{"id":3492,"date":"2022-07-11T09:30:31","date_gmt":"2022-07-11T13:30:31","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=3492"},"modified":"2022-07-14T11:10:30","modified_gmt":"2022-07-14T15:10:30","slug":"what-is-cmmc-recovery-domain","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/","title":{"rendered":"What Is CMMC Recovery Domain?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-full wp-image-3494\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/data-backup-and-recovery-concept.jpg\" alt=\"data backup and recovery concept\" width=\"300\" height=\"200\" \/>The <a href=\"\/cmmc-compliance\/\" target=\"_blank\" rel=\"noopener\">cyber security model certification (CMMC)<\/a> is the Department of Defense\u2019s main mode of safeguarding the country\u2019s sensitive data. This framework provides the foundation for cybersecurity protocols and procedures that all organizations that handle this information must adhere to.<\/p>\n<p>The framework mainly helps to secure controlled unclassified information throughout the vast supply chain that is connected to the DoD.<\/p>\n<p>With this important responsibility, it is essential that the CMMC has recovery and protection protocols in place in the case that <a href=\"\/the-best-method-for-disaster-recovery\/\" target=\"_blank\" rel=\"noopener\">data becomes lost or corrupted<\/a> due to unforeseen circumstances or other potential causes. This is the main responsibility of the CMMC\u2019s recovery domain.<\/p>\n<p>It helps to ensure the safety of data backups and helps organizations understand all of the ways in which this data can be vulnerable. These recovery practices range from protecting the secondary data itself to ensuring the resilience of third-party data centers that may be used in this process as well.<\/p>\n<h2>The CMMC Recovery Domain<\/h2>\n<p>The tasks that are put forth by the <a href=\"\/7-reasons-you-need-a-cmmc-assessment\/\">CMMC help<\/a> to provide a basis for those organizations handling sensitive information to keep their processes running and their data safe. These practices help to ensure that companies can continue to fulfill their objectives and perform their tasks in the case of an accident or interruption. These protocols include frameworks for how companies can quickly <a href=\"https:\/\/www.embroker.com\/blog\/how-to-recover-from-a-cyber-attack\/\" target=\"_blank\" rel=\"noopener\">recover after a cyber attack<\/a>, disruption to service or other interruption to normal functioning and data security.<\/p>\n<p>Having a recovery plan in place is a vital step for companies that operate with sensitive data. Interruptions, connection issues, cyber-attacks and other events happen all the time, and the data these companies house is too important to not have a plan in place. This makes it essential for companies to strive to meet the requirements for the <a href=\"\/ultimate-guide-to-the-cmmc-2-0\/\" target=\"_blank\" rel=\"noopener\">CMMC 2.0<\/a> updates as well as the general practices.<\/p>\n<h2>CMMC Recovery Domain Practices<\/h2>\n<p>The main CMMC recovery practices involve maintaining backups and the continuity of sensitive data storage within in-house facilities as well as third-party providers\u2019 facilities.<\/p>\n<p>The CMMC recovery domain\u2019s main practices in this area include:<\/p>\n<h3>Routine Backups and Maintenance<\/h3>\n<p><img decoding=\"async\" class=\"alignright size-full wp-image-3496\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/network-administrator-in-data-center-room-backing-up-data.jpg\" alt=\"network administrator in data center room backing up data\" width=\"300\" height=\"200\" \/>Maintaining <a href=\"\/data-backup-types\/\" target=\"_blank\" rel=\"noopener\">backup systems<\/a> and ensuring that they are properly set up and ready to be switched on in the event of an accident is crucial for the success of these protocols. In order to ensure that data is never lost in the case of an emergency, there is a specific timeline that must be followed and ready to be utilized in these cases.<\/p>\n<p>The proper backup schedule for your information systems depends on the unique nature of your infrastructure. These backup protocols are often required to be both prepared and regularly tested to confirm validity. This helps to ensure that these backup protocols are reliable and ready to go.<\/p>\n<h3>Protect Confidentiality of the Backup Storage Devices<\/h3>\n<p>The <a href=\"\/data-backup\/\" target=\"_blank\" rel=\"noopener\">data that is backed up<\/a> in these separate locations in order to ensure continuity is equally sensitive and requires security as well. These extra stores of data are favorite targets of cyber criminals due to their assumption that it will be less guarded.<\/p>\n<p>This makes it important for organizations and <a href=\"\/what-to-expect-during-cybersecurity-consulting-services\/\" target=\"_blank\" rel=\"noopener\">cybersecurity operators<\/a> to treat backup CUI as if it were the main data. Access to these stores of data should be given on a needed basis and kept to a very minimal group of administrators.<\/p>\n<p><a href=\"https:\/\/www.techtarget.com\/searchdatabackup\/definition\/cloud-backup\" target=\"_blank\" rel=\"noopener\">Cloud backup systems<\/a>, file transfer protocol services and network-attached storage devices are the most common tools used for these purposes. Most of these tools have rigorous security protocols attached, or the capability to apply your own organizational security to them. Lastly, it is also important to keep physical security in place in these facilities and monitor all access to the location of storage.<\/p>\n<h3>Ensure Safety of Data Processing Facilities<\/h3>\n<p><img decoding=\"async\" class=\"alignright size-full wp-image-3495\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2022\/07\/server-room-with-data-facility.jpg\" alt=\"server room with data facility\" width=\"300\" height=\"200\" \/>Most recovery protocols associated with CMMC-related data involve some sort of processing center or payment center that manages financial transactions. These partner data storage facilities should be equally scrutinized in order to ensure that they have, at a minimum, equal standards to your own facilities.<\/p>\n<p>There are NIST guidelines in place (<a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-63\/3\/final\" target=\"_blank\" rel=\"noopener\">NIST SP-800-63-3<\/a>) that address identity proofing and identity security guidelines that can be helpful when completing this step of the review process.<\/p>\n<h2>Ensure Compliance with CMMC Recovery Protocols<\/h2>\n<p>Protecting the data associated with your recovery protocols is just as important as protecting the original source of data. This is why the <a href=\"\/the-importance-of-cmmc-and-its-impact\/\" target=\"_blank\" rel=\"noopener\">CMMC places the utmost importance<\/a> on ensuring that relevant organizations are able to properly enact protocols that protect backup data and facilities properly.<\/p>\n<p>For more information on how to develop your unique recovery protocols or to determine the most efficient route of action for your organization, <a href=\"\/contact\/\" rel=\"noopener\">contact our team<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The cyber security model certification (CMMC) is the Department of Defense\u2019s main mode of safeguarding the country\u2019s sensitive data. This framework provides the foundation for cybersecurity protocols and procedures that all organizations that handle this information must adhere to. The framework mainly helps to secure controlled unclassified information throughout the vast supply chain that is [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":3493,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[61],"tags":[],"content_types":[63],"class_list":{"0":"post-3492","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cmmc","8":"content_types-article","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is CMMC Recovery Domain?<\/title>\n<meta name=\"description\" content=\"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is CMMC Recovery Domain?\" \/>\n<meta property=\"og:description\" content=\"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-11T13:30:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-14T15:10:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"What Is CMMC Recovery Domain?\",\"datePublished\":\"2022-07-11T13:30:31+00:00\",\"dateModified\":\"2022-07-14T15:10:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/\"},\"wordCount\":780,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/backup-storage-data-internet-technology-business-concept.jpg\",\"articleSection\":[\"CMMC\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/\",\"name\":\"What Is CMMC Recovery Domain?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/backup-storage-data-internet-technology-business-concept.jpg\",\"datePublished\":\"2022-07-11T13:30:31+00:00\",\"dateModified\":\"2022-07-14T15:10:30+00:00\",\"description\":\"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/backup-storage-data-internet-technology-business-concept.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/backup-storage-data-internet-technology-business-concept.jpg\",\"width\":1600,\"height\":800,\"caption\":\"backup storage data internet technology business concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-is-cmmc-recovery-domain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is CMMC Recovery Domain?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is CMMC Recovery Domain?","description":"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/","og_locale":"en_US","og_type":"article","og_title":"What Is CMMC Recovery Domain?","og_description":"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.","og_url":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/","og_site_name":"SeaGlass Technology","article_published_time":"2022-07-11T13:30:31+00:00","article_modified_time":"2022-07-14T15:10:30+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"What Is CMMC Recovery Domain?","datePublished":"2022-07-11T13:30:31+00:00","dateModified":"2022-07-14T15:10:30+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/"},"wordCount":780,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","articleSection":["CMMC"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/","url":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/","name":"What Is CMMC Recovery Domain?","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","datePublished":"2022-07-11T13:30:31+00:00","dateModified":"2022-07-14T15:10:30+00:00","description":"The main CMMC recovery domain practices involve maintaining backups and the continuity of sensitive data storage within facilities.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","width":1600,"height":800,"caption":"backup storage data internet technology business concept"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/what-is-cmmc-recovery-domain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"What Is CMMC Recovery Domain?"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/07\/backup-storage-data-internet-technology-business-concept.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=3492"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/3492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/3493"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=3492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=3492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=3492"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=3492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}