{"id":21,"date":"2025-06-24T08:35:26","date_gmt":"2025-06-24T08:35:26","guid":{"rendered":"https:\/\/tham098.thamtuuytin.org\/?p=21"},"modified":"2025-06-24T08:35:26","modified_gmt":"2025-06-24T08:35:26","slug":"cloud-workload-protection-platform-cwpp-securing-the-clouds-core-in-2025","status":"publish","type":"post","link":"https:\/\/tham098.thamtuuytin.org\/?p=21","title":{"rendered":"Cloud Workload Protection Platform (CWPP): Securing the Cloud\u2019s Core in 2025"},"content":{"rendered":"<p data-start=\"408\" data-end=\"457\">Cloud is no longer the future \u2014 it\u2019s the present.<\/p>\n<p data-start=\"459\" data-end=\"580\">From virtual machines to containers to serverless functions, workloads in the cloud are the backbone of digital business.<\/p>\n<p data-start=\"582\" data-end=\"716\">But with this power comes a new security challenge: <strong data-start=\"634\" data-end=\"715\">how do you protect dynamic, ephemeral, and highly distributed cloud workloads<\/strong>?<\/p>\n<p data-start=\"718\" data-end=\"785\">The answer lies in <strong data-start=\"737\" data-end=\"784\">Cloud Workload Protection Platforms (CWPPs)<\/strong>.<\/p>\n<hr data-start=\"787\" data-end=\"790\" \/>\n<h2 data-start=\"792\" data-end=\"847\">What Is a Cloud Workload Protection Platform (CWPP)?<\/h2>\n<p data-start=\"849\" data-end=\"1003\">A <strong data-start=\"851\" data-end=\"859\">CWPP<\/strong> is a security solution designed to <strong data-start=\"895\" data-end=\"1002\">detect, monitor, and protect workloads running in public, private, hybrid, and multi-cloud environments<\/strong>.<\/p>\n<p data-start=\"1005\" data-end=\"1029\">These workloads include:<\/p>\n<ul data-start=\"1031\" data-end=\"1176\">\n<li data-start=\"1031\" data-end=\"1057\">\n<p data-start=\"1033\" data-end=\"1057\">Virtual machines (VMs)<\/p>\n<\/li>\n<li data-start=\"1058\" data-end=\"1092\">\n<p data-start=\"1060\" data-end=\"1092\">Containers and Kubernetes pods<\/p>\n<\/li>\n<li data-start=\"1093\" data-end=\"1153\">\n<p data-start=\"1095\" data-end=\"1153\">Serverless functions (e.g., AWS Lambda, Azure Functions)<\/p>\n<\/li>\n<li data-start=\"1154\" data-end=\"1176\">\n<p data-start=\"1156\" data-end=\"1176\">Bare metal instances<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1178\" data-end=\"1310\">CWPP solutions provide <strong data-start=\"1201\" data-end=\"1251\">visibility, compliance, and runtime protection<\/strong> to workloads \u2014 no matter where they run or how they scale.<\/p>\n<hr data-start=\"1312\" data-end=\"1315\" \/>\n<h2 data-start=\"1317\" data-end=\"1349\">Why CWPP Is Essential in 2025<\/h2>\n<ul data-start=\"1351\" data-end=\"1676\">\n<li data-start=\"1351\" data-end=\"1409\">\n<p data-start=\"1353\" data-end=\"1409\">Cloud workloads are <strong data-start=\"1373\" data-end=\"1407\">highly dynamic and short-lived<\/strong><\/p>\n<\/li>\n<li data-start=\"1410\" data-end=\"1471\">\n<p data-start=\"1412\" data-end=\"1471\">Traditional endpoint protection doesn\u2019t work in the cloud<\/p>\n<\/li>\n<li data-start=\"1472\" data-end=\"1529\">\n<p data-start=\"1474\" data-end=\"1529\">Containerized apps introduce new layers of complexity<\/p>\n<\/li>\n<li data-start=\"1530\" data-end=\"1612\">\n<p data-start=\"1532\" data-end=\"1612\">Compliance standards like <strong data-start=\"1558\" data-end=\"1579\">PCI, HIPAA, SOC 2<\/strong> require deep workload controls<\/p>\n<\/li>\n<li data-start=\"1613\" data-end=\"1676\">\n<p data-start=\"1615\" data-end=\"1676\">Attackers increasingly target <strong data-start=\"1645\" data-end=\"1676\">cloud-native infrastructure<\/strong><\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1678\" data-end=\"1809\">CWPPs are built specifically to secure these modern environments, offering <strong data-start=\"1753\" data-end=\"1808\">agent-based, agentless, or hybrid protection models<\/strong>.<\/p>\n<hr data-start=\"1811\" data-end=\"1814\" \/>\n<h2 data-start=\"1816\" data-end=\"1846\">Core Capabilities of a CWPP<\/h2>\n<ol data-start=\"1848\" data-end=\"2304\">\n<li data-start=\"1848\" data-end=\"1922\">\n<p data-start=\"1851\" data-end=\"1922\"><strong data-start=\"1851\" data-end=\"1874\">Workload visibility<\/strong> across cloud providers, regions, and OS types<\/p>\n<\/li>\n<li data-start=\"1923\" data-end=\"1987\">\n<p data-start=\"1926\" data-end=\"1987\"><strong data-start=\"1926\" data-end=\"1954\">Vulnerability management<\/strong> \u2014 scanning images and packages<\/p>\n<\/li>\n<li data-start=\"1988\" data-end=\"2066\">\n<p data-start=\"1991\" data-end=\"2066\"><strong data-start=\"1991\" data-end=\"2013\">Runtime protection<\/strong> \u2014 detecting abnormal behavior or process anomalies<\/p>\n<\/li>\n<li data-start=\"2067\" data-end=\"2147\">\n<p data-start=\"2070\" data-end=\"2147\"><strong data-start=\"2070\" data-end=\"2091\">Microsegmentation<\/strong> \u2014 isolating workloads from unauthorized communication<\/p>\n<\/li>\n<li data-start=\"2148\" data-end=\"2232\">\n<p data-start=\"2151\" data-end=\"2232\"><strong data-start=\"2151\" data-end=\"2176\">Compliance monitoring<\/strong> \u2014 ensuring workloads meet required security baselines<\/p>\n<\/li>\n<li data-start=\"2233\" data-end=\"2304\">\n<p data-start=\"2236\" data-end=\"2304\"><strong data-start=\"2236\" data-end=\"2267\">Threat detection &amp; response<\/strong> \u2014 integrated with SIEM\/XDR platforms<\/p>\n<\/li>\n<\/ol>\n<p data-start=\"2306\" data-end=\"2421\">CWPPs operate at the <strong data-start=\"2327\" data-end=\"2345\">workload level<\/strong>, offering control and context beyond what cloud-native tools provide alone.<\/p>\n<hr data-start=\"2423\" data-end=\"2426\" \/>\n<h2 data-start=\"2428\" data-end=\"2466\">CWPP vs. Traditional Security Tools<\/h2>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"2468\" data-end=\"3124\">\n<thead data-start=\"2468\" data-end=\"2561\">\n<tr data-start=\"2468\" data-end=\"2561\">\n<th data-start=\"2468\" data-end=\"2501\" data-col-size=\"sm\">Feature<\/th>\n<th data-start=\"2501\" data-end=\"2528\" data-col-size=\"sm\">Traditional AV \/ EDR<\/th>\n<th data-start=\"2528\" data-end=\"2561\" data-col-size=\"sm\">CWPP<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2657\" data-end=\"3124\">\n<tr data-start=\"2657\" data-end=\"2749\">\n<td data-start=\"2657\" data-end=\"2690\" data-col-size=\"sm\">Designed for cloud?<\/td>\n<td data-col-size=\"sm\" data-start=\"2690\" data-end=\"2717\">\u274c<\/td>\n<td data-col-size=\"sm\" data-start=\"2717\" data-end=\"2749\">\u2705<\/td>\n<\/tr>\n<tr data-start=\"2750\" data-end=\"2842\">\n<td data-start=\"2750\" data-end=\"2783\" data-col-size=\"sm\">Container awareness<\/td>\n<td data-col-size=\"sm\" data-start=\"2783\" data-end=\"2810\">\u274c<\/td>\n<td data-col-size=\"sm\" data-start=\"2810\" data-end=\"2842\">\u2705<\/td>\n<\/tr>\n<tr data-start=\"2843\" data-end=\"2935\">\n<td data-start=\"2843\" data-end=\"2876\" data-col-size=\"sm\">Serverless visibility<\/td>\n<td data-col-size=\"sm\" data-start=\"2876\" data-end=\"2903\">\u274c<\/td>\n<td data-col-size=\"sm\" data-start=\"2903\" data-end=\"2935\">\u2705<\/td>\n<\/tr>\n<tr data-start=\"2936\" data-end=\"3030\">\n<td data-start=\"2936\" data-end=\"2969\" data-col-size=\"sm\">Cloud integration (AWS, GCP)<\/td>\n<td data-col-size=\"sm\" data-start=\"2969\" data-end=\"2997\">Limited<\/td>\n<td data-col-size=\"sm\" data-start=\"2997\" data-end=\"3030\">Native API integration<\/td>\n<\/tr>\n<tr data-start=\"3031\" data-end=\"3124\">\n<td data-start=\"3031\" data-end=\"3064\" data-col-size=\"sm\">Auto-scaling support<\/td>\n<td data-col-size=\"sm\" data-start=\"3064\" data-end=\"3091\">\u274c<\/td>\n<td data-col-size=\"sm\" data-start=\"3091\" data-end=\"3124\">\u2705 (dynamic workload coverage)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr data-start=\"3126\" data-end=\"3129\" \/>\n<h2 data-start=\"3131\" data-end=\"3160\">Top CWPP Providers in 2025<\/h2>\n<h3 data-start=\"3162\" data-end=\"3195\">1. <strong data-start=\"3169\" data-end=\"3195\">Palo Alto Prisma Cloud<\/strong><\/h3>\n<p data-start=\"3197\" data-end=\"3257\">A full-featured CNAPP platform, including CWPP capabilities.<\/p>\n<ul data-start=\"3259\" data-end=\"3554\">\n<li data-start=\"3259\" data-end=\"3328\">\n<p data-start=\"3261\" data-end=\"3328\"><strong data-start=\"3261\" data-end=\"3273\">Best for<\/strong>: Enterprises seeking unified cloud-native protection<\/p>\n<\/li>\n<li data-start=\"3329\" data-end=\"3554\">\n<p data-start=\"3331\" data-end=\"3346\"><strong data-start=\"3331\" data-end=\"3343\">Features<\/strong>:<\/p>\n<ul data-start=\"3349\" data-end=\"3554\">\n<li data-start=\"3349\" data-end=\"3378\">\n<p data-start=\"3351\" data-end=\"3378\">VM and container security<\/p>\n<\/li>\n<li data-start=\"3381\" data-end=\"3420\">\n<p data-start=\"3383\" data-end=\"3420\">IaC scanning and policy enforcement<\/p>\n<\/li>\n<li data-start=\"3423\" data-end=\"3466\">\n<p data-start=\"3425\" data-end=\"3466\">Runtime defense for workloads and hosts<\/p>\n<\/li>\n<li data-start=\"3469\" data-end=\"3513\">\n<p data-start=\"3471\" data-end=\"3513\">Compliance reports and CI\/CD integration<\/p>\n<\/li>\n<li data-start=\"3516\" data-end=\"3554\">\n<p data-start=\"3518\" data-end=\"3554\">Agent and agentless deployment modes<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3556\" data-end=\"3559\" \/>\n<h3 data-start=\"3561\" data-end=\"3611\">2. <strong data-start=\"3568\" data-end=\"3611\">Trend Micro Cloud One Workload Security<\/strong><\/h3>\n<p data-start=\"3613\" data-end=\"3669\">A mature, widely adopted CWPP offering from Trend Micro.<\/p>\n<ul data-start=\"3671\" data-end=\"3917\">\n<li data-start=\"3671\" data-end=\"3724\">\n<p data-start=\"3673\" data-end=\"3724\"><strong data-start=\"3673\" data-end=\"3685\">Best for<\/strong>: Hybrid and multi-cloud environments<\/p>\n<\/li>\n<li data-start=\"3725\" data-end=\"3917\">\n<p data-start=\"3727\" data-end=\"3742\"><strong data-start=\"3727\" data-end=\"3739\">Features<\/strong>:<\/p>\n<ul data-start=\"3745\" data-end=\"3917\">\n<li data-start=\"3745\" data-end=\"3778\">\n<p data-start=\"3747\" data-end=\"3778\">Host and container protection<\/p>\n<\/li>\n<li data-start=\"3781\" data-end=\"3810\">\n<p data-start=\"3783\" data-end=\"3810\">File integrity monitoring<\/p>\n<\/li>\n<li data-start=\"3813\" data-end=\"3844\">\n<p data-start=\"3815\" data-end=\"3844\">Application control and DLP<\/p>\n<\/li>\n<li data-start=\"3847\" data-end=\"3883\">\n<p data-start=\"3849\" data-end=\"3883\">IDS\/IPS built-in for cloud hosts<\/p>\n<\/li>\n<li data-start=\"3886\" data-end=\"3917\">\n<p data-start=\"3888\" data-end=\"3917\">Broad platform and OS support<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"3919\" data-end=\"3922\" \/>\n<h3 data-start=\"3924\" data-end=\"3996\">3. <strong data-start=\"3931\" data-end=\"3996\">Microsoft Defender for Cloud (formerly Azure Security Center)<\/strong><\/h3>\n<p data-start=\"3998\" data-end=\"4065\">Microsoft\u2019s built-in solution for Azure, also covering AWS and GCP.<\/p>\n<ul data-start=\"4067\" data-end=\"4344\">\n<li data-start=\"4067\" data-end=\"4112\">\n<p data-start=\"4069\" data-end=\"4112\"><strong data-start=\"4069\" data-end=\"4081\">Best for<\/strong>: Azure-centric organizations<\/p>\n<\/li>\n<li data-start=\"4113\" data-end=\"4344\">\n<p data-start=\"4115\" data-end=\"4130\"><strong data-start=\"4115\" data-end=\"4127\">Features<\/strong>:<\/p>\n<ul data-start=\"4133\" data-end=\"4344\">\n<li data-start=\"4133\" data-end=\"4161\">\n<p data-start=\"4135\" data-end=\"4161\">Auto-provisioning agents<\/p>\n<\/li>\n<li data-start=\"4164\" data-end=\"4195\">\n<p data-start=\"4166\" data-end=\"4195\">Just-in-time access control<\/p>\n<\/li>\n<li data-start=\"4198\" data-end=\"4246\">\n<p data-start=\"4200\" data-end=\"4246\">Security recommendations for VMs, containers<\/p>\n<\/li>\n<li data-start=\"4249\" data-end=\"4294\">\n<p data-start=\"4251\" data-end=\"4294\">Integrated with Azure Policy and Sentinel<\/p>\n<\/li>\n<li data-start=\"4297\" data-end=\"4344\">\n<p data-start=\"4299\" data-end=\"4344\">Real-time threat detection and hardening tips<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4346\" data-end=\"4349\" \/>\n<h3 data-start=\"4351\" data-end=\"4370\">4. <strong data-start=\"4358\" data-end=\"4370\">Lacework<\/strong><\/h3>\n<p data-start=\"4372\" data-end=\"4435\">A cloud-native CWPP built on behavior analytics and automation.<\/p>\n<ul data-start=\"4437\" data-end=\"4712\">\n<li data-start=\"4437\" data-end=\"4498\">\n<p data-start=\"4439\" data-end=\"4498\"><strong data-start=\"4439\" data-end=\"4451\">Best for<\/strong>: Teams wanting high signal-to-noise accuracy<\/p>\n<\/li>\n<li data-start=\"4499\" data-end=\"4712\">\n<p data-start=\"4501\" data-end=\"4516\"><strong data-start=\"4501\" data-end=\"4513\">Features<\/strong>:<\/p>\n<ul data-start=\"4519\" data-end=\"4712\">\n<li data-start=\"4519\" data-end=\"4553\">\n<p data-start=\"4521\" data-end=\"4553\">Anomaly-based threat detection<\/p>\n<\/li>\n<li data-start=\"4556\" data-end=\"4600\">\n<p data-start=\"4558\" data-end=\"4600\">Event context across workloads and users<\/p>\n<\/li>\n<li data-start=\"4603\" data-end=\"4628\">\n<p data-start=\"4605\" data-end=\"4628\">API security insights<\/p>\n<\/li>\n<li data-start=\"4631\" data-end=\"4670\">\n<p data-start=\"4633\" data-end=\"4670\">Container and Kubernetes visibility<\/p>\n<\/li>\n<li data-start=\"4673\" data-end=\"4712\">\n<p data-start=\"4675\" data-end=\"4712\">Compliance automation with audit logs<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"4714\" data-end=\"4717\" \/>\n<h3 data-start=\"4719\" data-end=\"4743\">5. <strong data-start=\"4726\" data-end=\"4743\">Sysdig Secure<\/strong><\/h3>\n<p data-start=\"4745\" data-end=\"4800\">A runtime-focused CWPP with deep Kubernetes visibility.<\/p>\n<ul data-start=\"4802\" data-end=\"5110\">\n<li data-start=\"4802\" data-end=\"4877\">\n<p data-start=\"4804\" data-end=\"4877\"><strong data-start=\"4804\" data-end=\"4816\">Best for<\/strong>: DevSecOps teams working with containers and microservices<\/p>\n<\/li>\n<li data-start=\"4878\" data-end=\"5110\">\n<p data-start=\"4880\" data-end=\"4895\"><strong data-start=\"4880\" data-end=\"4892\">Features<\/strong>:<\/p>\n<ul data-start=\"4898\" data-end=\"5110\">\n<li data-start=\"4898\" data-end=\"4938\">\n<p data-start=\"4900\" data-end=\"4938\">Image scanning and CI\/CD integration<\/p>\n<\/li>\n<li data-start=\"4941\" data-end=\"4979\">\n<p data-start=\"4943\" data-end=\"4979\">Real-time runtime threat detection<\/p>\n<\/li>\n<li data-start=\"4982\" data-end=\"5021\">\n<p data-start=\"4984\" data-end=\"5021\">Kubernetes RBAC audit and hardening<\/p>\n<\/li>\n<li data-start=\"5024\" data-end=\"5073\">\n<p data-start=\"5026\" data-end=\"5073\">Support for Falco rules and OSS observability<\/p>\n<\/li>\n<li data-start=\"5076\" data-end=\"5110\">\n<p data-start=\"5078\" data-end=\"5110\">Cost and usage analysis built-in<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr data-start=\"5112\" data-end=\"5115\" \/>\n<h2 data-start=\"5117\" data-end=\"5158\">CWPP Integration with DevOps and CI\/CD<\/h2>\n<p data-start=\"5160\" data-end=\"5281\">Modern CWPPs integrate with your <strong data-start=\"5193\" data-end=\"5213\">DevOps toolchain<\/strong> to shift security <strong data-start=\"5232\" data-end=\"5240\">left<\/strong>, detecting issues <strong data-start=\"5259\" data-end=\"5269\">before<\/strong> deployment:<\/p>\n<ul data-start=\"5283\" data-end=\"5481\">\n<li data-start=\"5283\" data-end=\"5341\">\n<p data-start=\"5285\" data-end=\"5341\"><strong data-start=\"5285\" data-end=\"5312\">Pre-deployment scanning<\/strong> (IaC and container images)<\/p>\n<\/li>\n<li data-start=\"5342\" data-end=\"5380\">\n<p data-start=\"5344\" data-end=\"5380\"><strong data-start=\"5344\" data-end=\"5365\">Secrets detection<\/strong> in Git repos<\/p>\n<\/li>\n<li data-start=\"5381\" data-end=\"5413\">\n<p data-start=\"5383\" data-end=\"5413\"><strong data-start=\"5383\" data-end=\"5411\">Build policy enforcement<\/strong><\/p>\n<\/li>\n<li data-start=\"5414\" data-end=\"5481\">\n<p data-start=\"5416\" data-end=\"5481\"><strong data-start=\"5416\" data-end=\"5450\">Automated rollback or alerting<\/strong> in case of high-risk artifacts<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5483\" data-end=\"5555\">This ensures workloads are secure <strong data-start=\"5517\" data-end=\"5554\">before they even reach production<\/strong>.<\/p>\n<hr data-start=\"5557\" data-end=\"5560\" \/>\n<h2 data-start=\"5562\" data-end=\"5592\">Challenges in CWPP Adoption<\/h2>\n<ul data-start=\"5594\" data-end=\"5902\">\n<li data-start=\"5594\" data-end=\"5670\">\n<p data-start=\"5596\" data-end=\"5670\"><strong data-start=\"5596\" data-end=\"5611\">Tool sprawl<\/strong>: Choosing the right CWPP that complements existing tools<\/p>\n<\/li>\n<li data-start=\"5671\" data-end=\"5746\">\n<p data-start=\"5673\" data-end=\"5746\"><strong data-start=\"5673\" data-end=\"5693\">Agent management<\/strong>: Agent-based CWPPs require patching and monitoring<\/p>\n<\/li>\n<li data-start=\"5747\" data-end=\"5816\">\n<p data-start=\"5749\" data-end=\"5816\"><strong data-start=\"5749\" data-end=\"5773\">Container complexity<\/strong>: Managing short-lived workloads at scale<\/p>\n<\/li>\n<li data-start=\"5817\" data-end=\"5902\">\n<p data-start=\"5819\" data-end=\"5902\"><strong data-start=\"5819\" data-end=\"5844\">Multicloud visibility<\/strong>: Ensuring unified security posture across AWS, Azure, GCP<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5904\" data-end=\"6027\">To succeed, teams need a CWPP that offers <strong data-start=\"5946\" data-end=\"5972\">both breadth and depth<\/strong> \u2014 security without sacrificing performance or agility.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud is no longer the future \u2014 it\u2019s the present. From virtual machines to containers to serverless functions, workloads in the cloud are the backbone of digital business. But with this power comes a new security challenge: how do you&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-21","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/21","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21"}],"version-history":[{"count":1,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/21\/revisions"}],"predecessor-version":[{"id":22,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/21\/revisions\/22"}],"wp:attachment":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}