{"id":3214,"date":"2021-12-27T09:30:13","date_gmt":"2021-12-27T14:30:13","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=3214"},"modified":"2021-12-09T12:58:19","modified_gmt":"2021-12-09T17:58:19","slug":"how-to-identify-your-target-cmmc-level","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/","title":{"rendered":"How To Identify Your Target CMMC Level"},"content":{"rendered":"<p>The <a href=\"\/cmmc-compliance\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Maturity Model Certification (CMMC)<\/a> is a framework developed by the U.S. Department of Defense (DoD) to implement cybersecurity practices and policies for contractors throughout the Defense Industrial Base (DIB).<br \/>\nThe loss of Controlled Unclassified Information (CUI) from the DIB has resulted in an increased risk to national security and the economy. To reduce this risk, the DoD has taken the necessary steps to enhance the protection of CUI by requiring federal contractors to meet the appropriate levels of <a href=\"\/it-security\/\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> processes and practices as outlined in the CMMC model.<br \/>\n<img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-3219\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/two-cyber-security-employees-identifying-what-CMMC-level-they-need-.jpg\" alt=\"two cyber security employees identifying what CMMC level they need \" width=\"300\" height=\"200\" \/><br \/>\n<a href=\"\/how-does-cmmc-certification-work\/\" target=\"_blank\" rel=\"noopener\">Requirements of CMMC certification<\/a> are dependent on each level of certification. Each level adds upon the requirements of the level before it, meaning contractors with a Level 3 target are also required to meet the requirements of Levels 1 and 2. Across all five levels of CMMC, certification requirements include a total of 43 capabilities that span 17 domains, five processes that measure process maturity, and 171 practices used to detect technical capacity.<br \/>\nTo identify what CMMC level a particular defense contractor must meet, it is important to fully understand all five levels and what type of information the organization manages. Learn more about these five levels and how to become CMMC compliant.<\/p>\n<h2>CMMC Certification Levels<\/h2>\n<p>CMMC levels range from Level 1, the lowest level, to Level 5, the highest and more advanced level. Here is a more in-depth look at these levels and what they entail.<\/p>\n<h3>Level 1<\/h3>\n<p>CMMC Level 1 requires defense contractors to apply basic cyber hygiene which requires them to meet basic safeguarding requirements found in 48 CFR 52.204-21. This level establishes a foundation for the higher levels of the framework and is required to be completed by all certified companies. Level 1 focuses on the protection of federal contract information (FCI), although process maturity is not accessed for this level.<br \/>\n<img decoding=\"async\" class=\"alignright size-full wp-image-3220\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/a-women-wokring-on-getting-cmmc-certification-.jpg\" alt=\"a women wokring on getting cmmc certification \" width=\"300\" height=\"200\" \/><\/p>\n<h3>Level 2<\/h3>\n<p>Level 2 of CMMC requires contractors to meet intermediate cyber hygiene. This transitional level consists of a more advanced set of practices that allow businesses to better protect their assets against cybersecurity threats. This level contains a subset of requirements specified in NIST SP 800-171, as well as other practices from references and standards. At CMMC Level 2, businesses are expected to create and document standard operating policies, procedures, and plans for the implementation of an effective cybersecurity program.<\/p>\n<h3>Level 3<\/h3>\n<p>Contractors that have met Level 3 CMMC compliance have demonstrated good cyber hygiene and a basic ability to protect and manage a business\u2019s CUI and assets. However, organizations at this level may still encounter some problems defending against advanced persistent threats (APTs). Level 3 focuses on the security requirements found in NIST SP 800-171, in addition to 20 other practices that help mitigate threats.<\/p>\n<h3>Level 4<\/h3>\n<p>Level 4 requires an organization to have a proactive and substantial cybersecurity program in place. This level focuses on the protection of CUI from APTs and includes a subset of security requirements from NIST SP 800-171B, as well as other cybersecurity best practices. CMMC Level 4 practices enhance the identification and response of a contractor to respond and adapt to various techniques and tactics leveraged by APTs.<\/p>\n<h3>Level 5<\/h3>\n<p>Once an organization has reached CMMC Level 5, it has achieved the creation of an advanced or progressive cybersecurity program that has successfully demonstrated the ability to block advanced persistent threats. The extra practices found at this level are designed to improve the sophistication and depth of an organization\u2019s cybersecurity capabilities.<\/p>\n<h2>Determining What CMMC Level To Comply With<\/h2>\n<p><img decoding=\"async\" class=\"alignright size-full wp-image-3218\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/a-group-of-cyber-security-employees-in-a-meeting.jpg\" alt=\"a group of cyber security employees in a meeting\" width=\"300\" height=\"200\" \/><br \/>\nDefense contractors are only required to comply with CMMC requirements that are necessary to protect the type of information that they are responsible for handling. Contractors who fall at the bottom of the supply chain will likely be required to certify at Level 1, while contractors that have access to sensitive military base construction projects may be required to certify at Levels 4 or 5.<br \/>\nTo determine what level a <a href=\"https:\/\/aida.mitre.org\/demystifying-dod\/understanding-dod-contracting\/\" target=\"_blank\" rel=\"noopener\">DoD contractor<\/a> must work towards achieving, start by inventorying all systems to determine where CUI and FCI data is stored and how it is managed. Conduct a readiness assessment to further determine how this data is accessed and controlled. Finally, a gap analysis can help organizations <a href=\"\/how-to-increase-your-cmmc-level\/\" target=\"_blank\" rel=\"noopener\">identify what requirements need to be met to achieve compliance<\/a> with their target CMMC level.<\/p>\n<p>Unless a contractor is at the bottom of the supply chain, they can assume that they will need to meet at least Level 3 compliance. Consider if the organization receives, creates, or processes CUI, which typically means they need to meet Level 3 or above. Contractors that handle high-value assets (HVA) may need to meet Levels 4 or 5.<\/p>\n<h2>Contact SeaGlass Technology<\/h2>\n<p>Determining how to identify your target CMMC level and become CMMC compliant can be challenging. To learn more about CMMC compliance, <a href=\"\/contact\/\">reach out to SeaGlass Technology for expert NYC managed IT services. <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cybersecurity Maturity Model Certification (CMMC) is a framework developed by the U.S. Department of Defense (DoD) to implement cybersecurity practices and policies for contractors throughout the Defense Industrial Base (DIB). The loss of Controlled Unclassified Information (CUI) from the DIB has resulted in an increased risk to national security and the economy. To reduce [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3217,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[61],"tags":[],"content_types":[],"class_list":{"0":"post-3214","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cmmc","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Identify Your Target CMMC Level - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Identify Your Target CMMC Level - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-27T14:30:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"How To Identify Your Target CMMC Level\",\"datePublished\":\"2021-12-27T14:30:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/visual-concept-of-cyber-security-network.jpg\",\"articleSection\":[\"CMMC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/\",\"name\":\"How To Identify Your Target CMMC Level - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/visual-concept-of-cyber-security-network.jpg\",\"datePublished\":\"2021-12-27T14:30:13+00:00\",\"description\":\"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/visual-concept-of-cyber-security-network.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/visual-concept-of-cyber-security-network.jpg\",\"width\":1600,\"height\":800,\"caption\":\"visual concept of cyber security network\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-identify-your-target-cmmc-level\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Identify Your Target CMMC Level\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Identify Your Target CMMC Level - SeaGlass Technology","description":"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/","og_locale":"en_US","og_type":"article","og_title":"How To Identify Your Target CMMC Level - SeaGlass Technology","og_description":"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.","og_url":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/","og_site_name":"SeaGlass Technology","article_published_time":"2021-12-27T14:30:13+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"How To Identify Your Target CMMC Level","datePublished":"2021-12-27T14:30:13+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/"},"wordCount":786,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","articleSection":["CMMC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/","url":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/","name":"How To Identify Your Target CMMC Level - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","datePublished":"2021-12-27T14:30:13+00:00","description":"The CMMC was developed to implement cybersecurity to government contractors. Find out what CMMC level your organization needs.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","width":1600,"height":800,"caption":"visual concept of cyber security network"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/how-to-identify-your-target-cmmc-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"How To Identify Your Target CMMC Level"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/12\/visual-concept-of-cyber-security-network.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=3214"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/3217"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=3214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=3214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=3214"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=3214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}