{"id":43919,"date":"2020-01-29T15:00:00","date_gmt":"2020-01-29T22:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=43919"},"modified":"2021-09-22T15:11:33","modified_gmt":"2021-09-22T19:11:33","slug":"desktop-hardening-requirements","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements","title":{"rendered":"Automating Desktop Hardening Requirements"},"content":{"rendered":"\n

Hardening systems can be a fairly straightforward task, but performing the process manually can be a pain for IT admins. That\u2019s why organizations concerned about new requirements should look for solutions to automate desktop hardening.<\/p>\n\n\n\n

But before we talk about finding the right solution, let\u2019s discuss what needs to be solved in the first place.<\/p>\n\n\n\n

What is Desktop Hardening?<\/h2>\n\n\n\n

Desktop hardening is the practice of reducing the number of attack vectors that can affect an individual system. Often, IT admins harden their system fleets by deploying patches to each system\u2019s kernel, the bridge between the application and hardware levels of a computer. Other examples of desktop hardening include installing firewall and antivirus software, debloating or uninstalling unused software, encrypting data when and wherever possible, and more.<\/p>\n\n\n\n

In practice, IT admins need to exercise several forms of desktop hardening to ensure the best results. Each step adds up, taking an admin anywhere from hours to weeks to manually harden each individual system in their organization. Since desktop hardening is an extensive time commitment, it sparks the need for an automation solution.<\/p>\n\n\n\n

Example: Major Telecom Desktop Hardening Requirements<\/h2>\n\n\n\n

The following high-level overview will help major telecom partners and resellers contextualize new hardening requirements and start planning how to address their automation solution needs. Once you’ve established baselines for your evaluation, we recommend looking to specific policy and command executions for granular detail about each requirement. <\/p>\n\n\n\n

Access Control<\/h3>\n\n\n\n

First and foremost for any desktop hardening endeavor is access control. IT admins need to ensure that only the right people are accessing critical company resources. Technically, access control falls out of the scope of traditional desktop hardening, but when considered as a holistic way to increase endpoint security, the practice makes a lot of sense. Additionally, this requirement is a standard across most compliance regulations<\/a>, so organizations should always consider some form of access control to secure their systems.<\/p>\n\n\n\n

A good way to start is to enforce strong password policies<\/a>, ensuring that end users are creating credentials that are difficult to compromise, and taking extra care to avoid weak or reused passwords that might be used in a credential stuffing attack. Piggybacking on this concept, multi-factor authentication (MFA)<\/a> is one of the most secure ways to safeguard identities<\/a> and make sure that a user is who they say they are.<\/p>\n\n\n\n

Authorize Access<\/h3>\n\n\n\n

Authorizing access is another key facet of the desktop hardening requirements. Admins need to meticulously manage which users have access to what resources \u2014 akin to the principle of least privilege applied to user management<\/a>.<\/p>\n\n\n\n

By controlling who has access to a resource, IT admins can limit the amount of overall contact with said resource, especially if it pertains to critical company data. That way, in the case of an external breach or insider attack, a set of credentials is only as good as the resources it has access to, curbing the amount of havoc the attacker can wreak. This even goes as deep as restricting resource access within a business\u2019s hours of operations, an especially important practice for organizations with Point of Sale (POS) systems. <\/p>\n\n\n\n

Audit Actions<\/h3>\n\n\n\n

With steps in place to make sure the right people have access to the right things, admins then need a solution to monitor their environment to check for other vulnerabilities. By auditing system activities, IT organizations can keep minute-by-minute tabs on their users\u2019 actions.<\/p>\n\n\n\n

Among the most important aspects to audit, admins need to have insights into user account updates, especially password changes. Additionally, admins must audit to see what software a system has installed, including when the software was downloaded and where it was downloaded from.<\/p>\n\n\n\n

If an anomaly is spotted in any of these aspects, IT organizations can make educated decisions about how to address the problem. This can range anywhere from suspending a user to even quarantining the system itself to ensure security. As such, auditing is critical to compliance regulations<\/a> beyond the new hardening requirements. <\/p>\n\n\n\n

Threat Protection<\/h3>\n\n\n\n

Protecting endpoints themselves shifts from the more holistic, identity-centric hardening approach directly into the hardware-focused definition. There are a number of steps that admins must take to protect their system fleets from threats. These range from checking if a system has updated patches to investing in firewall and antivirus software and everything in between.<\/p>\n\n\n\n

Although many of these seem straightforward, the challenge for IT admins is deploying each individual facet. Without the proper tooling, some systems may fall through the cracks, exposing an organization to attacks.<\/p>\n\n\n\n

Information Protection<\/h3>\n\n\n\n

The last of the hardening requirements pertains to protecting data stored on a system and ensuring that said data cannot be compromised in any way, digitally or physically. As such, encryption, such as protecting data at rest through full disk encryption (FDE)<\/a>, is crucial. Like with threat protection, IT admins need a way to automate encryption in as many places as possible.<\/p>\n\n\n\n

Beyond encryption, other security measures such as setting screen lock times are important to keep bad actors from interfacing directly with an unattended system. A major part of this practice involves creating a security training regimen<\/a> for end users. That way, in any situation where information might be at risk, such as a phishing attempt<\/a>, employees are prepared to recognize threats.<\/p>\n\n\n\n

Automating Desktop Hardening with 探花大神<\/h2>\n\n\n\n

With all of these requirements in mind, finding the right solution to automate these needs may seem daunting. Thankfully, 探花大神\u00ae<\/sup> Directory-as-a-Service\u00ae<\/sup><\/a> covers much of these desktop hardening requirements from a single cloud solution.<\/p>\n\n\n\n

What is 探花大神?<\/h3>\n\n\n\n

探花大神 is the first cloud directory service, unifying identity and access management in one tool and providing user access to virtually all modern IT resources with a single set of credentials. As such, 探花大神 is a key tool for meeting hardening requirements, as well as many industry compliance regulations.<\/p>\n\n\n\n

With 探花大神, IT admins can tightly control what resources their users can access and how they access them. This includes enforcing strong password requirements, MFA, VLAN tagging for network access<\/a>, and more.<\/p>\n\n\n\n

IT organizations can leverage 探花大神 Policies<\/a> to enforce security settings at scale across Windows\u00ae<\/sup>, Mac\u00ae<\/sup>, and Linux\u00ae<\/sup> system fleets. Some Policies include screen lock<\/a>, FDE<\/a>, system update\/patch controls<\/a>, and many more, all configurable from the cloud.<\/p>\n\n\n\n

Additionally, admins can use 探花大神\u2019s premium System Insights<\/a> feature to query system fleets for information on operating system, most recent patches, browser versions, battery life, storage capacity, and much more. Armed with this info, admins can make informed decisions about which systems need direct hardening efforts and which ones are operating below peak efficiency.<\/p>\n\n\n\n

Learn More<\/h2>\n\n\n\n

Interested in automating desktop hardening requirements for your organization? Contact us<\/a>; we\u2019d be happy to talk about how 探花大神 can fill your needs.<\/p>\n","protected":false},"excerpt":{"rendered":"

Instantly terminating Mac, Windows, & Linux user access can mean the difference between smooth sailing and a devastating security breach.<\/p>\n","protected":false},"author":70,"featured_media":43920,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[],"collection":[2778],"platform":[],"funnel_stage":[3016],"coauthors":[],"acf":[],"yoast_head":"\nAutomating Desktop Hardening Requirements - 探花大神<\/title>\n<meta name=\"description\" content=\"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automating Desktop Hardening Requirements\" \/>\n<meta property=\"og:description\" content=\"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\" \/>\n<meta property=\"og:site_name\" content=\"探花大神\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-29T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-22T19:11:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zach DeMeyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zach DeMeyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\"},\"author\":{\"name\":\"Zach DeMeyer\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d\"},\"headline\":\"Automating Desktop Hardening Requirements\",\"datePublished\":\"2020-01-29T22:00:00+00:00\",\"dateModified\":\"2021-09-22T19:11:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\"},\"wordCount\":1119,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg\",\"articleSection\":[\"Best Practices\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\",\"url\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\",\"name\":\"Automating Desktop Hardening Requirements - 探花大神\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg\",\"datePublished\":\"2020-01-29T22:00:00+00:00\",\"dateModified\":\"2021-09-22T19:11:33+00:00\",\"description\":\"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg\",\"width\":780,\"height\":520},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automating Desktop Hardening Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"探花大神\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"探花大神\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"探花大神\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d\",\"name\":\"Zach DeMeyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d1d6602d927eb5a16b1dfd4ba6b4c219\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g\",\"caption\":\"Zach DeMeyer\"},\"description\":\"Zach is a Product Marketing Specialist at 探花大神 with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, music, and soccer.\",\"sameAs\":[\"http:\/\/www.jumpcloud.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Automating Desktop Hardening Requirements - 探花大神","description":"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements","og_locale":"en_US","og_type":"article","og_title":"Automating Desktop Hardening Requirements","og_description":"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.","og_url":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements","og_site_name":"探花大神","article_published_time":"2020-01-29T22:00:00+00:00","article_modified_time":"2021-09-22T19:11:33+00:00","og_image":[{"width":780,"height":520,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg","type":"image\/jpeg"}],"author":"Zach DeMeyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Zach DeMeyer","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements"},"author":{"name":"Zach DeMeyer","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d"},"headline":"Automating Desktop Hardening Requirements","datePublished":"2020-01-29T22:00:00+00:00","dateModified":"2021-09-22T19:11:33+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements"},"wordCount":1119,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg","articleSection":["Best Practices"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements","url":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements","name":"Automating Desktop Hardening Requirements - 探花大神","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg","datePublished":"2020-01-29T22:00:00+00:00","dateModified":"2021-09-22T19:11:33+00:00","description":"Learn how to automate and enforce desktop hardening requirements with 探花大神 cloud directory service. Get started today.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/01\/att-desktop-hardening.jpg","width":780,"height":520},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/desktop-hardening-requirements#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Automating Desktop Hardening Requirements"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"探花大神","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"探花大神","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"探花大神"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/5b2c563fb7404910e9be96e7d4e7828d","name":"Zach DeMeyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/d1d6602d927eb5a16b1dfd4ba6b4c219","url":"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2145e4e676784129043e5eec7c4e41e6?s=96&d=mm&r=g","caption":"Zach DeMeyer"},"description":"Zach is a Product Marketing Specialist at 探花大神 with a degree in Mechanical Engineering from the Colorado School of Mines. He loves being on the cutting edge of new technology, and when he's not working, he enjoys all things outdoors, music, and soccer.","sameAs":["http:\/\/www.jumpcloud.com"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/43919"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=43919"}],"version-history":[{"count":1,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/43919\/revisions"}],"predecessor-version":[{"id":43921,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/43919\/revisions\/43921"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/43920"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=43919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=43919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=43919"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=43919"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=43919"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=43919"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=43919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}