{"id":18127,"date":"2022-02-02T11:03:37","date_gmt":"2022-02-02T19:03:37","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11860\/"},"modified":"2022-02-02T11:03:37","modified_gmt":"2022-02-02T19:03:37","slug":"news-11860","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11860\/","title":{"rendered":"Measure the effectiveness of your Microsoft security with AttackIQ"},"content":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 27 Jan 2022 18:00:00 +0000<\/strong><\/p>\n<p><em>This blog post is part of the Microsoft Intelligent&nbsp;Security Association&nbsp;<a href=\"https:\/\/aka.ms\/MISAGuestBlog\" target=\"_blank\" rel=\"noreferrer noopener\">guest blog series<\/a>.&nbsp;<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more about MISA<\/a>.<\/em><\/p>\n<p>To improve an organization\u2019s cybersecurity readiness, you need to test that your detection and prevention technologies work as intended and that your security program is performing as best it can. Research from a Poneman Institute survey found that amongst over 500 information technology and security leaders across sectors, 53 percent said they were uncertain about the effectiveness and performance of their cybersecurity capabilities.<sup>1<\/sup> The reason? Even\u202fthe most advanced security controls fail\u202fdue to human error and configuration drift,\u202fand when they do, they fail silently. They need to be tested continuously to ensure performance.\u202fBy analogy, even\u202fthe best sports teams in the world need to exercise and prepare\u202ftheir defenses for attacks. If they don&#8217;t train, they atrophy. To ensure readiness, everyone needs to prepare for known threats.<\/p>\n<h2>Measuring\u202fsecurity\u202feffectiveness using MITRE ATT&amp;CK\u00ae<\/h2>\n<p>The\u202fgood news is that the MITRE ATT&amp;CK framework provides\u202fcyber defenders\u202fwith known tactics, techniques, and behaviors that adversaries use to conduct an attack.\u202fToday, Microsoft and\u202fAttackIQ are\u202fworking together, including through the\u202f<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-defender-for-endpoint\/microsoft-defender-atp-evaluation-lab-breach-amp-attack\/ba-p\/1406088\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Evaluation Lab<\/a>,&nbsp;to automate testing using MITRE ATT&amp;CK and a threat-informed defense. AttackIQ is a part of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats.\u202fMISA helps break down silos between security organizations to build better-combined solutions and improve the world\u2019s cybersecurity posture.<\/p>\n<p>AttackIQ enables Microsoft customers to test their use of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Endpoint<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/dotnet\/architecture\/cloud-native\/azure-security\" target=\"_blank\" rel=\"noreferrer noopener\">Azure native cloud security controls<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>, running adversary emulations against the security program to generate detailed data that the team can use. With granular performance data, the customer can make informed decisions about people, processes, and technology, and elevate the security program\u2019s overall performance.<\/p>\n<p>Let\u2019s look at some of the ways the two companies work together.<\/p>\n<h3>Emulating the adversary to test Microsoft Defender for Endpoint<\/h3>\n<p>To validate cybersecurity readiness,\u202f<a href=\"https:\/\/www.youtube.com\/watch?v=Q2cZruaj5Gk\" target=\"_blank\" rel=\"noreferrer noopener\">AttackIQ\u202fintegrates with Microsoft Defender for Endpoint<\/a> to emulate cyberattacks with realism and specificity. It does so at scale and continuously, testing Microsoft Defender for Endpoint\u2019s machine learning and AI-enabled technologies\u202fto generate granular data about security program performance.\u202f&nbsp;<\/p>\n<h3>Testing Microsoft Azure and Microsoft Sentinel<\/h3>\n<p>In addition to testing Microsoft Defender for Endpoint,\u202fthe\u202fAttackIQ\u202f Security Optimization Platform\u202fruns assessments and scenarios against\u202fthe native cloud controls in\u202f<a href=\"https:\/\/azure.microsoft.com\/en-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure<\/a>, leveraging research<strong>\u202f<\/strong>from <a href=\"https:\/\/attackiq.com\/lp\/the-cisos-guide-to-cloud-security-using-attack\/?utm_source=web\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE\u202fEngenuity\u2019s Center for Threat-Informed Defense<\/a> that maps the native security controls in Azure to MITRE ATT&amp;CK.\u202fAttackIQ has built assessments to measure the effectiveness of native cloud controls.\u202fIn addition to Azure\u2019s native controls, AttackIQ is integrated with <a href=\"https:\/\/securityboulevard.com\/2020\/10\/new-attackiq-solution-integrates-with-microsoft-azure-sentinel-to-strengthen-cyber-threat-detection-and-investigation-for-security-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a>, enabling Microsoft Sentinel users to test their detection pipeline and fine-tune security processes across their organization.&nbsp;<\/p>\n<h3>Generating actionable performance data<\/h3>\n<p>Security teams can schedule assessments to run against Microsoft Defender for Endpoint\u202fand Microsoft Azure\u202fas frequently as needed. Based on continuous testing, the\u202fAttackIQ Security Optimization Platform generates\u202fpoint-in-time and longitudinal\u202fdata about security control\u202fperformance, giving teams a sense of the program\u2019s overall readiness.&nbsp;<\/p>\n<h3>Aligning MITRE ATT&amp;CK with Microsoft<\/h3>\n<p>AttackIQ\u202fbrings a deep alignment with MITRE ATT&amp;CK to its automated security control validation for Microsoft\u2019s security capabilities, leveraging a deep scenario library of tactics, techniques, and sub-techniques to validate security program performance.\u202f&nbsp;<\/p>\n<h2>AttackIQ scenarios<\/h2>\n<p>Below is an image of an AttackIQ interface scenario that provides a basic function check of Microsoft Defender for Endpoint. Within the AttackIQ Security Optimization Platform, users can select this scenario out of a range of scenarios within the platform to validate the effectiveness of Microsoft Defender for Endpoint. From there, the user can assign the scenario to run against Microsoft Defender for Endpoint to validate its effectiveness through their infrastructure.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"846\" height=\"784\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-1.jpg\" alt=\"AttackIQ interface scenario that provides a basic function check of Microsoft Defender for Endpoint.\" class=\"wp-image-105174\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-1.jpg 846w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-1-300x278.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-1-768x712.jpg 768w\" sizes=\"auto, (max-width: 846px) 100vw, 846px\" \/><\/figure>\n<p>After running the scenario, the AttackIQ Security Optimization Platform shows results of how well Microsoft Defender for Endpoint performed in its prevention and detection functions, tipping the customer\u2019s security team to any configuration challenges or other issues that may need attention.<\/p>\n<p>The AttackIQ Security Optimization Platform also includes scenarios for testing Azure blog storage accounts, as the below image shows.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"118\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2-1024x118.jpg\" alt=\"The scenarios for testing Azure blog storage accounts.\" class=\"wp-image-105177\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2-1024x118.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2-300x35.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2-768x88.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2-1420x165.jpg 1420w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-2.jpg 1432w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"736\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-3-1024x736.jpg\" alt=\"AttackIQ platform showcasing Data Harvesting from Blob Storage accounts.\" class=\"wp-image-105180\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-3-1024x736.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-3-300x216.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-3-768x552.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-3.jpg 1074w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>Beyond atomic tests of how well Microsoft Defender for Endpoint&nbsp;works in detecting and preventing an attacker\u2019s tactics, techniques, and procedures (TTPs), AttackIQ\u2019s Anatomic Engine chains together TTPs, aligned to the MITRE ATT&amp;CK framework, in a realistic and comprehensive adversary attack flow to run a range of adversary TTPs against an organization. AttackIQ\u2019s Anatomic Engine is designed to test advanced AI and machine learning-enabled defense capabilities like those within Microsoft Defender for Endpoint, Microsoft Azure, and Microsoft Sentinel, emulating the adversary with specificity and realism every step of the way.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"327\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4-1024x327.png\" alt=\"How a security control or set of controls have performed against MITRE ATT&amp;CK-aligned scenarios and attack flows.\" class=\"wp-image-105933\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4-1024x327.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4-300x96.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4-768x245.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4-1536x490.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-image-emulation-plan-012621-image-4.png 1818w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>Once tests have been conducted, AttackIQ generates reports from a single point in time, or longitudinally over a period of time, to show how a security control or set of security controls have performed against the MITRE ATT&amp;CK-aligned scenarios and attack flows that AttackIQ has built and run. The below illustrative diagrams show how AttackIQ generates performance data for detection and prevention failures and successes for a security control.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"551\" height=\"726\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-5.jpg\" alt=\"How AttackIQ generates performance data for detection.\" class=\"wp-image-105186\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-5.jpg 551w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/AI-5-228x300.jpg 228w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/figure>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"327\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6-1024x327.png\" alt=\"Bar graph of historical run rate for automated testing.\" class=\"wp-image-105936\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6-1024x327.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6-300x96.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6-768x245.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6-1536x490.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/Attack-IQ-012621-image-6.png 1777w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>The benefits of automated testing extend beyond single point-in-time analysis.\u202fThe\u202fdetection and prevention results can be aggregated longitudinally to show program performance over time. With real performance data, teams can identify control failures and gaps in the organization\u2019s defensive posture, make adjustments or investments\u202fto improve performance and investigate\u202funseen,\u202funderlying issues that may be impacting operations.\u202f&nbsp;<\/p>\n<h2>Human performance evaluation<\/h2>\n<p>Why is this important?\u202fIt is not just about testing technology.\u202fAll our technologies are run by human teams. Human factors,\u202ftherefore,\u202fplay a key role in security program performance, and the process of\u202fdiscovering the issues that are impacting a security team\u202frequires\u202fdeeper investigation than simple\u202facts of\u202fconfiguration management.\u202fBut if you don\u2019t test your controls, you will never know if you\u2019re having a problem.<\/p>\n<p>Consider the example of a large AttackIQ healthcare customer. Automated testing revealed a security control failure in the customer\u2019s defense capabilities, and on further investigation, they learned that it was due to a lapse in a managed security service provider (MSSP) contract. The security leader investigated the issue and discovered that his large security team faced a problem with attrition due to discrepancies in pay scales. His next call was to the head of human resources to talk about raising salaries. The technology, in this case, was not the problem: the issue was one of pay, not technology management.\u202fThe process of continuous security validation revealed underlying issues in human resources that had a negative impact on the team\u2019s ability to use an advanced technology effectively.<\/p>\n<h2>A comprehensive partnership<\/h2>\n<p>Security controls falter for a range of reasons, and continuous testing helps reveal areas of weakness and strength in a customer\u2019s security program. Microsoft and AttackIQ are helping make cyberspace safe and secure by\u202fvalidating Microsoft\u2019s\u202fsecurity\u202ftechnologies\u202fthrough automated testing, underpinned by the MITRE ATT&amp;CK framework. By emulating the adversary with realism and specificity every\u202fstep of the way, AttackIQ helps Microsoft customers achieve their highest return on investment from the company\u2019s security products.&nbsp;<\/p>\n<h2>About AttackIQ<\/h2>\n<p>AttackIQ, a leading independent vendor of breach and attack simulation solutions, built the industry\u2019s first Security Optimization Platform for continuous security control validation and improving security program effectiveness and efficiency. AttackIQ is trusted by leading organizations worldwide to identify security improvements and verify that cyber defenses work as expected, aligned with the MITRE ATT&amp;CK framework. The company is committed to giving back to the cybersecurity community through its free AttackIQ Academy, open Preactive Security Exchange, and partnership with <a href=\"https:\/\/ctid.mitre-engenuity.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Engenuity\u2019s Center for Threat Informed Defense<\/a>. For more information, <a href=\"http:\/\/www.attackiq.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">visit their website<\/a>. You can also follow AttackIQ on <a href=\"https:\/\/twitter.com\/attackiq\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/attackiq\/mycompany\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, and <a href=\"https:\/\/www.youtube.com\/c\/attackiq\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>.&nbsp;<\/p>\n<h2>Learn more<\/h2>\n<ul>\n<li>Visit <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Endpoint<\/a>.<\/li>\n<li>Explore <a href=\"https:\/\/azure.microsoft.com\/en-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Azure<\/a>.<\/li>\n<li>Start using <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> today.<\/li>\n<\/ul>\n<p>To learn more about the Microsoft Intelligent Security Association (MISA),&nbsp;<a href=\"https:\/\/aka.ms\/MISA\" target=\"_blank\" rel=\"noreferrer noopener\">visit our website<\/a>&nbsp;where you can learn about the MISA program, product integrations, and find MISA members. Visit the&nbsp;<a href=\"https:\/\/aka.ms\/MISAIntegrationVideos\" target=\"_blank\" rel=\"noreferrer noopener\">video playlist<\/a>&nbsp;to learn about the strength of member&nbsp;integrations&nbsp;with Microsoft products.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noreferrer noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/healthitsecurity.com\/news\/security-investments-increasing-but-53-leaders-unsure-of-effectiveness\" target=\"_blank\" rel=\"noreferrer noopener\">Security Investments Increasing, But 53% Leaders Unsure of Effectiveness<\/a>, Jessica Davis, Health IT Security. July 30, 2019.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/01\/27\/measure-the-effectiveness-of-your-microsoft-security-with-attackiq\/\">Measure the effectiveness of your Microsoft security with AttackIQ<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/01\/27\/measure-the-effectiveness-of-your-microsoft-security-with-attackiq\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 27 Jan 2022 18:00:00 +0000<\/strong><\/p>\n<p>Microsoft and\u202fAttackIQ are\u202fworking together to automate testing using MITRE ATT&#038;CK and a threat-informed defense. AttackIQ is a part of the Microsoft Intelligent Security Association.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/01\/27\/measure-the-effectiveness-of-your-microsoft-security-with-attackiq\/\">Measure the effectiveness of your Microsoft security with AttackIQ<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,22745,24738,24739],"class_list":["post-18127","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-microsoft-intelligent-security-association-misa","tag-microsoft-sentinel","tag-misa"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18127"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18127\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}