
{"id":3210,"date":"2017-05-03T00:00:00","date_gmt":"2017-05-03T00:00:00","guid":{"rendered":"http:\/\/otava.test\/security-in-a-hybrid-cloud\/"},"modified":"2017-05-03T00:00:00","modified_gmt":"2017-05-03T00:00:00","slug":"security-in-a-hybrid-cloud","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/","title":{"rendered":"Security in a hybrid cloud"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-17194\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\" alt=\"Hybrid cloud security\" width=\"300\" height=\"212\" \/>One of the biggest concerns around hybrid cloud for organizations is data security. According to Gartner, 38 percent of companies who don\u2019t plan to use public cloud cited security and privacy as the main reasons. It\u2019s very logical (and necessary) to ask how the cloud will protect your <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/why-you-should-value-your-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">most valuable asset<\/a>\u00a0\u2013 your data. What are the biggest security challenges in hybrid cloud adoption?<\/p>\n<p>According to experts, the biggest security concerns in a hybrid environment are <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/compliant-cloud-services-and-how-to-maintain-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">compliance<\/a>, lack of encryption, poor SLAs, data redundancy, and data privacy and visibility. Some clouds are more equipped to handle these challenges than others, and it\u2019s important to make sure you have the cloud that addresses your needs best. Let\u2019s look at the above barriers and see how they can be addressed.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Compliance\"><\/span>Compliance:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Whether your data is moving from cloud to cloud or a cloud to a physical server, it\u2019s critical that you and your cloud service provider (whether that\u2019s you or someone else) have the correct controls in place. This is especially important in today\u2019s mobile world and BYOD.<\/p>\n<p><strong>What should you do?<\/strong> Make sure your provider can pass third-party audits as part of a standard check for regulatory compliance. But remember, just because your provider is compliant with industry regulations doesn\u2019t mean you\u2019re off the hook\u2014<em>you<\/em> as an organization must also meet requirements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Lack_of_encryption\"><\/span>Lack of encryption:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>According to a recent report, less than 10 percent of cloud providers offer encryption at rest. This could leave your data vulnerable to attacks or user abuse.<\/p>\n<p><strong>What should you do?<\/strong> Encryption could be an important component of your compliance strategy as well. Encryption is widely considered a best practice for your data. Network endpoints are some of the most vulnerable spots for an attack, so you\u2019ll want encryption between your devices. The Healthcare Insurance Portability and Accountability Act (HIPAA) does not specifically require encryption, so if you decide not to use it, think about what other measures you should take to keep your data secure. PCI requires encryption.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Poor_SLAs\"><\/span>Poor SLAs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>An SLA (Service Level Agreement) is what your provider promises to give you to operate your environment, and what they will do if they can&#8217;t provide what you need. Think of it as the guarantee seal your provider slaps on your contract. Are you getting enough with that guarantee?<\/p>\n<p><strong>What should you do? <\/strong>Pay attention to how the SLA aligns with your customer demands and have a plan to reconcile any differences. One way to do this is to determine how much availability your workloads require.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_redundancy\"><\/span>Data redundancy:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In today\u2019s world, you can\u2019t rely on just one copy of your data. What\u2019s your backup strategy? If part of your environment goes down, can you still access your data?<\/p>\n<p><strong>What should you do?<\/strong> Take advantage of multiple data centers from your provider. In case of an outage at one, you can rest assured knowing your data is backed up at another. <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">Disaster Recovery as a Service<\/a>\u00a0(DRaaS) or <a href=\"https:\/\/www.onlinetech.com\/products\/offsite-backup-and-recovery\" target=\"_blank\" rel=\"noopener noreferrer\">Backup as a Service<\/a>\u00a0(BaaS) are two different ways you can address potential downtime and data loss effectively, no matter what cloud environment you have.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_leakage\"><\/span>Data leakage:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Data leakage really boils down to data visibility. What\u2019s happening with your data, and where exactly is it going? You\u2019ll want to monitor not only external network access, but internal access as well. According to the Protenus Breach Barometer, it takes healthcare entities an average of <strong>607 days<\/strong> to <a href=\"https:\/\/20kleague.com\/2017\/02\/2016-averaged-1-healthcare-data-breach-per-day\/\" target=\"_blank\" rel=\"noopener noreferrer\">detect a data breach<\/a> from insider wrongdoing. How long will it take you? What kind of access does your provider have to your data, if any?<\/p>\n<p><strong>What should you do?<\/strong> Track your employees and track your network traffic using services such as <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">daily log review<\/a>. Some providers offer this as a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\" target=\"_blank\" rel=\"noopener noreferrer\">managed service<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Hybrid cloud, like any other environment, is only as secure as you and your partners make it. Ten years ago, organizations hesitated to move to the cloud because they assumed it wasn\u2019t secure. Now, they\u2019ve swung in the opposite direction: If it\u2019s in the cloud, it must already be secure. This isn\u2019t true! It\u2019s up to you to thoroughly vet your cloud providers, and work with them to put the proper security measures in place that will keep your data protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the biggest concerns around hybrid cloud for organizations is data security. According to Gartner, 38 percent of companies who don\u2019t plan to use public cloud cited security and privacy as the main reasons. It\u2019s very logical (and necessary) to ask how the cloud will protect your most valuable asset\u00a0\u2013 your data. What are the biggest security challenges in hybrid cloud adoption? According to experts, the biggest security concerns in a hybrid environment are compliance, lack of encryption, poor SLAs, data redundancy, and data privacy and visibility. Some clouds are more equipped to handle these challenges than others, and it\u2019s important to make sure you have the cloud that addresses your needs best. Let\u2019s look at the above barriers and see how they can be addressed. Compliance: Whether your data is moving from cloud to cloud or a cloud to a physical server, it\u2019s critical that you and your cloud service provider (whether that\u2019s you or someone else) have the correct controls in place. This is especially important in today\u2019s mobile world and BYOD. What should you do? Make sure your provider can pass third-party audits as part of a standard check for regulatory compliance. But remember, just because&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[45],"tags":[],"other_category":[],"class_list":["post-3210","post","type-post","status-publish","format-standard","hentry","category-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security in a hybrid cloud | OTAVA<\/title>\n<meta name=\"description\" content=\"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in a hybrid cloud\" \/>\n<meta property=\"og:description\" content=\"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-03T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Security in a hybrid cloud\",\"datePublished\":\"2017-05-03T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\"},\"wordCount\":726,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\",\"url\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\",\"name\":\"Security in a hybrid cloud | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\",\"datePublished\":\"2017-05-03T00:00:00+00:00\",\"description\":\"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security in a hybrid cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security in a hybrid cloud | OTAVA","description":"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Security in a hybrid cloud","og_description":"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.","og_url":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/","og_site_name":"OTAVA","article_published_time":"2017-05-03T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Security in a hybrid cloud","datePublished":"2017-05-03T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/"},"wordCount":726,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg","articleSection":["Cloud Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/","url":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/","name":"Security in a hybrid cloud | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg","datePublished":"2017-05-03T00:00:00+00:00","description":"Hybrid cloud is only as secure as you make it. It\u2019s up to you to thoroughly vet your cloud providers and put the proper security measures in place.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Hybrid-cloud-security-BLOG-05.01.17.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/security-in-a-hybrid-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Security in a hybrid cloud"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3210"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3210\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3210"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}