{"id":837,"date":"2024-02-06T19:01:28","date_gmt":"2024-02-06T13:31:28","guid":{"rendered":"http:\/\/localhost:3002\/?p=837"},"modified":"2025-11-12T12:07:55","modified_gmt":"2025-11-12T06:37:55","slug":"cnapp-one-platform-to-secure-your-cloud-native-apps","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps","title":{"rendered":"CNAPP &#8211; One Platform To Secure Your Cloud Native Apps"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"what_is_cnapp\"><\/span>What is CNAPP?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The Cloud Native Application Protection Platform (CNAPP) is a security service designed to work seamlessly with both dynamic and public cloud environments, making it a cloud-native application.<\/p>\n\n\n\n<p>It integrates different security features like Cloud Security Posture Management (CSPM), Cloud Infrastructure Entitlement Management (CIEM), Identity and Access Management (IAM), and Cloud Workload Protection Platforms (CWPP).<\/p>\n\n\n\n<p>In turn, CNAPP allows the security teams and developers to work together, and it involves security at the early stages of application development. CNAPP is a transition to a platform that includes both cloud application security and traditionally distinct security capabilities. Therefore, this method improves visibility, eases tracking, and enhances security in the entire process of cloud application lifecycle.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"features_and_capabilities_of_cnapps\"><\/span>Features and Capabilities of CNAPPs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>CNAPPs offer a unified approach to cloud-native application security, merging several pivotal features:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cloud Security Posture Management (CSPM)<\/strong> improves monitoring of configuration in the clouds so that they comply with the best practices and industry standards, reducing vulnerabilities.<\/li>\n\n\n\n<li><strong>Infrastructure-as-Code (IaC)<\/strong> scanning proactively detects and fixes insecure infrastructure configurations before deployment to enhance the security of cloud deployment.<\/li>\n\n\n\n<li><strong>Cloud Workload Protection Platform (CWPP)<\/strong> is a system that secures workloads at runtime within VMs, containers, and serverless functions by identifying and protecting them.<\/li>\n\n\n\n<li><strong>Cloud Infrastructure Entitlement Management (CIEM)<\/strong> is a management that streamlines and secures access controls to avoid unauthorised access by ensuring strict management of permissions.<\/li>\n\n\n\n<li><strong>CNAPPs<\/strong> are based on the <strong>Graph Database Technology<\/strong>, which maps the complex relationship between the cloud application. Allowing one to grasp the architectural weaknesses and security of data flow.<\/li>\n\n\n\n<li><strong>Multipipeline DevOps Security<\/strong> is also a seamless part of the development cycles to be able to identify early the misconfigurations and vulnerabilities that will keep the cloud innovation pace without disrupting the security.<\/li>\n<\/ul>\n\n\n\n<p>All these capabilities can help CNAPPs provide a comprehensive security posture for cloud-native applications. They provide this comprehensive security stance during development, deployment, and operations. Therefore, solving the specific issues of the contemporary cloud settings is necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"why_cnapp_is_important_for_security_leaders\"><\/span>Why CNAPP is important for Security Leaders<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>CNAPP plays a critical role in the hands of security leaders because of the way it addresses the security of cloud-native applications. It consolidates several security capabilities into a single framework, adding value to the overall security posture. On CNAPP, security leaders can obtain:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Proactive Security<\/strong>: CNAPP allows identifying and preventing threats at an early stage of the development life cycle to minimize the attack surface and protect applications earlier.<\/li>\n\n\n\n<li><strong>Real-time Visibility<\/strong> <strong>and Control<\/strong>: It offers granular views of cloud-native environments, enabling quick detection and reaction to anomalies, hence keeping a stricter rein on security.<\/li>\n\n\n\n<li><strong>Enhanced Threat Detection<\/strong>: Ongoing surveillance and threat intelligence capacities of CNAPP are useful in the detection and response to threats in real-time, which is vital in averting breaches.<\/li>\n\n\n\n<li><strong>Compliance Assurance<\/strong>: CNAPP assists in complying with the regulations and makes it easier to comply with its built-in control and reporting systems.<\/li>\n\n\n\n<li><strong>Streamlined Security Operations<\/strong>: It simplifies and increases the effectiveness of teamwork and results in more effective security operations. This process is in line with the DevOps accelerating nature, and security is distributed efficiently among teams.<\/li>\n<\/ul>\n\n\n\n<p>Besides this, CNAPP comes out as a security leader&#8217;s strategic tool in the dynamic environment of cloud-native applications. It provides a complete security system that is not only preventative but also dynamic to the dynamism of cloud environments. <\/p>\n\n\n\n<p>CNAPP allows better visibility, simplifies compliance, and strengthens threat detection and responses by merging multiple security practices into an integrated platform. To security leaders, it represents a change in which cloud security management is more efficient, proactive, and comprehensive both in relation to business operations and in business strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"legacy_cloud_security_gaps_tackled_by_cnapps\"><\/span>Legacy Cloud Security Gaps Tackled by CNAPPs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cloud Native Application Protection Platforms (CNAPPs) emerge as a comprehensive solution designed to tackle the complexities of modern cloud environments. In contrast to legacy cloud security tools, they close the gaps that were created by them.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"secure_software_development_integration\"><\/span>Secure Software Development Integration<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>CNAPP facilitates the integration of security practices into the software development lifecycle, particularly within CI\/CD pipelines, to prevent insecure code and configurations from being deployed, addressing the gap between rapid development and security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"access_management_and_control\"><\/span>Access Management and Control<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It addresses complexities in managing access rights and entitlements in cloud environments, ensuring that the principle of least privilege is applied effectively to reduce the risk of unauthorized access and potential data breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"fragmented_security_solutions\"><\/span>Fragmented Security Solutions<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>CNAPP addresses the inefficiency and risk of using multiple, uncoordinated security tools by providing a unified platform. This consolidation enhances security posture management across diverse cloud environments.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"visibility_and_compliance\"><\/span>Visibility and Compliance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>It solves visibility issues by offering comprehensive insights into cloud infrastructure and applications, which is crucial for detecting vulnerabilities early and maintaining compliance with evolving regulatory standards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"threat_detection_and_response\"><\/span>Threat Detection and Response<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>CNAPP leverages advanced analytics and real-time monitoring to significantly improve the speed and effectiveness of threat detection and response, ensuring that threats are identified and mitigated swiftly to protect cloud-native applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"implementation_checklist_for_cnapp\"><\/span>Implementation Checklist for CNAPP<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>If you are considering deploying a CNAPP, firstly create a strategy for choosing a vendor and integrating your CNAPP with your organization\u2019s systems. As you develop this strategy, incorporate these fundamentals into your plan:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Choose a mature solution<\/strong>. Select a provider that is committed to remaining at the leading edge of multicloud security. Your CNAPP will need to evolve in sophistication as cyberthreats do. Equally important is having a vendor that can support you through the implementation process.<\/li>\n\n\n\n<li><strong>Prioritize comprehensiveness.<\/strong> Finding the most holistic solution now, you will ensure that you get the most value out of the shift to a CNAPP in the long term.<\/li>\n\n\n\n<li><strong>Address alert fatigue. <\/strong>A comprehensive solution with the most optimized prioritization of threats and alerts for instance, from a vendor that is also a cloud provider will ease the burden on your security team.<\/li>\n\n\n\n<li><strong>Cover all your environments and artifact types<\/strong>. Make sure that the CNAPP you choose can integrate security functions across the on-premises, private cloud, and public cloud resources you use and all the different types of artifacts you need to protect\u2014otherwise it won\u2019t reduce complexity in the way a CNAPP is intended to.<\/li>\n\n\n\n<li><strong>Shift to a development, security, and operations (DevSecOps) culture<\/strong>. Transition your application development lifecycle from a DevOps model to a DevSecOps model\u2014one in which fortifying security is a continuous part of the process rather than an afterthought. Plan for any necessary shifts in responsibilities and workflows that are likely to take place once your CNAPP is deployed.<\/li>\n\n\n\n<li><strong>Factor in change management<\/strong>. A consolidated solution will take time to deploy and both security teams and developers will need to become familiar with the CNAPP\u2019s features. Above all, plan ahead so you can minimize disruptions to your operations.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What is CNAPP? The Cloud Native Application Protection Platform (CNAPP) is a security service designed to work seamlessly with both dynamic and public cloud environments, making it a cloud-native application. It integrates different security features like Cloud Security Posture Management (CSPM), Cloud Infrastructure Entitlement Management (CIEM), Identity and Access Management (IAM), and Cloud Workload Protection [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1666,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[170,146],"tags":[],"class_list":["post-837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-native-application-protection-platform-cnapp","category-cloud-security-services"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CNAPP - One Platform To Secure Your Cloud Native Apps<\/title>\n<meta name=\"description\" content=\"CNAPP encompasses various security aspects like security posture management, identity and access management, and cloud workload protection.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CNAPP - One Platform To Secure Your Cloud Native Apps\" \/>\n<meta property=\"og:description\" content=\"CNAPP encompasses various security aspects like security posture management, identity and access management, and cloud workload protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey US Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-06T13:31:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T06:37:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ayush Arora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ayush Arora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CNAPP - One Platform To Secure Your Cloud Native Apps","description":"CNAPP encompasses various security aspects like security posture management, identity and access management, and cloud workload protection.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"CNAPP - One Platform To Secure Your Cloud Native Apps","og_description":"CNAPP encompasses various security aspects like security posture management, identity and access management, and cloud workload protection.","og_url":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps","og_site_name":"Techjockey US Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2024-02-06T13:31:28+00:00","article_modified_time":"2025-11-12T06:37:55+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg","type":"image\/jpeg"}],"author":"Ayush Arora","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Ayush Arora","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps"},"author":{"name":"Ayush Arora","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/ae2ffd87c86168e785d9fb384ec986ad"},"headline":"CNAPP &#8211; One Platform To Secure Your Cloud Native Apps","datePublished":"2024-02-06T13:31:28+00:00","dateModified":"2025-11-12T06:37:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps"},"wordCount":1120,"commentCount":0,"publisher":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg","articleSection":["Cloud Native Application Protection Platform (CNAPP)","Cloud Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps","url":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps","name":"CNAPP - One Platform To Secure Your Cloud Native Apps","isPartOf":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg","datePublished":"2024-02-06T13:31:28+00:00","dateModified":"2025-11-12T06:37:55+00:00","description":"CNAPP encompasses various security aspects like security posture management, identity and access management, and cloud workload protection.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#primaryimage","url":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg","contentUrl":"https:\/\/cdn.techjockey.com\/us\/blog\/wp-content\/uploads\/2024\/02\/12120722\/CNAPP-%E2%80%93-One-Platform-To-Secure-Your-Cloud-Native-Apps.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/us\/blog\/cnapp-one-platform-to-secure-your-cloud-native-apps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/us\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Security","item":"https:\/\/www.techjockey.com\/us\/blog\/category\/cloud-security-services"},{"@type":"ListItem","position":3,"name":"Cloud Native Application Protection Platform (CNAPP)","item":"https:\/\/www.techjockey.com\/us\/blog\/category\/cloud-native-application-protection-platform-cnapp"},{"@type":"ListItem","position":4,"name":"CNAPP &#8211; One Platform To Secure Your Cloud Native Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/us\/blog\/#website","url":"https:\/\/www.techjockey.com\/us\/blog\/","name":"Techjockey US Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/us\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.techjockey.com\/us\/blog\/wp-content\/uploads\/2025\/07\/cropped-favicon.png","contentUrl":"https:\/\/www.techjockey.com\/us\/blog\/wp-content\/uploads\/2025\/07\/cropped-favicon.png","width":512,"height":512,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/x.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/ae2ffd87c86168e785d9fb384ec986ad","name":"Ayush Arora","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/us\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d45bdae289582f15bf40c905233848a8b6b2a5280a8a4e4b96540526e480e060?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d45bdae289582f15bf40c905233848a8b6b2a5280a8a4e4b96540526e480e060?s=96&d=mm&r=g","caption":"Ayush Arora"},"description":"Ayush Arora is a highly motivated and results-oriented Product Management professional with a passion for learning and solving complex problems. He has extensive experience in the SaaS and Enterprise Technology industries, where he has successfully led projects to improve customer engagement and streamline the discovery and buying process. He is also skilled in using customer engagement platforms and analytics platforms to gather and analyze data to drive informed decision-making.","sameAs":["https:\/\/www.linkedin.com\/in\/ayush-arora-4a13b5201\/"],"url":"https:\/\/www.techjockey.com\/us\/blog\/author\/ayush"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/comments?post=837"}],"version-history":[{"count":6,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions"}],"predecessor-version":[{"id":1533,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/posts\/837\/revisions\/1533"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/media\/1666"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/media?parent=837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/categories?post=837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/us\/blog\/wp-json\/wp\/v2\/tags?post=837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}