{"id":1244,"date":"2012-06-25T15:54:03","date_gmt":"2012-06-25T15:54:03","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=1244"},"modified":"2024-12-13T09:01:36","modified_gmt":"2024-12-13T14:01:36","slug":"encryption-key-management-and-why-you-should-care","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/","title":{"rendered":"Encryption Key Management and Why You Should Care"},"content":{"rendered":"<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryptionkey.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2081\" title=\"encryptionkey\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryptionkey.jpg\" alt=\"Encryption Key\" width=\"256\" height=\"197\" \/><\/a><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encrypt\/key-management\">Encryption key management<\/a> is one of the most important &#8220;basics&#8221; for an organization dealing with security and privacy protection.\u00a0 Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers.<\/p>\n<p>By including encryption key management with other security measures, companies can administer the tasks involved with protecting, storing, backing-up, and organizing encryption keys. This is necessary to address relevant challenges that companies face, including:<\/p>\n<p>&#8211;\u00a0 Several different, and possibly incompatible, encryption tools will be used unknowingly, resulting in thousands of encryption keys &#8212; each of which must be securely stored, protected, and retrievable in a reliable fashion.<\/p>\n<p>&#8211;\u00a0 Confidential data resides in hundreds of places throughout an organization, resulting in a high demand for effective, practical, automated, and risk-mitigating ways to manage keys throughout their life-cycle so &#8220;good guys&#8221; have access and &#8220;bad guys&#8221; do not.<\/p>\n<p>Encryption is difficult for companies to perform on their own, as is the associated encryption key management.\u00a0 Keys grow exponentially as companies manage the data encryption life-cycle.<\/p>\n<p>If not managed properly, a new problem emerges:\u00a0 how to control and protect access to the keys to ensure they don&#8217;t get into the wrong hands, and that they are available when needed &#8212; today and in the future.<\/p>\n<p>Consider the following two-step process to manage data security risk while complying with regulatory requirements, from <a title=\"Gary Palgon's 8 Best Practices for Encryption Key Management and Data Security\" href=\"http:\/\/esj.com\/articles\/2008\/07\/01\/8-best-practices-for-encryption-key-management-and-data-security.aspx\" target=\"_blank\" rel=\"noopener\">Gary Palgon&#8217;s, &#8220;8 Best Practices for Encryption Key Management and Data Security&#8221;:<\/a><\/p>\n<p><strong>Step #1<\/strong>\u00a0&#8211; Eliminate as much collection and storage of sensitive data as possible &#8212; if you don&#8217;t really need it, get rid of it.<\/p>\n<p><strong>Step #2<\/strong>\u00a0&#8211; Encrypt, hash, or mask the remaining sensitive data at rest and in transit.<\/p>\n<p>&#8220;Encryption has become an increasingly important weapon in the security arsenal for data at rest in databases, files, and applications and for data in transit.\u00a0 Encryption is a perfect companion to strong perimeter and firewall protection.\u00a0 It is also one of the most important ways to protect against internal threats, which some estimate put as high as 73 percent of all breaches.\u00a0 Your firewall and perimeter security can&#8217;t protect you from the folks inside the fort, but encryption can&#8221;, says Palgon.<\/p>\n<p>Palgon specifies eight best practices in encryption key management and data security, including:<\/p>\n<p><strong>1.\u00a0 Decentralize encryption and decryption.\u00a0<\/strong>\u00a0One critical issue in designing a data protection plan is whether encryption and decryption will take place locally and be distributed throughout the enterprise, or will be performed at a central location on a single-purpose encryption server.\u00a0 If encryption and decryption are distributed, the key manager must provide for the secure distribution and management of keys.\u00a0 Click\u00a0<a href=\"http:\/\/esj.com\/Articles\/2008\/07\/01\/8-Best-Practices-for-Encryption-Key-Management-and-Data-Security.aspx?Page=1\">HERE\u00a0<\/a>to continue reading.<\/p>\n<p><strong>2.\u00a0 Centralize key management with distributed execution.\u00a0<\/strong>\u00a0A solution that employs a hub-and-spoke architecture for distributed key management allows encryption and decryption nodes to exist at any point within the enterprise network.\u00a0 Spoke key-management components are easily deployed to those nodes and integrated with the local encryption applications.\u00a0 Once the spoke components are active, all encryption and decryption of the formerly clear text data is performed locally to minimize the risk of a network or single component failure having a large impact on overall data security.\u00a0 Click\u00a0<a href=\"http:\/\/esj.com\/Articles\/2008\/07\/01\/8-Best-Practices-for-Encryption-Key-Management-and-Data-Security.aspx?Page=1\">HERE\u00a0<\/a>to continue reading.<\/p>\n<p>If you are interested in how <a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\">IRI FieldShield, CellShield or DarkShield<\/a> users manage encryption keys in structured, semi-structured, and unstructured <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\">data masking operation<\/a>s, click <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encrypt\/key-management\">HERE.<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption key management is one of the most important &#8220;basics&#8221; for an organization dealing with security and privacy protection.\u00a0 Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers. By including encryption key management with other security measures, companies can administer the tasks involved<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\" title=\"Encryption Key Management and Why You Should Care\">Read More<\/a><\/div>\n","protected":false},"author":2,"featured_media":11741,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[10,14,18,15,78],"class_list":["post-1244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-data-encryption","tag-data-masking","tag-data-privacy","tag-data-security","tag-encryption-key"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encryption Key Management and Why You Should Care - IRI<\/title>\n<meta name=\"description\" content=\"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption Key Management and Why You Should Care\" \/>\n<meta property=\"og:description\" content=\"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-25T15:54:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-13T14:01:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"231\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Don Purnhagen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Don Purnhagen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\"},\"author\":{\"name\":\"Don Purnhagen\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5f6325245947c8b8f0a0a76ef81580ec\"},\"headline\":\"Encryption Key Management and Why You Should Care\",\"datePublished\":\"2012-06-25T15:54:03+00:00\",\"dateModified\":\"2024-12-13T14:01:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg\",\"keywords\":[\"data encryption\",\"data masking\",\"data privacy\",\"data security\",\"encryption key\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\",\"name\":\"Encryption Key Management and Why You Should Care - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg\",\"datePublished\":\"2012-06-25T15:54:03+00:00\",\"dateModified\":\"2024-12-13T14:01:36+00:00\",\"description\":\"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg\",\"width\":300,\"height\":231},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption Key Management and Why You Should Care\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5f6325245947c8b8f0a0a76ef81580ec\",\"name\":\"Don Purnhagen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39a152e4ffaf1f20e40d0c6e56a9a91d?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39a152e4ffaf1f20e40d0c6e56a9a91d?s=96&d=blank&r=g\",\"caption\":\"Don Purnhagen\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/donp\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption Key Management and Why You Should Care - IRI","description":"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/","og_locale":"en_US","og_type":"article","og_title":"Encryption Key Management and Why You Should Care","og_description":"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/","og_site_name":"IRI","article_published_time":"2012-06-25T15:54:03+00:00","article_modified_time":"2024-12-13T14:01:36+00:00","og_image":[{"width":300,"height":231,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","type":"image\/jpeg"}],"author":"Don Purnhagen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Don Purnhagen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/"},"author":{"name":"Don Purnhagen","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5f6325245947c8b8f0a0a76ef81580ec"},"headline":"Encryption Key Management and Why You Should Care","datePublished":"2012-06-25T15:54:03+00:00","dateModified":"2024-12-13T14:01:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","keywords":["data encryption","data masking","data privacy","data security","encryption key"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/","name":"Encryption Key Management and Why You Should Care - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","datePublished":"2012-06-25T15:54:03+00:00","dateModified":"2024-12-13T14:01:36+00:00","description":"Explore the significance of encryption key management in data security. Learn how to protect, store, and manage encryption keys efficiently.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","width":300,"height":231},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryption-key-management-and-why-you-should-care\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Encryption Key Management and Why You Should Care"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/5f6325245947c8b8f0a0a76ef81580ec","name":"Don Purnhagen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/39a152e4ffaf1f20e40d0c6e56a9a91d?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39a152e4ffaf1f20e40d0c6e56a9a91d?s=96&d=blank&r=g","caption":"Don Purnhagen"},"url":"https:\/\/www.iri.com\/blog\/author\/donp\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/06\/encryption-key.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1244"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=1244"}],"version-history":[{"count":36,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1244\/revisions"}],"predecessor-version":[{"id":18159,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/1244\/revisions\/18159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11741"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=1244"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=1244"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=1244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}