{"id":43023,"date":"2019-10-11T12:06:42","date_gmt":"2019-10-11T12:06:42","guid":{"rendered":"https:\/\/www.42gears.com\/?p=43023"},"modified":"2020-05-07T11:13:39","modified_gmt":"2020-05-07T11:13:39","slug":"nist-800-88-and-42gears","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/de\/blog\/nist-800-88-and-42gears\/","title":{"rendered":"NIST 800-88 and 42Gears"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1024\" height=\"318\" style=\"width:100%;\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/NIST-800-88-and-42Gears-1024x318.jpg\" alt=\"\" class=\"wp-image-43044\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/NIST-800-88-and-42Gears-1024x318.jpg 1024w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/NIST-800-88-and-42Gears-300x93.jpg 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/NIST-800-88-and-42Gears-768x239.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p style=\"text-align:justify\">For any organization, data security is of prime importance. Businesses must ensure that business devices are not susceptible to a data breach, especially when such devices change hands or leave the organization. Improperly sanitized storage media from magnetic, flash-based storage, and other similar devices such as USB drives or servers, are a major security concern. Erasing all confidential data and making past data irretrievable from electronic storage media or media sanitization is a must when ensuring data confidentiality.<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>What is NIST 800-88?<\/strong><br><\/h2>\n\n\n\n<p style=\"text-align:justify\"><strong>NIST 800-88<\/strong> is a document by the government of the U.S. that outlines the method for erasing data from electronic storage media. The goal is to effectively sanitize media so that any data is irretrievable once the data or the data storage device reaches end-of-life. Sanitization here refers to a process that renders access to target data on the media infeasible for a given level of effort. It also stresses on a process that must consider end-of-life sanitization from the very beginning of data storage planning so that it is easier to implement sanitization properly when it\u2019s needed.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" style=\"width:100%;\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/NIST-800-88-Principles-Image.jpg\" alt=\"\" class=\"wp-image-43030\"><\/figure>\n\n\n\n<p style=\"text-align:justify\">NIST 800-88 suggests three data sanitization principles &#8211; clear, purge and destroy. Three different principles to sanitize based on the confidentiality categorization of the data.<\/p>\n\n\n\n<p style=\"text-align:justify\"><strong>Clear<\/strong> applies to a logical technique to sanitize data in all user-addressable storage locations. It is the level of data protection that\u2019s equivalent to using the reset option in the device menu to factory state.<\/p>\n\n\n\n<p style=\"text-align:justify\"><b>Purge<\/b> <\/strong>applies to physical or logical techniques that render Target Data recovery infeasible using state-of-the-art laboratory techniques. It refers to a more thorough level of sanitization than Clear and is used for more confidential data.\u00a0<\/p>\n\n\n\n<p style=\"text-align:justify\"><b>Destroy<\/b><\/strong> renders target data recovery infeasible using state-of-the-art laboratory techniques that render the media incapable of storing data afterward. This technique can be necessary for storage media that need to be made beyond possible use.<\/p>\n\n\n\n<h2 style=\"font-size:20px;\"><strong>NIST 800-88 and 42Gears for iOS<\/strong><br><\/h2>\n\n\n\n<p style=\"text-align:justify\">When you use Remote Wipe option in 42Gears UEM, it utilizes <strong>Apple MDM Protocol<\/strong> to erase all content and factory reset a device. It is the same function as using <strong>Erase All Content <\/strong>under <strong>Settings <\/strong>to reset the device. And, for iOS, any sanitization should fall under Purge operation as all current iPhones have hardware encryption turned on by default.<\/p>\n\n\n\n<p style=\"text-align:justify\">And NIST mentions for Apple iPhone and iPad \u201c<em>The sanitization operation should take only minutes as Cryptographic Erase is supported. This assumes that encryption is on and that all data has been encrypted.<\/em>\u201d&nbsp;<\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Data-Security-and-Management.jpg'); background-position: center; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 24px; color: #fff; margin-top: 0px;\">Data Security and Management<\/h2>\n<p style=\"font-size: 16px; margin-bottom: 0px; line-height: 26px; color: #fff;\">42Gears offers data security and management features<br> \nto different forms of mobile endpoints.<\/p>\n<p style=\"margin-top: 32px; display: inline-block;\"><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: #ff9041; color: #ffffff; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" href=\"https:\/\/www.42gears.com\/products\/suremdm\/signup\/\" target=\"_black\" rel=\"noopener noreferrer\">TRY FOR FREE<\/a><a style=\"min-width: 148px; height: 48px; padding: 0 24px; text-align: center; display: inline-block; background-color: transparent; color: #ffffff; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px; margin-left: 16px;\" href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\" target=\"_black\" rel=\"noopener noreferrer\">READ MORE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For any organization, data security is of prime importance. Businesses must ensure that business devices are not susceptible to a data breach, especially when such devices change hands or leave the organization. Improperly sanitized storage media from magnetic, flash-based storage, and other similar devices such as USB drives or servers, are a major security concern.&hellip;<\/p>\n","protected":false},"author":7,"featured_media":43061,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[398,399],"tags":[513,512],"class_list":["post-43023","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uem","category-unified-endpoint-management","tag-device-security","tag-nist-800-88"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NIST 800-88 | Data Protection | 42Gears UEM<\/title>\n<meta name=\"description\" content=\"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST 800-88 and 42Gears\" \/>\n<meta property=\"og:description\" content=\"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-11T12:06:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-07T11:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"NIST 800-88 and 42Gears\",\"datePublished\":\"2019-10-11T12:06:42+00:00\",\"dateModified\":\"2020-05-07T11:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\"},\"wordCount\":440,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg\",\"keywords\":[\"Device Security\",\"NIST 800-88\"],\"articleSection\":[\"UEM\",\"Unified Endpoint Management\"],\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\",\"url\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\",\"name\":\"NIST 800-88 | Data Protection | 42Gears UEM\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg\",\"datePublished\":\"2019-10-11T12:06:42+00:00\",\"dateModified\":\"2020-05-07T11:13:39+00:00\",\"description\":\"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg\",\"width\":500,\"height\":300,\"caption\":\"Featured Image - NIST 800-88 Principles (1)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIST 800-88 and 42Gears\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NIST 800-88 | Data Protection | 42Gears UEM","description":"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/","og_locale":"de_DE","og_type":"article","og_title":"NIST 800-88 and 42Gears","og_description":"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.","og_url":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2019-10-11T12:06:42+00:00","article_modified_time":"2020-05-07T11:13:39+00:00","og_image":[{"width":500,"height":300,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"NIST 800-88 and 42Gears","datePublished":"2019-10-11T12:06:42+00:00","dateModified":"2020-05-07T11:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/"},"wordCount":440,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","keywords":["Device Security","NIST 800-88"],"articleSection":["UEM","Unified Endpoint Management"],"inLanguage":"de-DE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/","url":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/","name":"NIST 800-88 | Data Protection | 42Gears UEM","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","datePublished":"2019-10-11T12:06:42+00:00","dateModified":"2020-05-07T11:13:39+00:00","description":"42Gears UEM maps data sanitization through Remote Wipe on Android and iOS devices in compliance with the guidelines outlined in NIST 800-88.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","width":500,"height":300,"caption":"Featured Image - NIST 800-88 Principles (1)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/fr\/blog\/nist-800-88-and-42gears\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/de\/"},{"@type":"ListItem","position":2,"name":"NIST 800-88 and 42Gears"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/10\/Featured-Image-NIST-800-88-Principles-1.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/43023","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/comments?post=43023"}],"version-history":[{"count":14,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/43023\/revisions"}],"predecessor-version":[{"id":50886,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/posts\/43023\/revisions\/50886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/media\/43061"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/media?parent=43023"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/categories?post=43023"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/de\/wp-json\/wp\/v2\/tags?post=43023"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}