refers to isolation. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The sandbox technique of Google helps in isolation of services running on the same machine. The primary applications of the technique include language and kernel-based sandboxes, hardware virtualization, and Linux user separation. Moreover, GCP also provides security for the operation of sensitive services such as cluster orchestration in Google Kubernetes Engine for specifically dedicated machines.\u00a0<\/span><\/p>\n<blockquote><p>Preparing for Google Cloud interview? Check out these\u00a0<a href=\"https:\/\/www.whizlabs.com\/blog\/google-cloud-interview-questions\/\" target=\"_blank\" rel=\"noopener noreferrer follow\" data-wpel-link=\"internal\">Google Cloud interview questions<\/a>\u00a0and get ready to ace the interview.<\/p><\/blockquote>\n<h4 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Bottom Line<\/span><\/h4>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">The efficiency of\u00a0Google Cloud security depends a lot on the Google security infrastructure, as evident in this discussion. One of the best highlights of this discussion is the insight into the shared responsibility model for GCP security. Google definitely provides credible measures to ensure the security of GCP. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">However, customers have to follow some best practices on their part for safeguarding their instances of GCP. For example, the use of managed services such as Cloud Functions and Dataflow to have smaller attack vectors. Other best practices include the use of hardened bastion hosts like load balancers and SSL proxy load balancers or the use of NAT gateways to avoid public IPs and ensure network isolation.\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">If you are a Google Cloud Security professional, you should validate your skills with a certification. To help you give your skills recognition and get certified, we offer best-in-industry <a href=\"https:\/\/www.whizlabs.com\/google-cloud-certifications\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google Cloud certification training courses<\/a>. Take the right decision and get ahead in your career!\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The significance of cloud data security is evident as one of the critical elements for the adoption of cloud computing. Different threats to the cloud and emerging vulnerabilities present critical issues for business owners aspiring for cloud migration. The assurance of\u00a0Google cloud security\u00a0is one of the prominent reasons for the increasing adoption of Google Cloud platform. According to the 2019 Cloud Security Report, data loss and leakage is the most prominent cloud security concern for cybersecurity professionals. The most notable vulnerability to cloud security is evident in unauthorized access through inappropriate access controls and misuse of employee credentials. Other prominent [&hellip;]<\/p>\n","protected":false},"author":169,"featured_media":73958,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[2859,2858,2860,2861],"class_list":["post-73927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-google-cloud","tag-gcp-security","tag-google-cloud-platform-security-features","tag-security-features-in-google-cloud-platform","tag-top-google-cloud-security-features"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features-150x150.png",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features-300x158.png",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features-250x250.png",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/12\/google-cloud-security-features.png",150,79,false]},"uagb_author_info":{"display_name":"Girdharee Saran","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/girdharee\/"},"uagb_comment_info":1,"uagb_excerpt":"The significance of cloud data security is evident as one of the critical elements for the adoption of cloud computing. Different threats to the cloud and emerging vulnerabilities present critical issues for business owners aspiring for cloud migration. The assurance of\u00a0Google cloud security\u00a0is one of the prominent reasons for the increasing adoption of Google Cloud&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/73927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/169"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=73927"}],"version-history":[{"count":4,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/73927\/revisions"}],"predecessor-version":[{"id":73941,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/73927\/revisions\/73941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/73958"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=73927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=73927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=73927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}