{"id":21359,"date":"2020-06-23T15:42:26","date_gmt":"2020-06-23T19:42:26","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=21359"},"modified":"2024-06-03T12:03:37","modified_gmt":"2024-06-03T16:03:37","slug":"everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/","title":{"rendered":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask"},"content":{"rendered":"<p>Whether during good times or bad times, security threats are always out there looking for victims. You may have or will soon move to the cloud with Microsoft 365, so you likely need a cybersecurity roadmap and execution plan. We have great news for you! Sherweb has the expertise and staff to help you achieve all your security needs, even for those running on tight budgets and limited resources. But first, let us introduce you to CIS controls and implementation groups so you can take the first step to build a security plan.<\/p>\n<h2>Who is CIS and how you can benefit from their work?<\/h2>\n<p>The <a href=\"https:\/\/www.cisecurity.org\/cybersecurity-best-practices\/\" target=\"_blank\" rel=\"noopener noreferrer\">Center for Internet Security\u00ae (CIS)<\/a> is a non-profit crowdsourced global consortium of IT experts that help organizations \u201cidentify, develop, validate, promote, and sustain best practice solutions for cyber defense and build and lead communities to enable an environment of trust in cyberspace.\u201d<\/p>\n<p>CIS\u2019s goal is to increase the organization\u2019s visibility of your digital operations, and that includes your physical infrastructure and software applications. With many possible pieces in your infrastructure, smaller organizations may not have the bandwidth to know all entry points. Even small companies can have complex infrastructures, so it is better to know where they are before an attack.<\/p>\n<p>You can find the basic guidelines <a href=\"https:\/\/learn.cisecurity.org\/cis-controls-download\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> broken down in a step-by-step approach. It\u2019s easily digestible for us mere mortals who do not possess PhDs or top-level NSA security clearances.<\/p>\n<h2><span lang=\"EN-US\">CIS controls are simple to understand<\/span><\/h2>\n<p>Upon opening the download, you may feel a bit overwhelmed as you scroll through all of the list\u2019s sub-controls. Don\u2019t worry; the guide is meant to be followed line-by-line so that you can go at your own pace. We recommend that you identify what phase you are in, then plan accordingly.<\/p>\n<h3>CIS Phases<\/h3>\n<ul>\n<li>Basic: Network inventory-focused and cost-effective actions. An accounting of all devices and workstations.<\/li>\n<li>Foundational: A more time-intensive implementation spanning across all organizational operations. Having an expert like Sherweb may be helpful to determine the right areas to focus on.<\/li>\n<li>Organizational: Typically, a more enterprise-level phase dealing with resource-intensive rollouts that have an ongoing timeline. Again, having an expert like Sherweb may be helpful to determine what to focus on.<\/li>\n<\/ul>\n<h2><span lang=\"EN-US\">Implementation Groups (IG)<\/span><\/h2>\n<p>Once you have established your phased approach, you can use CIS Implementation Groups (IGs). IGs are self-assessed categories based on your organization\u2019s relevant cybersecurity attributes. Within each IG, you will find and map which sub-controls are more reasonable to implement depending on your organization\u2019s risk profile and available resources.<\/p>\n<p>The CIS framework breaks the sub-controls into three groups. Implementation groups also continue the simplicity theme. Each group builds upon the previous group as you move up. IG2 builds upon IG1 controls, and IG3 builds upon IG2 controls.<\/p>\n<h3>Implementation Group 1:<\/h3>\n<p>Aimed at small businesses where data sensitivity requirements are very low, using commercially available off-the-shelf software. These are the core set of sub-controls for organizations with limited resources and expertise. Within IG1, you can identify, define, and plan the execution for future specialized actions or situations.<\/p>\n<p>At Sherweb, we had this group in mind when we created our Office Protect service. Our goal is to simplify security for small businesses that do not have the resources and bandwidth to have dedicated cybersecurity professionals on staff.<\/p>\n<h3>Implementation Group 2:<\/h3>\n<p>This group is for enterprises that store sensitive business information and have reasonable cybersecurity resources for implementation. IG2 contains more sub-controls for organizations that have dedicated IT teams and higher levels of operational complexity within their hardware and software.<\/p>\n<h3>Implementation Group 3:<\/h3>\n<p>IG3 operates as a defense against sophisticated adversaries such as Nation State actors utilizing zero-day vulnerabilities. IG3 is for larger organizations that must maintain and coordinate mass amounts of sensitive data and typically have engaged additional cybersecurity experts to assess and execute higher levels of enterprise security.<\/p>\n<h2><span lang=\"EN-US\">Help business unit partners roll out<\/span><\/h2>\n<p>Rolling out a detailed security plan and processes may cause roadblocks in any organization. To avoid pushback, Sherweb has found these steps to be extremely helpful when getting buy-in from business units.<\/p>\n<ul>\n<li>Communicate your security motivations clearly so business units can see how it benefits them.<\/li>\n<li>Learn as much as you can about each business unit\u2019s goals, processes, and practices so you can address their concerns first.<\/li>\n<li>Educate Business Unit leadership on the importance of their role and how they can provide value by notifying staff of possible threats early and often.<\/li>\n<\/ul>\n<h2 style=\"text-align: center;\"><a class=\"track-link\" href=\"https:\/\/info.sherweb.com\/office-protect-m365-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Are you looking for easy security management for Microsoft 365? Learn how Office Protect makes security management simple\u00a0<\/a><\/h2>\n<h2>Sherweb is here for you<\/h2>\n<p>CIS Control planning and making needed choices do not have to be painful. If you have questions about the implementation of CIS Controls, Sherweb is here for you. And if you wonder where you stand with your security, be sure to take our security assessment.<\/p>\n<p>Our security products portfolio builds around various levels of controls. We start with <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a> for the first level and dive deeper with <a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\" target=\"_blank\" rel=\"noopener noreferrer\">endpoint protection<\/a> as well as <a href=\"https:\/\/www.sherweb.com\/security\/acronis\/\" target=\"_blank\" rel=\"noopener noreferrer\">backup<\/a> and <a href=\"https:\/\/www.sherweb.com\/security\/veeam\/\" target=\"_blank\" rel=\"noopener noreferrer\">recovery<\/a> services. On top of this, our <a href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/it-advisor-and-network-operations-center\/\" target=\"_blank\" rel=\"noopener noreferrer\">NOC and professional services<\/a> help ensure the safest environment for our partners and their clients.<\/p>\n<p>Let us put our world-class cloud and security architects\u2019 knowledge and experience to work for you!<\/p>\n<p>With Sherweb, you get an expert cloud and security solutions partner that is committed to your success. We offer everything you would need from network operations to architects to professional services to help desk services.<\/p>\n<p>Let Sherweb be your resource to understand how CIS controls and implementation groups would benefit you and your organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether during good times or bad times, security threats are always out there looking for victims","protected":false},"author":177,"featured_media":21366,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[],"class_list":["post-21359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb<\/title>\n<meta name=\"description\" content=\"Security threats are always out there looking for victims. Let&#039;s look at CIS controls and groups so you can take the first step of your security plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Security threats are always out there looking for victims. Let&#039;s look at CIS controls and groups so you can take the first step of your security plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-23T19:42:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T16:03:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CIScontrols-1200x630@2x.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1260\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CIScontrols-1200x630@2x.png\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask\",\"datePublished\":\"2020-06-23T19:42:26+00:00\",\"dateModified\":\"2024-06-03T16:03:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/\"},\"wordCount\":941,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CIScontrols-1200x480@2x.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/\",\"name\":\"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CIScontrols-1200x480@2x.png\",\"datePublished\":\"2020-06-23T19:42:26+00:00\",\"dateModified\":\"2024-06-03T16:03:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Security threats are always out there looking for victims. Let's look at CIS controls and groups so you can take the first step of your security plan.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CIScontrols-1200x480@2x.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/CIScontrols-1200x480@2x.png\",\"width\":2400,\"height\":920,\"caption\":\"CIS controls\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb","description":"Security threats are always out there looking for victims. Let's look at CIS controls and groups so you can take the first step of your security plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/","og_locale":"en_US","og_type":"article","og_title":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb","og_description":"Security threats are always out there looking for victims. Let's look at CIS controls and groups so you can take the first step of your security plan.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-06-23T19:42:26+00:00","article_modified_time":"2024-06-03T16:03:37+00:00","og_image":[{"width":2400,"height":1260,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CIScontrols-1200x630@2x.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/CIScontrols-1200x630@2x.png","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask","datePublished":"2020-06-23T19:42:26+00:00","dateModified":"2024-06-03T16:03:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/"},"wordCount":941,"commentCount":1,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CIScontrols-1200x480@2x.png","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/","url":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/","name":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/CIScontrols-1200x480@2x.png","datePublished":"2020-06-23T19:42:26+00:00","dateModified":"2024-06-03T16:03:37+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Security threats are always out there looking for victims. Let's look at CIS controls and groups so you can take the first step of your security plan.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#primaryimage","url":"\/blog\/wp-content\/uploads\/CIScontrols-1200x480@2x.png","contentUrl":"\/blog\/wp-content\/uploads\/CIScontrols-1200x480@2x.png","width":2400,"height":920,"caption":"CIS controls"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/everything-you-wanted-to-know-about-cis-controls-and-implementation-groups-but-were-afraid-to-ask\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Everything you wanted to know about CIS controls and implementation groups but were afraid to ask"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":[],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=21359"}],"version-history":[{"count":13,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21359\/revisions"}],"predecessor-version":[{"id":24784,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/21359\/revisions\/24784"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/21366"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=21359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=21359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=21359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}