{"id":42410,"date":"2024-01-16T13:32:27","date_gmt":"2024-01-16T13:32:27","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=42410"},"modified":"2024-01-16T13:32:30","modified_gmt":"2024-01-16T13:32:30","slug":"what-is-threatmodeler-and-use-cases-of-threatmodeler","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/what-is-threatmodeler-and-use-cases-of-threatmodeler\/","title":{"rendered":"What is ThreatModeler and use cases of ThreatModeler?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is ThreatModeler?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-156-1024x538.png\" alt=\"\" class=\"wp-image-42419\" style=\"width:737px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-156-1024x538.png 1024w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-156-300x158.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-156-768x403.png 768w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-156.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong><em>What is ThreatModeler<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>ThreatModeler is a leading <strong>automated threat modeling platform<\/strong> designed to empower everyone, not just security experts, to build secure software from the ground up. It stands out for its intuitive interface, pre-built threat libraries, and seamless integration with existing development workflows.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Purpose:<\/strong> Helps developers, architects, and security professionals identify and mitigate potential security vulnerabilities in their software early in the development cycle.<\/li>\n\n\n\n<li><strong>Key Features:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Automatic threat generation:<\/strong> Analyzes your system architecture to automatically generate potential threats based on industry best practices and the STRIDE methodology.<\/li>\n\n\n\n<li><strong>Visual approach:<\/strong> Creates diagrams to represent your system and threats, making them easy to understand and discuss.<\/li>\n\n\n\n<li><strong>Real-time collaboration:<\/strong> Multiple users can work on the same threat model simultaneously, fostering teamwork and communication.<\/li>\n\n\n\n<li><strong>Compliance support:<\/strong> Aligns with industry standards like OWASP, NIST, and more.<\/li>\n\n\n\n<li><strong>Integration with development tools:<\/strong> Connects with your existing Git repositories, CI\/CD pipelines, and issue trackers.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Top 10 use cases of ThreatModeler?<\/h2>\n\n\n\n<p>Top 10 Use Cases of ThreatModeler:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Rapidly assess security risks for small features or entire applications.<\/li>\n\n\n\n<li>Facilitate security discussions and decisions during agile development sprints.<\/li>\n\n\n\n<li>Empower non-security experts to identify and address security concerns.<\/li>\n\n\n\n<li>Prioritize mitigation efforts based on the severity and likelihood of threats.<\/li>\n\n\n\n<li>Integrate seamlessly into existing development workflows without major disruption.<\/li>\n\n\n\n<li>Document security considerations early in the design process for future reference.<\/li>\n\n\n\n<li>Identify potential attack vectors for penetration testing and red teaming exercises.<\/li>\n\n\n\n<li>Communicate security risks and mitigation strategies effectively to stakeholders.<\/li>\n\n\n\n<li>Train and educate developers on basic security concepts and threat modeling principles.<\/li>\n\n\n\n<li>Complement and validate comprehensive threat modeling efforts later in the development lifecycle.<\/li>\n<\/ol>\n\n\n\n<p><strong>Additional benefits of ThreatModeler:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Shift left security:<\/strong> Ensures security considerations are addressed early in the design phase, saving time and resources compared to fixing vulnerabilities later.<\/li>\n\n\n\n<li><strong>Improved development efficiency:<\/strong> Helps identify and address security concerns early, reducing code rework and vulnerabilities.<\/li>\n\n\n\n<li><strong>Increased software security:<\/strong> Leads to more secure and robust software with mitigated risks.<\/li>\n<\/ul>\n\n\n\n<p>Overall, ThreatModeler offers a valuable solution for organizations looking to proactively improve their software security posture by making threat modeling accessible and collaborative for everyone involved in the development process.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the feature of ThreatModeler?<\/h2>\n\n\n\n<p>Here are some of the key features of ThreatModeler that contribute to its effectiveness and ease of use:<\/p>\n\n\n\n<p><strong>Automatic Threat Generation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rapid analysis:<\/strong> Automatically identifies potential threats based on your system architecture and pre-built threat libraries.<\/li>\n\n\n\n<li><strong>STRIDE methodology:<\/strong> Uses STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege) to ensure a comprehensive analysis.<\/li>\n\n\n\n<li><strong>Customizable threat libraries:<\/strong> Create and maintain your own libraries for specific technologies or industry standards.<\/li>\n<\/ul>\n\n\n\n<p><strong>Visual Approach and Collaboration:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Visual diagrams:<\/strong> Creates clear and informative diagrams to visualize your system, threats, and mitigations for better understanding and communication.<\/li>\n\n\n\n<li><strong>Real-time collaboration:<\/strong> Enables multiple users to work on the same threat model simultaneously, fostering teamwork and shared decision-making.<\/li>\n\n\n\n<li><strong>Commenting and discussion:<\/strong> Allows for annotations and discussions within the model to provide context and rationale for decisions.<\/li>\n<\/ul>\n\n\n\n<p><strong>Compliance and Reporting:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Compliance mapping:<\/strong> Aligns with industry standards and regulations like OWASP, NIST, PCI DSS, GDPR, and more.<\/li>\n\n\n\n<li><strong>Detailed reports:<\/strong> Generates comprehensive reports for sharing with stakeholders, auditors, and compliance teams.<\/li>\n<\/ul>\n\n\n\n<p><strong>Integration with Development Tools:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Git integration:<\/strong> Connects with your Git repositories for version control and tracking of threat model changes.<\/li>\n\n\n\n<li><strong>CI\/CD pipeline integration:<\/strong> Integrates with your continuous integration and continuous delivery pipelines for automated threat modeling and security checks.<\/li>\n\n\n\n<li><strong>Issue tracker integration:<\/strong> Pushes security tasks identified in threat models directly to your issue tracker (e.g., Jira, Azure DevOps).<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Features:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat modeling templates:<\/strong> Provides pre-built templates for common system types and architectures to accelerate the process.<\/li>\n\n\n\n<li><strong>Component libraries:<\/strong> Offers a collection of reusable components to streamline model creation and standardization.<\/li>\n\n\n\n<li><strong>Threat intelligence feeds:<\/strong> Leverages data from external threat intelligence sources to keep threat models up-to-date.<\/li>\n\n\n\n<li><strong>Cloud-based or on-premises deployment:<\/strong> Choose the deployment model that best suits your organization&#8217;s needs.<\/li>\n<\/ul>\n\n\n\n<p>ThreatModeler&#8217;s combination of automation, visual representation, collaboration capabilities, and integration with development tools makes it a powerful solution for embedding security into the development lifecycle and building more secure software from the ground up.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How ThreatModeler works and Architecture?<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1016\" height=\"518\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-157.png\" alt=\"\" class=\"wp-image-42420\" style=\"width:757px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-157.png 1016w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-157-300x153.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-157-768x392.png 768w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><figcaption class=\"wp-element-caption\"><strong><em>ThreatModeler works and Architecture<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>ThreatModeler operates through a <strong>layered architecture<\/strong> designed for efficient and collaborative threat modeling:<\/p>\n\n\n\n<p><strong>1. User Input:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users start by creating a visual <strong>diagram<\/strong> of their system using either <strong>ThreatModeler&#8217;s built-in editor or importing models from Draw.io.<\/strong><\/li>\n\n\n\n<li>Within the diagram, users define components, data flows, trust boundaries, and assets they want to protect.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Automated Analysis:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ThreatModeler&#8217;s analysis engine leverages the system architecture and pre-defined <strong>threat libraries<\/strong> to automatically generate potential threats based on the STRIDE methodology.<\/li>\n\n\n\n<li>These libraries contain well-known vulnerabilities and attack patterns relevant to various system types and technologies.<\/li>\n\n\n\n<li>Users can further refine the analysis by specifying <strong>attack scenarios<\/strong> to focus on specific security concerns.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Collaborative Refinement:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Users can review and revise the generated threats, adjusting their <strong>likelihood<\/strong> and <strong>impact<\/strong> based on specific circumstances.<\/li>\n\n\n\n<li><strong>Mitigation strategies<\/strong> are suggested for each threat, allowing users to choose appropriate countermeasures or define their own.<\/li>\n\n\n\n<li>The visual environment facilitates <strong>real-time collaboration<\/strong>, enabling multiple users to discuss and refine the threat model simultaneously.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Reporting and Integration:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ThreatModeler generates <strong>detailed reports<\/strong> summarizing the model, identified threats, chosen mitigations, and rationale behind decisions. These reports can be shared with stakeholders and used for compliance purposes.<\/li>\n\n\n\n<li>The platform integrates with various development tools like <strong>Git repositories, CI\/CD pipelines, and issue trackers<\/strong>, allowing for seamless security integration into existing workflows.<\/li>\n<\/ul>\n\n\n\n<p><strong>ThreatModeler Architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Client application:<\/strong> Provides the user interface for creating, editing, and collaborating on threat models.<\/li>\n\n\n\n<li><strong>Threat Engine:<\/strong> Analyzes the system diagram and generates threats based on libraries and the STRIDE methodology.<\/li>\n\n\n\n<li><strong>Mitigation Library:<\/strong> Contains pre-defined and customizable mitigation strategies for different threats.<\/li>\n\n\n\n<li><strong>Collaboration System:<\/strong> Enables real-time access and editing for multiple users.<\/li>\n\n\n\n<li><strong>Reporting Module:<\/strong> Generates comprehensive reports summarizing the threat model.<\/li>\n\n\n\n<li><strong>Integration APIs:<\/strong> Allow connection with development tools and platforms.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key characteristics of ThreatModeler&#8217;s architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Modular and scalable:<\/strong> Adapts to various system sizes and complexities.<\/li>\n\n\n\n<li><strong>Automated and intuitive:<\/strong> Simplifies threat modeling for non-security experts.<\/li>\n\n\n\n<li><strong>Collaborative and visual:<\/strong> Encourages team participation and communication.<\/li>\n\n\n\n<li><strong>Integrated and adaptable:<\/strong> Seamlessly connects with existing development workflows.<\/li>\n<\/ul>\n\n\n\n<p>Overall, ThreatModeler&#8217;s architecture allows for efficient and collaborative threat modeling, empowering teams to build secure software by design.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Install ThreatModeler it?<\/h2>\n\n\n\n<p>Here are the general steps to install ThreatModeler:<\/p>\n\n\n\n<p><strong>1. Choose Your Deployment Option:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud-based SaaS:<\/strong> Access the platform directly through a web browser, with ThreatModeler handling setup and maintenance. This is the most common and appropriate option.<\/li>\n\n\n\n<li><strong>On-Premises:<\/strong> Install ThreatModeler on your own servers for full control and customization. This requires more technical expertise and resource management.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Sign Up for a Free Trial or Request a Demo:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visit the ThreatModeler official website and create a free account to try the cloud-based version.<\/li>\n\n\n\n<li>For on-premises installation or a tailored demo, contact ThreatModeler&#8217;s sales team.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Follow the Installation Instructions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud-Based:<\/strong> No installation required; simply log in to the web interface.<\/li>\n\n\n\n<li><strong>On-Premises:<\/strong>\n<ol class=\"wp-block-list\">\n<li><strong>Environment Requirements:<\/strong>\n<ul class=\"wp-block-list\">\n<li>Server with Java 8 or higher<\/li>\n\n\n\n<li>PostgreSQL database<\/li>\n\n\n\n<li>Docker (optional, for easier setup)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Download Files:<\/strong> Obtain the installation package from ThreatModeler&#8217;s website or support team.<\/li>\n\n\n\n<li><strong>Run Installation Script:<\/strong> Execute the provided script to install the platform components.<\/li>\n\n\n\n<li><strong>Configure Database:<\/strong> Set up the PostgreSQL database with necessary credentials.<\/li>\n\n\n\n<li><strong>Start ThreatModeler:<\/strong> Launch the application and create an initial administrator account.<\/li>\n\n\n\n<li><strong>Access the Platform:<\/strong> Access ThreatModeler through a web browser using the provided URL and login credentials.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Additional Considerations:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Customization and Integration:<\/strong> Consult ThreatModeler&#8217;s documentation for detailed instructions on customizing the platform to match your specific needs and integrating it with your existing development tools and workflows.<\/li>\n\n\n\n<li><strong>Support:<\/strong> If you encounter any issues, reach out to ThreatModeler&#8217;s support team for assistance.<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Points:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The cloud-based option is generally easier to set up and maintain.<\/li>\n\n\n\n<li>The on-premises option offers more control and customization but requires more technical expertise.<\/li>\n\n\n\n<li>ThreatModeler&#8217;s documentation provides detailed instructions for both deployment options.<\/li>\n\n\n\n<li>Support is available from ThreatModeler&#8217;s team if needed.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Basic Tutorials of ThreatModeler: Getting Started<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"991\" height=\"437\" src=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-158.png\" alt=\"\" class=\"wp-image-42421\" style=\"width:744px;height:auto\" srcset=\"https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-158.png 991w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-158-300x132.png 300w, https:\/\/www.devopsschool.com\/blog\/wp-content\/uploads\/2024\/01\/image-158-768x339.png 768w\" sizes=\"auto, (max-width: 991px) 100vw, 991px\" \/><figcaption class=\"wp-element-caption\"><strong><em>Basic Tutorials of ThreatModeler<\/em><\/strong><\/figcaption><\/figure>\n<\/div>\n\n\n<p>Following is a step-by-step basic tutorial on using ThreatModeler, incorporating images for visual guidance:<\/p>\n\n\n\n<p><strong>1. Create a New Threat Model:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Log in to ThreatModeler and click &#8220;New Threat Model.&#8221;<\/li>\n\n\n\n<li>Choose a template (e.g., &#8220;Web Application&#8221;) or begin with a blank diagram.<\/li>\n\n\n\n<li>Give your model a descriptive name and save it.<\/li>\n<\/ul>\n\n\n\n<p><strong>2. Draw Your System Architecture:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Drag and drop elements from the toolbox onto the canvas:\n<ul class=\"wp-block-list\">\n<li>Processes (rectangles): Represent actions or functions.<\/li>\n\n\n\n<li>Data stores (open rectangles): Contain data.<\/li>\n\n\n\n<li>External entities (person icons): Interact with the system.<\/li>\n\n\n\n<li>Data flows (arrows): Show data movement between elements.<\/li>\n\n\n\n<li>Trust boundaries (dotted lines): Separate areas of different trust levels.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Identify Assets and Data Flows:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click on elements to add details:\n<ul class=\"wp-block-list\">\n<li>Description: Explain the element&#8217;s purpose.<\/li>\n\n\n\n<li>Assets: List valuable information or resources to protect.<\/li>\n\n\n\n<li>Security objectives: Define protection goals for assets.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Generate Threats:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Click the &#8220;Analyze&#8221; tab.<\/li>\n\n\n\n<li>Select a STRIDE category (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege).<\/li>\n\n\n\n<li>ThreatModeler will automatically generate potential threats based on the model and STRIDE.<\/li>\n<\/ul>\n\n\n\n<p><strong>5. Review and Refine Threats:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review the generated threats for relevance and accuracy.<\/li>\n\n\n\n<li>Add any missing threats you identify.<\/li>\n\n\n\n<li>Prioritize threats based on likelihood and impact.<\/li>\n<\/ul>\n\n\n\n<p><strong>6. Identify Mitigations:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ThreatModeler suggests potential mitigations for each threat.<\/li>\n\n\n\n<li>Choose relevant mitigations or add custom countermeasures.<\/li>\n<\/ul>\n\n\n\n<p><strong>7. Collaborate and Share:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Invite team members to collaborate on the threat model.<\/li>\n\n\n\n<li>Generate reports to share with stakeholders and track progress.<\/li>\n<\/ul>\n\n\n\n<p><strong>8. Continuously Update:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As your system evolves, revisit your threat model to ensure it remains accurate and effective.<\/li>\n<\/ul>\n\n\n\n<p><strong>Notes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Utilize ThreatModeler&#8217;s built-in tutorials and templates for further guidance.<\/li>\n\n\n\n<li>Leverage the threat libraries for pre-defined threats and mitigations relevant to common system types.<\/li>\n\n\n\n<li>Integrate ThreatModeler with your development workflow and issue trackers for seamless security integration.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What is ThreatModeler? ThreatModeler is a leading automated threat modeling platform designed to empower everyone, not just security experts, to build secure software from the ground up. It stands out for its intuitive interface, pre-built threat libraries, and seamless integration with existing development workflows. Top 10 use cases of ThreatModeler? Top 10 Use Cases of&#8230;<\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-42410","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=42410"}],"version-history":[{"count":1,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42410\/revisions"}],"predecessor-version":[{"id":42423,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/42410\/revisions\/42423"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=42410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=42410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=42410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}