{"id":47975,"date":"2022-04-11T09:31:01","date_gmt":"2022-04-11T01:31:01","guid":{"rendered":"https:\/\/version-2.com\/?p=47975"},"modified":"2022-05-30T10:42:15","modified_gmt":"2022-05-30T02:42:15","slug":"increasing-cloud-security-with-ciem","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/04\/increasing-cloud-security-with-ciem\/","title":{"rendered":"Increasing Cloud Security with CIEM"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"47975\" class=\"elementor elementor-47975\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><span style=\"font-weight:400;\">Given the current context, post-covid-19, talking about cloud security with CIEM has become essential. This is because the pandemic motivated the adoption of remote work by most organizations, which resulted in a significant increase in the adoption of cloud-based infrastructure.<\/span><\/p> <p><span style=\"font-weight:400;\">As you can imagine, this feature presents particularities when it comes to cybersecurity. To get a sense, <\/span><b>Gartner<\/b><span style=\"font-weight:400;\"> predicts that companies will suffer at least 2,300 violations of privilege policies annually by 2024.<\/span><\/p> <p><span style=\"font-weight:400;\">Also according to <\/span><b>Gartner<\/b><span style=\"font-weight:400;\">, <\/span><i><span style=\"font-weight:400;\">multi-cloud<\/span><\/i><span style=\"font-weight:400;\"> environments introduce a large cyberattack surface that can be exploited by malicious agents. Thus, incorrectly configuring security and identity tools in cloud environments may have violations as a consequence. Therefore, it is not recommended that the settings and maintenance in the access policy be performed manually.<\/span><\/p> <p><span style=\"font-weight:400;\">Added to this is the fact that conventional solutions, such as IGA and PAM, may not be efficient to manage this demand. In addition, with infrastructure as a service (IaaS), access management is the responsibility of the client company. According to<\/span><b> Gartner<\/b><span style=\"font-weight:400;\">, 99% of data breaches occurring in a cloud environment are the responsibility of the customer, not the Cloud Service Provider (CSP).<\/span><\/p> <p><span style=\"font-weight:400;\">In this article, we share everything you need to know about cloud security with CIEM. To make our text more understandable, we divided the content by topics. These are:<\/span><\/p> <ul> <li aria-level=\"1\"><b>History of Cloud Computing<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>What Are The Main Challenges of The Companies that Adopt this Service?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>What Is CIEM?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Why Are CIEM Solutions Important?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Benefits of a CIEM Solution<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>How Can CIEM Be Used?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>How Can CIEM Contribute to DevOps?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>senhasegura CIEM<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Conclusion<\/b><\/li> <\/ul> <p><b><\/b><\/p> <p><span style=\"font-weight:400;\">Follow our text to the end!<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>History of Cloud Computing<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">In the 1950s, computers were very expensive and companies had access to few machines. For this reason, in the following decade, cloud computing began to be discussed by experts.<\/span><\/p> <p><span style=\"font-weight:400;\">The first person to suggest shared use of computers was American computer scientist John McCarthy, who named this concept <\/span><i><span style=\"font-weight:400;\">Utility Computing<\/span><\/i><span style=\"font-weight:400;\">.<\/span><\/p> <p><span style=\"font-weight:400;\">In the following years, Joseph Carl Robnett Licklider studied different ways to use the computer and the Network of Advanced Research Project Agencies (<\/span><b>Arpanet<\/b><span style=\"font-weight:400;\">), which he helped develop, enabling two or more computers to share data, even in different locations, according to the principles of accessibility and availability.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">But the term \u201ccloud computing\u201d was only used for the first time in the second half of the 1990s, in an academic lecture given by the professor of information systems, Ramnath Chellappa. This expression is based on the symbol of the internet: the cloud.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">Today, we also have the concept of <\/span><i><span style=\"font-weight:400;\">multi-cloud<\/span><\/i><span style=\"font-weight:400;\">, which consists of the use of various cloud services. These services can be provided by third-party providers or include a private cloud, whose technology is in the organizations\u2019 own data center.<\/span><\/p> <p><span style=\"font-weight:400;\">This type of solution enables IT teams to perform individual operations efficiently, while companies reduce costs.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">There is also the hybrid cloud concept, which unites public cloud services with a private cloud, simplifying remote cloud operations and providing more flexibility for businesses.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">However, unlike cloud environment management, which must be managed in isolation, hybrid cloud management needs to be based on a unique strategy.&nbsp;<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>What Are The Main Challenges of The Companies that Adopt this Service?<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">With the evolution of technology, cloud computing has become accessible, and remote work, adopted by many organizations after the beginning of the covid-19 pandemic, has made this resource widely used.<\/span><\/p> <p><span style=\"font-weight:400;\">The big issue is that the larger the company, the more people will have access to cloud-based environments. Moreover, many permissions are granted to applications and machines that connect to other applications and databases to exchange information.<\/span><\/p> <p><span style=\"font-weight:400;\">Thus, it is necessary to have a strategy that limits unnecessary access and prevents inadequate sharing of information, which can be achieved through CIEM.<\/span><\/p> <p><span style=\"font-weight:400;\">&nbsp;<\/span><\/p> <ul> <li aria-level=\"1\"> <h2><b>What Is CIEM?<\/b><\/h2> <\/li> <\/ul> <p><i><span style=\"font-weight:400;\">Cloud Infrastructure Entitlements Management<\/span><\/i><span style=\"font-weight:400;\"> (CIEM) has the function of managing access in cloud and multi-cloud environments.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">This is possible through the access principle of least privilege, which contributes to companies that need to avoid risks such as attacks by malicious users and information leaks, problems generated by excessive permissions on this type of infrastructure.<\/span><\/p> <p><span style=\"font-weight:400;\">Thus, a CIEM solution allows you to remove these excessive permissions and centralize the visibility and control of permissions of a cloud environment.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">Through the use of artificial intelligence, a CIEM solution is also able to analyze exposure levels of a company\u2019s cloud environments, enabling the identification and reduction of cybersecurity risks.<\/span><\/p>\n<p><b style=\"color:#333;font-size:26px;\">. Why Are CIEM Solutions Important?<\/b><\/p> <p><span style=\"font-weight:400;\">Using cloud resources is very beneficial for businesses, as it allows them to simplify their operations and save time.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">However, traditional identity and access management (IAM) tools are aimed at protecting static applications and structures rather than cloud infrastructure, which is extremely dynamic.<\/span><\/p> <p><span style=\"font-weight:400;\">So, cloud providers have launched their own resources to ensure cybersecurity in this type of environment. Despite this, the dynamism and diversity of cloud environments continue to pose challenges to ensure data protection and compliance with security policies.<\/span><\/p> <p><span style=\"font-weight:400;\">After all, it is necessary to keep in mind that when a company uses the cloud to become more efficient, it can increase its attack surfaces with the excess of permissions in that environment. To make things worse, in such cases, it may not have the visibility and control necessary to apply the principle of least privilege.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">In this sense, CIEM solutions are essential to improve visibility, identify and correct incorrect access-related settings with minimal privileges in cloud and multi-cloud infrastructures, and thus ensure the organization\u2019s <\/span><b>cybersecurity<\/b><span style=\"font-weight:400;\">.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>Benefits of a CIEM Solution<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">A CIEM solution can generate several benefits for an organization. Check out the main ones below:&nbsp;<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It allows one to create and maintain an inventory with all permissions in the cloud environment;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It identifies normal operations in the cloud environment, also detecting abnormal operations;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">This feature allows the identification of external or internal risks, which may be associated with human action, such as errors and disregard for the company\u2019s security policies;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It points out incorrectly configured permissions, unused privileges, or rights that conflict with corporate policy;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">By making it possible to differentiate the necessary permissions from the excessive ones, it helps to automate the process of excluding improper privileges;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It detects high priority problems and presents correction plans;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It reduces the attack surface through the implementation of the principle of least privilege;&nbsp;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It enables the implementation of uniform protections across multi-cloud environments; and<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It allows the DevOps team to review all permissions granted to users and machines.&nbsp;<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">In the following topic, we approach these benefits from another perspective: by showing how CIEM can be used to ensure more cybersecurity for companies.&nbsp;<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>How Can CIEM Be Used?<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">Good IT security requires discovering and classifying identities and recognizing permissions granted to people and machines in order to prevent data leaks and breaches. In this sense, CIEM can be used to:<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Ensure that permissions are used appropriately, with separation of roles, which means the person controlling the keys to encrypt data should not have the role of decrypting such data.&nbsp;<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">CIEM enables continuous monitoring of identities and permissions, including changes in rights;<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Monitor whether someone has received more permissions than necessary to perform their activities, correcting this problem, which puts organizations at risk;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Ensure visibility of identities and rights, enabling more efficient management of these permissions.&nbsp;<\/span><\/li> <\/ul> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>How Can CIEM Contribute to DevOps?<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">For DevOps teams, managing cloud computing while maintaining information security can be challenging, after all, their priorities are speed and innovation rather than security.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">This is because the services must be launched or provisioned with agility, which ends up causing an excessive granting of permissions. However, the manual blocking of these rights is complex and compromises the fundamental speed for this type of operation.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">With CIEM, one can eliminate excessive permissions automatically, without interrupting developers, who can deploy code quickly and securely.&nbsp;<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"> <h2><b>senhasegura CIEM<\/b><\/h2> <\/li> <\/ul> <p><span style=\"font-weight:400;\">Check out the advantages of contracting the senhasegura CIEM service below:<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">This feature promotes access governance, since it grants visibility to unnecessary privileges, without interrupting or delaying the work of developers;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It allows organizations to comply with strict privacy policies, such as GDPR, LGPD, and CCPA;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It contributes to permissions risk management and helps prevent data breaches and theft in cloud environments;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">The management of access keys generated in CSPs, carried out by senhasegura, makes it possible to minimize the attack surface for malicious users and open-source software from third parties;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">This tool also allows adopting the principles of privileged access management (PAM) in cloud environments in order to reduce old and unnecessary permissions;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Senhasegura CIEM also enables automation in compliance with regulations such as GDPR, SOX, and <\/span><i><span style=\"font-weight:400;\">PCI Data Security Standard<\/span><\/i><span style=\"font-weight:400;\">.<\/span><\/li> <\/ul> <p>&nbsp;<\/p> <h2><span style=\"font-weight:400;\">.<\/span> <b>Conclusion<\/b><\/h2> <p><span style=\"font-weight:400;\">By reading this article, you saw that:<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Cloud computing is a technology that began to be required in the 1950s, due to the high cost for companies to have access to computers;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">CIEM is a resource that allows you to manage access in cloud and multi-cloud environments;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Traditional identity and access management (IAM) means are not suitable for cloud infrastructure, which has great dynamism, so CIEM is necessary in this case;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">A CIEM solution has several advantages, such as reducing the attack surface through the principle of least privilege, thus avoiding data breaches;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Another great benefit is to enable more visibility and control of identities and rights, detecting excessive permissions and allowing them to be corrected.<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">It can also contribute to DevOps, providing security without compromising the speed of releases or provisioning;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">To conclude, you learned about the senhasegura CIEM service, which can make all the difference in the cybersecurity of your company.<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">Did you like our article on CIEM solutions? Share it with someone who can benefit from this knowledge.&nbsp;<\/span><\/p> <p>&nbsp;<\/p> <p><b>ALSO READ IN SENHASEGURA\u2019S <\/b><a href=\"\/senhasegura\/#press-release\"><b>BLOG<\/b><\/a><\/p> <p><a href=\"\/2022\/03\/how-to-create-a-secure-password-policy\/\"><b>How to Create a Secure Password Policy?<\/b><\/a><\/p> <p><a href=\"\/2021\/04\/lgpd-know-what-your-company-needs-to-do-by-august\/\"><b>Learn All About Passwordless Authentication<\/b><\/a><\/p> <p><a href=\"\/2022\/03\/password-strength-how-to-create-strong-passwords-for-credentials\/\"><b>Password Strength: How to Create Strong Passwords for Credentials?<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Given the current context, post-covid-19, talking about [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[488,419,61],"tags":[420,489],"class_list":["post-47975","post","type-post","status-publish","format-standard","hentry","category-488","category-segura","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Increasing Cloud Security with CIEM - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing Cloud Security with CIEM - Version 2\" \/>\n<meta property=\"og:description\" content=\"Given the current context, post-covid-19, talking about [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-11T01:31:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-30T02:42:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/increasing-cloud-security-with-ciem\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Increasing Cloud Security with CIEM\",\"datePublished\":\"2022-04-11T01:31:01+00:00\",\"dateModified\":\"2022-05-30T02:42:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/increasing-cloud-security-with-ciem\\\/\"},\"wordCount\":1649,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Increasing-Cloud-Security-with-CIEM.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"2022\",\"Segura\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/04\\\/increasing-cloud-security-with-ciem\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/\",\"name\":\"Increasing Cloud Security with CIEM - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Increasing-Cloud-Security-with-CIEM.jpg\",\"datePublished\":\"2022-04-11T01:31:01+00:00\",\"dateModified\":\"2022-05-30T02:42:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Increasing-Cloud-Security-with-CIEM.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Increasing-Cloud-Security-with-CIEM.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/increasing-cloud-security-with-ciem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increasing Cloud Security with CIEM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Increasing Cloud Security with CIEM - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/","og_locale":"zh_HK","og_type":"article","og_title":"Increasing Cloud Security with CIEM - Version 2","og_description":"Given the current context, post-covid-19, talking about [&hellip;]","og_url":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/","og_site_name":"Version 2","article_published_time":"2022-04-11T01:31:01+00:00","article_modified_time":"2022-05-30T02:42:15+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/04\/increasing-cloud-security-with-ciem\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Increasing Cloud Security with CIEM","datePublished":"2022-04-11T01:31:01+00:00","dateModified":"2022-05-30T02:42:15+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/04\/increasing-cloud-security-with-ciem\/"},"wordCount":1649,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg","keywords":["Segura","2022"],"articleSection":["2022","Segura","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/04\/increasing-cloud-security-with-ciem\/","url":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/","name":"Increasing Cloud Security with CIEM - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg","datePublished":"2022-04-11T01:31:01+00:00","dateModified":"2022-05-30T02:42:15+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/03\/Increasing-Cloud-Security-with-CIEM.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/increasing-cloud-security-with-ciem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Increasing Cloud Security with CIEM"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ctN","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/47975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=47975"}],"version-history":[{"count":13,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/47975\/revisions"}],"predecessor-version":[{"id":47988,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/47975\/revisions\/47988"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=47975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=47975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=47975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}