{"id":53385,"date":"2024-03-13T13:24:10","date_gmt":"2024-03-13T13:24:10","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=53385"},"modified":"2024-06-25T10:04:38","modified_gmt":"2024-06-25T10:04:38","slug":"security-compliances-in-cloud-computing","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/security-compliances-in-cloud-computing","title":{"rendered":"Security Compliances in Cloud Computing"},"content":{"rendered":"","protected":false},"author":882,"featured_media":53450,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[3606,3608,3607,4459,3718],"user_email":"shakti@cloudthat.com","published_by":"325","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/53385"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/882"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=53385"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/53385\/revisions"}],"predecessor-version":[{"id":53388,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/53385\/revisions\/53388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/53450"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=53385"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=53385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}