{"id":24866,"date":"2021-11-10T16:57:09","date_gmt":"2021-11-10T16:57:09","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/?page_id=24866"},"modified":"2023-01-29T07:56:22","modified_gmt":"2023-01-29T07:56:22","slug":"ensure-cloud-security-in-iaas-paas-and-saas-environments","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/","title":{"rendered":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments"},"content":{"rendered":"

Ensure Cloud Security in IaaS, PaaS, and SaaS Environments<\/strong><\/h1>\n

Manage cyber & information security risks when leveraging the benefits of cloud computing.<\/span><\/p>\n

If you’re already a member, click here<\/a> to log in.<\/p>\n

Major Business Pain Points<\/strong><\/h2>\n
    \n
  • Security remains a large impediment to realizing cloud benefits. Numerous concerns still exist around the ability for data privacy, confidentiality, and integrity to be maintained in a cloud environment.<\/span><\/span><\/span><\/span><\/li>\n
  • Even if adoption is agreed upon, it becomes hard to evaluate vendors that have strong security offerings and even harder to utilize security controls that are internally deployed in the cloud environment.<\/span><\/li>\n<\/ul>\n

    \"Ensure<\/span><\/p>\n

    Recommendations<\/strong><\/h2>\n

    Key Points<\/strong><\/em><\/h3>\n
      \n
    • The cloud can be secure despite unique security threats.<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n
    • Securing a cloud environment is a balancing act of who is responsible for meeting specific security requirements.<\/span><\/span><\/span><\/li>\n
    • Most security challenges and concerns can be minimized through the structured process (CAGI) of selecting a trusted cloud security provider (CSP) partner.<\/span><\/li>\n<\/ul>\n

      Approach<\/strong><\/em><\/h3>\n

      \"Ensure<\/span><\/p>\n

        \n
      • The business is adopting a cloud environment and it must be secured, which includes:<\/span><\/li>\n
      • Ensuring business data cannot be leaked or stolen.<\/span><\/span><\/span><\/li>\n
      • Maintaining privacy of data and other information.<\/span><\/span><\/span><\/li>\n
      • Securing the network connection points.<\/span><\/li>\n
      • Determine your balancing act between yourself and your CSP; through contractual and configuration requirements, determine what security requirements your CSP can meet and cover the rest through internal deployment.<\/span><\/li>\n
      • This blueprint and associated tools are scalable for all types of organizations within various industry sectors.<\/span><\/li>\n<\/ul>\n

        Methodology and Tools<\/strong><\/h2>\n

        Executive Brief<\/strong><\/h3>\n

        Read the concise Executive Brief to find out why you should prioritize security in the cloud and review the methodology.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

          \n
        • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Executive Brief<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
        • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phases 1-5<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

          1. Determine your cloud risk profile<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

          Determine your organization\u2019s rationale for cloud adoption and what that means for your security obligations.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

            \n
          • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phase 1: Determine Your Cloud Risk Profile<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
          • Secure Cloud Usage Policy<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

            2. Identify your cloud security requirements<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

            Use the Cloud Security CAGI Tool to perform four unique assessments that will be used to identify secure cloud vendors.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

              \n
            • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phase 2: Identify Your Cloud Security Requirements<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Cloud Security CAGI Tool<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

              3. Evaluate vendors from a security perspective<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

              Learn how to assess and communicate with cloud vendors with security in mind.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

                \n
              • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phase 3: Evaluate Vendors From a Security Perspective<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
              • IaaS and PaaS Service Level Agreement Template<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
              • SaaS Service Level Agreement Template<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
              • Cloud Security Communication Deck<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

                4. Implement your secure cloud program<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

                Turn your security requirements into specific tasks and develop your implementation roadmap.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

                  \n
                • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phase 4: Implement Your Secure Cloud Program<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                • Cloud Security Roadmap Tool<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

                  5. Build a cloud security governance program<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

                  Build the organizational structure of your cloud security governance program.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

                    \n
                  • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments \u2013 Phase 5: Build a Cloud Security Governance Program<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
                  • Cloud Security Governance Program Template<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

                    All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.<\/p>\n","protected":false},"excerpt":{"rendered":"

                    Ensure Cloud Security in IaaS, PaaS, and SaaS Environments Manage cyber & information security risks when leveraging the benefits of […]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nEnsure Cloud Security in IaaS, PaaS, and SaaS Environments - Cyber Leadership Institute<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Embed Security Into the DevOps Pipeline\" \/>\n<meta property=\"og:description\" content=\"Shift security left to get into DevSecOps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-29T07:56:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/09-Embed-Security-Into-the-DevOps-Pipeline.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments\" \/>\n<meta name=\"twitter:description\" content=\"Ensure Cloud Security in IaaS, PaaS, and SaaS EnvironmentsManage cyber & information security risks when leveraging the benefits of cloud computing.If\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/\",\"name\":\"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments - Cyber Leadership Institute\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"datePublished\":\"2021-11-10T16:57:09+00:00\",\"dateModified\":\"2023-01-29T07:56:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"width\":2400,\"height\":1274},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments - Cyber Leadership Institute","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Embed Security Into the DevOps Pipeline","og_description":"Shift security left to get into DevSecOps.","og_url":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-01-29T07:56:22+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/09-Embed-Security-Into-the-DevOps-Pipeline.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments","twitter_description":"Ensure Cloud Security in IaaS, PaaS, and SaaS EnvironmentsManage cyber & information security risks when leveraging the benefits of cloud computing.If","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/","url":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/","name":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments - Cyber Leadership Institute","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","datePublished":"2021-11-10T16:57:09+00:00","dateModified":"2023-01-29T07:56:22+00:00","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","width":2400,"height":1274},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/ensure-cloud-security-in-iaas-paas-and-saas-environments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"nomel ojidrev","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/lem\/"},"uagb_comment_info":0,"uagb_excerpt":"Ensure Cloud Security in IaaS, PaaS, and SaaS Environments Manage cyber & information security risks when leveraging the benefits of […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/24866"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=24866"}],"version-history":[{"count":8,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/24866\/revisions"}],"predecessor-version":[{"id":35274,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/24866\/revisions\/35274"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=24866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}