{"id":5791,"date":"2018-08-17T22:53:51","date_gmt":"2018-08-17T21:53:51","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5791"},"modified":"2021-07-12T14:19:50","modified_gmt":"2021-07-12T13:19:50","slug":"how-secure-are-cloud-networks-2018","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018","title":{"rendered":"How Secure Are Cloud Networks in 2018?"},"content":{"rendered":"<p>There is no doubt cloud computing is sweeping across the enterprise world. RightScale\u2019s 2018 State of the Cloud\u00a0<a class=\"ext\" href=\"https:\/\/www.rightscale.com\/blog\/cloud-industry-insights\/cloud-computing-trends-2018-state-cloud-survey\" target=\"_blank\" rel=\"noopener noreferrer\">survey<\/a>\u00a0of 997 IT professionals revealed that 96% of respondents use cloud computing, with 38% seeing it as their top priority. Nevertheless, concerns remain.<\/p>\n<p>According to\u00a0<a class=\"ext\" href=\"https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/xx\/pdf\/2017\/02\/the-creative-cios-agenda-journey-to-cloud.PDF\" target=\"_blank\" rel=\"noopener noreferrer\">KPMG\/Harvey Nash figures<\/a>, data loss and privacy risks worry 53% of enterprises surveyed, while one in four frets about the governance of cloud solutions. How can companies maintain their cloud security with appropriate network management practices?<\/p>\n<h3><b>Network security differences in the cloud<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\" alt=\"cloud_main_2.jpg\" width=\"413\" height=\"204\" align=\"left\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>Before cloud computing, networks had two defining characteristics: First, although mobile users and external partners would still need access to computing resources, most components resided in the data center under a company\u2019s physical and logical control. This end-to-end control gave administrators a high level of network visibility.<\/p>\n<p>The other characteristic of pre-cloud networks was their traffic flow. Packets traveled between the server in the datacentre and client devices accessing services from elsewhere, in a configuration known as \u201cNorth-South.\u201d<\/p>\n<p>Network characteristics change in a cloud environment. Firstly, companies using public cloud services must monitor and manage virtualized infrastructure components located outside their physical environment. Their network, computing, and storage resources are now remote, but they still need the same visibility and management capabilities they had before.<\/p>\n<p>The other difference is traffic is no longer simply North-South. Thanks to changes in application architecture, servers talk to each other across the data center far more often. Software containers running small applications or microservices interact with each other to provide business services. This traffic is known as East-West, and there is a growing amount of it. Because it happens inside the data center, it can often involve sensitive application or control data you wouldn\u2019t want a third party to see.<\/p>\n<p>The network channels this East-West traffic travels along are hacker highways. When attackers gain a foothold in a network, the first thing they do is move laterally, exploring the network resources visible to them, and compromising them before moving onto the next. Eventually, they may find the sensitive information they are seeking. Protecting cloud-based components from lateral movement is a critical part of cloud networking security.<\/p>\n<h3><b>Bolstering cloud security<\/b><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_security_speedo.jpg\" alt=\"cloud_security_speedo.jpg\" width=\"409\" height=\"202\" align=\"right\" hspace=\"5\" data-entity-type=\"\" data-entity-uuid=\"\" \/>How can IT, networking, and security teams cope with these changes?<\/p>\n<p>One solution is to make use of the appropriate network and management information from any public cloud services you use. Many providers will provide monitoring and management solutions (Amazon Web Services has CloudWatch, for example) and you can often also get rule logging information via functions such as Amazon VPC Flow Logs.<\/p>\n<p>You can use a cloud service provider\u2019s dashboard or command-line tools to monitor what\u2019s happening in the public cloud. You may choose to go a step further and import this data into the appropriate management tools. These include on-premises network management and security incident and event management (SIEM) systems that are compatible with your cloud service provider\u2019s APIs.<\/p>\n<h3><b>SDN and microsegmentation<\/b><\/h3>\n<p>For fine-grained control in private cloud environments, companies should consider software-defined networking (SDN). By abstracting network control away from hardware components, SDN enables companies to configure network routing more dynamically. It also makes it easier to set security policies to control that routing.<\/p>\n<p>Management teams can use this flexible routing capability to create zones of control at a highly granular level, enabling them to cordon off individual components of their cloud infrastructure. This concept is known as microsegmentation, and it can help prevent intruders from moving laterally between different segments of your cloud infrastructure.<\/p>\n<p>By monitoring and controlling cloud infrastructure using these tools and techniques, companies can mitigate some of the risks associated with this new, virtualized infrastructure while enjoying some of its benefits, such as improved elasticity and potential cost savings.<\/p>\n<p>Expect a skills gap. These refined management approaches will present an entirely new challenge to existing administrators used to working with more traditional network management systems. Companies should not underestimate the task of recruiting or training experts able to manage API-based software-defined infrastructures. But with the right team in place, cloud-focused organizations should be able to build infrastructures that include a dynamic, adaptable security platform.<\/p>\n<p>&nbsp;<\/p>\n<p><b>Additional reading<\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/moving-cloud-help-ensure-your-cloud-based-web-security\" target=\"_blank\" rel=\"noopener\">Moving to the cloud: Help ensure your cloud-based web security<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/what-are-security-advantages-and-disadvantages-cloud-backup\" target=\"_blank\" rel=\"noopener\">What Are the Security Advantages and Disadvantages of Cloud Backup?<\/a><\/li>\n<\/ul>\n<p><em>Danny Bradbury has been a technology journalist since 1989. He writes for titles including the Guardian newspaper, and Canada\u2019s National Post. Danny specialises in areas including cybersecurity, and also cryptocurrency. He authors the\u00a0<a class=\"ext\" href=\"http:\/\/www.bitcoin.about.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">About Bitcoin<\/a>\u00a0website, and also writes a regular blog on technology for children called\u00a0<a class=\"ext\" href=\"http:\/\/www.kidstechnews.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kids Tech News<\/a>. You can follow Danny on Twitter\u00a0at\u00a0<a class=\"ext\" href=\"https:\/\/twitter.com\/dannybradbury%22%20%5Ct%20%22_blank\" target=\"_blank\" rel=\"noopener noreferrer\">@DannyBradbury<\/a>\u00a0<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><b>For more help and guidance with your\u00a0security concerns, click here to visit our\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/resources\/security\" target=\"_blank\" rel=\"noopener\">Security Resource Center<\/a>.\u00a0<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5791","post","type-post","status-publish","format-standard","hentry","topic-cloud-computing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Secure Are Cloud Networks in 2018? - N-able<\/title>\n<meta name=\"description\" content=\"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure Are Cloud Networks in 2018? - N-able\" \/>\n<meta property=\"og:description\" content=\"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T21:53:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:19:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"How Secure Are Cloud Networks in 2018?\",\"datePublished\":\"2018-08-17T22:53:51+01:00\",\"dateModified\":\"2021-07-12T13:19:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\"},\"wordCount\":789,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\",\"articleSection\":[\"Cloud Computing\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\",\"name\":\"How Secure Are Cloud Networks in 2018? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\",\"datePublished\":\"2018-08-17T22:53:51+01:00\",\"dateModified\":\"2021-07-12T13:19:50+00:00\",\"description\":\"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Cloud Computing\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Secure Are Cloud Networks in 2018?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Secure Are Cloud Networks in 2018? - N-able","description":"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018","og_locale":"es_ES","og_type":"article","og_title":"How Secure Are Cloud Networks in 2018? - N-able","og_description":"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.","og_url":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-08-17T21:53:51+00:00","article_modified_time":"2021-07-12T13:19:50+00:00","og_image":[{"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg","type":"","width":"","height":""}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Guest","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"How Secure Are Cloud Networks in 2018?","datePublished":"2018-08-17T22:53:51+01:00","dateModified":"2021-07-12T13:19:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018"},"wordCount":789,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg","articleSection":["Cloud Computing"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018","url":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018","name":"How Secure Are Cloud Networks in 2018? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg","datePublished":"2018-08-17T22:53:51+01:00","dateModified":"2021-07-12T13:19:50+00:00","description":"With cloud computing sweeping across the enterprise world, Danny Bradbury looks at the current state of cloud security and what organizations need to be aware of.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/blog\/2018\/08\/cloud_main_2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/how-secure-are-cloud-networks-2018#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Cloud Computing","item":"https:\/\/www.n-able.com\/es\/blog\/category\/cloud-computing"},{"@type":"ListItem","position":2,"name":"How Secure Are Cloud Networks in 2018?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5791"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5791\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}