{"id":1921,"date":"2021-10-18T15:50:55","date_gmt":"2021-10-18T15:50:55","guid":{"rendered":"https:\/\/www.reloadly.com\/blog\/?p=1921"},"modified":"2021-11-16T08:38:34","modified_gmt":"2021-11-16T08:38:34","slug":"api-security-checklist","status":"publish","type":"post","link":"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/","title":{"rendered":"API Security Checklist: Everything You Need To know"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_46 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69d27fea7aee5\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #000000;color:#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #000000;color:#000000\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69d27fea7aee5\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-visibility-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#What_is_API_Security\" title=\"What is API Security?\">What is API Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#Why_is_API_Security_important\" title=\"Why is API Security important?\">Why is API Security important?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#API_Security_Risks\" title=\"API Security Risks\">API Security Risks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#API_Security_Checklist\" title=\"API Security Checklist\">API Security Checklist<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#API_Security_Best_Practices\" title=\"API Security Best Practices\">API Security Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#In_Conclusion\" title=\"In Conclusion\">In Conclusion<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/blog.reloadly.com\/blog\/api-security-checklist\/#START_USING_RELOADLY_AND_PROTECT_YOUR_API_FROM_THE_FIRST_CALL\" title=\"START USING RELOADLY AND PROTECT YOUR API FROM THE FIRST CALL\">START USING RELOADLY AND PROTECT YOUR API FROM THE FIRST CALL<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<p>Nowadays, many companies are developing web and mobile applications, which means having logic on securing their application programming interfaces (APIs). These interfaces connect different technological systems. They are able to process queries from users, deal with server instructions and facilitate the processing of data.<\/p>\n\n\n\n<p>APIs are the building blocks of modern applications, which can be protected in a very similar way to how regular old web applications have been protected until now.<\/p>\n\n\n\n<p>The rise of APIs in the business ecosystem<strong> generates a need to add security layer<\/strong>s. Since APIs deal with personal and sensitive information, an extra layer of security is crucial for every developer.&nbsp;<\/p>\n\n\n\n<p>For that reason, today we want to provide you with the <strong>API Security Checklist<\/strong> that will help you to keep your APIs safe.<\/p>\n\n\n\n<p>But first and before diving into the API security checklist, let\u2019s explore the main concepts you need to know.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_is_API_Security\"><\/span>What is API Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>API security focuses on protecting application layers and creating logic that takes action in case a malicious hacker tries to interact with an API. It embraces programs and strategies that allow for understanding and mitigating potential vulnerabilities and security risks of APIs.<\/p>\n\n\n\n<p>Without a proper API security checklist, rapid innovation in web and mobile applications would not be possible, as APIs are exposing application logic and sensitive data such as Personally Identifiable Information (PII).&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_is_API_Security_important\"><\/span>Why is API Security important?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As attacks on APIs are more and more common, companies are starting to adopt security measures in order to protect their sensitive information from hackers. According to the <a href=\"https:\/\/www.imvision.ai\/2021-api-security-survey\/\">Imvision<\/a> report \u201cAPI Security is Coming\u201d, 91% of IT professionals admit that API security should be a priority in the next two years.<\/p>\n\n\n\n<p>Research by Salt has shown that overall API traffic on its platform increased 141% while malicious traffic grew 348%. As API technology advances, the need for protecting sensitive information and data is increasing.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends-1024x1024.png\" alt=\"\" class=\"wp-image-1922\" width=\"440\" height=\"440\" srcset=\"https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends-1024x1024.png 1024w, https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends-300x300.png 300w, https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends-150x150.png 150w, https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends-768x768.png 768w, https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/salt-api-security-trends.png 1150w\" sizes=\"(max-width: 440px) 100vw, 440px\" \/><figcaption><em>Source: <\/em><a href=\"https:\/\/content.salt.security\/state-api-report.html?\"><em>Salt<\/em><\/a><em>, State of API Security Report Q3 2021<\/em><\/figcaption><\/figure><\/div>\n\n\n\n<p>Apparently, attacks against API don&#8217;t seem to stop, so companies are beginning to take API security checklists and measures more seriously. In a new report released in the first quarter of 2021 by Imvision, it has been confirmed that 91% of IT professionals consider API security as a priority.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-14-at-10.22.47.png\" alt=\"\" class=\"wp-image-1923\" width=\"418\" height=\"351\" srcset=\"https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-14-at-10.22.47.png 576w, https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/Screenshot-2021-10-14-at-10.22.47-300x252.png 300w\" sizes=\"(max-width: 418px) 100vw, 418px\" \/><figcaption><em>Source: <\/em><a href=\"https:\/\/www.imvision.ai\/2021-api-security-survey\/\"><em>Imvision<\/em><\/a><em>, Enterprise API Security Survey 2021<\/em><\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"API_Security_Risks\"><\/span>API Security Risks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Not surprisingly, cyberattacks have become an everyday problem in today\u2019s cyber world. Since APIs are able to reveal apps for third-party integrations, they are more susceptible to hacker attacks, and the security strategies must be strengthened, as well as the API security checklist processes. Here are some of the most common risks APIs may have:&nbsp;&nbsp;<\/p>\n\n\n\n<ol><li>Poor software development practices<\/li><\/ol>\n\n\n\n<p>Starting off with bad or inefficient coding might expose API to serious security risks. Ensure your API coding is correct from the get-go in order to avoid irreversible issues in the future.<\/p>\n\n\n\n<ol start=\"2\"><li>Issues managing APIs<\/li><\/ol>\n\n\n\n<p>In big corporations, sometimes barriers or blockers could make APIs tracking and utilization not as accurate as it should be. This can deliver the API into malicious hands, and hackers will be able to steal keys, personal information or passwords.<\/p>\n\n\n\n<ol start=\"3\"><li>XML format<\/li><\/ol>\n\n\n\n<p>XML format has some security gaps regarding its SOAP protocol. That is why it can yield several security risks that hackers can take advantage of.<\/p>\n\n\n\n<ol start=\"4\"><li>Redundant API usage<\/li><\/ol>\n\n\n\n<p>Repetitive API usage can persist if it is not properly tracked. What can we do in this case? Having a strong API administration and control can be very helpful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"API_Security_Checklist\"><\/span>API Security Checklist<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>At Reloadly, we truly believe that safety comes first. For that reason, we recommend all API users follow an API security checklist and transact with peace of mind knowing that the connection details are safe and sound.<\/p>\n\n\n\n<p>Ensure your account and credentials are safe by following the API security checklist.<\/p>\n\n\n\n<ol><li><strong>Use a dedicated email ID<\/strong> belonging to your company domain to create your developer account.<\/li><li><strong>Choose a strong password for your developer account<\/strong>. Try to avoid words, phrases, and numbers while creating a new password because it can be easily found on your social media accounts. Remember that you should not reuse a password because if one of your accounts gets compromised, others can be compromised too.<\/li><li><strong>Secure your account with two-factor authentication (2FA)<\/strong>. Two-factor authentication is a way of establishing access to an online account or computer system that requires the user to provide two different types of information. It provides the system you\u2019re trying to access with additional evidence that you are the rightful owner of the account.&nbsp;<\/li><li><strong>IP Whitelisting<\/strong>. When you whitelist your production server IP addresses, it ensures that traffic from only those servers will be accepted by an API.&nbsp;<\/li><li><strong>Ensure that your ID and API Keys are in possession of very few authorized personnel<\/strong> only and are not shared with anyone else within or outside your company<\/li><li><strong>Make sure that your user portal password, Client ID, Client Secret and Bearer tokens are never printed<\/strong> to server logs and are never checked-in into version control.<\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"API_Security_Best_Practices\"><\/span>API Security Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When interacting with APIs, it&#8217;s very important to observe certain security protocols to avoid having your account being compromised and vulnerable. Make sure your development team is following the API Security Best Practices while integrating with Reloadly APIs:<\/p>\n\n\n\n<ul><li>Promote and encourage a strong culture around security in design and code.&nbsp;<\/li><li>Ensure that production security credentials like passwords, clientID, client secret, etc. are never checked into version control.<\/li><li>Ensure that your source code is accessible to only those who need to have access to it.<\/li><li>Have your engineering team review code with your ITSM team to certify that all security policies mandated by the organization are fully implemented.<\/li><li>Ensure that sensitive information such as passwords etc. is never stored in databases or files in clear-text format.<\/li><li>Ensure that developer machines and servers are always patched with the latest security patches appropriate for the operating systems they run.<\/li><li>Be aware of social engineering and other phishing threats.<\/li><li>Ensure and demand from third-party integrators that end-to-end encryption via the latest standards of SSL\/TLS is used.<\/li><li>If you integrate with Reloadly APIs via server-side, ensure that your security credentials like ClientID and ClientSecret are not printed to server logs. Your production servers should be fully secure and locked down for any unauthorized access.<\/li><li>If you integrate with Reloadly APIs via SDK, ensure that you have robust processes in place to manage the production clientID and clientSecret that you package in your mobile apps. Consult the relevant documents and best practices applicable for the platform you are developing for, e.g. iOS, Android.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"In_Conclusion\"><\/span>In Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The best way to protect your API from attacks and malicious hackers is by implementing proper measures and an API security checklist. Make sure you are familiar with top vulnerabilities your API can face as understanding this will enable you to proceed with adequate methods.<\/p>\n\n\n\n<p>If you have any questions while integrating with Reloadly API or you need more information about security best practices, you can get immediate professional help here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"START_USING_RELOADLY_AND_PROTECT_YOUR_API_FROM_THE_FIRST_CALL\"><\/span><a href=\"https:\/\/www.reloadly.com\/registration\">START USING RELOADLY AND PROTECT YOUR API FROM THE FIRST CALL<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to start implementing the API Security Checklist and protect your API from the first call<\/p>\n","protected":false},"author":19,"featured_media":1924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[274],"tags":[307],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>API Security Checklist: Everything You Need To know - Reloadly<\/title>\n<meta name=\"description\" content=\"Learn how to start implementing the API Security Checklist and protect your API from the first call\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"API Security Checklist: Everything You Need To know - Reloadly\" \/>\n<meta property=\"og:description\" content=\"Learn how to start implementing the API Security Checklist and protect your API from the first call\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"Reloadly\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T15:50:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-16T08:38:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/API-security-checklist.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"6 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/#organization\",\"name\":\"Reloadly\",\"url\":\"https:\/\/www.reloadly.com\/blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2020\/11\/logo-1.svg\",\"width\":100,\"height\":100,\"caption\":\"Reloadly\"},\"image\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/#website\",\"url\":\"https:\/\/www.reloadly.com\/blog\/\",\"name\":\"Reloadly\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.reloadly.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.reloadly.com\/blog\/wp-content\/uploads\/2021\/10\/API-security-checklist.png\",\"width\":600,\"height\":400},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#webpage\",\"url\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\",\"name\":\"API Security Checklist: Everything You Need To know - Reloadly\",\"isPartOf\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#primaryimage\"},\"datePublished\":\"2021-10-18T15:50:55+00:00\",\"dateModified\":\"2021-11-16T08:38:34+00:00\",\"description\":\"Learn how to start implementing the API Security Checklist and protect your API from the first call\",\"breadcrumb\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/\",\"url\":\"https:\/\/www.reloadly.com\/blog\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\",\"url\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/\",\"name\":\"API Security Checklist: Everything You Need To know\"}}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/#\/schema\/person\/29c3072724a51014dc99a556639d9c86\"},\"headline\":\"API Security Checklist: Everything You Need To know\",\"datePublished\":\"2021-10-18T15:50:55+00:00\",\"dateModified\":\"2021-11-16T08:38:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#webpage\"},\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#primaryimage\"},\"keywords\":\"api security checklist\",\"articleSection\":\"Developer Blog\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.reloadly.com\/blog\/api-security-checklist\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/#\/schema\/person\/29c3072724a51014dc99a556639d9c86\",\"name\":\"A. Fern\\u00e1ndez\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.reloadly.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2d7caf23c9dbb236bf5938c839407628?s=96&d=mm&r=g\",\"caption\":\"A. Fern\\u00e1ndez\"},\"sameAs\":[\"http:%20\/\/www.reloadly.com\"],\"url\":\"https:\/\/blog.reloadly.com\/blog\/author\/alejandra-aranda\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","authors":[{"term_id":360,"user_id":19,"is_guest":0,"slug":"alejandra-aranda","display_name":"A. Fern\u00e1ndez"}],"_links":{"self":[{"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/posts\/1921"}],"collection":[{"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/comments?post=1921"}],"version-history":[{"count":2,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/posts\/1921\/revisions"}],"predecessor-version":[{"id":1958,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/posts\/1921\/revisions\/1958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/media\/1924"}],"wp:attachment":[{"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/media?parent=1921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/categories?post=1921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.reloadly.com\/blog\/wp-json\/wp\/v2\/tags?post=1921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}