
{"id":2656,"date":"2013-10-02T00:00:00","date_gmt":"2013-10-02T00:00:00","guid":{"rendered":"http:\/\/otava.test\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/"},"modified":"2013-10-02T00:00:00","modified_gmt":"2013-10-02T00:00:00","slug":"pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/","title":{"rendered":"PCI DSS &#8216;Business as Usual&#8217; Practices Provide Guidance to PCI Hosting"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"PCI SSC\" src=\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\" alt=\"PCI SSC\" width=\"128\" height=\"128\" \/>SearchSecurity.TechTarget.com recently reported on the PCI SSC (Payment Card Industry Security Standards Council) and their first annual PCI Community Meeting to discuss the changes made in PCI DSS 3.0 that affects merchants, ecommerce and retailers that deal with credit cardholder data.<\/p>\n<p>In an interview with PCI SSC Gen. Manager Bob Russo and their CTO (Chief Technology Officer) Troy Leach, they highlight the most-discussed proposed changes at the meeting, including the pain points of <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI compliant hosting<\/a> outsourcing and integrating with different vendors:<\/p>\n<blockquote><p>To that point, one of the areas we see failures is, for example, where a merchant will have good intentions to meet the requirements, but then they merge with another company, the professionals in charge of PCI change roles and new IT administrators and senior managers come in. All the while they don&#8217;t think anything has changed, but the necessary network monitoring activity is no longer being done, or more people than necessary have access to admin passwords that should have been revoked. &#8211; <span style=\"font-style: normal;\">PCI SSC CTO, Troy Leach<\/span><\/p><\/blockquote>\n<p>Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Organizations can still take advantage of outsourcing benefits, like reduced cost and system management time, but only if partnering with a client-focused PCI compliant host that clearly defines roles and responsibilities when it comes to compliance and data security.<\/p>\n<p>Leach also notes that the council&#8217;s &#8216;business as usual&#8217; practices have been well-received. These practices are detailed guides to implementing the standards, and published in a document called <em>Navigating PCI DSS<\/em>. This is a great document that really explains both the technical side and the reasoning behind the requirement &#8211; including specifically how hackers can take advantage of systems that lack the required security technology.<\/p>\n<p>One example is the PCI requirement:<\/p>\n<blockquote><p>2.2.1 Implement only one primary function per server to prevent functions that require different security levels from co-existing on the same server. (For example, web servers, database servers, and DNS should be implemented on separate servers.)<\/p>\n<p>Note: Where virtualization technologies are in use, implement only one primary function per virtual system component.<\/p><\/blockquote>\n<p>Their guidance\/reasoning for this standard is to ensure your system&#8217;s configuration standards and related processes address server functions that need to have different security levels, or that may introduce security weaknesses to other functions on the same server. An example is a database sharing a server with a web application would put the database at risk since the web app needs to be open for Internet traffic.<\/p>\n<p>Another example is the PCI requirement:<\/p>\n<blockquote><p>3.4.1 If disk encryption is used (rather than file- or column-level database encryption), logical access must be managed independently of native operating system access control mechanisms (for example, by not using local user account databases). Decryption keys must not be tied to user accounts.<\/p><\/blockquote>\n<p>The SSC explains the characteristics of disk <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a>, including the fact that disk encryption encrypts data in mass storage and automatically decrypts data when a user requests it. Disk encryption also intercepts OS read and write operations, and supplies data after a password is entered by the user. Therefore, they require that the disk encryption method can&#8217;t have a direct association with the OS, or it cannot have decryption keys associated with user accounts.<\/p>\n<p><a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" style=\"font-size: 12px;\" title=\"PCI Compliant Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-pci.png\" alt=\"PCI Compliant Hosting White Paper\" width=\"220\" height=\"99\" \/><\/a>Learn more about encryption in our <strong><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data white paper<\/a><\/strong>. Or read our\u00a0<strong><a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">PCI Compliant Hosting white paper<\/a><\/strong>\u00a0as it discusses the impact of the PCI DSS standard on data centers and server infrastructure, describes the architecture of a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data center<\/a>\u00a0both technically and contractually, and outlines the benefits and risks of data center outsourcing, and vendor selection criteria.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Jason Yaeger\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/jason-yaeger-100.jpg\" alt=\"Jason Yaeger\" width=\"100\" height=\"150\" \/>Online Tech&#8217;s Jason Yaeger, Direct of Operations, will be on a virtual panel discussion with Bob Russo of the PCI SSC, as well as Brandon Dunlap of Brightfly, Inc. and Randal Asay of Catbird. <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/recording-navigating-pci-security-mountains-in-the-cloud\/\">Join them<\/a> as they discuss the role that <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">cloud service providers<\/a> play in protecting cardholder data and inherent security issues involved on November 6 @2PM ET. Gain new insights on:<\/p>\n<ul>\n<li>Emerging PCI security risks in the cloud<\/li>\n<li>Processes for assessing risk when card data could potentially be stored in multiple locations<\/li>\n<li>Recommendations for achieving PCI compliance across virtual environments<\/li>\n<li>How to use a data-centric approach to reduce the cost and scope of PCI Compliance<\/li>\n<\/ul>\n<div><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/recording-navigating-pci-security-mountains-in-the-cloud\/\"><span style=\"font-size: medium;\"><span style=\"line-height: 19.200000762939453px;\">Sign up for the event online.<\/span><\/span><\/a><\/strong><\/div>\n<p>References:<br \/>\n<a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/navigating_dss_v20.pdf\">Navigating PCI DSS: Understanding the Intent of the Requirements, v.2.0<\/a> (PDF)<br \/>\n<a href=\"https:\/\/searchsecurity.techtarget.com\/news\/2240206282\/At-2013-PCI-annual-meeting-hot-topics-include-POS-security-EMV-chips?utm_campaign=ssec_security&amp;utm_medium=social&amp;utm_source=twitter&amp;utm_content=1380307585\">At 2013 PCI Annual Meeting, Hot Topics Include POS Security, EMV Chips<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SearchSecurity.TechTarget.com recently reported on the PCI SSC (Payment Card Industry Security Standards Council) and their first annual PCI Community Meeting to discuss the changes made in PCI DSS 3.0 that affects merchants, ecommerce and retailers that deal with credit cardholder data. In an interview with PCI SSC Gen. Manager Bob Russo and their CTO (Chief Technology Officer) Troy Leach, they highlight the most-discussed proposed changes at the meeting, including the pain points of PCI compliant hosting outsourcing and integrating with different vendors: To that point, one of the areas we see failures is, for example, where a merchant will have good intentions to meet the requirements, but then they merge with another company, the professionals in charge of PCI change roles and new IT administrators and senior managers come in. All the while they don&#8217;t think anything has changed, but the necessary network monitoring activity is no longer being done, or more people than necessary have access to admin passwords that should have been revoked. &#8211; PCI SSC CTO, Troy Leach Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Organizations can still take advantage of outsourcing benefits, like reduced cost and system&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2656","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PCI DSS &#039;Business as Usual&#039; Practices Provide Guidance to PCI Hosting | OTAVA<\/title>\n<meta name=\"description\" content=\"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PCI DSS &#039;Business as Usual&#039; Practices Provide Guidance to PCI Hosting\" \/>\n<meta property=\"og:description\" content=\"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-02T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"PCI DSS &#8216;Business as Usual&#8217; Practices Provide Guidance to PCI Hosting\",\"datePublished\":\"2013-10-02T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\"},\"wordCount\":755,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\",\"url\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\",\"name\":\"PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\",\"datePublished\":\"2013-10-02T00:00:00+00:00\",\"description\":\"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage\",\"url\":\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\",\"contentUrl\":\"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PCI DSS &#8216;Business as Usual&#8217; Practices Provide Guidance to PCI Hosting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting | OTAVA","description":"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/","og_locale":"en_US","og_type":"article","og_title":"PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting","og_description":"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.","og_url":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/","og_site_name":"OTAVA","article_published_time":"2013-10-02T00:00:00+00:00","og_image":[{"url":"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"PCI DSS &#8216;Business as Usual&#8217; Practices Provide Guidance to PCI Hosting","datePublished":"2013-10-02T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/"},"wordCount":755,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage"},"thumbnailUrl":"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/","url":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/","name":"PCI DSS 'Business as Usual' Practices Provide Guidance to PCI Hosting | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage"},"thumbnailUrl":"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png","datePublished":"2013-10-02T00:00:00+00:00","description":"Communication and strategic planning with the PCI requirement matrix is key to avoiding gaps in security. Guidance to PCI Hosting.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#primaryimage","url":"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png","contentUrl":"https:\/\/si0.twimg.com\/profile_images\/2405441459\/PCI-SSC-Twitter-Icon.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/pci-dss-business-as-usual-practices-provide-guidance-to-pci-hosting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"PCI DSS &#8216;Business as Usual&#8217; Practices Provide Guidance to PCI Hosting"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2656"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2656\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2656"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}