{"id":27992,"date":"2022-11-25T18:57:09","date_gmt":"2022-11-25T13:27:09","guid":{"rendered":"https:\/\/blazeclan.com\/achieving-proactive-protection-with-cloud-security-management\/"},"modified":"2024-04-23T19:27:16","modified_gmt":"2024-04-23T13:57:16","slug":"achieving-proactive-protection-with-cloud-security-management","status":"publish","type":"post","link":"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/","title":{"rendered":"What is Cloud Security Management?"},"content":{"rendered":"<p>Cloud adoption continues to spur, with most enterprise workloads running in private data centers being replaced by the public cloud. To advance their data and infrastructure on the cloud, security leaders ought to leverage <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/4-must-have-technologies-that-made-the-gartner-hype-cycle-for-cloud-security-2021\" class=\"broken_link\">emerging innovations and technologies<\/a> of cybersecurity. Achieving proactive protection is at the center of cybersecurity strategies. However, executing this is a daunting task for organizations, who are held back due to lack of skilled resources for cloud security management.<\/p>\n<p>What does cloud security management signify? It is basically a contract between an organization and cloud service provider, where the latter manages and monitors the former\u2019s infrastructure for maintaining a robust security. Key tasks include risk assessment, navigating vulnerabilities, and penetration testing. Cloud security management is a must-have for organizations running on the cloud primarily.<\/p>\n<h2>Cloud Security Management Explained<\/h2>\n<p>Cloud security management refers to the practice of implementing and maintaining security measures to protect data, applications, and infrastructure hosted in cloud environments. It encompasses various processes, technologies, and policies designed to mitigate risks, detect and respond to threats, and ensure compliance with security standards and regulations.<\/p>\n<p>Cloud security management involves securing multiple layers of the cloud stack, including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), as well as managing access controls, encryption, identity and access management (IAM), network security, and threat intelligence.<\/p>\n<p>Effective cloud security management requires a comprehensive approach that combines proactive measures such as risk assessment, vulnerability scanning, and security monitoring with continuous updates, audits, and training to safeguard cloud assets and maintain data confidentiality, integrity, and availability in today&#8217;s dynamic and evolving threat landscape.<\/p>\n<h2>Keys to an Effective Cloud Security Management<\/h2>\n<p>An ongoing process, cloud security management must adhere to be proactive in data encryption and credentials management while scanning for potential vulnerabilities. Following are some useful tips to implement for achieving proactive protection with cloud security management.<\/p>\n<h3>Continuous Security<\/h3>\n<p>When it comes to code, design, or performance of services, the notion of optimizing later is quite damaging. Transitioning safety protocols into the continuous integration and continuous delivery cycle is bid to breed proactive security, excessively reducing the problems of misconfigurations and compliance. Security testing across the development lifecycle is what continuous security is all about. It brings agility to development processes and equips developers to mitigate the problems on the dot.<\/p>\n<h3>Identifying Misconfigurations<\/h3>\n<p>Misconfiguration, often resulting from improper training, sooner or later creates potential opportunities for cyberattackers to compromise and steal the data. Setting up access privileges and maintaining efficiency in mitigating the inescapably error-prone configurations through automated tools adds to proactive protection of the data stored in the cloud.<\/p>\n<h3>Protecting Sensitive Information<\/h3>\n<p>While the developers and DevOps teams emphasize efficiency and speed, concerns around security is often misunderstood to be taken care by the vendor. Although security of the product and client information remains considered during development, protecting sensitive information and data on the cloud goes avoided. This inevitably results in the loss, misuse, or exposure of such information and data. Educating the teams about security hygiene and enforcing policies on one hand while having security scanning integrated into the continuous integration process on the other is a perfectly balanced way to keep data loss in check.<\/p>\n<h3>Leveraging Multi-Cloud<\/h3>\n<p>When adopting the multi-cloud, organizations must remember that every environment comes with its unique security tools, which are designed for securing services delivered by that environment. However, the more the number of environments, more will be number of alerts, errors, and notifications with respect to event logs. This results into a massive overhead concerning identification of risks and threats along with their mitigation measures. Security services provided by vendors focus on reducing efforts and time for organizations in managing different monitoring systems and dashboards. Integrating every cloud environment with these services makes a feasible solution for cloud security management, which is also true in the case an organization has only one cloud environment.<\/p>\n<h3>Blending Cloud Security with Organization Culture<\/h3>\n<p>Once the organizations address their cloud security issues, blending the best practices with their culture and making employees follow them as a top priority can make a big difference. For example, organizations can include these best practices in their newsletters, or come up with security training &amp; tests, or conduct webinars for educating their teams. Gradually, every employee adopts the protection-first mindset, thereby contributing to building a robust security posture for their organization.<\/p>\n<h2>To Conclude<\/h2>\n<p>Organizations need <a href=\"https:\/\/blazeclan.com\/asean\/blog\/how-organizations-can-enhance-their-cloud-security\/\">cloud security<\/a> management that is tailored to their infrastructure and partnering with the right service provider is imperative. Keeping in mind the size of the organization, services required, budget, and the service provider\u2019s experience, it becomes easy to meet the security and compliance objectives at scale.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud adoption continues to spur, with most enterprise workloads running in private data centers being replaced by the public cloud. To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies of cybersecurity. Achieving proactive protection is at the center of cybersecurity strategies. However, executing this is a [&hellip;]<\/p>\n","protected":false},"author":192,"featured_media":24113,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1132,1098],"tags":[1225,1099,1262,1055,1104],"class_list":["post-27992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security-asean","category-managed-services-asean","tag-artificial-intelligence-asean","tag-cloud-security-asean","tag-cloud-security-management-asean","tag-machine-learning-asean","tag-multi-cloud-asean"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Cloud Security Management? - Blazeclan<\/title>\n<meta name=\"description\" content=\"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cloud Security Management? - Blazeclan\" \/>\n<meta property=\"og:description\" content=\"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Blazeclan\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/blazeclan.hq\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T13:27:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-23T13:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1680\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Team Blazeclan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:site\" content=\"@blazeclan_hq\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team Blazeclan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/\"},\"author\":{\"name\":\"Team Blazeclan\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8\"},\"headline\":\"What is Cloud Security Management?\",\"datePublished\":\"2022-11-25T13:27:09+00:00\",\"dateModified\":\"2024-04-23T13:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/\"},\"wordCount\":786,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg\",\"keywords\":[\"Artificial intelligence\",\"Cloud Security\",\"Cloud Security Management\",\"Machine Learning\",\"Multi-Cloud\"],\"articleSection\":[\"Cloud Security\",\"Managed Services\"],\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/\",\"url\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/\",\"name\":\"What is Cloud Security Management? - Blazeclan\",\"isPartOf\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg\",\"datePublished\":\"2022-11-25T13:27:09+00:00\",\"dateModified\":\"2024-04-23T13:57:16+00:00\",\"description\":\"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.\",\"breadcrumb\":{\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#breadcrumb\"},\"inLanguage\":\"ASEAN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg\",\"width\":1680,\"height\":680},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blazeclan.com\/asean\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Cloud Security Management?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#website\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"name\":\"Blazeclan\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blazeclan.com\/asean\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ASEAN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#organization\",\"name\":\"Blazeclan\",\"url\":\"https:\/\/blazeclan.com\/asean\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"contentUrl\":\"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg\",\"caption\":\"Blazeclan\"},\"image\":{\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/blazeclan.hq\/\",\"https:\/\/x.com\/blazeclan_hq\",\"https:\/\/www.instagram.com\/blazeclantechnologies\/\",\"https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/\",\"https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8\",\"name\":\"Team Blazeclan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ASEAN\",\"@id\":\"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g\",\"caption\":\"Team Blazeclan\"},\"sameAs\":[\"http:\/\/localhost\/ps-local-wp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cloud Security Management? - Blazeclan","description":"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/","og_locale":"en_US","og_type":"article","og_title":"What is Cloud Security Management? - Blazeclan","og_description":"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.","og_url":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/","og_site_name":"Blazeclan","article_publisher":"https:\/\/www.facebook.com\/blazeclan.hq\/","article_published_time":"2022-11-25T13:27:09+00:00","article_modified_time":"2024-04-23T13:57:16+00:00","og_image":[{"width":1680,"height":680,"url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg","type":"image\/jpeg"}],"author":"Team Blazeclan","twitter_card":"summary_large_image","twitter_creator":"@blazeclan_hq","twitter_site":"@blazeclan_hq","twitter_misc":{"Written by":"Team Blazeclan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#article","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/"},"author":{"name":"Team Blazeclan","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8"},"headline":"What is Cloud Security Management?","datePublished":"2022-11-25T13:27:09+00:00","dateModified":"2024-04-23T13:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/"},"wordCount":786,"commentCount":0,"publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg","keywords":["Artificial intelligence","Cloud Security","Cloud Security Management","Machine Learning","Multi-Cloud"],"articleSection":["Cloud Security","Managed Services"],"inLanguage":"ASEAN","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blazeclan.com\/asean\/blog\/achieving-proactive-protection-with-cloud-security-management\/","url":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/","name":"What is Cloud Security Management? - Blazeclan","isPartOf":{"@id":"https:\/\/blazeclan.com\/asean\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage"},"image":{"@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage"},"thumbnailUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg","datePublished":"2022-11-25T13:27:09+00:00","dateModified":"2024-04-23T13:57:16+00:00","description":"To advance their data and infrastructure on the cloud, security leaders ought to leverage emerging innovations and technologies.","breadcrumb":{"@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#breadcrumb"},"inLanguage":"ASEAN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/"]}]},{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#primaryimage","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2022\/04\/Blog-post_CSM_1-9.jpg","width":1680,"height":680},{"@type":"BreadcrumbList","@id":"https:\/\/blazeclan.com\/blog\/achieving-proactive-protection-with-cloud-security-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blazeclan.com\/asean\/"},{"@type":"ListItem","position":2,"name":"What is Cloud Security Management?"}]},{"@type":"WebSite","@id":"https:\/\/blazeclan.com\/asean\/#website","url":"https:\/\/blazeclan.com\/asean\/","name":"Blazeclan","description":"","publisher":{"@id":"https:\/\/blazeclan.com\/asean\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blazeclan.com\/asean\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ASEAN"},{"@type":"Organization","@id":"https:\/\/blazeclan.com\/asean\/#organization","name":"Blazeclan","url":"https:\/\/blazeclan.com\/asean\/","logo":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/","url":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","contentUrl":"https:\/\/blazeclan.com\/wp-content\/uploads\/2024\/10\/ITCI-Blazeclan_logo.svg","caption":"Blazeclan"},"image":{"@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/blazeclan.hq\/","https:\/\/x.com\/blazeclan_hq","https:\/\/www.instagram.com\/blazeclantechnologies\/","https:\/\/www.linkedin.com\/company\/blazeclan-technologies\/","https:\/\/www.youtube.com\/channel\/UCCKF4Lcbtus-pUoZr7Lxrow"]},{"@type":"Person","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/779910eccddff4a1ea6663b6bfb271e8","name":"Team Blazeclan","image":{"@type":"ImageObject","inLanguage":"ASEAN","@id":"https:\/\/blazeclan.com\/asean\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a43c1fa01bb3c7e839254c9084bf11ed422d7e633231f9e935096045af416ba2?s=96&d=mm&r=g","caption":"Team Blazeclan"},"sameAs":["http:\/\/localhost\/ps-local-wp"]}]}},"_links":{"self":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/27992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/users\/192"}],"replies":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/comments?post=27992"}],"version-history":[{"count":0,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/posts\/27992\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media\/24113"}],"wp:attachment":[{"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/media?parent=27992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/categories?post=27992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blazeclan.com\/asean\/wp-json\/wp\/v2\/tags?post=27992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}