{"id":41,"date":"2025-06-25T09:26:36","date_gmt":"2025-06-25T09:26:36","guid":{"rendered":"https:\/\/tham098.thamtuuytin.org\/?p=41"},"modified":"2025-06-25T09:26:36","modified_gmt":"2025-06-25T09:26:36","slug":"identity-and-access-management-iam-the-backbone-of-modern-cybersecurity","status":"publish","type":"post","link":"https:\/\/tham098.thamtuuytin.org\/?p=41","title":{"rendered":"Identity and Access Management (IAM): The Backbone of Modern Cybersecurity"},"content":{"rendered":"<p data-start=\"362\" data-end=\"554\">In today\u2019s digital-first world, organizations are managing <strong data-start=\"421\" data-end=\"480\">thousands of users, devices, applications, and services<\/strong>, often across multiple environments \u2014 on-prem, cloud, hybrid, and mobile.<\/p>\n<p data-start=\"556\" data-end=\"645\">Without strong access control, one compromised account could lead to a full-scale breach.<\/p>\n<p data-start=\"647\" data-end=\"806\">That\u2019s why <strong data-start=\"658\" data-end=\"698\">Identity and Access Management (IAM)<\/strong> is no longer just an IT function \u2014 it\u2019s a <strong data-start=\"741\" data-end=\"771\">strategic business enabler<\/strong> and a <strong data-start=\"778\" data-end=\"805\">cybersecurity necessity<\/strong>.<\/p>\n<hr data-start=\"808\" data-end=\"811\" \/>\n<h2 data-start=\"813\" data-end=\"828\">What Is IAM?<\/h2>\n<p data-start=\"830\" data-end=\"1057\"><strong data-start=\"830\" data-end=\"870\">Identity and Access Management (IAM)<\/strong> is a framework of <strong data-start=\"889\" data-end=\"930\">policies, processes, and technologies<\/strong> that ensures the right individuals have the right access to the right resources \u2014 at the right time and for the right reasons.<\/p>\n<p data-start=\"1059\" data-end=\"1096\">IAM answers three critical questions:<\/p>\n<ul data-start=\"1097\" data-end=\"1170\">\n<li data-start=\"1097\" data-end=\"1111\">\n<p data-start=\"1099\" data-end=\"1111\">Who are you?<\/p>\n<\/li>\n<li data-start=\"1112\" data-end=\"1134\">\n<p data-start=\"1114\" data-end=\"1134\">What can you access?<\/p>\n<\/li>\n<li data-start=\"1135\" data-end=\"1170\">\n<p data-start=\"1137\" data-end=\"1170\">Are you allowed to do that \u2014 now?<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1172\" data-end=\"1175\" \/>\n<h2 data-start=\"1177\" data-end=\"1203\">Why IAM Matters in 2025<\/h2>\n<ul data-start=\"1205\" data-end=\"1604\">\n<li data-start=\"1205\" data-end=\"1309\">\n<p data-start=\"1207\" data-end=\"1309\"><strong data-start=\"1207\" data-end=\"1265\">Credential-based attacks (e.g., phishing, brute force)<\/strong> are the most common initial breach vector<\/p>\n<\/li>\n<li data-start=\"1310\" data-end=\"1381\">\n<p data-start=\"1312\" data-end=\"1381\"><strong data-start=\"1312\" data-end=\"1344\">Remote and hybrid workforces<\/strong> demand secure, frictionless access<\/p>\n<\/li>\n<li data-start=\"1382\" data-end=\"1453\">\n<p data-start=\"1384\" data-end=\"1453\"><strong data-start=\"1384\" data-end=\"1415\">Multi-cloud and SaaS sprawl<\/strong> require unified identity governance<\/p>\n<\/li>\n<li data-start=\"1454\" data-end=\"1534\">\n<p data-start=\"1456\" data-end=\"1534\"><strong data-start=\"1456\" data-end=\"1483\">Compliance requirements<\/strong> (GDPR, HIPAA, SOX) mandate strict access control<\/p>\n<\/li>\n<li data-start=\"1535\" data-end=\"1604\">\n<p data-start=\"1537\" data-end=\"1604\"><strong data-start=\"1537\" data-end=\"1560\">Privileged accounts<\/strong> represent a high-value target for attackers<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1606\" data-end=\"1713\">IAM helps organizations manage risk while <strong data-start=\"1648\" data-end=\"1673\">enabling productivity<\/strong> and <strong data-start=\"1678\" data-end=\"1712\">ensuring regulatory compliance<\/strong>.<\/p>\n<hr data-start=\"1715\" data-end=\"1718\" \/>\n<h2 data-start=\"1720\" data-end=\"1744\">Core Functions of IAM<\/h2>\n<ol data-start=\"1746\" data-end=\"2499\">\n<li data-start=\"1746\" data-end=\"1837\">\n<p data-start=\"1749\" data-end=\"1769\"><strong data-start=\"1749\" data-end=\"1767\">Authentication<\/strong><\/p>\n<ul data-start=\"1773\" data-end=\"1837\">\n<li data-start=\"1773\" data-end=\"1837\">\n<p data-start=\"1775\" data-end=\"1837\">Verifying a user&#8217;s identity (e.g., passwords, biometrics, MFA)<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1839\" data-end=\"1922\">\n<p data-start=\"1842\" data-end=\"1861\"><strong data-start=\"1842\" data-end=\"1859\">Authorization<\/strong><\/p>\n<ul data-start=\"1865\" data-end=\"1922\">\n<li data-start=\"1865\" data-end=\"1922\">\n<p data-start=\"1867\" data-end=\"1922\">Granting access to resources based on roles or policies<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"1924\" data-end=\"2016\">\n<p data-start=\"1927\" data-end=\"1958\"><strong data-start=\"1927\" data-end=\"1956\">User Lifecycle Management<\/strong><\/p>\n<ul data-start=\"1962\" data-end=\"2016\">\n<li data-start=\"1962\" data-end=\"2016\">\n<p data-start=\"1964\" data-end=\"2016\">Automating onboarding, offboarding, and role changes<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2018\" data-end=\"2105\">\n<p data-start=\"2021\" data-end=\"2059\"><strong data-start=\"2021\" data-end=\"2057\">Role-Based Access Control (RBAC)<\/strong><\/p>\n<ul data-start=\"2063\" data-end=\"2105\">\n<li data-start=\"2063\" data-end=\"2105\">\n<p data-start=\"2065\" data-end=\"2105\">Assigning permissions based on job roles<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2107\" data-end=\"2178\">\n<p data-start=\"2110\" data-end=\"2136\"><strong data-start=\"2110\" data-end=\"2134\">Single Sign-On (SSO)<\/strong><\/p>\n<ul data-start=\"2140\" data-end=\"2178\">\n<li data-start=\"2140\" data-end=\"2178\">\n<p data-start=\"2142\" data-end=\"2178\">Enabling one login for multiple apps<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2180\" data-end=\"2297\">\n<p data-start=\"2183\" data-end=\"2222\"><strong data-start=\"2183\" data-end=\"2220\">Multi-Factor Authentication (MFA)<\/strong><\/p>\n<ul data-start=\"2226\" data-end=\"2297\">\n<li data-start=\"2226\" data-end=\"2297\">\n<p data-start=\"2228\" data-end=\"2297\">Adding an extra layer of verification (e.g., SMS, authenticator apps)<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2299\" data-end=\"2406\">\n<p data-start=\"2302\" data-end=\"2342\"><strong data-start=\"2302\" data-end=\"2340\">Privileged Access Management (PAM)<\/strong><\/p>\n<ul data-start=\"2346\" data-end=\"2406\">\n<li data-start=\"2346\" data-end=\"2406\">\n<p data-start=\"2348\" data-end=\"2406\">Securing and monitoring access for high-privilege accounts<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li data-start=\"2408\" data-end=\"2499\">\n<p data-start=\"2411\" data-end=\"2445\"><strong data-start=\"2411\" data-end=\"2443\">Audit &amp; Compliance Reporting<\/strong><\/p>\n<ul data-start=\"2449\" data-end=\"2499\">\n<li data-start=\"2449\" data-end=\"2499\">\n<p data-start=\"2451\" data-end=\"2499\">Tracking who accessed what, when, and from where<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<hr data-start=\"2501\" data-end=\"2504\" \/>\n<h2 data-start=\"2506\" data-end=\"2530\">IAM Deployment Models<\/h2>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"2532\" data-end=\"3085\">\n<thead data-start=\"2532\" data-end=\"2642\">\n<tr data-start=\"2532\" data-end=\"2642\">\n<th data-start=\"2532\" data-end=\"2553\" data-col-size=\"sm\">Model<\/th>\n<th data-start=\"2553\" data-end=\"2605\" data-col-size=\"sm\">Description<\/th>\n<th data-start=\"2605\" data-end=\"2642\" data-col-size=\"sm\">Example Tools<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"2753\" data-end=\"3085\">\n<tr data-start=\"2753\" data-end=\"2863\">\n<td data-start=\"2753\" data-end=\"2774\" data-col-size=\"sm\"><strong data-start=\"2755\" data-end=\"2770\">On-premises<\/strong><\/td>\n<td data-col-size=\"sm\" data-start=\"2774\" data-end=\"2826\">Installed and hosted internally<\/td>\n<td data-col-size=\"sm\" data-start=\"2826\" data-end=\"2863\">Microsoft AD, Oracle IAM<\/td>\n<\/tr>\n<tr data-start=\"2864\" data-end=\"2974\">\n<td data-start=\"2864\" data-end=\"2885\" data-col-size=\"sm\"><strong data-start=\"2866\" data-end=\"2881\">Cloud-based<\/strong><\/td>\n<td data-col-size=\"sm\" data-start=\"2885\" data-end=\"2937\">Delivered as a SaaS or IaaS solution<\/td>\n<td data-col-size=\"sm\" data-start=\"2937\" data-end=\"2974\">Okta, Azure AD, JumpCloud<\/td>\n<\/tr>\n<tr data-start=\"2975\" data-end=\"3085\">\n<td data-start=\"2975\" data-end=\"2996\" data-col-size=\"sm\"><strong data-start=\"2977\" data-end=\"2991\">Hybrid IAM<\/strong><\/td>\n<td data-col-size=\"sm\" data-start=\"2996\" data-end=\"3048\">Combination of both for flexibility<\/td>\n<td data-col-size=\"sm\" data-start=\"3048\" data-end=\"3085\">ForgeRock, Ping Identity<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p data-start=\"3087\" data-end=\"3209\"><strong data-start=\"3087\" data-end=\"3100\">Cloud IAM<\/strong> is now the preferred model due to scalability, availability, and integration with cloud-native applications.<\/p>\n<hr data-start=\"3211\" data-end=\"3214\" \/>\n<h2 data-start=\"3216\" data-end=\"3244\">Top IAM Solutions in 2025<\/h2>\n<h3 data-start=\"3246\" data-end=\"3278\">1. <strong data-start=\"3253\" data-end=\"3276\">Okta Identity Cloud<\/strong><\/h3>\n<p data-start=\"3279\" data-end=\"3316\">Industry leader in cloud IAM and SSO.<\/p>\n<ul data-start=\"3318\" data-end=\"3487\">\n<li data-start=\"3318\" data-end=\"3362\">\n<p data-start=\"3320\" data-end=\"3362\">Extensive integrations (over 7,000 apps)<\/p>\n<\/li>\n<li data-start=\"3363\" data-end=\"3396\">\n<p data-start=\"3365\" data-end=\"3396\">Passwordless and adaptive MFA<\/p>\n<\/li>\n<li data-start=\"3397\" data-end=\"3445\">\n<p data-start=\"3399\" data-end=\"3445\">Universal Directory and lifecycle automation<\/p>\n<\/li>\n<li data-start=\"3446\" data-end=\"3487\">\n<p data-start=\"3448\" data-end=\"3487\">Supports B2B and B2C identity use cases<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3489\" data-end=\"3492\" \/>\n<h3 data-start=\"3494\" data-end=\"3545\">2. <strong data-start=\"3501\" data-end=\"3543\">Microsoft Entra ID (formerly Azure AD)<\/strong><\/h3>\n<p data-start=\"3546\" data-end=\"3588\">Perfect for Microsoft-centric enterprises.<\/p>\n<ul data-start=\"3590\" data-end=\"3748\">\n<li data-start=\"3590\" data-end=\"3648\">\n<p data-start=\"3592\" data-end=\"3648\">Seamless integration with Office 365, Teams, and Azure<\/p>\n<\/li>\n<li data-start=\"3649\" data-end=\"3680\">\n<p data-start=\"3651\" data-end=\"3680\">Conditional Access policies<\/p>\n<\/li>\n<li data-start=\"3681\" data-end=\"3723\">\n<p data-start=\"3683\" data-end=\"3723\">Identity Protection risk-based scoring<\/p>\n<\/li>\n<li data-start=\"3724\" data-end=\"3748\">\n<p data-start=\"3726\" data-end=\"3748\">B2B and B2C federation<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3750\" data-end=\"3753\" \/>\n<h3 data-start=\"3755\" data-end=\"3781\">3. <strong data-start=\"3762\" data-end=\"3779\">Ping Identity<\/strong><\/h3>\n<p data-start=\"3782\" data-end=\"3815\">Flexible, enterprise-focused IAM.<\/p>\n<ul data-start=\"3817\" data-end=\"3956\">\n<li data-start=\"3817\" data-end=\"3846\">\n<p data-start=\"3819\" data-end=\"3846\">Centralized policy engine<\/p>\n<\/li>\n<li data-start=\"3847\" data-end=\"3883\">\n<p data-start=\"3849\" data-end=\"3883\">Intelligent MFA and risk signals<\/p>\n<\/li>\n<li data-start=\"3884\" data-end=\"3919\">\n<p data-start=\"3886\" data-end=\"3919\">API security for CIAM scenarios<\/p>\n<\/li>\n<li data-start=\"3920\" data-end=\"3956\">\n<p data-start=\"3922\" data-end=\"3956\">Deployable in any cloud or on-prem<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3958\" data-end=\"3961\" \/>\n<h3 data-start=\"3963\" data-end=\"4003\">4. <strong data-start=\"3970\" data-end=\"4001\">ForgeRock Identity Platform<\/strong><\/h3>\n<p data-start=\"4004\" data-end=\"4056\">Built for complex enterprise and customer IAM needs.<\/p>\n<ul data-start=\"4058\" data-end=\"4208\">\n<li data-start=\"4058\" data-end=\"4099\">\n<p data-start=\"4060\" data-end=\"4099\">Supports IoT and non-human identities<\/p>\n<\/li>\n<li data-start=\"4100\" data-end=\"4138\">\n<p data-start=\"4102\" data-end=\"4138\">AI-driven access and risk modeling<\/p>\n<\/li>\n<li data-start=\"4139\" data-end=\"4172\">\n<p data-start=\"4141\" data-end=\"4172\">Self-service account recovery<\/p>\n<\/li>\n<li data-start=\"4173\" data-end=\"4208\">\n<p data-start=\"4175\" data-end=\"4208\">Modular and scalable architecture<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4210\" data-end=\"4213\" \/>\n<h3 data-start=\"4215\" data-end=\"4265\">5. <strong data-start=\"4222\" data-end=\"4263\">CyberArk Identity (formerly Idaptive)<\/strong><\/h3>\n<p data-start=\"4266\" data-end=\"4310\">Security-first IAM with strong PAM features.<\/p>\n<ul data-start=\"4312\" data-end=\"4421\">\n<li data-start=\"4312\" data-end=\"4328\">\n<p data-start=\"4314\" data-end=\"4328\">Adaptive MFA<\/p>\n<\/li>\n<li data-start=\"4329\" data-end=\"4352\">\n<p data-start=\"4331\" data-end=\"4352\">App access auditing<\/p>\n<\/li>\n<li data-start=\"4353\" data-end=\"4382\">\n<p data-start=\"4355\" data-end=\"4382\">Identity threat detection<\/p>\n<\/li>\n<li data-start=\"4383\" data-end=\"4421\">\n<p data-start=\"4385\" data-end=\"4421\">Seamless SSO and device trust checks<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4423\" data-end=\"4426\" \/>\n<h2 data-start=\"4428\" data-end=\"4462\">IAM in Zero Trust Architectures<\/h2>\n<p data-start=\"4464\" data-end=\"4502\">IAM is foundational to <strong data-start=\"4487\" data-end=\"4501\">Zero Trust<\/strong>:<\/p>\n<ul data-start=\"4504\" data-end=\"4718\">\n<li data-start=\"4504\" data-end=\"4561\">\n<p data-start=\"4506\" data-end=\"4561\"><strong data-start=\"4506\" data-end=\"4538\">\u201cNever trust, always verify\u201d<\/strong> starts with identity<\/p>\n<\/li>\n<li data-start=\"4562\" data-end=\"4610\">\n<p data-start=\"4564\" data-end=\"4610\">Continuous authentication, not just at login<\/p>\n<\/li>\n<li data-start=\"4611\" data-end=\"4671\">\n<p data-start=\"4613\" data-end=\"4671\">Role, context, device posture all shape access decisions<\/p>\n<\/li>\n<li data-start=\"4672\" data-end=\"4718\">\n<p data-start=\"4674\" data-end=\"4718\">Granular controls for least privilege access<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4720\" data-end=\"4798\">IAM is the <strong data-start=\"4731\" data-end=\"4751\">first gatekeeper<\/strong> to all systems and apps in a Zero Trust model.<\/p>\n<hr data-start=\"4800\" data-end=\"4803\" \/>\n<h2 data-start=\"4805\" data-end=\"4845\">IAM Challenges &amp; How to Overcome Them<\/h2>\n<div class=\"_tableContainer_16hzy_1\">\n<div class=\"_tableWrapper_16hzy_14 group flex w-fit flex-col-reverse\" tabindex=\"-1\">\n<table class=\"w-fit min-w-(--thread-content-width)\" data-start=\"4847\" data-end=\"5469\">\n<thead data-start=\"4847\" data-end=\"4935\">\n<tr data-start=\"4847\" data-end=\"4935\">\n<th data-start=\"4847\" data-end=\"4886\" data-col-size=\"sm\">Challenge<\/th>\n<th data-start=\"4886\" data-end=\"4935\" data-col-size=\"md\">Solution<\/th>\n<\/tr>\n<\/thead>\n<tbody data-start=\"5025\" data-end=\"5469\">\n<tr data-start=\"5025\" data-end=\"5113\">\n<td data-start=\"5025\" data-end=\"5064\" data-col-size=\"sm\">Password fatigue and reuse<\/td>\n<td data-col-size=\"md\" data-start=\"5064\" data-end=\"5113\">Implement passwordless auth or MFA<\/td>\n<\/tr>\n<tr data-start=\"5114\" data-end=\"5202\">\n<td data-start=\"5114\" data-end=\"5153\" data-col-size=\"sm\">Over-provisioning of access rights<\/td>\n<td data-col-size=\"md\" data-start=\"5153\" data-end=\"5202\">Enforce RBAC with regular entitlement reviews<\/td>\n<\/tr>\n<tr data-start=\"5203\" data-end=\"5291\">\n<td data-start=\"5203\" data-end=\"5242\" data-col-size=\"sm\">User resistance to MFA<\/td>\n<td data-col-size=\"md\" data-start=\"5242\" data-end=\"5291\">Use adaptive MFA or biometric options<\/td>\n<\/tr>\n<tr data-start=\"5292\" data-end=\"5380\">\n<td data-start=\"5292\" data-end=\"5331\" data-col-size=\"sm\">Shadow IT and rogue accounts<\/td>\n<td data-col-size=\"md\" data-start=\"5331\" data-end=\"5380\">Enable SSO with app discovery and CASB<\/td>\n<\/tr>\n<tr data-start=\"5381\" data-end=\"5469\">\n<td data-start=\"5381\" data-end=\"5420\" data-col-size=\"sm\">Lack of visibility into access logs<\/td>\n<td data-col-size=\"md\" data-start=\"5420\" data-end=\"5469\">Centralize logging and integrate with SIEM<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"sticky end-(--thread-content-margin) h-0 self-end select-none\">\n<div class=\"absolute end-0 flex items-end\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<hr data-start=\"5471\" data-end=\"5474\" \/>\n<h2 data-start=\"5476\" data-end=\"5510\">IAM Beyond the Enterprise: CIAM<\/h2>\n<p data-start=\"5512\" data-end=\"5604\"><strong data-start=\"5512\" data-end=\"5562\">Customer Identity and Access Management (CIAM)<\/strong> extends IAM principles to external users:<\/p>\n<ul data-start=\"5606\" data-end=\"5788\">\n<li data-start=\"5606\" data-end=\"5649\">\n<p data-start=\"5608\" data-end=\"5649\">Secure and seamless login for customers<\/p>\n<\/li>\n<li data-start=\"5650\" data-end=\"5708\">\n<p data-start=\"5652\" data-end=\"5708\">Support for social logins and mobile-first experiences<\/p>\n<\/li>\n<li data-start=\"5709\" data-end=\"5754\">\n<p data-start=\"5711\" data-end=\"5754\">Fine-grained consent and privacy controls<\/p>\n<\/li>\n<li data-start=\"5755\" data-end=\"5788\">\n<p data-start=\"5757\" data-end=\"5788\">Helps meet GDPR\/CCPA compliance<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"5790\" data-end=\"5886\">IAM isn\u2019t just for employees anymore \u2014 it\u2019s for <em data-start=\"5838\" data-end=\"5885\">everyone who accesses your business digitally<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s digital-first world, organizations are managing thousands of users, devices, applications, and services, often across multiple environments \u2014 on-prem, cloud, hybrid, and mobile. Without strong access control, one compromised account could lead to a full-scale breach. That\u2019s why Identity&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-41","post","type-post","status-publish","format-standard","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/41","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=41"}],"version-history":[{"count":1,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/41\/revisions"}],"predecessor-version":[{"id":42,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=\/wp\/v2\/posts\/41\/revisions\/42"}],"wp:attachment":[{"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=41"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=41"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tham098.thamtuuytin.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=41"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}