{"id":20918,"date":"2018-08-18T08:30:43","date_gmt":"2018-08-18T15:30:43","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=20918"},"modified":"2018-08-29T10:14:23","modified_gmt":"2018-08-29T17:14:23","slug":"controlling-monitoring-access-sensitive-data-cloud","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/","title":{"rendered":"Controlling and Monitoring Access to Sensitive Data in the Cloud"},"content":{"rendered":"<p>As enterprises plan their digital transformations, many organizations choose to move their business information to the cloud in an attempt to save both time and money. According to a 2017 <a href=\"https:\/\/newsroom.intel.com\/news-releases\/intel-security-cloud-report-reveals-it-departments-find-hard-keep-cloud-safe\/\" target=\"_blank\" rel=\"noopener\">Intel Security survey<\/a>, over 60% of companies use the cloud for storing sensitive customer information. Looking at these impressive numbers, it becomes obvious that access to sensitive data in the cloud needs to be properly controlled and monitored. It\u2019s the only way you can ensure sensitive data protection and comply with regulatory requirements. However, ensuring an on-premise level security in the cloud environment can be quite a challenge.<\/p>\n<p>So, what are the risks of not monitoring access to sensitive data in the cloud and what can be done to ensure a better level of control? We talk about it in the next section.<\/p>\n<p><strong>Key problems of poor cloud access management<\/strong><\/p>\n<p>Even though the definition of sensitive information may vary from an organization to organization, the key requirements for cloud data security and governance are pretty common. Your company\u2019s data must be constantly available while being well-protected and secured at the same time. The main problem is that many organizations don\u2019t monitor their sensitive data security properly.<\/p>\n<p>The lack of control poses a serious threat to a company\u2019s cybersecurity. Thus, ensuring a high level of cloud computing sensitive data protection is essential. Here are the main risks posed by a poor monitoring and control of cloud information access:<\/p>\n<ul>\n<li><b>You don\u2019t know where<\/b> <b>your sensitive data is.<\/b> When stored in the cloud, the information can be physically located almost anywhere in the world. The main problem created by this cloud computing peculiarity is that some types of sensitive information are subjected to strict data residency and compliance regulations.<\/li>\n<li><b>You don\u2019t know who can access that data.<\/b> It\u2019s not only your top-management and IT department staff that can access your data. Cloud provider employees and third-party actors may also be able to access your company\u2019s critical information. Your task is to make sure that any third-party users won\u2019t get access to the information they\u2019re not supposed to have access to.<\/li>\n<li><b>You don\u2019t know if your data has been changed.<\/b> Without an advanced monitoring and auditing system, you can miss the moment some of your company\u2019s sensitive information was changed, deleted, or moved to a different location. This can result in devastating data breaches as well as serious compliance and regulation violations.<\/li>\n<\/ul>\n<p>It\u2019s also important to work with trustworthy cloud service providers (CSPs). When choosing a CSP, pay special attention not only to their reputation but also to their flexibility and the variety of security tools and solutions they can offer.<\/p>\n<p>Take your time planning a security strategy fit for your business. Usually, an organization has to comply with several security standards, depending on their industry, residency, and the kind of information they work with. Your task is to determine what regulations and security standards you need to comply with. Then, make sure to list all these standards, as well as delineate the responsibilities of both sides in a Service-Level Agreement (SLA) with your CSP.<\/p>\n<p>Next, we\u2019ll talk about effective approaches and solutions you can implement for monitoring and controlling valuable data in the cloud.<\/p>\n<p><strong>Best practices for monitoring access to sensitive data in the cloud<\/strong><\/p>\n<p>In contrast to on-premise data centers, cloud-based infrastructures are not that easy to monitor and manage. In order to secure the perimeter and ensure high-quality data protection in the cloud, you need to accomplish the following tasks:<\/p>\n<ul>\n<li>Provide end-to-end visibility<\/li>\n<li>Secure access to valuable information<\/li>\n<li>Implement Privileged Access Management<\/li>\n<li>Monitor and audit access to sensitive data continuously<\/li>\n<li>Build an efficient incident-response strategy<\/li>\n<\/ul>\n<p>Let\u2019s take a closer look at each of these tasks.<\/p>\n<p>The lack of visibility across the infrastructure is one of the main drawbacks of the cloud-based solutions. Therefore, there is a need to ensure <b>end-to-end visibility<\/b> into the infrastructure, critical data, and applications.<\/p>\n<p>The implementation of an efficient <b>identity and access management system<\/b> can help you limit access to critical data. Plus, it\u2019ll help you understand who exactly accesses and works with your business\u2019s critical data. A high-level granularity of access management allows granting elevated privileges only to users that actually need it. Also, you can use cloud data encryption both in transit and at rest for additional protection of sensitive information.<\/p>\n<p>By implementing an advanced privileged user management approach, you can make sure that users with elevated privileges, such as administrators or managers, don\u2019t try to harm your business. PAM solutions can also help ensure a better level of access granularity and personalization for shared accounts.<\/p>\n<p>Continuous<b> monitoring and auditing<\/b> of your cloud infrastructure allow detecting possible attacks and data breaches at an early stage. Monitoring is also needed for managing your company\u2019s consumption of cloud resources. While your CSP may provide specific monitoring tools, it\u2019s usually much better to use a dedicated user activity monitoring solution. Such systems specifically designed for detecting and investigating incidents, while built-in PAM capabilities will help you both monitor sensitive data and manage access to it.<\/p>\n<p>There are different kinds of access management and monitoring solutions, from traditional agent-based security software to advanced user activity monitoring platforms to SaaS-based solutions. To make the monitoring process easy and efficient, try finding an ultimate solution that can help you solve all these tasks.<\/p>\n<p><b>An incident-response strategy<\/b> can help you react to a possible security incident in an adequate and immediate manner. Look for a solution that allows setting custom alerts for specific events and offers efficient disaster recovery tools.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Monitoring and managing access to sensitive information in the cloud is an essential part of cybersecurity policy in any organization. You need to have a clear visibility of what information is stored where and who can have access to it. Being able to track every action involving critical data is also important. Look for a complex user activity monitoring solution that allows setting specific rules and restrictions, personalizing access to shared accounts, and continuously tracking any activity involving your company\u2019s sensitive information.<\/p>\n<p>Choosing a trustworthy CSP who meets the exact security standards that your organization needs can help ensure a better level of cloud data protection. Just make sure to determine where the responsibilities of each side lie and what compliance regulations and security standards must be adhered to.<\/p>\n<p><strong>About the Author<\/strong><\/p>\n<p><i><span class=\"m_6765492997525498149gmail-lt-line-clamp__line\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-20919\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan.jpg\" alt=\"\" width=\"125\" height=\"125\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan.jpg 125w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan-110x110.jpg 110w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan-50x50.jpg 50w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/>Marcell Gogan is a specialist within digital security solution business design and development, virtualization and cloud\u00a0<\/span><span class=\"m_6765492997525498149gmail-lt-line-clamp__line\">computing R&amp;D projects, establishment and management of software research direction &#8211; working with <a href=\"https:\/\/www.ekransystem.com\/en\" target=\"_blank\" rel=\"noopener\">Ekran System<\/a>. He also loves\u00a0<\/span><span class=\"m_6765492997525498149gmail-lt-line-clamp__line m_6765492997525498149gmail-lt-line-clamp__line--last\">writing about data management and cybersecurity.<\/span><\/i><\/p>\n<p>&nbsp;<\/p>\n<p><em>Sign up for the free insideBIGDATA\u00a0<a href=\"http:\/\/insidebigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noopener noreferrer\">newsletter<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this contributed article, cloud computing specialist Marcell Gogan advises that monitoring and managing access to sensitive information in the cloud is an essential part of cybersecurity policy in any organization. You need to have a clear visibility of what information is stored where and who can have access to it. Being able to track every action involving critical data is also important. <\/p>\n","protected":false},"author":10511,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[115,66,68,87,180,56,97,1],"tags":[590,96],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In this contributed article, cloud computing specialist Marcell Gogan advises that monitoring and managing access to sensitive information in the cloud is an essential part of cybersecurity policy in any organization. You need to have a clear visibility of what information is stored where and who can have access to it. Being able to track every action involving critical data is also important.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-18T15:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-08-29T17:14:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan.jpg\" \/>\n<meta name=\"author\" content=\"Stephanie Ellars\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stephanie Ellars\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/\",\"url\":\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/\",\"name\":\"Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2018-08-18T15:30:43+00:00\",\"dateModified\":\"2018-08-29T17:14:23+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/f5d11c67dca8ab57ddabc5617f9344a6\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Controlling and Monitoring Access to Sensitive Data in the Cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/f5d11c67dca8ab57ddabc5617f9344a6\",\"name\":\"Stephanie Ellars\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f7e9498a236e8c04e446e0e57122ab89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f7e9498a236e8c04e446e0e57122ab89?s=96&d=mm&r=g\",\"caption\":\"Stephanie Ellars\"},\"sameAs\":[\"http:\/\/insideBIGDATA.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/stephanie-ellars\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/","og_locale":"en_US","og_type":"article","og_title":"Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA","og_description":"In this contributed article, cloud computing specialist Marcell Gogan advises that monitoring and managing access to sensitive information in the cloud is an essential part of cybersecurity policy in any organization. You need to have a clear visibility of what information is stored where and who can have access to it. Being able to track every action involving critical data is also important.","og_url":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2018-08-18T15:30:43+00:00","article_modified_time":"2018-08-29T17:14:23+00:00","og_image":[{"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2018\/08\/marcell-gogan.jpg"}],"author":"Stephanie Ellars","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Stephanie Ellars","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/","url":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/","name":"Controlling and Monitoring Access to Sensitive Data in the Cloud - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2018-08-18T15:30:43+00:00","dateModified":"2018-08-29T17:14:23+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/f5d11c67dca8ab57ddabc5617f9344a6"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2018\/08\/18\/controlling-monitoring-access-sensitive-data-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"Controlling and Monitoring Access to Sensitive Data in the Cloud"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/f5d11c67dca8ab57ddabc5617f9344a6","name":"Stephanie Ellars","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f7e9498a236e8c04e446e0e57122ab89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7e9498a236e8c04e446e0e57122ab89?s=96&d=mm&r=g","caption":"Stephanie Ellars"},"sameAs":["http:\/\/insideBIGDATA.com"],"url":"https:\/\/insidebigdata.com\/author\/stephanie-ellars\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-5ro","jetpack-related-posts":[{"id":17707,"url":"https:\/\/insidebigdata.com\/2017\/04\/29\/dataguise-introduces-sensitive-data-monitoring-masking-apache-hive\/","url_meta":{"origin":20918,"position":0},"title":"Dataguise Introduces Sensitive Data Monitoring and Masking for Apache Hive","date":"April 29, 2017","format":false,"excerpt":"Dataguise, a leader in sensitive data governance, announced that DgSecure now provides industry-first sensitive data monitoring and masking in Apache Hive.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17620,"url":"https:\/\/insidebigdata.com\/2017\/04\/15\/dataguise-strengthens-sensitive-data-governance-cloud-support-google-cloud-storage\/","url_meta":{"origin":20918,"position":1},"title":"Dataguise Strengthens Sensitive Data Governance in the Cloud with Support for Google Cloud Storage","date":"April 15, 2017","format":false,"excerpt":"Dataguise, a leader in sensitive data governance, announced that DgSecure Detect now supports sensitive data detection on Google Cloud Storage (GCS). Integration with GCS extends the range of platforms supported by DgSecure Detect, which helps data-driven enterprises move to the cloud with confidence by providing precise sensitive data detection across\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14885,"url":"https:\/\/insidebigdata.com\/2016\/04\/20\/unleash-the-power-of-data-with-dataguise-dgsecure-for-amazon-web-services\/","url_meta":{"origin":20918,"position":2},"title":"Unleash the Power of Data with Dataguise DgSecure for Amazon Web Services","date":"April 20, 2016","format":false,"excerpt":"Dataguise, a technology leader in secure business execution, announced Dataguise DgSecure for the detection, protection and monitoring of sensitive data across Amazon Simple Storage Service (Amazon S3) via the Amazon Elastic MapReduce (Amazon EMR) platform.","rel":"","context":"In &quot;Big Data Software&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14565,"url":"https:\/\/insidebigdata.com\/2016\/02\/27\/2016-vormetric-data-threat-report-cloud-big-data-and-iot-edition\/","url_meta":{"origin":20918,"position":3},"title":"2016 Vormetric Data Threat Report \u2013 Cloud, Big Data and IoT Edition","date":"February 27, 2016","format":false,"excerpt":"Vormetric, a leader in enterprise data security for physical, big data, public, private and hybrid cloud environments, announced the results of its cloud, big data and IoT focused edition of the 2016 Vormetric Data Threat Report (DTR) issued in conjunction with analyst firm 451 Research.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17709,"url":"https:\/\/insidebigdata.com\/2017\/04\/30\/thales-63-enterprises-using-cloud-big-data-iot-container-environments-without-securing-sensitive-data\/","url_meta":{"origin":20918,"position":4},"title":"Thales: 63% of Enterprises Using Cloud, Big Data, IoT and Container Environments without Securing Sensitive Data","date":"April 30, 2017","format":false,"excerpt":"Thales, a leader in critical information systems, cybersecurity and data security, announced the results of its 2017 Thales Data Threat Report, Advanced Technology Edition, issued in conjunction with analyst firm 451 Research. According to the report, 93 percent of respondents will use sensitive data in an advanced technology (defined as\u2026","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25950,"url":"https:\/\/insidebigdata.com\/2021\/04\/10\/consumption-derived-data-governance-is-difficult-to-flank\/","url_meta":{"origin":20918,"position":5},"title":"Consumption-derived Data Governance is Difficult to Flank","date":"April 10, 2021","format":false,"excerpt":"In this special guest feature, Doug Wick, Vice President of Product at ALTR, believes that data consumption governance, implemented at the query level to observe and control consumption of sensitive data, could help organizations to take full advantage of the cloud while reducing the associated risks.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/20918"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10511"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=20918"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/20918\/revisions"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=20918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=20918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=20918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}