{"id":5196,"date":"2019-03-26T21:15:48","date_gmt":"2019-03-26T21:15:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5196"},"modified":"2021-04-01T21:18:15","modified_gmt":"2021-04-01T20:18:15","slug":"logical-security-controls","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls","title":{"rendered":"Logical Security Controls and Measures"},"content":{"rendered":"<p>Today, organizations across a range of industries contend with a number of cybersecurity dilemmas, and logical security controls may be the answer to a number of these issues. For example, how can small and mid-sized businesses keep pace with industry giants when it comes to cybersecurity? How do you protect your enterprise\u2019s online assets with an increasingly remote workforce? How do you invest in and expand your digital environment while maintaining careful control over who in your organization can access given information?<\/p>\n<p>On the one hand, businesses have often prioritized physical security. This entails controlling who enters an office, who has access to data centers, and what to do in the event of a physical breach. However, while this is an important part of protecting an enterprise\u2019s infrastructure, it\u2019s just one piece of what should be a comprehensive security apparatus\u2014especially as businesses need next-generation cybersecurity strategies to protect proprietary information and secure their networks.<\/p>\n<p>This is where logical security controls come in. Logical security refers to practices that give system administrators control over who within an organization has access to which resources and for what purpose. As businesses generate more information at an increasing pace\u2014incredibly,\u00a0<a class=\"ext\" href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2018\/05\/21\/how-much-data-do-we-create-every-day-the-mind-blowing-stats-everyone-should-read\/#2e96c42960ba\" target=\"_blank\" rel=\"noopener noreferrer\">90% of the data in the world<\/a>\u00a0has been created within the past two years\u2014it\u2019s incumbent upon IT teams, key decision-makers, and other stakeholders to protect proprietary information with the most advanced technology possible.<\/p>\n<p>However, maintaining logical security over the modern enterprise is easier said than done. With\u00a0<a class=\"ext\" href=\"https:\/\/www.forbes.com\/sites\/louiscolumbus\/2018\/08\/30\/state-of-enterprise-cloud-com\" target=\"_blank\" rel=\"noopener noreferrer\">77% of businesses<\/a>\u00a0maintaining at least one component of their computing infrastructure in the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-secure-are-cloud-networks-2018\" target=\"_blank\" rel=\"noopener\">cloud<\/a>, it can be challenging to maintain control and guarantee security over access to assets that may not even be managed within your facilities. Despite these obstacles, it\u2019s vital that enterprises make these investments\u2014as the cost of cybercrime around the world has soared to more than $600 billion.<\/p>\n<h3><b>What is logical access control?<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" id=\"\" class=\"img-responsive alignleft\" title=\"\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\" alt=\"\" width=\"441\" height=\"218\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Logical access control is the means by which organizations implement security constraints over proprietary data and broader digital environments. Various logical access control measures at the individual and team levels make up a broader logical security policy at the organizational level. By regulating access in this way, a business can prevent any single user from having too much control over an entire enterprise\u2019s digital assets.<\/p>\n<p>Some logical security practices will already be familiar even to those without an extensive IT background. For example, the passwords and passcodes you use to access your computer, your phone, and your favorite websites and online services are all instances of logical access control. In this process, the right username and password combination verify your permission to access certain functions within an organization as a user, employee, or client. This type of authentication\u2014password authentication\u2014is just one of a growing number of logical access controls.<\/p>\n<p>Authentication is one of the most popular logical security measures in the cybersecurity space. However, authentication strategies are getting more advanced every year as it becomes clear that traditional password authentication is no longer enough against the range of threats businesses face. These more advanced strategies add additional steps to the authentication process, helping enterprise networks verify with greater certainty the identity of users attempting to access system resources.<\/p>\n<p>Token authentication is one of these measures. In this model, security tokens provide users with a number that changes on a given timeline\u2014typically every minute. As part of a log-on process, enterprise systems will prompt users for the token and match it against internal mechanisms to ensure the token is correct. Two-factor authentication (2FA) is another emerging area of logical security. In addition to a username and password, users might have to provide answers to security questions or confirm a PIN sent to a separate device or app.<\/p>\n<p>In addition to types of authentication\u2014which can even include biometric measures\u2014there are other logical security measures available. For example, user segmentation allows system administrators to control the areas of the organization&#8217;s network that individual users can access. This ensures that in the event of a user\u2019s account being compromised in some way, the attacker won\u2019t be able to wreak havoc across the organization\u2019s entire network.<\/p>\n<h3><b>What is the difference between logical and physical access?<\/b><\/h3>\n<p>Traditionally, logical and physical security access have been different animals. While logical security control involves everything discussed above, physical access refers to the measures that organizations take to protect their actual facilities. This may involve ID cards for employees, physical or electronic locks on hardware or on certain areas of an office, and CCTV systems to monitor entrances, exits, and access points to data centers or other critical locations. However, physical access can also entail forced entry onto a computer by direct means, such as using system install discs.<\/p>\n<p>Boiled down, this means that\u00a0<i>physical access<\/i>\u00a0controls who can enter offices and engage with assets in-person while\u00a0<i>logical access<\/i>\u00a0controls who can enter networks and engage with assets while mediated by a computer or other device. However, as you and your clients might predict, this separation isn\u2019t as clear-cut as it once was.<\/p>\n<p>Indeed, as technologies such as the Internet of Things (IoT) bring our physical environment and infrastructure online, the distinction between what\u2019s connected to the internet and what\u2019s not will become more difficult to articulate. This means that cybersecurity and physical security professionals will need to collaborate going forward in order to coordinate efforts and streamline next-generation solutions.<\/p>\n<h3><b>What is a logical threat?<\/b><\/h3>\n<p>While\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/pitching-disaster-recovery\" target=\"_blank\" rel=\"noopener\">physical threats<\/a>\u00a0may include theft, vandalism, and\u00a0<a class=\"ext\" href=\"https:\/\/www.solarw\/\" target=\"_blank\" rel=\"noopener noreferrer\">environmental damage<\/a>, logical threats are those that may damage your software systems, data, or network without actually damaging your hardware. Viruses, DoS attacks, phishing, and Trojans are all examples of logical threats that can be inadvertently downloaded or spread through the use of flash drives. In a worst-case scenario, an attack doesn\u2019t just affect a single device, but spreads across a network, scraping sensitive data or shutting down operating systems.<\/p>\n<p>As mentioned above, logical threats are evolving and their relation to physical threats are becoming more complex. If IoT tech is just as vulnerable as traditional computing resources\u2014and it is\u2014then our responses to threats and the precautions we take will need to become more complex in turn. Although there are a number of logical security measures you can take to protect against these threats, user actions are not enough to ensure against the loss of business data. Strong authentication and other best practices are just another security layer on top of what should be a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/solutions\/layered-security\" target=\"_blank\" rel=\"noopener\">robust security platform<\/a>. With the right protection, you can better prevent outside attacks that pose significant threats to your business information.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Interested in learning more about how you can implement security controls on your network?\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\" target=\"_blank\" rel=\"noopener\">Explore our product suite<\/a>\u00a0to see how you can ensure complete security for your IT infrastructure.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5196","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Logical Security Measures for Networks - N-able<\/title>\n<meta name=\"description\" content=\"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Logical Security Measures for Networks - N-able\" \/>\n<meta property=\"og:description\" content=\"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T21:15:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-01T20:18:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Logical Security Controls and Measures\",\"datePublished\":\"2019-03-26T21:15:48+00:00\",\"dateModified\":\"2021-04-01T20:18:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\"},\"wordCount\":1147,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\",\"name\":\"Logical Security Measures for Networks - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\",\"datePublished\":\"2019-03-26T21:15:48+00:00\",\"dateModified\":\"2021-04-01T20:18:15+00:00\",\"description\":\"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Logical Security Controls and Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Logical Security Measures for Networks - N-able","description":"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls","og_locale":"de_DE","og_type":"article","og_title":"Logical Security Measures for Networks - N-able","og_description":"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.","og_url":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-03-26T21:15:48+00:00","article_modified_time":"2021-04-01T20:18:15+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg","type":"","width":"","height":""}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Logical Security Controls and Measures","datePublished":"2019-03-26T21:15:48+00:00","dateModified":"2021-04-01T20:18:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls"},"wordCount":1147,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg","articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls","url":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls","name":"Logical Security Measures for Networks - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg","datePublished":"2019-03-26T21:15:48+00:00","dateModified":"2021-04-01T20:18:15+00:00","description":"Ensure you\u2019re implementing the right logical security controls by reading through our list of logical security measures and examples that can be used in your organization.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/logical-security-controls"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2019\/03\/logical%20security.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/logical-security-controls#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Logical Security Controls and Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5196"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5196\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}