{"id":3348,"date":"2022-04-11T09:30:40","date_gmt":"2022-04-11T13:30:40","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=3348"},"modified":"2022-03-24T09:49:23","modified_gmt":"2022-03-24T13:49:23","slug":"how-to-be-cmmc-compliance-ready","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/","title":{"rendered":"How To Be CMMC Compliance Ready"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-3349\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/03\/handshake-of-two-businesswomen-who-enters-into-the-contract-to-protect-cyber-security.jpg\" alt=\"handshake of two businesswomen who enters into the contract to protect cyber security\" width=\"300\" height=\"200\" \/>Over the last several years, the U.S. Department of Defense (DoD) has been working to develop the <a href=\"\/cmmc-compliance\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Maturity Model Certification (CMMC)<\/a> to standardize cybersecurity preparedness for more than 300,000 contractors across the defense industrial base (DIB). The CMMC will soon become a requirement for any defense contractor or other vendor that is working with or wishes to work with the DoD.<\/p>\n<p>The main goal of the CMMC is to safeguard <a href=\"https:\/\/www.dcsa.mil\/mc\/ctp\/cui\/\" target=\"_blank\" rel=\"noopener\">Controlled Unclassified Information (CUI)<\/a> in the DoD supply chain. CUI refers to any data or information that is created or stored by the government or another entity on behalf of the government. The CMMC framework incorporates many practices, processes, and approaches to standardize the assessment of a defense contractor\u2019s capabilities.<\/p>\n<p>Meeting CMMC compliance requires DoD contractors to go through several essential steps. Here is a look at recommended practices to become CMMC compliant.<\/p>\n<h2>1. Identify The CUI Environment<\/h2>\n<p>To become CMMC compliant, a contractor must first identify the CUI environment specific to the contract. This is where CUI is processed, transmitted, and stored. The CUI environment defines the systems, processes, and services in scope for <a href=\"https:\/\/www.nist.gov\/blogs\/manufacturing-innovation-blog\/what-nist-sp-800-171-and-who-needs-follow-it-0\" target=\"_blank\" rel=\"noopener\">NIST 800-171<\/a>. Each business is unique; therefore, CUI is generally defined by the U.S. Government\u2019s contracting official for the prime contractor. A prime contractor is required to identify CUI in all contracts to subcontractors.<\/p>\n<h2>2. Determine What Controls Are Applicable<\/h2>\n<p>Businesses will need to determine what services, systems, and processes are needed to comply with NIST 800-171. There are a total of 62 Non-Federal Organization (NFO) and 110 CUI controls, but not all may apply to every CUI environment. When dealing with simple or flat networks, all controls may be applicable across the organization. In segmented CUI environments, most controls may apply to subnetworks.<\/p>\n<h2>3. Create Standards, Policies, And Procedures<\/h2>\n<p><img decoding=\"async\" class=\"alignright size-full wp-image-3350\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/03\/digital-lock-with-city-background.jpg\" alt=\"digital lock with city background\" width=\"300\" height=\"200\" \/>The next step to <a href=\"\/who-needs-to-comply-with-cmmc\/\" target=\"_blank\" rel=\"noopener\">becoming CMMC compliance-ready<\/a> involves developing standards, policies, and procedures to address applicable cybersecurity compliance requirements. Consider all applicable regulations, laws, and contracts that the business must comply with, including domestic and international cybersecurity laws. Also, determine if there are any industry-specific regulations, privacy laws, or contract requirements from partners that require compliance. Contractors must perform due diligence to ensure that they have the proper documentation to prove compliance.<\/p>\n<h2>4. Implement NIST 800-171 Controls<\/h2>\n<p>In this step, the processes and technology come together to create an operational <a href=\"\/what-to-expect-during-cybersecurity-consulting-services\/\" target=\"_blank\" rel=\"noopener\">cybersecurity program<\/a>. Organizations must address and implement NIST 800-171 controls to put the developed standards and policies to use. The parties responsible for certain CUI controls will need to be identified and the roles and responsibilities of these individuals or teams must be defined. This helps guarantee that no aspects of the implementation are overlooked or performed inaccurately due to misunderstandings.<\/p>\n<h2>5. Document and Assess The CUI Environment<\/h2>\n<p>Next, defense contractors should document the CUI environment and assess its controls and potential deficiencies. Now, organizations can develop a Plan of Actions &amp; Milestones (POA&amp;M) and a <a href=\"https:\/\/www.pivotpointsecurity.com\/ssp-for-cmmc-compliance\/#:~:text=A%20system%20security%20plan%20(SSP)%20is%20a%20document%20that%20outlines,guidelines%20that%20the%20organization%20follows.\" target=\"_blank\" rel=\"noopener\">System Security Plan (SSP)<\/a>. Over time, these \u201cliving documents\u201d will continue to receive changes and updates that may impact the CUI environment.<\/p>\n<h2>6. Manage Risk Across Business And Technology Processes<\/h2>\n<p>In this next step, contractors can use the controls to assess their risk across business and technology processes. Risk models may include a variety of options, such as NIST 800-37, ISO 31010, FAIR and OCTAVE. There is no perfect risk methodology but businesses can choose a methodology that best supports how the company functions. The goal for any organization should be to reach a comfortable level of risk.<\/p>\n<h2>7. Gather Metrics To Find Areas Of Improvement<\/h2>\n<p>The final step in <a href=\"\/8-cmmc-compliance-faqs\/\" target=\"_blank\" rel=\"noopener\">becoming CMMC compliance<\/a> ready involves gathering metrics. Metrics can be useful to give businesses a general idea of the performance of controls. In the long-term, metrics can be used to perform a trend analysis that business leaders can leverage to identify areas of improvement. Gaining insights into controls can be accomplished in a variety of ways, such as by defining Key Risk Indicators (KRIs) or Key Performance Indicators (KPIs).<\/p>\n<h2>Importance Of Becoming CMMC Compliant<\/h2>\n<p><img decoding=\"async\" class=\"alignright wp-image-3207 size-full\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/12\/an-employee-unlocking-different-levels-of-security.jpg\" alt=\"an employee unlocking different levels of security for cmmc compliance\" width=\"300\" height=\"200\" \/>By 2025, all DoD contractors will need to meet CMMC requirements. Contractors that currently work with the DoD or wish to start working with the DoD will need to get started on their <a href=\"\/5-steps-to-obtain-a-cmmc-certification\/\" target=\"_blank\" rel=\"noopener\">CMMC certification<\/a>.<\/p>\n<p>Companies that undergo the certification can attain other key benefits, such as enhanced protection of CUI and intellectual property (IP) within the DIB. <a href=\"\/how-do-i-know-if-my-organization-needs-cmmc-certification\/\" target=\"_blank\" rel=\"noopener\">Becoming CMMC certified<\/a> also results in a risk reduction against harmful cyber threats. It is also a cost-effective way for small businesses to implement lower <a href=\"\/the-5-levels-of-cmmc-explained\/\" target=\"_blank\" rel=\"noopener\">CMMC levels<\/a>.<\/p>\n<h2>Schedule a Consultation to Learn More<\/h2>\n<p>Vulnerabilities within business systems have contributed to some of the most publicized corporate breaches in history. The release of the CMMC has helped countless businesses start the journey of achieving a high level of protection against cybercrimes. For more information about how to become CMMC compliance-ready, <a href=\"\/contact\/\" target=\"_blank\" rel=\"noopener\">contact SeaGlass Technology<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last several years, the U.S. Department of Defense (DoD) has been working to develop the Cybersecurity Maturity Model Certification (CMMC) to standardize cybersecurity preparedness for more than 300,000 contractors across the defense industrial base (DIB). The CMMC will soon become a requirement for any defense contractor or other vendor that is working with [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3351,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[61],"tags":[],"content_types":[],"class_list":{"0":"post-3348","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cmmc","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Be CMMC Compliance Ready<\/title>\n<meta name=\"description\" content=\"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Be CMMC Compliance Ready\" \/>\n<meta property=\"og:description\" content=\"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-11T13:30:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"How To Be CMMC Compliance Ready\",\"datePublished\":\"2022-04-11T13:30:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/\"},\"wordCount\":806,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/user-privacy-security-and-encryption.jpg\",\"articleSection\":[\"CMMC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/\",\"name\":\"How To Be CMMC Compliance Ready\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/user-privacy-security-and-encryption.jpg\",\"datePublished\":\"2022-04-11T13:30:40+00:00\",\"description\":\"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/user-privacy-security-and-encryption.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/user-privacy-security-and-encryption.jpg\",\"width\":1600,\"height\":800,\"caption\":\"user privacy security and encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-to-be-cmmc-compliance-ready\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Be CMMC Compliance Ready\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Be CMMC Compliance Ready","description":"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/","og_locale":"en_US","og_type":"article","og_title":"How To Be CMMC Compliance Ready","og_description":"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.","og_url":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/","og_site_name":"SeaGlass Technology","article_published_time":"2022-04-11T13:30:40+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"How To Be CMMC Compliance Ready","datePublished":"2022-04-11T13:30:40+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/"},"wordCount":806,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","articleSection":["CMMC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/","url":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/","name":"How To Be CMMC Compliance Ready","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","datePublished":"2022-04-11T13:30:40+00:00","description":"The DoD has been working on the CMMC assessment to standardize cybersecurity preparedness. Discover how to prepare for CMMC compliance.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","width":1600,"height":800,"caption":"user privacy security and encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/how-to-be-cmmc-compliance-ready\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"How To Be CMMC Compliance Ready"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/03\/user-privacy-security-and-encryption.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=3348"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3348\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/3351"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=3348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=3348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=3348"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=3348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}