{"id":2643,"date":"2012-09-04T10:26:19","date_gmt":"2012-09-04T10:26:19","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=2643"},"modified":"2020-11-09T17:02:59","modified_gmt":"2020-11-09T22:02:59","slug":"selecting-pii-for-secure-queries-fieldshield-filters","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/","title":{"rendered":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)"},"content":{"rendered":"<p>In the course of protecting personally identifiable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That approach does not tax DB performance or security, and is especially useful when a separate, safe table or protected subset of rows or columns needs to be created. But how can these tools be used to protect only updated rows and secure queries?<\/p>\n<p>Following are two major ways IRI tools fine-tune your data protections. Think about which of these approaches work best for your environment, and ask IRI how you can integrate these capabilities into your database application:<\/p>\n<p>Only Protect (Updated) Rows that Need Protecting (Selection):<\/p>\n<ol>\n<li>Table Pre-Selection<br \/>\nRDBMS table data to be protected in FieldShield operations can be filtered during extraction through SQL WHERE clauses that include only those rows meeting specific delivery criteria.<\/li>\n<li>&#8220;Dumb&#8221; (Unconditional) Phase-Level Filtering<br \/>\nBoth FieldShield and CoSort&#8217;s Sort Control Language (SortCL) programs have the ability to skip or collect a specified number of rows at the input, action, and\/or output phases of any job script.<\/li>\n<li>&#8220;Smart&#8221; (Conditional) Selection<br \/>\nRows can be included or omitted from input, processing, and\/or output based on the change in a column value or on the basis of whether that column meets the test of boolean logic with a relational operator, expressed in SQL (\/QUERY) or \/INCLUDE (or OMIT) syntax inside the scripts.<\/li>\n<li>Conditional Field Logic<br \/>\nThe protection function assigned to any given field can be applied conditionally based on the &#8216;smart&#8217; criteria above; i.e. only protect the field if its value passes the protection test your business rules dictate.<\/li>\n<li>Application-Level Filtering<br \/>\nPrograms polling or populating tables or files for data can direct only those rows meeting their protection criteria into an API or system call to FieldShield or CoSort&#8217;s SortCL program. Conversely, data protected either en masse or conditionally by IRI software can be filtered and redirected by the calling application according to targeting requirements; i.e. which targets require which data, and in which form (e.g. protected or unprotected).<\/li>\n<\/ol>\n<p>Only Protect Columns Containing PII (Projection):<\/p>\n<ol>\n<li>Column Pre-Selection<br \/>\nRDBMS table data to be protected can be vertically filtered during extraction through SQL SELECT WHERE clauses that extract and pass in only those columns requiring FieldShield or SortCL protection.<\/li>\n<li>Target-Phase Specification<br \/>\nFieldShield and SortCL programs can specify the protection and thus output of only those columns that are to be protected, so there would be no need to process, write out, or <a href=\"http:\/\/stackoverflow.com\/questions\/10253605\/import-csv-to-update-only-one-column-in-table\" target=\"_blank\" rel=\"nofollow noopener\">import<\/a> the other columns.<\/li>\n<\/ol>\n<p>In either scenario, if you can identify and filter out only the data that needs to be protected, you can reduce or eliminate the unnecessary CPU and I\/O overhead involved with processing and moving non-PII data.* IRI can also develop <a href=\"http:\/\/www.iri.com\/blog\/miscellaneous\/iri-professional-services-open\/\">custom<\/a>, in-situ encryption solutions, or otherwise provide protection libraries you can integrate directly into your SQL procedures.<\/p>\n<p>&nbsp;<\/p>\n<p><em>* Protecting only the columns that need protecting is also an inherent computational efficiency <a title=\"FieldShield products page\" href=\"http:\/\/www.iri.com\/products\/FieldShield\" target=\"_blank\" rel=\"nofollow noopener\">advantage<\/a> in securing personally identifiable information (PII). This data-centric approach taken by FieldShield or CoSort&#8217;s SortCL means that CPU cycles are not consumed in the protection of non-sensitive columns, or any other data outside the specified source(s). Just as protecting only fields is a performance benefit, so too is protecting only updated rows. Either way, you can save time encrypting, masking or otherwise de-identifying PII by reducing the amount of data feeding or leaving FieldShield or SortCL operations.<br \/>\n<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the course of protecting personally identifiable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That approach does not tax DB performance or security, and is especially useful when a separate, safe table or protected subset of rows or columns needs to<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\" title=\"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":11737,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[44,153,14,13,15,155,9,148,149,154],"class_list":["post-2643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-cosort","tag-data-filters","tag-data-masking","tag-data-protection-2","tag-data-security","tag-database-performance","tag-fieldshield","tag-personally-identifiable-information","tag-pii","tag-rdbms-tables"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters) - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)\" \/>\n<meta property=\"og:description\" content=\"In the course of protecting personally identifiable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That approach does not tax DB performance or security, and is especially useful when a separate, safe table or protected subset of rows or columns needs toRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-04T10:26:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-09T22:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"595\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)\",\"datePublished\":\"2012-09-04T10:26:19+00:00\",\"dateModified\":\"2020-11-09T22:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg\",\"keywords\":[\"CoSort\",\"data filters\",\"data masking\",\"data protection\",\"data security\",\"database performance\",\"FieldShield\",\"personally identifiable information\",\"PII\",\"RDBMS tables\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\",\"name\":\"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters) - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg\",\"datePublished\":\"2012-09-04T10:26:19+00:00\",\"dateModified\":\"2020-11-09T22:02:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg\",\"width\":900,\"height\":595},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters) - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/","og_locale":"en_US","og_type":"article","og_title":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)","og_description":"In the course of protecting personally identifiable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That approach does not tax DB performance or security, and is especially useful when a separate, safe table or protected subset of rows or columns needs toRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/","og_site_name":"IRI","article_published_time":"2012-09-04T10:26:19+00:00","article_modified_time":"2020-11-09T22:02:59+00:00","og_image":[{"width":900,"height":595,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","type":"image\/jpeg"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/"},"author":{"name":"David Friedland","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)","datePublished":"2012-09-04T10:26:19+00:00","dateModified":"2020-11-09T22:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","keywords":["CoSort","data filters","data masking","data protection","data security","database performance","FieldShield","personally identifiable information","PII","RDBMS tables"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/","name":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters) - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","datePublished":"2012-09-04T10:26:19+00:00","dateModified":"2020-11-09T22:02:59+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","width":900,"height":595},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/selecting-pii-for-secure-queries-fieldshield-filters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Selecting Personally Identifiable Information for Secure Queries (FieldShield Filters)"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/www.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2012\/09\/pii-wordmap.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/2643"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=2643"}],"version-history":[{"count":84,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/2643\/revisions"}],"predecessor-version":[{"id":14153,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/2643\/revisions\/14153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11737"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=2643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=2643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=2643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}