{"id":6679,"date":"2021-01-27T17:07:58","date_gmt":"2021-01-27T20:07:58","guid":{"rendered":"https:\/\/addvalue.com.br\/novo\/?p=6679"},"modified":"2021-01-27T17:08:37","modified_gmt":"2021-01-27T20:08:37","slug":"ransomware-protection","status":"publish","type":"post","link":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/","title":{"rendered":"Ransomware Protection with Commvault\u2019s Modernized Air Gap"},"content":{"rendered":"<header class=\"entry__header\"><\/header>\n<div class=\"entry__content\">\n<p class=\"\">Cyber threats are continuously evolving at an accelerated pace.\u00a0Ransomware is often the leading antagonist, leaving organizations crippled and at the mercy of cybercriminals.\u00a0Commvault helps organizations protect and recover data to resume business operations quickly. However, as threats evolve, even backup and recovery platforms are at risk to ransomware.\u00a0This has led to next-generation security controls such as immutability and multi-factor authentication to mitigate against these invasive threats. What about traditional air gap solutions? Is air gapping a viable solution against ransomware threats? In some cases, air gapping by itself may not be enough protection against threats; conversely, immutability and multi-factor authentication (MFA) may not be enough protection either. However, layering immutability, MFA, and Commvault\u2019s modernized air gap controls provide a highly effective solution at mitigating threats.\u00a0Let\u2019s dive into this further.<\/p>\n<h4 class=\"is-style-heading-sans\"><strong>Understanding the basics of ransomware<\/strong><\/h4>\n<p class=\"\">First, let\u2019s understand how ransomware works at a high level. I like to think of ransomware as a <strong>symptom<\/strong> but not necessarily the <strong>catalyst<\/strong>. Most of the common ransomware strains we see today started as an Advanced Persistent Threat (APT) introduced into the environment through a targeted socially engineered <a href=\"https:\/\/www.rapid7.com\/fundamentals\/phishing-attacks\/\">phishing<\/a> attack.\u00a0For example, you may get an email from what appears to be a legitimate source (such as a work organization or bank) that tricks you into downloading a malicious application that introduces the APT. The APT keeps itself hidden in the environment crawling around doing reconnaissance, such as looking for user accounts and data to steal, as well as locating resources to infect.\u00a0APT\u2019s use \u201coff the shelf\u201d tools built into many operating systems to remain hidden, help collect data, and spread ransomware.\u00a0They take advantage of exposed and exploitable protocols to move around the environment. APT\u2019s have also been known to take down backup applications and data, as you can see from the <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/ryuk-revisited-analysis-of-recent-ryuk-attack\">Ryuk<\/a> ransomware breakdown.\u00a0Threats that move and spread around in the network are called lateral moving threats. As soon as the APT has done its work, the ransomware is released like a time-bomb.<\/p>\n<p class=\"\">This is key to understanding how air gapping provides an effective layer of security.\u00a0The assumption is ransomware will infect your environment if there is any exposure to public networks such as the internet. This is especially true during the <a href=\"https:\/\/www.securitymagazine.com\/articles\/92886-covid-19-pandemic-sparks-72-ransomware-growth-mobile-vulnerabilities-grow-50\">COVID pandemic<\/a> wherein organizations adopted \u201cwork from home\u201d policies, allowing end-users to connect into the work environments, creating more exposure and entry points for threats. However, backup storage targets that are air-gapped within the organization are shielded from lateral moving threats.<\/p>\n<h4 class=\"is-style-heading-sans\"><strong>What is traditional air gapping?<\/strong><\/h4>\n<p class=\"\">We established that air gapping has value.\u00a0When you think of air gapping, you might immediately think of tape backups or the classic \u201cgovernment\u201d dark site.\u00a0Both solutions offer protection against lateral movement of threats since tapes are removed from the library, and dark sites are isolated and have no persistent connections to public networks.\u00a0However, both solutions are slow and ineffective for modern environments that need accessibility and rapid recovery.\u00a0Organizations are looking for air gap principles applied to modern storage,\u00a0 including cloud targets, to limit lateral moving threats while providing a seamless recovery experience when needed.<\/p>\n<h4 class=\"is-style-heading-sans\"><strong>Commvault\u2019s modernized air gap<\/strong><\/h4>\n<p class=\"\">Commvault\u2019s approach to air gapping allows organizations to maintain efficient recovery point and recovery time objectives while reducing the impact of lateral moving threats.<\/p>\n<p class=\"\">The most accessible air gap solution offered by Commvault is Metallic\u2122 Cloud Storage Service (MCSS).\u00a0With MCSS, there are no\u00a0persistent connections to the storage since all data resides in Metallic Cloud and is only accessed via authenticated API calls.\u00a0Direct access to cloud storage is not possible as credentials are not exposed. The storage is secure, scalable, and accessible.\u00a0When ransomware infects the environment, it will not spread to the cloud storage since it is virtually air-gapped, reducing lateral threats. MCSS is built into Commvault data protection solutions and preconfigured. It is as simple as applying a license and selecting the storage; there is no additional infrastructure or settings required.<\/p>\n<p class=\"\">For organizations that cannot use the cloud, they can air gap using Commvault\u2019s Network Topologies and built-in intelligence for managing persistent connections to storage.\u00a0This on-premises solution segments and compartmentalizes storage; all incoming communication to the storage is blocked, and data pulled into the isolated storage.\u00a0Communication is air-gapped by controlling power management automatically for virtual gateways or data movers.\u00a0This solution requires minimal infrastructure; however, it can be applied to Commvault HyperScale\u2122 and just about any storage.<\/p>\n<p class=\"\">To protect the backup content, Commvault\u2019s machine learning framework detects anomalous activity and changes to the content. Events and notifications are automatically triggered so customers can respond proactively. Removing threats from content is as simple as browsing your content and selecting the threat to erase. Check out this <a href=\"https:\/\/www.youtube.com\/watch?v=su_rtk5L5Eg\">youtube video demonstration<\/a>, <em>Avoid ransomware reinfection with Commvault<\/em>, to see how this works. This ensures backup data is clean and ready for recovery.<\/p>\n<h4 class=\"is-style-heading-sans\"><strong>Putting the security pieces together for maximum ransomware protection<\/strong><\/h4>\n<p class=\"\">At this point, you might be thinking, why bother with an air gap solution when I have immutable storage locked down with MFA controls? There is no doubt that immutability and MFA are an integral part of the layered solution; however, they do not address lateral moving threats.<\/p>\n<p class=\"\">Let\u2019s use the analogy of a combination safe.\u00a0If your offline bitcoin wallet is stored in a safe, is it safer sitting in plain sight for an intruder to easily see, or would it be better if the safe is <strong>secured<\/strong> and <strong>hidden<\/strong> in your house?\u00a0 Even though your safe is locked and secured, why would you expose it to additional risk? You don\u2019t need the combination to get into the safe; you need a way to exploit the safe.\u00a0It makes logical sense that the <strong>most secure<\/strong>option would be to keep your bitcoin wallet in a lockbox stored at a remote secured facility such as a bank \u2013 where it is air-gapped and un-reachable. Now you have eliminated the possible exposure to an intruder altogether.<\/p>\n<p class=\"\">The same applies to backups; your storage should be immutable and protected with MFA controls. As soon as you segment, isolate, and air gap, you are further reducing the risk to ensure the ultimate protection.<\/p>\n<h4 class=\"is-style-heading-sans\"><strong>Fighting ransomware with Commvault\u2019s layered security approach<\/strong><\/h4>\n<p class=\"\">Taking a layered approach to securing backup data provides the best overall protection against threats such as ransomware. Commvault\u2019s modernized approach to air gapping is not only simple, but it also provides the maximum level of security needed to protect against lateral moving threats so customers can be assured their data is recovery ready.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\">source: https:\/\/www.commvault.com\/blogs\/ransomware-protection-with-commvaults-modernized-air-gap?hsamp_network=linkedin&amp;hsamp=aSkEnY-rLpGIO<\/div>\n<div>\n<header class=\"entry__header\">\n<div class=\"entry__byline\"><span class=\"entry__posted-on\">Posted<\/span> <time class=\"entry__published\" datetime=\"2021-01-25T14:00:19+00:00\">January 25, 2021 -\u00a0<\/time>By David Cunningham<\/div>\n<\/header>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p class=\"\">Cyber threats are continuously evolving at an accelerated pace.\u00a0Ransomware is often the leading antagonist, leaving organizations crippled and at the mercy of cybercriminals.\u00a0Commvault helps organizations protect and recover data to resume business operations quickly. However, as threats evolve, even backup and recovery platforms are at risk to ransomware.\u00a0This has led to next-generation security controls such as immutability and multi-factor authentication to mitigate against these invasive threats. What about traditional air gap solutions? Is air gapping a viable solution against ransomware threats? In some cases, air gapping by itself may<\/p>\n","protected":false},"author":1,"featured_media":6680,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[115],"tags":[47,126],"class_list":["post-6679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artigos","tag-commvault","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Protection with Commvault\u2019s Modernized Air Gap<\/title>\n<meta name=\"description\" content=\"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Protection with Commvault\u2019s Modernized Air Gap\" \/>\n<meta property=\"og:description\" content=\"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Add Value\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-27T20:07:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-27T20:08:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"addvalue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"addvalue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\"},\"author\":{\"name\":\"addvalue\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"headline\":\"Ransomware Protection with Commvault\u2019s Modernized Air Gap\",\"datePublished\":\"2021-01-27T20:07:58+00:00\",\"dateModified\":\"2021-01-27T20:08:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\"},\"wordCount\":1126,\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg\",\"keywords\":[\"Commvault\",\"ransomware\"],\"articleSection\":[\"Artigos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\",\"url\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\",\"name\":\"Ransomware Protection with Commvault\u2019s Modernized Air Gap\",\"isPartOf\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg\",\"datePublished\":\"2021-01-27T20:07:58+00:00\",\"dateModified\":\"2021-01-27T20:08:37+00:00\",\"author\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\"},\"description\":\"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.\",\"breadcrumb\":{\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage\",\"url\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg\",\"contentUrl\":\"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg\",\"width\":650,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/addvalue.com.br\/novo\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Protection with Commvault\u2019s Modernized Air Gap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#website\",\"url\":\"https:\/\/addvalue.com.br\/novo\/\",\"name\":\"Add Value\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e\",\"name\":\"addvalue\",\"url\":\"https:\/\/addvalue.com.br\/novo\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Protection with Commvault\u2019s Modernized Air Gap","description":"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/","og_locale":"pt_BR","og_type":"article","og_title":"Ransomware Protection with Commvault\u2019s Modernized Air Gap","og_description":"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.","og_url":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/","og_site_name":"Add Value","article_published_time":"2021-01-27T20:07:58+00:00","article_modified_time":"2021-01-27T20:08:37+00:00","og_image":[{"width":650,"height":350,"url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg","type":"image\/jpeg"}],"author":"addvalue","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"addvalue","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#article","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/"},"author":{"name":"addvalue","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"headline":"Ransomware Protection with Commvault\u2019s Modernized Air Gap","datePublished":"2021-01-27T20:07:58+00:00","dateModified":"2021-01-27T20:08:37+00:00","mainEntityOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/"},"wordCount":1126,"image":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg","keywords":["Commvault","ransomware"],"articleSection":["Artigos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/","url":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/","name":"Ransomware Protection with Commvault\u2019s Modernized Air Gap","isPartOf":{"@id":"https:\/\/addvalue.com.br\/novo\/#website"},"primaryImageOfPage":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage"},"image":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg","datePublished":"2021-01-27T20:07:58+00:00","dateModified":"2021-01-27T20:08:37+00:00","author":{"@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e"},"description":"As amea\u00e7as cibern\u00e9ticas evoluem em um ritmo acelerado. A Commvault ajuda as empresas a proteger dados e retomando as opera\u00e7\u00f5es rapidamente.","breadcrumb":{"@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#primaryimage","url":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg","contentUrl":"https:\/\/addvalue.com.br\/novo\/wp-content\/uploads\/2021\/01\/commvault_blog_21.jpg","width":650,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/addvalue.com.br\/novo\/artigos\/ransomware-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/addvalue.com.br\/novo\/"},{"@type":"ListItem","position":2,"name":"Ransomware Protection with Commvault\u2019s Modernized Air Gap"}]},{"@type":"WebSite","@id":"https:\/\/addvalue.com.br\/novo\/#website","url":"https:\/\/addvalue.com.br\/novo\/","name":"Add Value","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/addvalue.com.br\/novo\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Person","@id":"https:\/\/addvalue.com.br\/novo\/#\/schema\/person\/9dcae17489d35780e33cd4f1d48db37e","name":"addvalue","url":"https:\/\/addvalue.com.br\/novo\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/comments?post=6679"}],"version-history":[{"count":1,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6679\/revisions"}],"predecessor-version":[{"id":6681,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/posts\/6679\/revisions\/6681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media\/6680"}],"wp:attachment":[{"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/media?parent=6679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/categories?post=6679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/addvalue.com.br\/novo\/wp-json\/wp\/v2\/tags?post=6679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}