{"id":16530,"date":"2019-10-07T14:00:38","date_gmt":"2019-10-07T22:00:38","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/10\/07\/news-10269\/"},"modified":"2019-10-07T14:00:38","modified_gmt":"2019-10-07T22:00:38","slug":"news-10269","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/07\/news-10269\/","title":{"rendered":"CISO series: Lessons learned from the Microsoft SOC\u2014Part 3a: Choosing SOC tools"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/02\/21\/lessons-learned-from-the-microsoft-soc-part-1-organization\/\" target=\"_blank\" rel=\"noopener\">Lessons learned from the Microsoft SOC<\/a> blog series is designed to share our approach and experience with security operations center (SOC) operations. Our learnings in the series come primarily from Microsoft\u2019s corporate IT security operation team, one of several specialized teams in the <a href=\"https:\/\/www.microsoft.com\/en-us\/msrc\/cdoc\" target=\"_blank\" rel=\"noopener\">Microsoft Cyber Defense Operations Center (CDOC<\/a>).<\/p>\n<p>Over the course of the series, we\u2019ve discussed how we operate our SOC at Microsoft. In the last two posts, Part 2a, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/23\/lessons-learned-microsoft-soc-part-2-organizing-people\/\" target=\"_blank\" rel=\"noopener\">Organizing people<\/a>, and Part 2b: <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/06\/06\/lessons-learned-from-the-microsoft-soc-part-2b-career-paths-and-readiness\/\" target=\"_blank\" rel=\"noopener\">Career paths and readiness<\/a>, we discussed how to support our most valuable resources\u2014people\u2014based on successful job performance.<\/p>\n<p>We\u2019ve also included lessons learned from the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-detection-and-response-team-dart-blog-series\/\" target=\"_blank\" rel=\"noopener\">Microsoft Detection and Response Team (DART)<\/a> to help our customers respond to major incidents, as well as insights from the other internal SOC teams.<\/p>\n<p>For a visual depiction of our SOC philosophy, <a href=\"https:\/\/aka.ms\/minutesmatter\" target=\"_blank\" rel=\"noopener\">download our Minutes Matter poster<\/a>. To learn more about our Security operations, watch <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/ciso-cybersecurity-strategy?rtc=1\" target=\"_blank\" rel=\"noopener\">CISO Spotlight Series: The people behind the cloud<\/a>.<\/p>\n<p>As part of Cybersecurity Awareness month, today\u2019s installment focuses on the technology that enables our people to accomplish their mission by sharing our current approach to technology, how our tooling evolved over time, and what we learned along the way. We hope you can use what we learned to improve your own security operations.<\/p>\n<h3>Our strategic approach to technology<\/h3>\n<p>Ultimately, the role of technology in a SOC is to help empower people to better contain risk from adversary attacks. Our design for the modern enterprise SOC has moved away from the classic model of relying primarily on alerts generated by static queries in an on-premise security information and event management (SIEM) system. The volume and sophistication of today\u2019s threats have outpaced the ability of this model to detect and respond to threats effectively.<\/p>\n<p>We also found that augmenting this model with disconnected point-solutions lead to additional complexity and didn\u2019t necessarily speed up analysis, prioritization, orchestration, and execution of response action.<\/p>\n<h3>Selecting the right technology<\/h3>\n<p>Every tool we use must enable the SOC to better achieve its mission and provide meaningful improvement before we invest in purchasing and integrating it. Each tool must also meet rigorous requirements for the sheer scale and global footprint of our environment and the top-shelf skill level of the adversaries we face, as well as efficiently enable our analysts to provide high quality outcomes. The tools we selected support a range of scenarios.<\/p>\n<p>In addition to enabling firstline responders to rapidly remediate threats, we must also enable deep subject matter experts in security and data science to reason over immense volumes of data as they hunt for highly skilled and well-funded nation state level adversaries.<\/p>\n<h3>Making the unexpected choice<\/h3>\n<p>Even though many of the tools we currently use are made by Microsoft, they still must meet our stringent requirements. All SOC tools\u2014no matter who makes them\u2014are strictly vetted and we don\u2019t hesitate to reject tools that don\u2019t work for our purposes. For example, our SOC rejected Microsoft\u2019s Advanced Threat Analytics tool because of the infrastructure required to scale it up (despite some promising detection results in a pilot). It\u2019s successor, Azure Advanced Threat Protection (Azure ATP) solved this infrastructure challenge by shifting to a SaaS architecture and is now in active use daily.<\/p>\n<p>Our SOC analysts work with Microsoft engineering and third-party tool providers to drive their requirements and provide feedback. As an example, our SOC team has a weekly meeting with the Windows Defender ATP team to review learnings, findings, request features or changes, share engineering progress on requested features, and share attacker research from both teams. Even today, as we <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/09\/24\/azure-sentinel-cloud-native-siem-empowers-defenders-generally-available\/\" target=\"_blank\" rel=\"noopener\">roll out Azure Sentinel<\/a>, our SOC is actively working with the engineering team to ensure key requirements are met, so we can fully retire our legacy SIEM (more details below). Additionally, we regularly invite engineers from our product groups to join us in the SOC to learn how the technology is applied by our experts.<\/p>\n<h3>History and evolution to broad and deep tooling<\/h3>\n<p>Microsoft\u2019s Corporate IT SOC protects a cross platform environment with a significant population of Windows, Linux, and Macs running a variety of Microsoft and non-Microsoft software. This environment is approximately 95 percent hosted on the cloud today. The tooling used in this SOC has evolved significantly over the years starting from the classic model centered around an on-premises SIEM.<\/p>\n<p><strong>Phase 1\u2014Classic on-premises SIEM-centric model<\/strong><\/p>\n<p>This is the common model where all event data is fed into an on-premises SIEM where analytics are performed on the data (primarily static queries that were refined over time).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89960 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-1.png\" alt=\"Infographic showing the classic SIEM model: Incidents, Alert Queue, Primary Investigation, Pivot and Remediate.\" width=\"1569\" height=\"689\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-1.png 1569w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-1-300x132.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-1-768x337.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-1-1024x450.png 1024w\" sizes=\"auto, (max-width: 1569px) 100vw, 1569px\" \/><\/p>\n<p>We experienced a set of challenges that we now view as natural limitations of this model. These challenges included:<\/p>\n<ul>\n<li><strong>Overwhelming event volume<\/strong>\u2014High volume and growth (on the scale of 20+ billion events a day currently) exceeded the capacity of the on-premises SIEM to handle it.<\/li>\n<li><strong>Analyst overload and fatigue<\/strong>\u2014The static rulesets generated excessive amounts of false positive alerts that lead to alert fatigue.<\/li>\n<li><strong>Poor investigation workflow<\/strong>\u2014Investigation of events using the SIEM was clunky and required manual queries and manual steps when switching between tools.<\/li>\n<\/ul>\n<p><strong>Phase 2\u2014Bolster on-premises SIEM weaknesses with cloud analytics and deep tools<\/strong><\/p>\n<p>We introduced several changes designed to address shortcomings of the classic model.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89961 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-2.png\" alt=\"Infographic showing Investigation tooling in SIEM: Log analytics, Endpoint, Identity, Saas, and Azure Assets.\" width=\"1656\" height=\"784\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-2.png 1656w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-2-300x142.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-2-768x364.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-2-1024x485.png 1024w\" sizes=\"auto, (max-width: 1656px) 100vw, 1656px\" \/><\/p>\n<p>Three strategic shifts were introduced and included:<\/p>\n<p><b>1. Cloud based log analytics<\/b>\u2014To address the SIEM scalability challenges discussed previously, we introduced cloud data lake and machine learning technology to more efficiently store and analyze events. This took pressure off our legacy SIEM and allowed our hunters to embrace the scale of cloud computing to apply advanced techniques like machine learning to reason over the data. We were early adopters of this technology before many current commercial offerings had matured, so we ended up with several &#8220;generations&#8221; of custom technology that we had to later reconcile and consolidate (into the Log Analytics technology that now powers Azure Sentinel).<\/p>\n<blockquote>\n<p><strong>Lesson learned:<\/strong> \u201cGood enough\u201d and \u201csupported\u201d is better than \u201ccustom.\u201d<\/p>\n<p>Adopt commercial products if they meet at least the \u201cPareto 80 percent\u201d of your needs because the support of these custom implementations (and later rationalization effort) takes resources and effort away from hunting and other core mission priorities.<\/p>\n<\/blockquote>\n<p><strong>2. Specialized high-quality tooling<\/strong>\u2014To address analyst overload and poor workflow challenges, we tested and adopted specialized tooling designed to:<\/p>\n<ul>\n<li>Produce high quality alerts (versus high quantity of detailed data).<\/li>\n<li>Enable analysts to rapidly investigate and remediate compromised assets.<\/li>\n<\/ul>\n<p>It is hard to overstate the benefits of this incredibly successful integration of technology. These tools had a powerful positive impact on our analyst morale and productivity, driving significant improvements of our SOC\u2019s mean time to acknowledge (MTTA) and remediate (MTTR).<\/p>\n<p>We attribute a significant amount of this success of these tools to the direct real-world input that was used to design them.<\/p>\n<ul>\n<li><strong>SOC<\/strong>\u2014The engineering group spent approximately 18-24 months with our SOC team focused on learning about SOC analyst needs, thought processes, pain points, and more while designing and building the first release of Windows Defender ATP. These teams still stay in touch weekly.<\/li>\n<li><strong>DART team<\/strong>\u2014The engineering group directly integrated analysis and hunting techniques that <a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-detection-and-response-team-dart-blog-series\/\" target=\"_blank\" rel=\"noopener\">DART<\/a> developed to rapidly find and evict advanced adversaries from customers.<\/li>\n<\/ul>\n<p>Here\u2019s a quick summary of the key tools. We\u2019ll share more details on how we use them in our next blog:<\/p>\n<ul>\n<li><strong>Endpoint<\/strong>\u2014Microsoft Defender ATP is the default starting point for analysts for almost any investigation (regardless of the source of the alert) because of its powerful visibility and investigation capabilities.<\/li>\n<li><strong>Email<\/strong>\u2014Office 365 ATP\u2019s integration with Office 365 Exchange Online helps analysts rapidly find and remove phishing emails from mailboxes. The integration with Microsoft Defender ATP and Azure ATP enables analysts to handle common cases extremely quickly, which lead to growth in our analyst caseload (in a good way <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/263a.png\" alt=\"\u263a\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>).<\/li>\n<li><strong>Identity<\/strong>\u2014Integrating Azure ATP helped complete the triad of the most attacked\/utilized resources (Endpoint-Email-Identity) and enabled analysts to smoothly pivot across them (and added some useful detections too).<\/li>\n<li>We also added Microsoft Cloud App Security and Azure Security Center to provide high quality detections and improve investigation experience as well.<\/li>\n<\/ul>\n<p>Even before adding the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/automated-investigations\" target=\"_blank\" rel=\"noopener\">Automated investigations<\/a> technology (originally acquired from Hexadite), we found that Microsoft Defender ATP\u2019s Endpoint Detection and Response (EDR) solution increased SOC\u2019s efficiency to the point where Investigation teams analysts can start doing more proactive hunting part-time (often by sifting through lower priority alerts from Microsoft Defender ATP).<\/p>\n<blockquote>\n<p><strong>Lesson learned:<\/strong> Enable rapid end-to-end workflow for common Email-Endpoint identity attacks.<\/p>\n<p>Ensure your technology investments optimize the analyst workflow to detect, investigate, and remediate common attacks. The Microsoft Defender ATP and connected tools (Office 365 ATP, Azure ATP) was a game changer in our SOC and enabled us to consistently remediate these attacks within minutes. This is our number one recommendation to SOCs as it helped with:<\/p>\n<ul>\n<li><strong>Commodity attacks<\/strong>\u2014Efficiently dispatch (a high volume of) commodity attacks in the environment.<\/li>\n<li><strong>Targeted attacks<\/strong>\u2014Mitigate impact advanced attacks by severely limiting attack operator time to laterally traverse and explore, hide, set up command\/control (C2), etc.<\/li>\n<\/ul>\n<\/blockquote>\n<p><strong>3. Mature case management<\/strong>\u2014To further improve analyst workflow challenges, we transitioned the analyst\u2019s primary queue to our case management service hosted by a commercial SaaS provider. This further reduced our dependency on our legacy SIEM (primarily hosting legacy static analytics that had been refined over time).<\/p>\n<blockquote>\n<p><strong>Lesson learned:<\/strong> Single queue<\/p>\n<p>Regardless of the size and tooling of your SOC, it\u2019s important to have a single queue and govern quality of it.<\/p>\n<p>This can be implemented as a case management solution, the alert queue in a SIEM, or as simple as the alert list in the Microsoft Threat Protection tool for smaller organizations. Having a single place to go for reactive analysis and ensuring that place produces high quality alerts are key enablers of SOC effectiveness and responsiveness. As a complement to the quality piece, you should also have a proactive hunting activity to ensure that attacker activities are not lost in high noise detection.<\/p>\n<\/blockquote>\n<p><strong>Phase 3\u2014Modernize SIEM to cloud native<\/strong><\/p>\n<p>Our current focus is the transition of the remaining SIEM functions from our legacy capability to Azure Sentinel.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89962 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-3.png\" alt=\"Infographic showing showing a unified view: Event logs, endpoint, identity, SaaS, Azure assets, network, servers, and 3rd party logs and tools.\" width=\"1857\" height=\"914\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-3.png 1857w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-3-300x148.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-3-768x378.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/10\/Choosing-SOC-tools-3-1024x504.png 1024w\" sizes=\"auto, (max-width: 1857px) 100vw, 1857px\" \/><\/p>\n<p>We\u2019re now focused on refining our tool strategy and architecture into a model designed to optimize both breadth (unified view of all events) and depth capabilities. The specialized high-quality tooling (depth tooling) works great for monitoring the \u201cfront door\u201d and some hunting but isn\u2019t the only tooling we need.<\/p>\n<p>We\u2019re now in the early stages of operating Microsoft\u2019s Azure Sentinel technology in our SOC to completely replace our legacy on-premises SIEM. This task is a bit simpler for us than most, as we have years of experience using the underlying event log analysis technology that powers Azure Sentinel (Azure Monitor technology, which was previously known as Azure Log Analytics and Operations Management Suite (OMS)).<\/p>\n<p>Our SOC analysts have also been contributing heavily to Azure Sentinel and its community (queries, dashboards, etc.) to share what we have learned about adversaries with our customers.<\/p>\n<p>Learn more details about this SOC and download slides from the <a href=\"https:\/\/aka.ms\/CISOWorkshop\" target=\"_blank\" rel=\"noopener\">CISO Workshop<\/a>:<\/p>\n<ul>\n<li>Video\u2014<a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/ciso-workshop-module-4b#part-1-evolution-of-threat-landscape-539\" target=\"_blank\" rel=\"noopener\">Part 3: Learnings from Microsoft Corporate IT SOC (22:07)<\/a><\/li>\n<li>Slides\u2014<a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/office-365-security\/ciso-workshop-module-4b#part-1-evolution-of-threat-landscape-539\" target=\"_blank\" rel=\"noopener\">CISO Workshop Module 4b<\/a><\/li>\n<\/ul>\n<blockquote>\n<p><strong>Lesson learned:<\/strong> Side-by-side transition state<\/p>\n<p>Based on our experience and conversations with customers, we expect transitioning to cloud analytics like Azure Sentinel will often include a side-by-side configuration with an existing legacy SIEM. This could include a:<\/p>\n<ul>\n<li><strong>Short-term transition state<\/strong>\u2014For organizations that are committed to rapidly retiring a legacy SIEM in favor of Azure Sentinel (often to reduce cost\/complexity) and need operational continuity during this short bridge period.<\/li>\n<li><strong>Medium-term coexistence<\/strong>\u2014For organizations with significant investment into an on-premises SIEM and\/or a longer-term plan for cloud migration. These organization recognize the power of <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/08\/30\/building-the-security-operations-center-of-tomorrow-harnessing-the-law-of-data-gravity\/\" target=\"_blank\" rel=\"noopener\">Data Gravity<\/a>\u2014placing analytics closer to the cloud data will avoid costs and challenges of transferring logs to\/from the cloud.<\/li>\n<\/ul>\n<p>Managing the SOC investigations across the SIEM platforms can be accomplished with reasonable efficiency using either a case management tool or the <a href=\"http:\/\/aka.ms\/graphsecurityapi\" target=\"_blank\" rel=\"noopener\">Microsoft Graph Security API<\/a> (synchronizing Alerts between the two SIEM platforms).<\/p>\n<p>Microsoft is continuing to invest in building more detailed guidance and capabilities to document learnings on this process and continue to refine technology to support it.<\/p>\n<\/blockquote>\n<h3>Learn more<\/h3>\n<p>To learn more, read previous posts in the \u201cLessons learned from the Microsoft SOC\u201d series, including:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/02\/21\/lessons-learned-from-the-microsoft-soc-part-1-organization\/\" target=\"_blank\" rel=\"noopener\">Part 1: Organization<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/23\/lessons-learned-microsoft-soc-part-2-organizing-people\/\" target=\"_blank\" rel=\"noopener\">Part 2a: Organizing people<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/06\/06\/lessons-learned-from-the-microsoft-soc-part-2b-career-paths-and-readiness\/\" target=\"_blank\" rel=\"noopener\">Part 2b: Career paths and readiness<\/a><\/li>\n<\/ul>\n<p>Also, see our full <a href=\"https:\/\/www.microsoft.com\/security\/blog\/ciso-series\/\" target=\"_blank\" rel=\"noopener\">CISO series<\/a>.<\/p>\n<p>Watch the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/ciso-cybersecurity-strategy?rtc=1\" target=\"_blank\" rel=\"noopener\">CISO Spotlight Series: The people behind the cloud<\/a>.<\/p>\n<p>For a visual depiction of our SOC philosophy, <a href=\"https:\/\/aka.ms\/minutesmatter\" target=\"_blank\" rel=\"noopener\">download our Minutes Matter poster<\/a>.<\/p>\n<p>Stayed tuned for the next segment in \u201cLessons learned from the Microsoft SOC\u201d where we dive into more of the analyst experience of using these tools to rapidly investigate and remediate attacks. In the meantime, bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/07\/ciso-series-lessons-learned-from-the-microsoft-soc-part-3a-choosing-soc-tools\/\">CISO series: Lessons learned from the Microsoft SOC\u2014Part 3a: Choosing SOC tools<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/07\/ciso-series-lessons-learned-from-the-microsoft-soc-part-3a-choosing-soc-tools\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Mon, 07 Oct 2019 21:20:56 +0000<\/strong><\/p>\n<p>In the next post of our series, we provide tips on choosing technology to help a security operations center (SOC) be more responsive, effective, and collaborative.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/07\/ciso-series-lessons-learned-from-the-microsoft-soc-part-3a-choosing-soc-tools\/\">CISO series: Lessons learned from the Microsoft SOC\u2014Part 3a: Choosing SOC tools<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21500,21983,21984,22453,21877],"class_list":["post-16530","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-azure-security","tag-ciso-series","tag-ciso-series-page","tag-microsoft-security-intelligence","tag-security-strategies"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16530"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16530\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16530"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}