{"id":693,"date":"2019-08-16T08:31:59","date_gmt":"2019-08-16T07:31:59","guid":{"rendered":"https:\/\/www.easydeploy.io\/blog\/?p=693"},"modified":"2019-08-16T08:31:59","modified_gmt":"2019-08-16T07:31:59","slug":"aws-security-issues","status":"publish","type":"post","link":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/","title":{"rendered":"Top 7 AWS Security Issues You Need to Know"},"content":{"rendered":"<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\"><a href=\"https:\/\/aws.amazon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS<\/a> is one of the frontrunners in the cloud computing industry. Businesses and users received multiple advantages from AWS. The flexibility and wide assortment of services on the AWS platform are some of them. Also, AWS provided cloud-native transparency into activities and behavior in AWS environments.<\/span><\/p>\n<p><span class=\"s1\">However, most companies are focused on learning best practices to deal with AWS security issues. Why? Because organizations have to deal with emerging complexities in data and compliance requirements at every step of their cloud journey. So, every organization has to identify the most common security issues in AWS to develop best practices.<\/span><\/p>\n<blockquote><p>Also Read: <a href=\"https:\/\/www.easydeploy.io\/blog\/aws-managed-services\/\" target=\"_blank\" rel=\"noopener noreferrer\">What are AWS Managed Services?<\/a><\/p><\/blockquote>\n<h2>Know About These 7 AWS Security Issues<\/h2>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">If you have adopted Amazon Web Services (AWS) for your business then you should be familiar with the security issues associated with AWS. So, to help you out, the following discussion outlines seven of the common AWS security issues in detail.<\/span><\/p>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">1. Neglecting the security strategy<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Many organizations are not aware of dealing with AWS security issues in the first place. This is where the concern of priority for security strategy arises! You can think that appropriate security tools and controls would be best in this case. By doing so, you are neglecting strategy. A security strategy helps in evaluating whether a particular tool suits your AWS cloud security. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Security strategy can help in dealing with AWS real-time issues! How? Your security strategy integrates into all business functions, such as operations and development. For example, you can implement security monitoring for configuration management tools used for automating software updates. The lack of a security strategy can leave you confused when you encounter security issues.<\/span><\/p>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">2. Lack of accountability<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Accountability is the next entry in the list of AWS security issues. This is a formidable element in cloud security. Why? You have to know the individual responsible for a particular security incident for implementing appropriate remedial measures. AWS security best practices directly imply collective liability for security incidents beyond the virtual machine layer. However, this does not solve the problem of accountability. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Users have to take responsibility for audit logging, access control, and monitoring. This can help in determining access privileges, management of alerts, and approaches for monitoring applications and data. So, companies could follow a proactive approach in the definition of access level and network monitoring activity. This can be a promising intervention to deal with issues in AWS security by recognizing the responsible individuals precisely.<\/span><\/p>\n<blockquote><p>To deal with AWS security issues, It is very important to build the right AWS Consulting Practice. Read our previous article on <a href=\"https:\/\/www.easydeploy.io\/blog\/build-a-successful-aws-consulting-practice\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to build a successful AWS consulting practice<\/a>\u00a0for your business.<\/p><\/blockquote>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">3. Compliance issues<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Another prominent reason for AWS real-time issues is compliance. AWS has launched resources for ensuring data privacy as a response to GDPR. However, AWS cannot deal with every compliance requirement. You can get safeguards such as encryption of PII in rest and flight states. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">However, it would not ensure continuous data monitoring to detect abnormal behavior or facility of host-level insights. On the other hand, it is difficult to find out where AWS cannot assure compliance, and you may need other solutions for compliance. Companies face the lack of patience and time to figure this out and often end up sticking to the on-premises solution. <\/span><\/p>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">4. A huge target for hackers<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">AWS security issues are also developed from its cloud-based services. Companies input substantial volumes of sensitive data such as financial reports and healthcare information to AWS. Therefore, attackers are most likely to target AWS data. One of the common ways in which AWS security incidents occur is credential theft. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Credentials can provide access to huge volumes of data by attacking a single data source. Examples of the attacks on AWS accounts of CodeSpaces and Timehop show the vulnerability of AWS cloud services to attackers. Therefore, AWS security best practices should be put in place in advance to safeguard your data and credentials. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Implementation of logging service at the host level, multifactor authentication, and monitoring anomalous logins are some of the recommended methods. Also, you can choose the AWS Secrets Manager for rotating credentials to provide a pre-emptive safeguard on your AWS data and credentials.<\/span><\/p>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">5. Failure to trust cloud security providers<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">As discussed before, AWS provides effective security tools and configurations for logging and monitoring. However, companies need to define where the responsibility of AWS ceases. So, it is important to look for cloud security providers and establish trust in their services to deal with security issues. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Companies should consult with cloud security providers regarding compliance, access to log data, and dealing with incident response. Companies should also aim at asking questions on cloud security to providers related to their industry and use cases. This can provide a definitive advantage in migrating to AWS cloud with confidence.<\/span><\/p>\n<blockquote><p>Must Read: <a href=\"https:\/\/www.easydeploy.io\/blog\/how-to-choose-best-aws-consulting-partner\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Choose the Best AWS Consulting Partner?<\/a><\/p><\/blockquote>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">6. Clouding the security visibility<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Security visibility in the cloud is also accounted for as one of the foremost AWS security issues. Companies use many cloud applications on AWS and associate various logins and controls with them. This creates confusion regarding the identity and location of individuals gaining access. As discussed before, a lack of security strategy with these applications can be highly dangerous for security visibility. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Therefore, organizations should look towards liability best practices to find out insider threats to AWS security. Also, it is essential to look into monitoring methods other than the use of logs. For example, the use of Host-based intrusion detection can work effectively for identifying the details of an attack comprehensively. <\/span><\/p>\n<h3 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">7. Data exposure in multi-tenancy environments<\/span><\/h3>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Multi-tenancy is also responsible for increasing the risks of data breaches. However, the security of infrastructure can help reduce the risk of AWS security issues. The lack of secure infrastructure is observed in cases of immature processes and untrained staff. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Similarly, companies could also face risks of data exposure to competitors with multi-tenancy. Therefore, companies should take additional precautions other than the security measures provided by AWS. Benchmarking of security maturity can be a promising method for securing your infrastructure in a multi-tenancy environment.<\/span><\/p>\n<blockquote><p>Looking for an AWS Consulting partner for your business? Check out the top 10\u00a0<a href=\"https:\/\/www.easydeploy.io\/blog\/points-to-consider-while-choosing-aws-consulting-company\/\" target=\"_blank\" rel=\"noopener noreferrer\">points you should consider while choosing an AWS Consulting Partner<\/a>.<\/p><\/blockquote>\n<h4 class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">Conclusion<\/span><\/h4>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">On a concluding note, migration to the cloud has become a mandatory requirement for companies. That is some good news as companies no longer think twice before migrating to AWS! However, as noted above, security issues are bound to pop up. Therefore, a clear understanding of the common AWS security issues presented in this discussion is mandatory. <\/span><\/p>\n<p class=\"p1\" style=\"text-align: justify;\"><span class=\"s1\">You should always focus on verification of best practices for the security of your AWS infrastructure. As we noted in the discussion, AWS provides substantial security measures for your data. All you need is take some additional precautions on your behalf!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AWS is one of the frontrunners in the cloud computing industry. Businesses and users received multiple advantages from AWS. The flexibility and wide assortment of services on the AWS platform are some of them. Also, AWS provided cloud-native transparency into activities and behavior in AWS environments. However, most companies are focused on learning best practices [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2],"tags":[110,112,111],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 7 AWS Security Issues You Need to Know | easydeploy.io<\/title>\n<meta name=\"description\" content=\"There are a number of security concerns associated with AWS. Let&#039;s have a look at the top 7 AWS security Issues you should know while using AWS platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 7 AWS Security Issues You Need to Know | easydeploy.io\" \/>\n<meta property=\"og:description\" content=\"There are a number of security concerns associated with AWS. Let&#039;s have a look at the top 7 AWS security Issues you should know while using AWS platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"easydeploy.io\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-16T07:31:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png\" \/>\n\t<meta property=\"og:image:width\" content=\"830\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Siranjeevi R\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Siranjeevi R\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\"},\"author\":{\"name\":\"Siranjeevi R\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c\"},\"headline\":\"Top 7 AWS Security Issues You Need to Know\",\"datePublished\":\"2019-08-16T07:31:59+00:00\",\"dateModified\":\"2019-08-16T07:31:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\"},\"wordCount\":1142,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png\",\"keywords\":[\"aws real time issues\",\"aws security best practices\",\"aws security issues\"],\"articleSection\":[\"Amazon Web Services\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\",\"name\":\"Top 7 AWS Security Issues You Need to Know | easydeploy.io\",\"isPartOf\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png\",\"datePublished\":\"2019-08-16T07:31:59+00:00\",\"dateModified\":\"2019-08-16T07:31:59+00:00\",\"description\":\"There are a number of security concerns associated with AWS. Let's have a look at the top 7 AWS security Issues you should know while using AWS platform.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png\",\"contentUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png\",\"width\":830,\"height\":360,\"caption\":\"Top AWS Security Issues\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.easydeploy.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 7 AWS Security Issues You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#website\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/\",\"name\":\"easydeploy.io\",\"description\":\"A Cloud Architect Company\",\"publisher\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.easydeploy.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#organization\",\"name\":\"EasyDeploy Technologies Pvt Ltd\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png\",\"contentUrl\":\"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png\",\"width\":536,\"height\":100,\"caption\":\"EasyDeploy Technologies Pvt Ltd\"},\"image\":{\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c\",\"name\":\"Siranjeevi R\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g\",\"caption\":\"Siranjeevi R\"},\"url\":\"https:\/\/www.easydeploy.io\/blog\/author\/siru\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 7 AWS Security Issues You Need to Know | easydeploy.io","description":"There are a number of security concerns associated with AWS. Let's have a look at the top 7 AWS security Issues you should know while using AWS platform.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/","og_locale":"en_GB","og_type":"article","og_title":"Top 7 AWS Security Issues You Need to Know | easydeploy.io","og_description":"There are a number of security concerns associated with AWS. Let's have a look at the top 7 AWS security Issues you should know while using AWS platform.","og_url":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/","og_site_name":"easydeploy.io","article_published_time":"2019-08-16T07:31:59+00:00","og_image":[{"width":830,"height":360,"url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png","type":"image\/png"}],"author":"Siranjeevi R","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Siranjeevi R","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#article","isPartOf":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/"},"author":{"name":"Siranjeevi R","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c"},"headline":"Top 7 AWS Security Issues You Need to Know","datePublished":"2019-08-16T07:31:59+00:00","dateModified":"2019-08-16T07:31:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/"},"wordCount":1142,"commentCount":0,"publisher":{"@id":"https:\/\/www.easydeploy.io\/blog\/#organization"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png","keywords":["aws real time issues","aws security best practices","aws security issues"],"articleSection":["Amazon Web Services"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/","url":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/","name":"Top 7 AWS Security Issues You Need to Know | easydeploy.io","isPartOf":{"@id":"https:\/\/www.easydeploy.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png","datePublished":"2019-08-16T07:31:59+00:00","dateModified":"2019-08-16T07:31:59+00:00","description":"There are a number of security concerns associated with AWS. Let's have a look at the top 7 AWS security Issues you should know while using AWS platform.","breadcrumb":{"@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#primaryimage","url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png","contentUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/08\/aws-security-issues.png","width":830,"height":360,"caption":"Top AWS Security Issues"},{"@type":"BreadcrumbList","@id":"https:\/\/www.easydeploy.io\/blog\/aws-security-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.easydeploy.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 7 AWS Security Issues You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/www.easydeploy.io\/blog\/#website","url":"https:\/\/www.easydeploy.io\/blog\/","name":"easydeploy.io","description":"A Cloud Architect Company","publisher":{"@id":"https:\/\/www.easydeploy.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.easydeploy.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.easydeploy.io\/blog\/#organization","name":"EasyDeploy Technologies Pvt Ltd","url":"https:\/\/www.easydeploy.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png","contentUrl":"https:\/\/www.easydeploy.io\/blog\/wp-content\/uploads\/2019\/02\/easydeploy.png","width":536,"height":100,"caption":"EasyDeploy Technologies Pvt Ltd"},"image":{"@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/0e7f79e0cd26f6446f7a76d9d2d3b20c","name":"Siranjeevi R","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.easydeploy.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/353661218917699fcc292e9bc0da9081?s=96&d=mm&r=g","caption":"Siranjeevi R"},"url":"https:\/\/www.easydeploy.io\/blog\/author\/siru\/"}]}},"_links":{"self":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/693"}],"collection":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/comments?post=693"}],"version-history":[{"count":2,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/693\/revisions"}],"predecessor-version":[{"id":695,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/posts\/693\/revisions\/695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/media\/696"}],"wp:attachment":[{"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/media?parent=693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/categories?post=693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.easydeploy.io\/blog\/wp-json\/wp\/v2\/tags?post=693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}