{"id":79608,"date":"2026-02-04T18:20:04","date_gmt":"2026-02-04T18:20:04","guid":{"rendered":"https:\/\/www.n-able.com\/?p=79608"},"modified":"2026-02-05T10:43:03","modified_gmt":"2026-02-05T10:43:03","slug":"the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","title":{"rendered":"The Three Pillars of CMMC Success"},"content":{"rendered":"<p>Achieving CMMC compliance depends on three pillars, where technology, operations, and verification work together to produce the objective evidence modern defense contracts demand. This article outlines a strategic framework to help Defense Industrial Base (DIB) contractors, subcontractors, and their Managed Service Providers navigate the transition to CMMC 2.0 with confidence. <\/p>\n<p>The Cybersecurity Maturity Model Certification (CMMC) 2.0 represents a fundamental shift in how the Defense Industrial Base (DIB) approaches cybersecurity. As of November 2025, organizations operate under Phase 1 of the rollout, where self-assessments remain the standard for most contracts. The strategic inflection point arrives on November 10, 2026, when Phase 2 introduces mandatory third-party C3PAO assessments for new contracts involving prioritized Controlled Unclassified Information (CUI). <\/p>\n<p>For defense contractors, subcontractors, and Managed Service Providers (MSPs), the question is no longer whether CMMC will impact operations, but how to operationalize it effectively. Success in this landscape requires alignment across three critical areas: the technology vendor, the operational entity (contractors\/MSPs), and the assessor. The \u201cThree Pillars of CMMC Success\u201d establishes the structural foundation needed to build audit-ready operations that support both compliance and growth. <\/p>\n<h2>The Current Landscape: From Intent to Evidence<\/h2>\n<p>The Department of Defense (DoD) estimates that approximately 80,000 entities will eventually require Level 2 certification. This shift moves the industry from a \u201cpaper compliance\u201d model based on policy statements to one based on objective evidence. <\/p>\n<p>Implications for organizations: Market access now depends on the ability to produce proof of control implementation. DIB contractors must verify their own posture and that of their vendors. At the same time, MSPs must demonstrate consistent audit readiness to remain viable partners in the defense supply chain. Those unable to provide audit-ready artifacts may find themselves excluded from opportunities. <\/p>\n<p><strong>Implications:<\/strong> This regulatory shift creates clear differentiation in the market. Those who can demonstrate consistent operations through documented evidence become strategic partners essential to their clients&#8217; compliance efforts. Organizations unable to provide audit ready artifacts may find themselves effectively excluded from defense supply chain opportunities. <\/p>\n<h2>The Three Pillars Framework<\/h2>\n<p>Readiness requires coordination across three distinct entities: <\/p>\n<ul>\n<li><strong>Pillar 1 -The Technology Vendor: <\/strong>Provides platforms with secure architecture, validated cryptography, and audit-capable outputs.<\/li>\n<li><strong>Pillar 2 -The Operational Entity:<\/strong> Implements disciplined process that generate evidence of effectiveness.<\/li>\n<li><strong>Pillar 3 &#8211; The Assessor:<\/strong> Validates implementation against NIST SP 800-171 requirements.<\/li>\n<\/ul>\n<p>Weakness in any pillar destabilizes the entire compliance foundation. A capable platform (Pillar 1) is ineffective without disciplined operations (Pillar 2), and compliant operations can fail if evidence is not presented clearly to the assessor (Pillar 3). <\/p>\n<h2>Pillar 1 &#8211; Technology Platform Capabilities<\/h2>\n<p><strong>The Foundation of Secure Design <\/strong><br \/>\nWhile the DIB contractor retains ultimate responsibility for compliance, technology selection dictates the feasibility of that compliance. Platforms must support evidence generation rather than hinder it. <\/p>\n<p><strong>Hardened Architecture:<\/strong> Systems should ideally operate on architectures configured to industry standards, such as Center for Internet Security (CIS) Benchmarks. This establishes a documented baseline for Configuration Management (CM) without requiring manual kernel hardening.  <\/p>\n<p><strong>FIPS 140-3 Cryptography:<\/strong> Protecting CUI confidentiality requires validated cryptography (NIST SP 800-171 SC.L2-3.13.11). It is not enough to use \u00abstrong\u00bb encryption; the module itself must be FIPS validated. <\/p>\n<p><strong>Data Residency:<\/strong> Export controls (ITAR\/EAR) often mandate that technical data remain within the U.S. Cloud platforms must offer geographic guarantees to satisfy Media Protection (MP) requirements. <\/p>\n<h2>Pillar 2 &#8211; Operational Discipline<\/h2>\n<p><strong>Consistent Implementation:<\/strong> Assessors evaluate consistency. The operational entity, whether an internal IT team or an MSP, must translate platform capabilities into repeatable processes. <\/p>\n<p><strong>Active Log Review:<\/strong> CMMC requires review, not just retention (AU.L2-3.3.3). A common failure is configuring systems to save logs but failing to establish a review cadence. Operations must include continuous monitoring and documented investigation of security events. <\/p>\n<p><strong>Clear Responsibility Boundaries:<\/strong> Compliance gaps often hide in the \u00abgrey areas\u00bb between a contractor and their MSP. The Shared Responsibility Matrix (SRM) is a critical tool here. It must explicitly map every control to a responsible party -defining who patches the OS, who enforces MFA, and who holds the evidence. <\/p>\n<p><strong>Evidence as Output:<\/strong> Technical outputs (patch reports, access logs) must be paired with ticketing records to build defensible control narratives. <\/p>\n<h2>Pillar 3 -Third-Party Verification<\/h2>\n<p><strong>The Role of Formal Assessment:<\/strong> C3PAOs conduct validation against the 110 practices of NIST SP 800-171. Preparation requires viewing operations through the assessor&#8217;s lens. <\/p>\n<p><strong>Self-Assessment Rigor:<\/strong> Phase 1 self-assessments are formal declarations to the U.S. Government. Organizations should prepare as if a third-party audit were imminent, ensuring evidence stands on its own merits. <\/p>\n<p><strong>Engagement Models: <\/strong><\/p>\n<ul>\n<li><strong>Support Model:<\/strong> The MSP manages the client&#8217;s environment using client-provided tools, keeping the MSP&#8217;s own infrastructure largely out of scope. <\/li>\n<li><strong>Certification Model:<\/strong> The MSP achieves its own CMMC Level 2 certification, allowing them to offer \u201cEnclave as a Service.\u201d This relieves the contractor of significant burden but requires the MSP to maintain a mature, audited environment.<\/li>\n<\/ul>\n<p><strong>N&#8209;able&#8217;s Approach to Platform Security <\/strong><br \/>\nN&#8209;able platforms are designed to support Pillar 1 capabilities with Pillar 2 operational needs, streamlining the path to Pillar 3 validation. <\/p>\n<ul>\n<li><strong>Secure by Design:<\/strong> N&#8209;central operates on AlmaLinux configured to CIS Benchmarks, allowing partners to inherit a hardened baseline.<\/li>\n<li><strong>Validated Cryptography:<\/strong> Take Control includes integrated FIPS validated cryptographic libraries, meeting the strict encryption requirements for remote access to CUI environments. <\/li>\n<li><strong>Sovereignty &#038; Availability: <\/strong>Cove Data Protection offers 30+ global data centers, allowing MSPs to pin backup data to U.S.-only repositories to support data sovereignty. <\/li>\n<li><strong>Operational Clarity:<\/strong> The N&#8209;central Shared Responsibility Matrix feature sheet pre-maps platform controls to CMMC requirements, clearly identifying vendor-provided capabilities versus MSP responsibilities.<\/li>\n<\/ul>\n<h2>Practical 90-Day Readiness Plan<\/h2>\n<p>Organizations can begin assessment preparation through focused near-term activities: <\/p>\n<ul>\n<li><strong>Define Strategy:<\/strong> Explicitly choose between the Support or Certification model and document scope boundaries.<\/li>\n<li><strong>Map Responsibilities:<\/strong> Utilize a Shared Responsibility Matrix to assign ownership for every artifact (logs, reports, screenshots).<\/li>\n<li><strong>Operationalize Evidence:<\/strong> Transition from ad-hoc reporting to standardized workflows. Link patch reports and log reviews to ticketing records.<\/li>\n<li><strong>Secure Management:<\/strong> Enforce MFA and role-based access on all management platforms. Verify FIPS status on remote access tools.<\/li>\n<li><strong>Test Defenses:<\/strong> Select 5 to 8 controls (e.g., Access Control, Audit) and assemble complete evidence packets to identify gaps before the formal assessment.<\/li>\n<\/ul>\n<h2>Building Confidence Through Alignment <\/h2>\n<p>CMMC success is not a product; it is a process of alignment. By understanding the interdependencies between vendor capabilities, operational discipline, and assessment expectations, DIB contractors and MSPs can build defensible programs that secure both national interests and business continuity. <\/p>\n<p>N&#8209;able provides platforms designed to support evidence generation and secure operations. Combined with disciplined MSP implementation, these capabilities enable organizations to approach assessment with confidence. <\/p>\n<p><strong>Ready to put the three pillars into practice? <\/strong><\/p>\n<p>Download the N&#8209;central Shared Responsibility Matrix Feature Sheet from the N&#8209;able <a href=\"\/resources\/the-n-central-shared-responsibility-matrix\">Resource Library<\/a> to see how platform controls map to CMMC requirements. <\/p>\n<p><em>Disclaimer: This content is provided for informational purposes only and does not constitute legal or compliance advice. CMMC requirements are determined by the Department of Defense. Consult with qualified CMMC Registered Practitioners for specific guidance. <\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Achieving CMMC compliance depends on three pillars, where technology, operations, and verification work together to produce the objective evidence modern defense contracts demand. This article outlines a strategic framework to&#8230;<\/p>\n","protected":false},"author":137,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-79608","post","type-post","status-publish","format-standard","hentry","topic-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Three Pillars of CMMC Success - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Three Pillars of CMMC Success - N-able\" \/>\n<meta property=\"og:description\" content=\"Achieving CMMC compliance depends on three pillars, where technology, operations, and verification work together to produce the objective evidence modern defense contracts demand. This article outlines a strategic framework to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-04T18:20:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-05T10:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ash Luitel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ash Luitel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\"},\"author\":{\"name\":\"Ash Luitel\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/bf908b02b4551a20d63b09f97ad6e3a1\"},\"headline\":\"The Three Pillars of CMMC Success\",\"datePublished\":\"2026-02-04T18:20:04+00:00\",\"dateModified\":\"2026-02-05T10:43:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\"},\"wordCount\":1134,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\",\"name\":\"The Three Pillars of CMMC Success - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2026-02-04T18:20:04+00:00\",\"dateModified\":\"2026-02-05T10:43:03+00:00\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/bf908b02b4551a20d63b09f97ad6e3a1\",\"name\":\"Ash Luitel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g\",\"caption\":\"Ash Luitel\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Three Pillars of CMMC Success - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","og_locale":"es_ES","og_type":"article","og_title":"The Three Pillars of CMMC Success - N-able","og_description":"Achieving CMMC compliance depends on three pillars, where technology, operations, and verification work together to produce the objective evidence modern defense contracts demand. This article outlines a strategic framework to...","og_url":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2026-02-04T18:20:04+00:00","article_modified_time":"2026-02-05T10:43:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Ash Luitel","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Ash Luitel","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026"},"author":{"name":"Ash Luitel","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/bf908b02b4551a20d63b09f97ad6e3a1"},"headline":"The Three Pillars of CMMC Success","datePublished":"2026-02-04T18:20:04+00:00","dateModified":"2026-02-05T10:43:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026"},"wordCount":1134,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","url":"https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026","name":"The Three Pillars of CMMC Success - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2026-02-04T18:20:04+00:00","dateModified":"2026-02-05T10:43:03+00:00","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/the-three-pillars-of-cmmc-success-a-strategic-framework-for-defense-contractors-subcontractors-and-msps-in-2026"]}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/bf908b02b4551a20d63b09f97ad6e3a1","name":"Ash Luitel","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41d7af2963df8d55df837e5c65a49daf676ac0da7cda8badf5e9cd1cf9a5d3a0?s=96&d=mm&r=g","caption":"Ash Luitel"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/79608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=79608"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/79608\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=79608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}