{"id":3338,"date":"2019-02-15T07:36:03","date_gmt":"2019-02-15T07:36:03","guid":{"rendered":"https:\/\/lcloud.pl\/?p=3338"},"modified":"2024-12-11T14:18:21","modified_gmt":"2024-12-11T13:18:21","slug":"security-management-using-devops","status":"publish","type":"post","link":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/","title":{"rendered":"Security management using DevOps"},"content":{"rendered":"<h4 style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 23px;\">Safety and risk assessment are one of the most important elements subjected to cyclical inspections. In order to improve these processes, it is worth considering their automation. DevOps practices can be useful, which, according to the assumptions, bring many benefits and improve the control process in the organization.<\/span><\/h4>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\">The methodology is <a href=\"https:\/\/aws.amazon.com\/devops\/\">defined by the AWS<\/a> as follows:<br \/>\n<\/span><\/p>\n<h6 style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><i><span style=\"font-weight: 400;\">&#8220;DevOps is a combination of cultural philosophies, practices and tools that increase the organization&#8217;s ability to deliver applications and services at high speed: they evolve and improve products at a faster rate than organizations use in traditional software development processes and infrastructure management. This speed allows organizations to better serve customers and compete more effectively in the market. &#8220;<\/span><\/i><\/span><\/h6>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"http:\/\/www.devsecops.org\/blog\/2015\/2\/15\/what-is-devsecops\">DevSecOps<\/a> complements the practices and focuses on security issues: <\/span><\/p>\n<h6 style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><i><span style=\"font-weight: 400;\">&#8220;The purpose and intention of DevSecOps is to build a mentality that &#8220;everyone is responsible for security&#8221; with a view to securely separating safety decisions at a fast pace and matching those who maintain the highest level of context without sacrificing the required security.&#8221;<\/span><\/i><\/span><\/h6>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\"><span style=\"font-weight: 400;\">You can read more about DevSecOps in our blog post &#8211; <\/span><a href=\"https:\/\/lcloud.pl\/en\/devsecops-as-a-security-guard\/\"><span style=\"font-weight: 400;\">DevSecOps as a security guard.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/a><span style=\"font-weight: 400;\">When managing security, we can use the principles that suggest DevOps practices: risk modeling and continuous integration and security assessment.<\/span><\/span><\/p>\n<h5 style=\"text-align: justify;\"><\/h5>\n<p>&nbsp;<\/p>\n<h5 style=\"text-align: justify;\"><span style=\"font-size: 23px; color: #199ad8;\"><b>Risk modeling<\/b><\/span><\/h5>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><span style=\"font-weight: 400;\">An important issue on which the process of developing safety control mechanisms should begin is risk modeling.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Priority should be given to creating a risk register that contains all information about threats: their analysis, counteracting and status. On its basis, the probability of the occurrence and impact of hazards is assessed.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><span style=\"font-weight: 400;\">In order to facilitate the task, there are several tools that will certainly improve the entire process.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">We can distinguish, among others:<\/span><\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/STRIDE_(security)\"><span style=\"color: #676767;\">STRIDE<\/span><\/a> &#8211; a threat model developed by Praerit Garg and Loren Kohnfelder to identify computer security threats. It provides a mnemonic for security threats in six categories: impersonation of user&#8217;s identity, manipulation, rejection, the disclosure of information, privacy violation or data leakage, D.o.S, unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Threat_model#P.A.S.T.A.\"><span style=\"color: #676767;\">PASTA<\/span><\/a> &#8211; a process for simulating attacks and analyzing threats is a seven-stage, risk-focused methodology.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/DREAD_(risk_assessment_model)\"><span style=\"color: #676767;\">DREAD<\/span><\/a> &#8211; this is part of the system for assessing computer security threats previously used by Microsoft (until 2008). It is currently used by OpenStack. It provides a mnemonic for security risks of risk assessment using the five categories (listed in point 1).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"https:\/\/en.wikipedia.org\/wiki\/Threat_model#VAST\"><span style=\"color: #676767;\">VAST<\/span><\/a> &#8211; the basic principle of the methodology is the need to scale the risk modelling process in the entire infrastructure and the entire SDLC and integrate it in a simple manner with the Agile software development methodology. The methodology is intended to provide practical results for the unique needs of various stakeholders: application and development architects, cybersecurity employees and senior management.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"http:\/\/www.octotrike.org\/\"><span style=\"color: #676767;\">Trike<\/span><\/a> &#8211; the aim is to use threat models as a risk management tool that is used during the audit. Threat models are based on the &#8220;requirements model&#8221;. In turn, the requirements model defines the &#8220;risk level&#8221; defined by stakeholders, assigned to each class of assets. The prepared threat model is used to construct a risk model based on assets, roles, activities and calculated risk exposure.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\"><a href=\"https:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?assetid=7875\"><span style=\"color: #676767;\">OCTAVE<\/span><\/a> &#8211; CERT method of critical importance for threat, resources and risk assessment (OCTAVE). This is an approach to information security risk management. It was designed to be flexible enough for the organization and to meet unique and highly contextual analysis needs, thanks to customization capabilities.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\"><span style=\"font-weight: 400;\">In addition to the mentioned models, it is worth to read the documentation prepared by <\/span><a href=\"https:\/\/aws.amazon.com\/professional-services\/CAF\/\"><span style=\"font-weight: 400;\">AWS &#8211; Cloud Adoption Framework<\/span><\/a><span style=\"font-weight: 400;\">, where you will find tips on the coordination of various parts of the organization, e.g. migrating data to the cloud. The CAF guidelines are divided into several areas, important for the implementation of systems based on the AWS cloud.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3319\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/12-1.jpg\" alt=\"\" width=\"1280\" height=\"720\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/12-1.jpg 1280w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-300x169.jpg 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-768x432.jpg 768w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-1024x576.jpg 1024w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-160x90.jpg 160w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-140x79.jpg 140w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-174x98.jpg 174w, https:\/\/lcloud.pl\/wp-content\/uploads\/12-1-161x91.jpg 161w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<pre style=\"text-align: center;\"><span style=\"font-size: 10px;\"><em><span style=\"font-weight: 400;\">The adoption scheme of the AWS Cloud Adoption Framework<\/span><\/em><\/span><\/pre>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><span style=\"font-weight: 400;\">T<span style=\"font-size: 19px;\">h<\/span><\/span><\/span><span style=\"font-size: 19px;\"><span style=\"font-weight: 400;\">e guidelines aim to improve and ensure the proper development of security controls. Every regulation should be carefully formulated to avoid ambiguity. It usually has a form of a single instruction requiring some action or configuration. The tips mean that the risk is documented or completely eliminated. There is also some residual risk that can be managed further by using other security controls. Full documentation about the CAF can be found <\/span><a href=\"https:\/\/d1.awsstatic.com\/whitepapers\/AWS_CAF_Security_Perspective.pdf\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/span><\/p>\n<h5 style=\"text-align: justify;\"><\/h5>\n<p>&nbsp;<\/p>\n<h5 style=\"text-align: justify;\"><span style=\"font-size: 23px; color: #199ad8;\"><b>Continuous integration and security assessment<\/b><\/span><\/h5>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\">Once the security controls have been created, you can go to the next stage. It is the creation of a scenario of acceptance criteria for users&#8217; actions, which then undergo a test of the correctness of operation. After the test, we enter the remaining criteria as rules into the AWS Config service, allowing for continuous evaluation of the entire AWS account in terms of compliance. As a rule, compliance with the control rules based on the time segment (&lt;15 min) is assessed. The defined elements can be placed in the CI \/ CD Pipeline, thanks to which security controls will be as fast as the rate of innovation in the DevOps process.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3321\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/13.jpg\" alt=\"\" width=\"1280\" height=\"306\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/13.jpg 1280w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-300x72.jpg 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-768x184.jpg 768w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-1024x245.jpg 1024w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-312x75.jpg 312w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-161x38.jpg 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/13-140x33.jpg 140w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<pre style=\"text-align: center;\"><span style=\"font-size: 10px;\"><em><span style=\"font-weight: 400;\">Diagram of the standard DevOps pipeline<\/span><\/em><\/span><\/pre>\n<h5 style=\"text-align: justify;\"><\/h5>\n<p>&nbsp;<\/p>\n<h5 style=\"text-align: justify;\"><span style=\"font-size: 23px; color: #199ad8;\"><b>Advantages of the applied solution<\/b><\/span><\/h5>\n<p><span style=\"font-size: 19px;\"><span style=\"font-weight: 400;\">The use of the DevOps approach in security management brings a number of benefits:<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\">In contrast to the traditional approach (audit), continuity of integration and security assessment, allows you to be consistent with the requirements \/ legal regulations at all times.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\">In order to save time for labour-intensive audits, it is worth using the AWS Config service.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\">Easy access to its panel, allows you to quickly launch simple operating procedures.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\">We receive immediate information on the compliance of our activities with our control rules, and thus with legal regulations.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400; font-size: 19px;\">Developers receive feedback on the proposed solutions in advance.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-3325\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/attention-mark.png\" alt=\"\" width=\"67\" height=\"68\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/attention-mark.png 135w, https:\/\/lcloud.pl\/wp-content\/uploads\/attention-mark-98x98.png 98w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/><span style=\"color: #199ad8;\">AWS pays attention to keep the division between risk proofs and risk management processes. Exceptions that appear in the code are difficult management cases and may give a distorted assessment of resource compliance.<\/span><br \/>\n<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Cloud solutions are slowly starting to become popular. Therefore, the technological development of other components complementary to cloud computing is extremely important. The DevOps practices allow for fast and efficient creation of solutions, with a high level of security.<\/span><\/p>\n<p style=\"text-align: justify;\">\n","protected":false},"excerpt":{"rendered":"<p>Safety and risk assessment are one of the most important elements subjected to cyclical inspections. In order to improve these processes, it is worth considering their automation. DevOps practices can be useful, which, according to the assumptions, bring many benefits and improve the control process in the organization. &nbsp; The methodology is defined by the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3356,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[30,37,14,61,34],"class_list":["post-3338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-aws-en","tag-cloud","tag-devops-en","tag-freamework","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security management using DevOps | LCloud<\/title>\n<meta name=\"description\" content=\"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security management using DevOps | LCloud\" \/>\n<meta property=\"og:description\" content=\"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/\" \/>\n<meta property=\"og:site_name\" content=\"LCloud\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-15T07:36:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T13:18:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"275\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"LCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/\",\"url\":\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/\",\"name\":\"Security management using DevOps | LCloud\",\"isPartOf\":{\"@id\":\"https:\/\/lcloud.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png\",\"datePublished\":\"2019-02-15T07:36:03+00:00\",\"dateModified\":\"2024-12-11T13:18:21+00:00\",\"author\":{\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\"},\"description\":\"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage\",\"url\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png\",\"contentUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png\",\"width\":1440,\"height\":275},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lcloud.pl\/#website\",\"url\":\"https:\/\/lcloud.pl\/\",\"name\":\"LCloud\",\"description\":\"AWS Advanced Consulting Partner | APN Well-Architected Partner\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lcloud.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\",\"name\":\"LCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"caption\":\"LCloud\"},\"url\":\"https:\/\/lcloud.pl\/en\/author\/wpdev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security management using DevOps | LCloud","description":"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.","og_locale":"en_US","og_type":"article","og_title":"Security management using DevOps | LCloud","og_description":"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.","og_url":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/","og_site_name":"LCloud","article_published_time":"2019-02-15T07:36:03+00:00","article_modified_time":"2024-12-11T13:18:21+00:00","og_image":[{"width":1440,"height":275,"url":"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png","type":"image\/png"}],"author":"LCloud","twitter_card":"summary_large_image","twitter_misc":{"Written by":"LCloud","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/","url":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/","name":"Security management using DevOps | LCloud","isPartOf":{"@id":"https:\/\/lcloud.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage"},"image":{"@id":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage"},"thumbnailUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png","datePublished":"2019-02-15T07:36:03+00:00","dateModified":"2024-12-11T13:18:21+00:00","author":{"@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a"},"description":"Safety and risk assessment are elements that should be subject of periodic inspections. We can ensure the highest possible level of security.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lcloud.pl\/en\/security-management-using-devops\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/en\/security-management-using-devops\/#primaryimage","url":"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png","contentUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/security-management-2.png","width":1440,"height":275},{"@type":"WebSite","@id":"https:\/\/lcloud.pl\/#website","url":"https:\/\/lcloud.pl\/","name":"LCloud","description":"AWS Advanced Consulting Partner | APN Well-Architected Partner","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lcloud.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a","name":"LCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","caption":"LCloud"},"url":"https:\/\/lcloud.pl\/en\/author\/wpdev\/"}]}},"_links":{"self":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/comments?post=3338"}],"version-history":[{"count":14,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3338\/revisions"}],"predecessor-version":[{"id":10078,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3338\/revisions\/10078"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media\/3356"}],"wp:attachment":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media?parent=3338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/categories?post=3338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/tags?post=3338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}