{"id":37914,"date":"2022-10-04T17:30:09","date_gmt":"2022-10-04T16:30:09","guid":{"rendered":"https:\/\/www.n-able.com\/?p=37914"},"modified":"2022-10-04T15:46:12","modified_gmt":"2022-10-04T14:46:12","slug":"10-steps-to-securing-the-cloud","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud","title":{"rendered":"10 steps to securing the cloud\u00a0"},"content":{"rendered":"<p class=\"p1\"><span class=\"s1\">When it comes to cloud adoption, the analogy I always use is that our networks used to be built like castles. We put all our servers and users inside, and we had big walls to protect everything. Today, we\u2019ve shifted large parts of our businesses outside of these walls, and moved them to various cloud and SaaS providers. As a result, we no longer always have the knowledge or expertise to secure and protect them. So, a core part of the journey towards owning the cloud is understanding what you can do to help your customers secure all those bits that now lie outside the castle walls.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This list of 10 steps is not specific to any one provider, it represents a holistic view of the things everybody can\u2014and should\u2014be doing to make this transition to cloud as secure as possible.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">1. Deploy multi-factor authentication (MFA)<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">MFA should be table stakes in the cloud. It&#8217;s the lynch pin for securing all environments. Whether you&#8217;re a normal user or a super user, MFA should be configured for any, and all access to all systems at any time.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">2. Add conditional access<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">MFA on it\u2019s own sometimes isn\u2019t enough and this is where conditional access comes into play. You can configure specific requirements for users and devices connecting to your environment as a secondary line of defense. Should someone get through your MFA they can still be denied access if they don\u2019t meet set criteria, such as whether they are allowed access to certain apps, whether the device they\u2019re using has been properly patched, or if they have failed authentication a number of times.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">3. Keep privileged accounts separate and vaulted<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Privileged accounts are the most valuable to any hacker as they offer unfettered access to your systems. You should not be using these accounts to do your day-to-day job, even as an admin. Separating out those highly privileged accounts is essential if you want to protect both your own and your customers\u2019 networks.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">4. Configure RBAC and standardize configuration across customers<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">How many times have you spun up new environments, given someone the access they need and then not revoked that access after any specific tasks have been completed? I&#8217;m pretty sure we\u2019ve all done it. Making sure that you have role-based access control (RBAC) fully configured across all your customers is essential to control who can do what, but so is regularly going back and auditing that access to ensure people don\u2019t still have access to stuff they shouldn\u2019t.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">5. Understand the technology you\u2019re using<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Cloud technologies have evolved quickly. As of the time of writing, Amazon has more than 200 services that they offer through AWS, and Microsoft has just shy of 500\u2014and that\u2019s just for those two providers. Whereas historically you could say you were a cloud expert, today nobody&#8217;s can claim that because there are so many different aspects of the cloud that you can leverage.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">This means you need to invest in the skills in your teams so that you have people that are strong in different areas, either through training or hiring. Having in-depth understanding of the technologies you\u2019re using means you can help ensure best practices are followed when deploying them and that you are properly protected.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">6. Know the surface area of your deployment<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">This really follows on from my previous point. I would argue that our MSPs that perform the best in terms of managing cloud deployments are the ones who not only really understand the technologies they are deploying, but that also deploy it consistently across their customer base. Creating and maintaining one-off environments, requires a level of expertise that would be very difficult to achieve in even the biggest MSP.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">7. Monitor changes to the environment and pay attention to adversaries<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">I think of this first part in the same way as my home alarm system: I might be able to see a back window is open, but is it because somebody broke in or because one of my kids opened it because they were too hot? I don&#8217;t know until I investigate further, but I need to ensure that I have \u201ceyes on glass\u201d and am looking for things like this.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">In addition to this, you should pay attention to what potential adversaries are doing as this can help you spot the signs of a security event early. There are a number of different sources available, such as regular updates from <a href=\"https:\/\/www.cisa.gov\/uscert\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CISA<\/span><\/a>, that can help you understand how to protect both your business and your customer\u2019s business from current cyber threats. Knowing what&#8217;s happening in the broader ecosystem gives you an advantage in that you can leverage that information to make sure that you&#8217;re pivoting to proactively protect your customers from whatever the threats are in their environment.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">8. Plan ahead<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">This is something I&#8217;m personally very big on\u2014proactively planning for all eventualities. Essentially this falls into two categories.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">1) <strong>Security events.<\/strong> If you have a security event that impacts your cloud technologies, what are you going to do? What steps do you need to take? How do you recover that? Do you have it backed up?<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">2) <strong>Employee departures.<\/strong> As MSPs you have highly privileged access across all your customers. If one of your techs leaves (whether by their own choice or yours) you need to ensure you are able to quickly close down everything they have access to\u2014that could be via single sign on or Azure AD.<span class=\"Apple-converted-space\">\u00a0<\/span><\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">9. Understand what you need to do to recover<\/span><\/h2>\n<p class=\"p1\"><span class=\"s1\">Again, this follows on from the previous point, if you do suffer a security event of any description, what is your recovery actually going to look like? You need to have a plan in place. So you need to look at things like how you properly communicate with your customers about what you\u2019re doing and what they need to do. This is something that you should be testing via tabletop exercises both internally and with your customers. These events should not go perfectly, they should cause you to find gaps and refine your processes. It\u2019s an extremely healthy exercise to go through.<\/span><\/p>\n<h2 class=\"p1\"><span class=\"s1\">10. Measure your customer\u2019s security posture<\/span><\/h2>\n<p class=\"p1\"><span class=\"s2\"><a href=\"https:\/\/www.cisecurity.org\/cis-benchmarks\/\" target=\"_blank\" rel=\"noopener\">CIS<\/a><\/span><span class=\"s1\"> puts out benchmarks for what good security looks like across a number of different operating systems, cloud providers, endpoints, and others. With CIS, there are different levels, so you can determine your risk level and increase your security rating over time.\u00a0 Many solutions have built-in reporting for this. It provides clear details on what it would take to hit level one or two, or specific requirements within both that align with your business risk. This will really help you craft the security story to your customers, as you can clearly demonstrate what you\u2019re doing and how that compares to benchmarks, as well as where they will need to invest if they want to level up their performance.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">The tough reality with security is that no one is impervious, but by following these steps you can help make sure that your customer\u2019s journey to the cloud is as uneventful as it can be.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>Dave MacKinnon is Chief Security Officer at N&#8209;able<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re looking to make your customers\u2019 journeys to the cloud as uneventful as they can be, Dave MacKinnon has 10 steps you should follow.\u00a0<\/p>\n","protected":false},"author":82,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-37914","post","type-post","status-publish","format-standard","hentry","topic-cloud-computing","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 steps to securing the cloud\u00a0 - N-able<\/title>\n<meta name=\"description\" content=\"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 steps to securing the cloud\u00a0 - N-able\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T16:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/10\/221003_blogbanner_Empower_10Steps_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dave MacKinnon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/10\/221003_blogbanner_Empower_10Steps_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave MacKinnon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\"},\"author\":{\"name\":\"Dave MacKinnon\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e\"},\"headline\":\"10 steps to securing the cloud\u00a0\",\"datePublished\":\"2022-10-04T17:30:09+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\"},\"wordCount\":1208,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Cloud Computing\",\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\",\"name\":\"10 steps to securing the cloud\u00a0 - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2022-10-04T17:30:09+01:00\",\"description\":\"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cloud Computing\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 steps to securing the cloud\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e\",\"name\":\"Dave MacKinnon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g\",\"caption\":\"Dave MacKinnon\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 steps to securing the cloud\u00a0 - N-able","description":"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud","og_locale":"es_ES","og_type":"article","og_title":"10 steps to securing the cloud\u00a0 - N-able","og_description":"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0","og_url":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-10-04T16:30:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/10\/221003_blogbanner_Empower_10Steps_ss.jpg","type":"image\/jpeg"}],"author":"Dave MacKinnon","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/10\/221003_blogbanner_Empower_10Steps_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Dave MacKinnon","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud"},"author":{"name":"Dave MacKinnon","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e"},"headline":"10 steps to securing the cloud\u00a0","datePublished":"2022-10-04T17:30:09+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud"},"wordCount":1208,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Cloud Computing","Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud","url":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud","name":"10 steps to securing the cloud\u00a0 - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2022-10-04T17:30:09+01:00","description":"If you\u2019re looking to make your MSP customers\u2019 journeys to the cloud as uneventful as they can be, this blog has 10 steps you should follow.\u00a0","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/10-steps-to-securing-the-cloud#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cloud Computing","item":"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing"},{"@type":"ListItem","position":2,"name":"10 steps to securing the cloud\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/87be88dc76a4fdfdee351724ad7f531e","name":"Dave MacKinnon","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffccee54572de70bdbb45f981eeb40faf44d3c98bcba33636d43c794f61ea6ef?s=96&d=mm&r=g","caption":"Dave MacKinnon"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/37914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=37914"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/37914\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=37914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}