Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the absolute-reviews domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the advanced-popups domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the canvas domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the powerkit domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the sight domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the loginizer domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the rank-math domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-optimize domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home1/cloudpatterns/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home1/cloudpatterns/public_html/wp-includes/functions.php:6114) in /home1/cloudpatterns/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":3493,"date":"2023-12-12T08:17:48","date_gmt":"2023-12-12T08:17:48","guid":{"rendered":"https:\/\/cloudpatterns.org\/?p=3493"},"modified":"2023-12-12T08:20:14","modified_gmt":"2023-12-12T08:20:14","slug":"aws-detective","status":"publish","type":"post","link":"https:\/\/cloudpatterns.org\/aws-detective\/","title":{"rendered":"Master Your Cloud Security: A Deep Dive into AWS Detective"},"content":{"rendered":"\n

Imagine having a personal detective at your disposal, always ready to scrutinize, analyze, and expose potential threats in the vast landscape of cloud security. Amazon Web Services (AWS) offers precisely that. Welcome to the world of AWS Detective – a powerful and innovative tool that simplifies the daunting task of investigating security issues by analyzing data from multiple sources and offering interactive visualizations. Let\u2019s navigate through this powerful tool and see how it can revolutionize your approach to cloud security.<\/p>\n\n\n\n

Exploring AWS Detective: Your Cybersecurity Sleuth<\/h2>\n\n\n\n
\"Security<\/figure>\n\n\n\n

In the cybersecurity space, Amazon Detective operates much like a virtual investigator. It is a security service that facilitates efficient security investigations by aggregating data from multiple sources and offering interactive visualizations. Amazon Detective provides a unified, interactive view of AWS resources, users, and their interactions over time, making it ideal for multi-account monitoring deployments. This is accomplished by evaluating trillions of events from various data sources including Amazon VPC Flow Logs, Amazon EKS audit logs, and Amazon GuardDuty findings.<\/p>\n\n\n\n

The pricing model for AWS Detective is based on the volume of data ingested from various logs and findings. This makes it a cost-effective solution for organizations of all sizes, ensuring that top-notch security analysis doesn\u2019t break the bank.<\/p>\n\n\n\n

Understanding the Behavior Graph<\/h3>\n\n\n\n

The Behavior Graph in AWS Detective forms the core of its analytical capabilities. It provides a dynamic visual representation of the relationships and interactions between different entities and resources within an AWS environment, assisting security teams in understanding behavior patterns and detecting any suspicious activities. AWS Detective automatically collects log data from various sources to create the Behavior Graph.<\/p>\n\n\n\n

The Behavior Graph utilizes machine learning algorithms to analyze and correlate data from various sources, such as AWS CloudTrail logs and VPC Flow Logs, to identify patterns and anomalies in user behavior. This aids security teams in understanding the context and extent of an incident, enabling them to make decisions for remediation based on better data.<\/p>\n\n\n\n

The Behavior Graph is akin to a cyber-detective\u2019s magnifying glass, revealing hidden patterns and providing critical clues for proactive security management.<\/p>\n\n\n\n

The Role of Machine Learning in AWS Detective<\/h3>\n\n\n\n

Machine learning is the unseen power that fuels AWS Detective\u2019s analytical strength. It analyzes and detects patterns in log data in order to identify potential security threats and anomalies. AWS Detective\u2019s machine learning algorithms analyze events and log data from various sources such as AWS CloudTrail, VPC Flow Logs, and Amazon GuardDuty findings. It uses machine learning, statistical analysis, and graph theory to construct a linked set of data referred to as a security behavior graph.<\/p>\n\n\n\n

While the exact accuracy metrics of the machine learning analysis in AWS Detective may not be publicly accessible, rest assured that AWS Detective is built on AWS\u2019s expertise in machine learning and security, ensuring a high degree of accuracy in its analysis.<\/p>\n\n\n\n

It\u2019s like having a seasoned detective who never sleeps, always alert and ready to uncover potential threats in your AWS environment.<\/p>\n\n\n\n

Unpacking AWS Detective’s Key Features<\/h2>\n\n\n\n
\"Detective<\/figure>\n\n\n\n

AWS Detective is filled with a multitude of features designed to reinforce your cloud security posture. One of its key characteristics is its ability to provide multi-account service insights by utilizing multiple AWS services. This feature enables:<\/p>\n\n\n\n

    \n
  • The analysis, investigation, and identification of potential security issues or suspicious activity across multiple AWS accounts<\/p><\/li>\n\n\n\n

  • Built-in, multi-account log analysis, offering visibility into role usage and cross-account activity<\/p><\/li>\n\n\n\n

  • Enhancing the efficiency of security investigations and providing valuable insights into the context of potential security threats<\/p><\/li>\n<\/ul>\n\n\n\n

    Another significant feature is its seamless integration with other AWS security services, such as AWS Security Hub and AWS Organizations. This integration simplifies the process of investigating security findings from services such as Amazon GuardDuty and Amazon Security Lake, providing necessary data and context for efficient security analysis.<\/p>\n\n\n\n

    Multi-Account Service Insights<\/h3>\n\n\n\n

    The multi-account service insights feature of AWS Detective acts as a security control center. It offers a centralized view of your security landscape, aggregating data and findings from up to 1000 AWS accounts, including member accounts. It allows users to analyze, investigate, and identify potential security issues or suspicious activity across multiple accounts. Through its built-in, multi-account log analysis, Detective provides visibility into role usage, cross-account activity, and other security-related insights.<\/p>\n\n\n\n

    This feature offers several advantages:<\/p>\n\n\n\n

      \n
    • Increased visibility<\/p><\/li>\n\n\n\n

    • Centralized administration<\/p><\/li>\n\n\n\n

    • Improved security posture<\/p><\/li>\n\n\n\n

    • Streamlined investigations<\/p><\/li>\n\n\n\n

    • Scalability<\/p><\/li>\n<\/ul>\n\n\n\n

      It contributes to threat detection by providing continuous monitoring for malicious activity and unauthorized behavior across multiple AWS accounts, integrating with services such as Amazon GuardDuty and Amazon Inspector to detect and investigate security findings, thereby enhancing overall cloud security.<\/p>\n\n\n\n

      Integration with AWS Security Services<\/h3>\n\n\n\n

      AWS Detective works well in a team setting. It integrates with other AWS Security Services, including AWS Security Hub and AWS Organizations, creating a comprehensive and robust security ecosystem. This integration means that AWS Detective can leverage the capabilities of other AWS services to boost its own performance and functionality.<\/p>\n\n\n\n

      The benefits of this integration are manifold. It facilitates the process of investigating security findings from services such as Amazon GuardDuty and Amazon Security Lake, providing necessary data and context for efficient security analysis. This integration forms a powerful, comprehensive security solution, akin to a roundtable of cybersecurity experts, each contributing their unique skills and insights to protect your AWS environment.<\/p>\n\n\n\n

      Implementing AWS Detective for Proactive Security<\/h2>\n\n\n\n
      \"Illustration<\/figure>\n\n\n\n

      Incorporating AWS Detective into your security practices offers several benefits:<\/p>\n\n\n\n

        \n
      • It acts as a new team member, consistently alert and meticulously examining your cloud environment for any signs of issues.<\/p><\/li>\n\n\n\n

      • The setup and configuration process is straightforward, designed to get you started with minimal effort.<\/p><\/li>\n\n\n\n

      • AWS Detective encourages a proactive approach to security, providing best practices for ongoing monitoring and maintenance.<\/p><\/li>\n\n\n\n

      • It ensures that your cloud security remains robust and updated.<\/p><\/li>\n<\/ul>\n\n\n\n

        The maintenance of AWS Detective for long-term use involves:<\/p>\n\n\n\n

          \n
        • Ensuring it is enabled for the AWS accounts and regions where you wish to collect and analyze security data<\/p><\/li>\n\n\n\n

        • Monitoring the Detective findings and investigating any suspicious or anomalous activities<\/p><\/li>\n\n\n\n

        • Integrating with other AWS security services, like GuardDuty and Amazon VPC Flow Logs, to strengthen your security posture.<\/p><\/li>\n<\/ul>\n\n\n\n

          Setup and Configuration<\/h3>\n\n\n\n

          Establishing and configuring AWS Detective resembles setting the gears of a clock in motion, with each component working in sync to maintain security operations. There are no prerequisites to utilizing AWS Detective, making it an accessible solution for organizations of all sizes. After the setup and configuration, one can access AWS Detective by following the steps outlined in the AWS Detective documentation, available at the AWS Detective Setup Guide link.<\/p>\n\n\n\n

          The service can be customized to meet individual user requirements, much like tailoring a suit to fit perfectly. This customization allows for an adaptable and flexible approach to security management, ensuring AWS Detective aligns with the unique needs and challenges of your organization.<\/p>\n\n\n\n

          Best Practices for Ongoing Monitoring<\/h3>\n\n\n\n

          Maintaining AWS Detective is comparable to tending to a garden. It requires regular attention, nurturing, and a proactive approach to ensure it remains healthy and productive. For optimal security, it is suggested to review findings in AWS Detective on a regular basis, at least once a week or as often as necessary to remain informed of potential security issues.<\/p>\n\n\n\n

          AWS Detective offers the following features:<\/p>\n\n\n\n

            \n
          • Automated detection and investigation capabilities<\/p><\/li>\n\n\n\n

          • Machine learning algorithms to analyze and correlate data from different AWS services<\/p><\/li>\n\n\n\n

          • Detection of potential security problems and anomalies<\/p><\/li>\n\n\n\n

          • Proactive approach to detecting and responding to suspicious activities<\/p><\/li>\n\n\n\n

          • Enhancing overall risk mitigation strategy<\/p><\/li>\n<\/ul>\n\n\n\n

            Real-World Applications: AWS Detective Use Cases<\/h2>\n\n\n\n

            Beyond theory and technical jargon, AWS Detective has practical applications that bring tangible benefits to organizations. It has been utilized in the real world to:<\/p>\n\n\n\n

              \n
            • Investigate potential security breaches, such as unauthorized access or data exfiltration<\/p><\/li>\n\n\n\n

            • Expedite incident response procedures<\/p><\/li>\n\n\n\n

            • Facilitate incident response by providing automated alerting and notifications based on past data and criteria of conditions<\/p><\/li>\n\n\n\n

            • Aid security analysts in investigating and responding to security incidents effectively<\/p><\/li>\n<\/ul>\n\n\n\n

              AWS Detective has been employed to investigate suspicious activities in a variety of scenarios. Examples include the investigation of security issues in Amazon EKS clusters, analysis of VPC flow logs, and determination of the root cause of potential security issues. It has been highly successful in streamlining incident response in real-world scenarios, offering automated threat detection and investigation capabilities, allowing security teams to promptly identify and address security incidents.<\/p>\n\n\n\n

              Investigating Suspicious Activities<\/h3>\n\n\n\n

              AWS Detective acts like a bloodhound, constantly tracking suspicious activities. It gathers and analyzes events that describe IP traffic, AWS management operations, and malicious or unauthorized activity from AWS, facilitating the analysis, investigation, and rapid identification of the root cause of security findings or potential security issues.<\/p>\n\n\n\n

              AWS Detective, one of the AWS partner security products:<\/p>\n\n\n\n

                \n
              • Identifies potential security threats<\/p><\/li>\n\n\n\n

              • Gathers and examines security data<\/p><\/li>\n\n\n\n

              • Investigates and visualizes security issues<\/p><\/li>\n\n\n\n

              • Assists security analysts in analyzing and investigating suspicious activities<\/p><\/li>\n\n\n\n

              • Determines the root cause of potential security issues<\/p><\/li>\n<\/ul>\n\n\n\n

                By providing automated detection and investigation capabilities, AWS Detective enables organizations to take a proactive approach to detecting and responding to suspicious activities, thereby enhancing their overall risk mitigation strategy.<\/p>\n\n\n\n

                Streamlining Incident Response<\/h3>\n\n\n\n

                When a security incident occurs, AWS Detective takes charge as the coordinator, simplifying the response process. It integrates with other AWS security services, providing automated alerting and notifications based on past data and criteria of conditions, which can aid security analysts in investigating and responding to security incidents effectively.<\/p>\n\n\n\n

                Through its automated detection and alerts, AWS Detective offers the following benefits:<\/p>\n\n\n\n

                  \n
                • Reduces the time and effort needed to investigate and respond to incidents<\/p><\/li>\n\n\n\n

                • Results in faster incident resolution<\/p><\/li>\n\n\n\n

                • Lessens the impact on the organization By aggregating data from various AWS sources, AWS Detective enables organizations to effectively respond to security incidents and reduce their impact.<\/p><\/li>\n<\/ul>\n\n\n\n

                  It\u2019s like having an experienced incident commander at your service, directing your security teams to respond swiftly and effectively.<\/p>\n\n\n\n

                  Enhancing Team Efficiency with AWS Detective<\/h2>\n\n\n\n
                  \"New<\/figure>\n\n\n\n

                  AWS Detective is more than a tool; it is a collaborator, designed to boost the efficiency of your security teams. Its automation features reduce manual effort and human error in the detection and investigation of security incidents. AWS Detective facilitates detection and alerts by leveraging machine learning algorithms to automatically analyze resources in your AWS environment, thereby identifying potential indicators of compromise or suspicious activity.<\/p>\n\n\n\n

                  Team efficiency can be improved through AWS Detective\u2019s automation features in several ways. These include time-saving investigations, finding groups, and integration with existing tools and automations.<\/p>\n\n\n\n

                  AWS Detective provides the following features:<\/p>\n\n\n\n

                    \n
                  • Visualizations of aggregated data<\/p><\/li>\n\n\n\n

                  • Prompt identification of security issues<\/p><\/li>\n\n\n\n

                  • Information, context, and direction for efficient exploration and identification of the fundamental cause of security findings or dubious activities.<\/p><\/li>\n<\/ul>\n\n\n\n

                    Automated Detection and Alerts<\/h3>\n\n\n\n

                    The automated detection and alerts feature of AWS Detective includes:<\/p>\n\n\n\n

                      \n
                    • Continuous scanning for potential threats<\/p><\/li>\n\n\n\n

                    • Processing logs, events, and monitoring data<\/p><\/li>\n\n\n\n

                    • Intelligent algorithms and machine learning to analyze data and identify potential threats<\/p><\/li>\n\n\n\n

                    • Automatic generation of alerts to notify users<\/p><\/li>\n<\/ul>\n\n\n\n

                      This feature enables users to take prompt action to address threats.<\/p>\n\n\n\n

                      This feature reduces manual effort and human error by increasing the speed of detection, investigation, and recovery. These processes leverage automation to integrate detective, corrective, and preventative controls, thereby diminishing the risk of human error and exposure. Furthermore, automated processes help reduce the overall time for security tasks and enable real-time monitoring, alerting, and auditing of security events.<\/p>\n\n\n\n

                      Data Visualizations for Quick Analysis<\/h3>\n\n\n\n

                      Data visualization in AWS Detective serves as a clear map, navigating you through the intricate landscape of cybersecurity events. It provides graphical representations that illustrate the connections between entities associated with security findings. These visualizations provide analysts with the necessary information, context, and guidance to rapidly analyze and comprehend the scope and severity of security issues.<\/p>\n\n\n\n

                      These visualizations aid in streamlining security investigations, enabling analysts to rapidly recognize patterns, anomalies, and potential threats, thus resulting in more expeditious decision-making and response times. The visualizations generated by AWS Detective supply the essential data for investigating and responding to security findings.<\/p>\n\n\n\n

                      Summary<\/h2>\n\n\n\n

                      In this age of ever-growing cybersecurity threats, AWS Detective stands out as a powerful and innovative tool for cloud security. Its features like multi-account service insights and integration with other AWS security services, along with its automated detection and alerts, and data visualizations, make it a comprehensive solution for organizations seeking to enhance their security posture. AWS Detective not only simplifies security investigations but also encourages a proactive approach to cloud security, making it a must-have tool in any cybersecurity arsenal.<\/p>\n\n\n\n

                      Frequently Asked Questions<\/h2>\n\n\n\n

                      What is AWS detective used for?<\/h3>\n\n\n\n

                      Amazon Detective provides detailed analysis and visualizations of the behaviors between AWS accounts, EC2 instances, users, roles, and IP addresses to help identify the root cause of security findings or suspicious activities. It automatically collects log data from AWS resources for a comprehensive investigation experience.<\/p>\n\n\n\n

                      What is the difference between GuardDuty and detective?<\/h3>\n\n\n\n

                      GuardDuty provides initial security monitoring, while Detective is better suited for in-depth incident investigation. Both services are invaluable to keep cloud environments secure.<\/p>\n\n\n\n

                      Is there an Amazon investigation team?<\/h3>\n\n\n\n

                      Yes, Amazon does have an investigation team in order to review disputes and investigate suspicious behaviour.<\/p>\n\n\n\n

                      How does AWS Detective enhance team efficiency?<\/h3>\n\n\n\n

                      AWS Detective enables teams to investigate security incidents quickly and efficiently, with its automated features reducing manual effort and risk of human error.<\/p>\n\n\n\n

                      What are some real-world applications of AWS Detective?<\/h3>\n\n\n\n

                      AWS Detective is a valuable tool for investigating potential security issues, such as unauthorized access or data exfiltration, enabling rapid incident response.<\/p>\n","protected":false},"excerpt":{"rendered":"

                      Imagine having a personal detective at your disposal, always ready to scrutinize, analyze, and expose potential threats in the vast landscape of cloud security. Amazon Web Services (AWS) offers precisely…<\/p>\n","protected":false},"author":1,"featured_media":3458,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24],"tags":[],"powerkit_post_featured":[],"ppma_author":[17],"class_list":{"0":"post-3493","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-amazon-web-services"},"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/cloudpatterns.org\/wp-content\/uploads\/2023\/12\/Product-Page-Diagram_Amazon-Detective402x.257ee0bd351d2a3bdb513149ad14b0bcebe982d9-1.png","authors":[{"term_id":17,"user_id":1,"is_guest":0,"slug":"justinmg","display_name":"Justin JW Lee","avatar_url":{"url":"https:\/\/cloudpatterns.org\/wp-content\/uploads\/2023\/03\/justin-profile-picture.jpeg","url2x":"https:\/\/cloudpatterns.org\/wp-content\/uploads\/2023\/03\/justin-profile-picture.jpeg"},"description":"Justin started his career as a data engineer where he was in charge of deploying ETL & predictive analytics on the cloud for a fortune 1000 company and went on to lead product management at one of the leading big data search analytics company. \r\n\r\nWith over a decade of experience, Justin has established himself as a thought leader in cloud architecture and solutions. His expertise extends to developing scalable and efficient cloud strategies, helping organizations transition to and optimize their cloud environments.","first_name":"Justin JW","last_name":"Lee","user_url":"https:\/\/www.linkedin.com\/in\/justinjwlee","user_email_2":""}],"_links":{"self":[{"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/posts\/3493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/comments?post=3493"}],"version-history":[{"count":1,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/posts\/3493\/revisions"}],"predecessor-version":[{"id":3499,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/posts\/3493\/revisions\/3499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/media\/3458"}],"wp:attachment":[{"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/media?parent=3493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/categories?post=3493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/tags?post=3493"},{"taxonomy":"powerkit_post_featured","embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/powerkit_post_featured?post=3493"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/cloudpatterns.org\/wp-json\/wp\/v2\/ppma_author?post=3493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}