{"id":3550,"date":"2019-03-05T08:02:23","date_gmt":"2019-03-05T08:02:23","guid":{"rendered":"https:\/\/lcloud.pl\/?p=3550"},"modified":"2024-12-11T14:19:12","modified_gmt":"2024-12-11T13:19:12","slug":"security-and-compliance-based-on-the-aws-cloud","status":"publish","type":"post","link":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/","title":{"rendered":"Security and compliance based on the AWS cloud"},"content":{"rendered":"<h5 style=\"text-align: justify;\"><span style=\"font-size: 22px; color: #199ad8;\">Amazon Web Services as a cloud leader for more than 12 years and creating new solutions, has also developed a number of audit procedures that are aimed at ensuring compliance with restrictive criteria, in many demanding industries.<br \/>\n<\/span><\/h5>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">An important issue that we should remember from the outset is <em><u><a href=\"https:\/\/www.slideshare.net\/LCloud\/shared-responsibility-in-the-cloud-lcloud\">Shared <\/a><a href=\"https:\/\/www.slideshare.net\/LCloud\/shared-responsibility-in-the-cloud-lcloud\">Responsibility<\/a><\/u>.<\/em> The diagram below shows who is responsible for particular areas, using cloud solutions. On the client\u2019s side remain data protection, access management, network and firewall supervision. AWS, in turn, takes responsibility for basic services such as compute, database services, network connectivity or data storage. In addition, AWS is responsible for the availability of regions and the operation of accessibility zones (Availability Zones), including end (edge) locations.<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3462\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme.png\" alt=\"\" width=\"605\" height=\"296\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme.png 605w, https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme-300x147.png 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme-200x98.png 200w, https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme-161x79.png 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/rshared_responsibility_in_cloud_AWS_scheme-140x68.png 140w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 12px;\"><em>Source: <a href=\"https:\/\/d1.awsstatic.com\/whitepapers\/compliance\/AWS_Auditing_Security_Checklist.pdf\">Introduction to Auditing the Use of AWS<\/a><\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><em>\u00a0<\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Being aware of the security foundations in the cloud, the next step is to <span style=\"color: #199ad8;\">identify the client&#8217;s assets placed in the AWS<\/span>. Depending on your needs, these can be:<\/span><\/p>\n<ul>\n<li><span style=\"font-size: 19px;\">EC2 instances,<\/span><\/li>\n<li><span style=\"font-size: 19px;\">data warehouses,<\/span><\/li>\n<li><span style=\"font-size: 19px;\">apps,<\/span><\/li>\n<li><span style=\"font-size: 19px;\">or simply data.<br \/>\n<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Basically, there is no major difference in the categorization of resources stored in the public cloud, and those that the customer stores in his own data centre. <span style=\"color: #199ad8;\">AWS gives the resources 2 unique identification numbers<\/span>: the first number is the AWS account number; the second is ARN (Amazon Resources Names), which is necessary when you need to clearly specify a given resource in services such as Amazon RDS, API Gateway, or IAM. <em>In addition, each of the AWS services creates its internal identifier<\/em>, which can be helpful in cataloguing the environment&#8217;s resources.<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400; font-size: 19px;\"><span style=\"color: #199ad8;\">Proper management of resources allows for setting the aim and direction of security implementation.<\/span> The essence is to check which procedures, rules and plans can be applied to used AWS services. As part of the management, <em>it is crucial to determine who in the organization manages the AWS account<\/em> and <em>who is the owner of the resources maintained under the account<\/em>, and lastly <em>who manages the services that are used<\/em>.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><span style=\"color: #199ad8;\">Configuration and proper management of resources must be preceded by an in-depth analysis of the categories of used resources.<\/span> <em>It is important to safely configure the system and applications<\/em> (taking care of safe configuration settings and protection against malware) <em>and controlling changes<\/em> taking place <em>in the resources.<\/em> It is also important to properly manage the risks resulting from emerging security gaps to protect the stability and integrity of the resources.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3479\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/1.png\" alt=\"\" width=\"1440\" height=\"221\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/1.png 1440w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-300x46.png 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-768x118.png 768w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-1024x157.png 1024w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-312x48.png 312w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-161x25.png 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/1-140x21.png 140w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Another extremely important point, verified during the audit, <span style=\"color: #199ad8;\">is security recording and monitoring<\/span>. This is primarily about <em>logs<\/em>,<em> in which all behaviours and events appearing in user\u2019s systems and networks are registered<\/em>.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><em>During logical access control<\/em>, the most important aspect <span style=\"color: #199ad8;\">is determining who or what can have access to a specific resource<\/span>, as well as <span style=\"color: #199ad8;\">the type of actions that can be performed on a given resource<\/span>. As part of the audit, users should confirm the authorization to perform specific functions or access to resources.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3481\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/3.png\" alt=\"\" width=\"1440\" height=\"221\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/3.png 1440w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-300x46.png 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-768x118.png 768w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-1024x157.png 1024w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-312x48.png 312w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-161x25.png 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/3-140x21.png 140w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">The next aspect is related to the previously mentioned monitoring. Referring also to the issue of shared responsibility in the cloud &#8211; <span style=\"color: #199ad8;\">both the AWS client and the AWS itself are obliged to respond to incidents related to threats<\/span>. The main area of the audit is the assessment of the effectiveness of the existing incident management control.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Another important action is <span style=\"color: #199ad8;\">data encryption<\/span>. <em>It is necessary if they are confidential<\/em>. Currently, <em>Amazon S3 provides an automated encryption service<\/em>. It is worth paying attention to <em>data encryption at rest as well as in transport<\/em>. This is just as important as protecting data stored locally on disks. It should be mentioned that many security policies call into question the Internet as a secured communication medium.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">In the case of unsecured data and their loss or failure, the <span style=\"color: #199ad8;\">Disaster Recovery process becomes a major issue<\/span>. <em>Thanks to the solutions<\/em> <em>provided by AWS<\/em>, <em>it is possible to design resistant and quickly responding systems to incidents of applications<\/em>. It is important to ensure that the systems are configured to use multiple regions and Availability Zones during the design process. This will ensure high availability and fast recovery time.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">Network management in the cloud is very similar to managing it in an on-premise model. The only difference is the components (e.g. firewall) that are virtual in the cloud. <span style=\"color: #199ad8;\">It is the customer&#8217;s responsibility to ensure that the network architecture complies with the security requirements of his organization<\/span>. Improper configuration of external security may cause many threats. I<em>n order to verify the correctness, it is worth using the AWS Trusted Advisor.<\/em><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3483\" src=\"https:\/\/lcloud.pl\/wp-content\/uploads\/4-2.png\" alt=\"\" width=\"1440\" height=\"221\" srcset=\"https:\/\/lcloud.pl\/wp-content\/uploads\/4-2.png 1440w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-300x46.png 300w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-768x118.png 768w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-1024x157.png 1024w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-312x48.png 312w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-161x25.png 161w, https:\/\/lcloud.pl\/wp-content\/uploads\/4-2-140x21.png 140w\" sizes=\"auto, (max-width: 1440px) 100vw, 1440px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\">It is also worth paying attention to the <span style=\"color: #199ad8;\">security features<\/span>, <span style=\"color: #199ad8;\">that AWS uses in the case of its Data Centers<\/span>. Physical access is strictly controlled both on the outskirts of the land on which the building is located and also at the entry points to the facility. They are controlled by professional security guards using video surveillance, intrusion detection systems and other electronic tools. <em>Both authorized AWS employees and outsiders must undergo a two-step control to access individual floors of the data centre.<\/em> All visitors and contractors who gain access to zones are required to provide proof of identity. Their data is placed in registers, and moving around the building takes place in the escort of security guards.<\/span><\/p>\n<h6 style=\"text-align: justify;\"><span style=\"font-size: 19px;\">In summary, specially designed AWS tools were created to help maximize the protection of AWS cloud users\u2019 data and applications. In addition, through the systematic conduct of audit activities, an unbiased and objective opinion can be obtained regarding the actual state of the audited areas. They will also confirm the compliance of organizations and elements with the provisions of legal or normative regulations. They will also allow optimizing financial outlays incurred to secure systems. They will also strengthen awareness of AWS security solutions.<\/span><\/h6>\n<hr \/>\n<p style=\"text-align: justify;\"><span style=\"font-size: 19px;\"><a href=\"https:\/\/lcloud.pl\/en\/service\/security-and-compatibility\/\"><span style=\"font-weight: 400;\">Security and compliance<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; this is one of the services during which we undertake a number of activities at LCloud, whose overriding goal is to ensure full security of all resources. We also put our SlideShare on security in the cloud, which you will find under this<\/span><a href=\"https:\/\/www.slideshare.net\/LCloud\/security-safe-in-cloud-essentials-lcloud\"><span style=\"font-weight: 400;\"> link<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amazon Web Services as a cloud leader for more than 12 years and creating new solutions, has also developed a number of audit procedures that are aimed at ensuring compliance with restrictive criteria, in many demanding industries. &nbsp; An important issue that we should remember from the outset is Shared Responsibility. The diagram below shows [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3459,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[37,34],"class_list":["post-3550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-cloud","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security and compliance based on the AWS cloud | LCloud<\/title>\n<meta name=\"description\" content=\"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and compliance based on the AWS cloud | LCloud\" \/>\n<meta property=\"og:description\" content=\"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"LCloud\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-05T08:02:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T13:19:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"221\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"LCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"LCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/\",\"url\":\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/\",\"name\":\"Security and compliance based on the AWS cloud | LCloud\",\"isPartOf\":{\"@id\":\"https:\/\/lcloud.pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png\",\"datePublished\":\"2019-03-05T08:02:23+00:00\",\"dateModified\":\"2024-12-11T13:19:12+00:00\",\"author\":{\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\"},\"description\":\"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage\",\"url\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png\",\"contentUrl\":\"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png\",\"width\":1440,\"height\":221},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lcloud.pl\/#website\",\"url\":\"https:\/\/lcloud.pl\/\",\"name\":\"LCloud\",\"description\":\"AWS Advanced Consulting Partner | APN Well-Architected Partner\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lcloud.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a\",\"name\":\"LCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lcloud.pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g\",\"caption\":\"LCloud\"},\"url\":\"https:\/\/lcloud.pl\/en\/author\/wpdev\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and compliance based on the AWS cloud | LCloud","description":"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...","og_locale":"en_US","og_type":"article","og_title":"Security and compliance based on the AWS cloud | LCloud","og_description":"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...","og_url":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/","og_site_name":"LCloud","article_published_time":"2019-03-05T08:02:23+00:00","article_modified_time":"2024-12-11T13:19:12+00:00","og_image":[{"width":1440,"height":221,"url":"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png","type":"image\/png"}],"author":"LCloud","twitter_card":"summary_large_image","twitter_misc":{"Written by":"LCloud","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/","url":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/","name":"Security and compliance based on the AWS cloud | LCloud","isPartOf":{"@id":"https:\/\/lcloud.pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage"},"image":{"@id":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png","datePublished":"2019-03-05T08:02:23+00:00","dateModified":"2024-12-11T13:19:12+00:00","author":{"@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a"},"description":"What to look for when designing the architecture in the cloud, so that the audit runs according to our expectations. Read and check your ...","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/en\/security-and-compliance-based-on-the-aws-cloud\/#primaryimage","url":"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png","contentUrl":"https:\/\/lcloud.pl\/wp-content\/uploads\/2-1.png","width":1440,"height":221},{"@type":"WebSite","@id":"https:\/\/lcloud.pl\/#website","url":"https:\/\/lcloud.pl\/","name":"LCloud","description":"AWS Advanced Consulting Partner | APN Well-Architected Partner","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lcloud.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/4e56c347d5a37e0bd0ae7d8353ac1b0a","name":"LCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lcloud.pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d1d7540a45e57ac9534226adcc4ce4700cdb19ae67e134ae46e7f5d9fce93e8?s=96&d=mm&r=g","caption":"LCloud"},"url":"https:\/\/lcloud.pl\/en\/author\/wpdev\/"}]}},"_links":{"self":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/comments?post=3550"}],"version-history":[{"count":5,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3550\/revisions"}],"predecessor-version":[{"id":10082,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/posts\/3550\/revisions\/10082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media\/3459"}],"wp:attachment":[{"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/media?parent=3550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/categories?post=3550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lcloud.pl\/en\/wp-json\/wp\/v2\/tags?post=3550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}