{"id":15209,"date":"2024-01-29T14:29:58","date_gmt":"2024-01-29T14:29:58","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-gl\/?p=13730"},"modified":"2024-01-29T14:29:58","modified_gmt":"2024-01-29T14:29:58","slug":"understanding-cloud-security-best-practices-challenges","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-kh\/blogs\/understanding-cloud-security-best-practices-challenges\/","title":{"rendered":"Understanding Cloud Security: Best Practices &amp; Challenges"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15209\" class=\"elementor elementor-15209\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-28c70bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"28c70bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f589827\" data-id=\"f589827\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-551cd33 elementor-widget elementor-widget-image\" data-id=\"551cd33\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/sites\/7\/2024\/01\/Untitled-design-12.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e34667 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e34667\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c7c3c47\" data-id=\"c7c3c47\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0afe9d7 elementor-widget elementor-widget-text-editor\" data-id=\"0afe9d7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.20.0 - 26-03-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>If we had to describe the current weather of the digital sphere, an apt forecast would be \u2018<strong>mostly cloudy<\/strong>\u2019. It was partly cloudy back in 2015, with <a href=\"https:\/\/www.statista.com\/statistics\/1062879\/worldwide-cloud-storage-of-corporate-data\/\" target=\"_blank\" rel=\"noopener\">30%<\/a> of the world\u2019s corporate data stored in the cloud and 1.1 billion people using personal clouds such as Dropbox, Google Drive and iCloud. Fast forward to the present day, and in a mere 8-9 years, those figures have ballooned to 60% of the world\u2019s corporate data, and 2.3 billion people on personal clouds. In fact, <a href=\"https:\/\/www.businessnewsdaily.com\/4427-cloud-computing-small-business.html\" target=\"_blank\" rel=\"noopener\">92% of enterprises presently host at least some of their IT environment there<\/a>.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ad94a09 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad94a09\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2816b8d\" data-id=\"2816b8d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a146f43 elementor-widget elementor-widget-image\" data-id=\"a146f43\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/sites\/7\/2024\/01\/Cloud-share.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-919f3bf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"919f3bf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eae2b36\" data-id=\"eae2b36\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5dc99f0 elementor-widget elementor-widget-text-editor\" data-id=\"5dc99f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Why so? Because scale, flexibility, economics and ease of adoption make cloud a highly desirable option for managing organizational and personal data. There\u2019s no doubt that its scope is unprecedented &#8211; most of the streaming platforms we frequent and the games we play have been developed solely on the cloud. However, the danger lies in the fact that every asset in the cloud can be exposed to the Internet, simply because, well, you are accessing it over the Internet.<\/p><p>This danger is magnified in organizations because many of them think cloud security is comparable to on-premises security. But that\u2019s far from the case &#8211; the cloud is a different beast, and before getting onto it, one has to stringently manage and strategize what goes onto it and what doesn\u2019t, what\u2019s critical and what\u2019s not.<\/p><p>It\u2019s an oversight that is becoming increasingly widespread and costly. <a href=\"https:\/\/go.snyk.io\/state-of-cloud-security-2022.html\" target=\"_blank\" rel=\"noopener\">80% of companies<\/a> have experienced at least one cloud breach in the last year. And on the off chance you are breached, the average cost of a data breach in organizations using private cloud is <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">$4.24 million<\/a>, which balloons to $5.02 million for those using public cloud like AWS, GCP and Azure.<\/p><p>There are quite a few risks associated with the cloud, and your strategy should be designed to mitigate them. <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200603005175\/en\/Ermetic-Reports-80-Companies-Experienced-Cloud-Data\" target=\"_blank\" rel=\"noopener\">Misconfigurations are a key risk, with Gartner saying they cause 80% of all cloud data breaches<\/a>.<\/p><p>The biggest fallout of this came in the summer of 2019, with the now infamous <a href=\"https:\/\/web.mit.edu\/smadnick\/www\/wp\/2020-16.pdf\" target=\"_blank\" rel=\"noopener\">AWS Capital One breach<\/a>. A former Amazon employee named Paige Thompson created a scanning software tool that identifies cloud computing servers with misconfigured firewalls. Due to the misconfiguration, these firewalls accepted commands from outside. With this at her disposal, she launched a server-side request forgery (SSRF) attack that led to the PIIs of 100 million Americans and 6 million Canadians to be leaked. The estimated financial loss due to the hack was close to $200 million, and here\u2019s the kick: AWS only discovered the incident from their Responsible Disclosure Program, not their regular cybersecurity operations. That, too, 4 months later.<\/p><p>Since we\u2019re on the topic of AWS, another risk involves the <strong>shared responsibilities between CSPs and customers<\/strong>. Not being watertight in your distinctions for this particular risk leads to misalignment of duties, and that creates a blind spot for hackers to exploit. Here is the shared responsibility model AWS goes with these days:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d34e897 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d34e897\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-893ecd0\" data-id=\"893ecd0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e05127b elementor-widget elementor-widget-image\" data-id=\"e05127b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/sites\/7\/2024\/01\/Picture2.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9a85f7e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9a85f7e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5aa75e\" data-id=\"e5aa75e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29b6641 elementor-widget elementor-widget-text-editor\" data-id=\"29b6641\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Improper <strong>identity &amp; access management<\/strong> also becomes a big risk, as <a href=\"https:\/\/ermetic.com\/blog\/cloud\/state-of-cloud-security-2021-more-aware-yet-very-exposed\/#:~:text=Cloud%20Data%20Breaches%20Often%20Begin%20with%20Unauthorized%20Access&amp;text=Of%20all%20participants%2C%2083%25%20said,breaches%20were%20related%20to%20access\" target=\"_blank\" rel=\"noopener\">83% of organizations have experienced at least one cloud data breach related to access<\/a>. This makes it all the more important to have the right roles for the right users. And, of course, there are workflow risks, like vulnerabilities related to containers.<\/p><p>\u00a0<\/p><p>So, considering all these potential challenges, how would one go about creating a holistic cloud security plan? We believe the best plans should have these 10 elements:<\/p><p>\u00a0<\/p><p><strong>Cloud Security Architecture &amp; Strategy<\/strong><\/p><p>Before moving onto the cloud, a comprehensive assessment of risk management and criticality has to be undertaken, which forms the backbone of a sound architecture &amp; strategy. As shifting to cloud takes a long time to get right, we provide a security roadmap for you to successfully meet your goals.<\/p><p>\u00a0<\/p><p><strong>Cloud Identity &amp; Access Management<\/strong><\/p><p>This is all about giving access and granting permissions to the right people, in the right amounts. IAM is an integral part of cloud security, as stolen credentials are often the easiest way for an attacker to gain access. A principle of least privilege should be adopted while figuring this out. Here\u2019s another key tip: please, please, please keep your production and testing accounts separate.<\/p><p>\u00a0<\/p><p><strong>Cloud Resource Inventory<\/strong><\/p><p>This is a metadata inventory service that allows you to view, monitor &amp; analyse all your cloud assets (hardware &amp; software) across verticals, and gives you a snapshot of your entire inventory at any point in time. We have a host of matured as well as open-source tools to undertake this.<\/p><p>\u00a0<\/p><p><strong>Provisioning Security<\/strong><\/p><p>Cloud provisioning involves managing and configuring your IT resources (processing power, storage and network) to meet your organization\u2019s needs. Adding a layer of security tools like firewalls, threat detection and encryption on top of this can help safeguard your assets.<\/p><p>\u00a0<\/p><p><strong>Application Security<\/strong><\/p><p>From securing SaaS, DaaS, code reviews and testing to safely deploying the app on cloud, application security is a continuous process that should ideally be automated across all steps. In fact, because of the complexities involved, the world is moving toward developer first security, which focuses on identifying vulnerabilities at the time of writing code itself, not at the time of testing or release.<\/p><p>\u00a0<\/p><p><strong>Container Security<\/strong><\/p><p>Containers are preferred to VMs because they are highly portable, use fewer resources and run consistently every time regardless of the environment. However, they have the capacity to create vulnerabilities, so the need of the hour is a robust security strategy integrated into the entire software development lifecycle. (SLDC)<\/p><p>\u00a0<\/p><p><strong>Cloud Network Security Diagrams<\/strong><\/p><p>This is extremely important for your cloud security, as it gives great visibility into how network and account resources are managed. Our solutions use Hava, which maps and subsequently creates informative data flow and network security diagrams that provide great insights into the structure of your cloud.<\/p><p>\u00a0<\/p><p><strong>Logging &amp; Monitoring<\/strong><\/p><p>It is essential for all logs to be captured, and all incidents to be reported. This will give you all the necessary data to investigate &amp; take subsequent action on the same.<\/p><p>\u00a0<\/p><p><strong>Data Security<\/strong><\/p><p>This peg goes about safeguarding the three types of data on your cloud &#8211; data in rest, data in motion and data in memory. Another factor to consider is how your regular encryption methods evolve when you\u2019re dealing with cloud data.<\/p><p>\u00a0<\/p><p><strong>Incident Management &amp; Recovery<\/strong><\/p><p>The last 9 elements were all about prevention, but what if the worst has already happened? This element is key in that scenario, as it creates plans for business continuity and data recovery in the case of an unfortunate breach.<\/p><p>Such a holistic security framework gives us the know-how to deal with the most prevalent issues when it comes to testing on cloud:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60e4ac3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60e4ac3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-895b7f2\" data-id=\"895b7f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1043a36 elementor-widget elementor-widget-image\" data-id=\"1043a36\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/sites\/7\/2024\/01\/Picture3.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-642273b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"642273b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2111ef\" data-id=\"b2111ef\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8336899 elementor-widget elementor-widget-text-editor\" data-id=\"8336899\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>It also gives us the right tools for most of the issues currently plaguing the cloud sphere:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c5912b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c5912b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-02f272b\" data-id=\"02f272b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e74dff1 elementor-widget elementor-widget-image\" data-id=\"e74dff1\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/ivaluegroup.com\/en-gl\/wp-content\/uploads\/sites\/7\/2024\/01\/Picture4.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9eb2f48 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9eb2f48\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e35f648\" data-id=\"e35f648\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db95d01 elementor-widget elementor-widget-text-editor\" data-id=\"db95d01\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>It all coalesces into a fully stacked security solution, where assets &amp; resources across platforms are constantly sharing intelligence with one another. So, if you want to seamlessly lift up your organization into the cloud, without any of the growing pains and potential risks that come with it, contact us today to get started!<\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>If we had to describe the current weather of the digital sphere, an apt forecast would be \u2018mostly cloudy\u2019. It was partly cloudy back in 2015, with 30% of the world\u2019s corporate data stored in the cloud and 1.1 billion people using personal clouds such as Dropbox, Google Drive and iCloud. Fast forward to the &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-kh\/blogs\/understanding-cloud-security-best-practices-challenges\/\"> <span class=\"screen-reader-text\">Understanding Cloud Security: Best Practices &amp; Challenges<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":19,"featured_media":15059,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[109],"tags":[],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/15209"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/comments?post=15209"}],"version-history":[{"count":0,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/posts\/15209\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media\/15059"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/media?parent=15209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/categories?post=15209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/tags?post=15209"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/whitepapers?post=15209"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-kh\/wp-json\/wp\/v2\/case_studies?post=15209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}