{"id":2435,"date":"2018-08-06T00:00:00","date_gmt":"2018-08-06T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks"},"modified":"2023-05-11T15:38:20","modified_gmt":"2023-05-11T22:38:20","slug":"enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/","title":{"rendered":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks"},"content":{"rendered":"<p>Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals. To help safeguard your resources in the cloud, you need to be able to keep up with threats, harden your resources that could be vulnerable to attacks, and deploy techniques to ensure that protection mechanisms are working.<\/p>\n<p>Avyan Consulting partnered with the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a> team to build attack simulation playbooks for demonstration and training purposes. Azure administrators may use these playbooks to deploy fully operational web and Compute workloads, security management tools such as Azure Security Center &#038; Web App Firewalls (WAFs), and SQL threat protection. Once deployed, the administrator can invoke attacks against the workloads, executing similar techniques used by adversaries around the world. These attack simulations are applied using the supplied instructions and automation. The playbooks cover four common attack scenarios simulations:<\/p>\n<div align=\"justify\">\n<table border=\"0\" cellpadding=\"0\" cellspacing=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"209\">\n<p><b>Scenario<\/b><\/p>\n<\/td>\n<td valign=\"top\" width=\"456\">\n<p><b>Description<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"209\">\n<p><a href=\"https:\/\/aka.ms\/ASCPlaybooksVAttack\" target=\"_blank\" rel=\"noopener\">VM-Virus-Attack<\/a><\/p>\n<\/td>\n<td valign=\"top\" width=\"456\">\n<p>To showcase Virus attack on a Virtual Machine detection &#038; prevention<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"209\">\n<p><a href=\"https:\/\/aka.ms\/ASCPlaybooksSQLi\" target=\"_blank\" rel=\"noopener\">SQL-Injection-Attack-WebApp<\/a><\/p>\n<\/td>\n<td valign=\"top\" width=\"456\">\n<p>To showcase SQL injection attack detection &#038; prevention on a Web Application (Web App + SQL DB)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"209\">\n<p><a href=\"https:\/\/aka.ms\/ASCPlaybooksXSS\" target=\"_blank\" rel=\"noopener\">XSS-Attack-WebApp<\/a><\/p>\n<\/td>\n<td valign=\"top\" width=\"456\">\n<p>To showcase Cross Site Scripting (XSS) attack detection &#038; prevention on a Web Application<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"209\">\n<p><a href=\"https:\/\/aka.ms\/ASCPlaybooksDDos\" target=\"_blank\" rel=\"noopener\">DDoS-Attack-Public IP<\/a><\/p>\n<\/td>\n<td valign=\"top\" width=\"456\">\n<p>To showcase DDoS Protection Standard on Azure resources with public IP<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>This experience will enable Azure customers to learn about hardening best practices, defensive configurations, and what to look for should a real attack occur.<\/p>\n<p>If you are responsible for the security of datacenter workloads running in the cloud, learn more about Azure\u2019s native security tools such as\u00a0 <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/security-center\/\" target=\"_blank\" rel=\"noopener\">Azure Security Center<\/a>, <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sql-database\/sql-database-threat-detection\" target=\"_blank\" rel=\"noopener\">SQL Threat Detection<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/application-gateway\/\" target=\"_blank\" rel=\"noopener\">Application Gateway (WAF)<\/a>. These tools work with <a href=\"https:\/\/azuremarketplace.microsoft.com\/en-us\/marketplace\/apps\/cloudneeti.cloudneeti_enterpise?tab=Overview\" target=\"_blank\" rel=\"noopener\">Cloudneeti<\/a> from Avyan Consulting to provide rich compliance views across Azure resources.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1459],"tags":[],"audience":[3053,3056],"content-type":[],"product":[1798],"tech-community":[],"topic":[],"coauthors":[818],"class_list":["post-2435","post","type-post","status-publish","format-standard","hentry","category-security","audience-it-decision-makers","audience-it-implementors","product-azure-security-center"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-06T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T22:38:20+00:00\" \/>\n<meta name=\"author\" content=\"Ty Balascio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ty Balascio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/ty-balascio\/\",\"@type\":\"Person\",\"@name\":\"Ty Balascio\"}],\"headline\":\"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks\",\"datePublished\":\"2018-08-06T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:38:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\"},\"wordCount\":291,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\",\"name\":\"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"datePublished\":\"2018-08-06T00:00:00+00:00\",\"dateModified\":\"2023-05-11T22:38:20+00:00\",\"description\":\"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog","description":"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/","og_locale":"en_US","og_type":"article","og_title":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog","og_description":"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2018-08-06T00:00:00+00:00","article_modified_time":"2023-05-11T22:38:20+00:00","author":"Ty Balascio","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Ty Balascio","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/ty-balascio\/","@type":"Person","@name":"Ty Balascio"}],"headline":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks","datePublished":"2018-08-06T00:00:00+00:00","dateModified":"2023-05-11T22:38:20+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/"},"wordCount":291,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/","name":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"datePublished":"2018-08-06T00:00:00+00:00","dateModified":"2023-05-11T22:38:20+00:00","description":"Cloud-hosted workloads offer excellent scalability, ease of deployment, and pre-secured infrastructure for your workloads. However, the workloads themselves may still be susceptible to attack by cybercriminals.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/enhance-your-devsecops-practices-with-azure-security-center-s-newest-playbooks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Enhance your DevSecOps practices with Azure Security Center\u2019s newest playbooks"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/2435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=2435"}],"version-history":[{"count":0,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/2435\/revisions"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=2435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=2435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=2435"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=2435"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=2435"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=2435"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=2435"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=2435"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=2435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}