{"id":23218,"date":"2021-10-28T15:36:25","date_gmt":"2021-10-28T19:36:25","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=23218"},"modified":"2025-04-17T14:43:38","modified_gmt":"2025-04-17T18:43:38","slug":"zero-trust-framework-identity-and-access-management","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/","title":{"rendered":"Implementing a Zero Trust framework: identity and access management (IAM)"},"content":{"rendered":"<p>Identity and Access Management (IAM) is a key piece of any <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-security-model\/\">Zero Trust<\/a> cybersecurity strategy. Usernames and passwords have become the first line of defense for modern information security practices, which is why IAM is so important.<\/p>\n<p>This first line of defense is under increasing attack as organizations take advantage of more Software as a Service (SaaS) applications to run their business and employ an increasingly distributed workforce. A <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/08\/20-percent-of-organizations-experienced-breach-due-to-remote-worker-labs-report-reveals\">2020 study<\/a> from Malwarebytes found that 20% of organizations had experienced a breach via work-from-home employees.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-23219 size-medium\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Microsoft-Authenticator-Mobile-App-282x300.png\" alt=\"Microsoft Authenticator Mobile App\" width=\"282\" height=\"300\" srcset=\"\/blog\/wp-content\/uploads\/Microsoft-Authenticator-Mobile-App-282x300.png 282w, \/blog\/wp-content\/uploads\/Microsoft-Authenticator-Mobile-App.png 728w\" sizes=\"auto, (max-width: 282px) 100vw, 282px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Identity and Access Management (IAM) solutions MSPs should know<\/h2>\n<p>To strengthen clients\u2019 IAM strategy, managed service providers (MSPs) should lead with a solution that many clients are already paying for with their <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a> subscriptions: Azure Active Directory (AAD). AAD has a rich feature set that can help protect identities in your Microsoft 365 environment and other applications.<\/p>\n<p>MSPs would also do well to offer clients <a href=\"https:\/\/www.sherweb.com\/blog\/security\/why-you-should-enable-multi-factor-authentication\/\">Multi-factor Authentication<\/a> (MFA). About <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/08\/20\/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks\/\">99.9% of account compromise attacks<\/a> could be stopped with MFA, making it an increasingly imperative must-have for businesses of all sizes. MFA can be deployed using an authenticator app. Implementing Smart MFA processes can also help you decide when users should be prompted for MFA and when they don\u2019t need to be prompted to maximize productivity.<\/p>\n<p>Another effective solution is Single Sign On (SSO). We know clients use applications outside of Microsoft; we can securely publish access to in house apps within Microsoft 365 while also managing access to SaaS apps via a user&#8217;s AAD credentials, even enforcing MFA.<\/p>\n<p>In addition to security benefits, managing only one username and password helps employees be more productive. Below are just some of the commonly used apps that integrate with AAD for SSO.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-23221\" src=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Microsoft-Single-Sign-On.png\" alt=\"Microsoft Single Sign On\" width=\"800\" height=\"450\" srcset=\"\/blog\/wp-content\/uploads\/Microsoft-Single-Sign-On.png 800w, \/blog\/wp-content\/uploads\/Microsoft-Single-Sign-On-300x169.png 300w, \/blog\/wp-content\/uploads\/Microsoft-Single-Sign-On-768x432.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2>How does AAD with MFA and SSO within the Zero Trust framework help businesses?<\/h2>\n<p>In the context of Zero Trust, the combination of AAD, MFA and SSO help businesses:<\/p>\n<ul>\n<li>Prevent breaches<\/li>\n<li>Secure identities<\/li>\n<li>Maintain trust with both users and customers<\/li>\n<li>Allow employees to collaborate even more seamlessly for a streamlined user experience<\/li>\n<\/ul>\n<p>IAM is the key to securing and managing your identity\u2014data, systems, applications and more. It is fundamentally one of the most <a href=\"https:\/\/www.sherweb.com\/blog\/security\/building-your-security-offering\/\">important components<\/a> of your business, enabling the right people to securely access the right resources at the right time without impacting their <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/productivity\/\">productivity<\/a>.<\/p>\n<div style=\"text-align: center;\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity _ What is zero trust and how does it work?\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/a0FXu7_Jpbo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Want a broader perspective? In this video, Roddy Bergeron, Sherweb&#8217;s Cybersecurity Technical Fellow, explains how IAM and Zero Trust go hand in hand.<\/em><\/p>\n<h2>Learn more about implementing a Zero Trust framework<\/h2>\n<p><a href=\"https:\/\/www.aegisinnovators.com\/\">Connect with Team Aegis<\/a> to learn more about Zero Trust and scoping your business\u2019s security environment. You can also explore <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/security\/\">Sherweb\u2019s marketplace of cybersecurity products and solutions<\/a> for more ways to expand your offering.<\/p>\n<h3><strong>Keeping reading about Zero Trust:<\/strong> <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-intelligent-endpoint-protection\/\">Intelligent endpoint protection<\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Use","protected":false},"author":181,"featured_media":23222,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[887,919,1031],"class_list":["post-23218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-zero-trust","tag-cybersecurity","tag-identity-and-access-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb<\/title>\n<meta name=\"description\" content=\"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T19:36:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T18:43:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aegis Innovators\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aegis Innovators\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/\"},\"author\":{\"name\":\"Aegis Innovators\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\"},\"headline\":\"Implementing a Zero Trust framework: identity and access management (IAM)\",\"datePublished\":\"2021-10-28T19:36:25+00:00\",\"dateModified\":\"2025-04-17T18:43:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/\"},\"wordCount\":476,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg\",\"keywords\":[\"Zero Trust\",\"Cybersecurity\",\"Identity and Access Management\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/\",\"name\":\"Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg\",\"datePublished\":\"2021-10-28T19:36:25+00:00\",\"dateModified\":\"2025-04-17T18:43:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\"},\"description\":\"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg\",\"width\":1200,\"height\":460,\"caption\":\"Identity and Access Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/zero-trust-framework-identity-and-access-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Implementing a Zero Trust framework: identity and access management (IAM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/43cc530df9eadbdff975cdd572299b0c\",\"name\":\"Aegis Innovators\",\"description\":\"AEGIS INNOVATORS is a Microsoft partner located in Southern California that helps business leaders throughout the United States solve IT issues and make critical technology decisions. Our Zero Trust approach to cybersecurity and expertise with the Microsoft 365 framework for secure cloud collaboration and Azure platform has empowered our team to deliver extraordinary business results for our clients.\",\"sameAs\":[\"https:\\\/\\\/www.aegisinnovators.com\\\/\"],\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/aegis-innovators\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb","description":"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/","og_locale":"en_US","og_type":"article","og_title":"Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb","og_description":"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!","og_url":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2021-10-28T19:36:25+00:00","article_modified_time":"2025-04-17T18:43:38+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg","type":"image\/jpeg"}],"author":"Aegis Innovators","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Aegis Innovators","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/"},"author":{"name":"Aegis Innovators","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c"},"headline":"Implementing a Zero Trust framework: identity and access management (IAM)","datePublished":"2021-10-28T19:36:25+00:00","dateModified":"2025-04-17T18:43:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/"},"wordCount":476,"commentCount":4,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg","keywords":["Zero Trust","Cybersecurity","Identity and Access Management"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/","url":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/","name":"Implementing a Zero Trust framework: identity and access management (IAM) | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg","datePublished":"2021-10-28T19:36:25+00:00","dateModified":"2025-04-17T18:43:38+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c"},"description":"Identity and Access Management (IAM) is a key piece of any Zero Trust cybersecurity strategy. Manage those usernames and passwords!","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Aegis-Guest-Blog-\u2013-IAM-1200x480-1.jpg","width":1200,"height":460,"caption":"Identity and Access Management"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-framework-identity-and-access-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Implementing a Zero Trust framework: identity and access management (IAM)"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/43cc530df9eadbdff975cdd572299b0c","name":"Aegis Innovators","description":"AEGIS INNOVATORS is a Microsoft partner located in Southern California that helps business leaders throughout the United States solve IT issues and make critical technology decisions. Our Zero Trust approach to cybersecurity and expertise with the Microsoft 365 framework for secure cloud collaboration and Azure platform has empowered our team to deliver extraordinary business results for our clients.","sameAs":["https:\/\/www.aegisinnovators.com\/"],"url":"https:\/\/www.sherweb.com\/blog\/author\/aegis-innovators\/"}]}},"tag_names":["Zero Trust","Cybersecurity","Identity and Access Management"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/181"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=23218"}],"version-history":[{"count":9,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23218\/revisions"}],"predecessor-version":[{"id":25430,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/23218\/revisions\/25430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/23222"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=23218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=23218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=23218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}