
{"id":2554,"date":"2013-08-02T00:00:00","date_gmt":"2013-08-02T00:00:00","guid":{"rendered":"http:\/\/otava.test\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/"},"modified":"2025-10-14T07:44:17","modified_gmt":"2025-10-14T07:44:17","slug":"ensuring-cloud-security-transparency-in-the-age-of-data-breaches","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/","title":{"rendered":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches"},"content":{"rendered":"<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Cloud Computing\" src=\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\" alt=\"Cloud Computing\" width=\"256\" height=\"160\" \/>Gartner recently released recommendations for gaining transparency into cloud software as a service (SaaS) contracts &#8211; including emphasis on annual security audits and certification by a third party to verify a cloud vendor\u2019s operating\/product security.<\/p>\n<p dir=\"ltr\">Gartner also recommends that contracts allow for an option to terminate the agreement in the event of a security breach if the provider fails on any material measure. Gartner\u2019s report,<em> <a href=\"https:\/\/www.gartner.com\/DisplayDocument?id=2372720&amp;ref=QuickSearch&amp;sthkw=g00247574\">Cloud Contracts Need Security Service Levels to Better Manage Risk<\/a><\/em> reveals that 80 percent of IT procurement professionals will remain dissatisfied with SaaS contract language and protections that relate to security over the next two years.<\/p>\n<p dir=\"ltr\">\u201cWe continue to see frustration among cloud services users over the form and degree of transparency they are able to obtain from prospective and current service providers,\u201d said Alexa Bona, vice president and analyst at Gartner.<\/p>\n<p dir=\"ltr\">So how can you maintain complete transparency into your cloud service provider\u2019s ability to provide ongoing secure services? The following is relevant to <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud infrastructure as a service<\/a> (IaaS) providers that may offer services to other software as a service (SaaS) providers:<\/p>\n<ul>\n<li><strong>Check compliance audit reports<\/strong>. The list of security audits that should be conducted by an independent third-party auditor at least annually is a long one &#8211; it just depends what you\u2019re looking for and what industry you\u2019re in. Take this <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/data-center-standards-cheat-sheet-from-hipaa-to-soc-2\/\">Data Center Audits Cheat Sheet<\/a> with you to your data center visit.<\/li>\n<li><strong>Visit the actual data center<\/strong>. Verify your cloud service provider owns and operates their facilities, and then schedule a tour to check out their physical and technical security. Talk to their staff and ensure they\u2019ve been trained to handle sensitive data, as well as their policies around access.<\/li>\n<li><strong>Compare industry compliance requirements with their offering<\/strong>. \u00a0Knowing who\u2019s responsible for what clears up any gaps in your overall security, and clarifying what they offer and don\u2019t also gives you insight into the scope of their services.<\/li>\n<li><strong>Find out what their breach notification policies are<\/strong>. Ask if the clause includes a standard notification policy if they discover a breach, and what the procedure involves after the event. Get your team involved to manage their end and ensure contacts are identified.<\/li>\n<\/ul>\n<p dir=\"ltr\">Gaining transparency into your cloud provider\u2019s environment may take more upfront work on your organization\u2019s part, but it could be worth it in the end &#8211; the Ponemon Institute revealed that the cost of a data breach is rising across the globe in <a href=\"https:\/\/www4.symantec.com\/mktginfo\/whitepaper\/053013_GL_NA_WP_Ponemon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf\">2013 Cost of Data Breach Study: Global Analysis<\/a> (PDF).<\/p>\n<p>Related Articles:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\">Enterprise Cloud Infrastructure as a Service (IaaS): Security, Reliability &amp; Availability Desired<\/a><\/em><br \/>\nAccording to a recent survey by IT research firm Neovise as reported by CIOInsight.com of over 800 IT decision-makers in the U.S., enterprise cloud infrastructure as a service (IaaS) is the most widely adopted form of cloud computing. Thirty-seven percent \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/enterprise-cloud-infrastructure-as-a-service-iaas-security-reliability-availability-desired\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Securing Regulated Data with a Private Cloud Infrastructure<\/a><\/em><br \/>\nDr. Larry Ponemon, chairman and founder of the Ponemon Institute described how the shift of the attack surface from the mobile device is moving to unsecure places in the cloud environment with unsecure data, as reported by HealthITSecurity.com. More specifically, \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/securing-regulated-data-with-a-private-cloud-infrastructure\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.gartner.com\/newsroom\/id\/2567015\">Gartner Says Cloud Contracts Need More Transparency to Improve Risk Management<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gartner recently released recommendations for gaining transparency into cloud software as a service (SaaS) contracts &#8211; including emphasis on annual security audits and certification by a third party to verify a cloud vendor\u2019s operating\/product security. Gartner also recommends that contracts allow for an option to terminate the agreement in the event of a security breach if the provider fails on any material measure. Gartner\u2019s report, Cloud Contracts Need Security Service Levels to Better Manage Risk reveals that 80 percent of IT procurement professionals will remain dissatisfied with SaaS contract language and protections that relate to security over the next two years. \u201cWe continue to see frustration among cloud services users over the form and degree of transparency they are able to obtain from prospective and current service providers,\u201d said Alexa Bona, vice president and analyst at Gartner. So how can you maintain complete transparency into your cloud service provider\u2019s ability to provide ongoing secure services? The following is relevant to cloud infrastructure as a service (IaaS) providers that may offer services to other software as a service (SaaS) providers: Check compliance audit reports. The list of security audits that should be conducted by an independent third-party auditor at least annually&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[45],"tags":[],"other_category":[],"class_list":["post-2554","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches | OTAVA<\/title>\n<meta name=\"description\" content=\"Discover how to ensure cloud security transparency and build trust in the age of data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches\" \/>\n<meta property=\"og:description\" content=\"Discover how to ensure cloud security transparency and build trust in the age of data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-02T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T07:44:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches\",\"datePublished\":\"2013-08-02T00:00:00+00:00\",\"dateModified\":\"2025-10-14T07:44:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\"},\"wordCount\":551,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\",\"url\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\",\"name\":\"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\",\"datePublished\":\"2013-08-02T00:00:00+00:00\",\"dateModified\":\"2025-10-14T07:44:17+00:00\",\"description\":\"Discover how to ensure cloud security transparency and build trust in the age of data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage\",\"url\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\",\"contentUrl\":\"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches | OTAVA","description":"Discover how to ensure cloud security transparency and build trust in the age of data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches","og_description":"Discover how to ensure cloud security transparency and build trust in the age of data breaches.","og_url":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/","og_site_name":"OTAVA","article_published_time":"2013-08-02T00:00:00+00:00","article_modified_time":"2025-10-14T07:44:17+00:00","og_image":[{"url":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches","datePublished":"2013-08-02T00:00:00+00:00","dateModified":"2025-10-14T07:44:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/"},"wordCount":551,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png","articleSection":["Cloud Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/","url":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/","name":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png","datePublished":"2013-08-02T00:00:00+00:00","dateModified":"2025-10-14T07:44:17+00:00","description":"Discover how to ensure cloud security transparency and build trust in the age of data breaches.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#primaryimage","url":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png","contentUrl":"https:\/\/otavawebsite.wpengine.com\/wp-content\/uploads\/images\/banners\/home\/home-banner-clouds.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2554"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2554\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2554"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}