{"id":106829,"date":"2024-06-30T20:16:31","date_gmt":"2024-06-30T20:16:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/"},"modified":"2024-09-11T10:21:05","modified_gmt":"2024-09-11T10:21:05","slug":"aws-security-group-vs-network-acl","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/","title":{"rendered":"AWS Security Group Vs Network ACL"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today\u2019s\u200b digital age, \u2062your \u200donline security is important for \u200dprotecting your data and preventing cyber-attacks. AWS (Amazon\u2064 Web Services) helps you keep your data secure with \u2062their security features. \u200cOne of those \u2063features is \u200cthe ability to use \u2064two different \u200clevels \u2062of security: AWS Security Group vs Network ACL (Access Control Lists). This article will explore the \u200ddifferences between an AWS Security Group vs Network ACL, and \u2063provide\u2064 an \u200dunderstanding of how \u2063to use \u200ceach of these security tools for optimal security.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#1%E2%81%A3_What_is_AWS_Security_Group_and_Network_ACL\" >1.\u2063 What is AWS Security Group and Network ACL?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#2_What%E2%81%A2_are_the_Key_Features_of_AWS_Security_Group_and_Network_ACL\" >2. What\u2062 are the Key Features of AWS Security Group and Network ACL?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#3%E2%80%8D_How_AWS_Security_Group_and_Network_%E2%80%8BACL_Are_Different\" >3.\u200d How AWS Security Group and Network \u200bACL Are Different?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#4%E2%80%8D_Keeping_Your_Cloud_Environment_Secure_with_AWS_Security_Group_%E2%80%8Band_%E2%80%8DNetwork_ACL\" >4.\u200d Keeping Your Cloud Environment Secure with AWS Security Group \u200band \u200dNetwork ACL<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#Comparison_of_AWS_Security_Group_and_Network_ACL\" >Comparison of AWS Security Group and Network ACL<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/aws-security-group-vs-network-acl\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-aws-security-group-and-network-acl\"><span class=\"ez-toc-section\" id=\"1%E2%81%A3_What_is_AWS_Security_Group_and_Network_ACL\"><\/span>1.\u2063 What is AWS Security Group and Network ACL?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>AWS \u2063Security Groups are a \u2064combination \u2062of access\u2063 rules\u2064 used\u2062 to control inbound and outbound network traffic. They work like a\u200b firewall, allowing you \u2064to control which \u2062traffic \u200cis allowed to reach your\u200b application. Network Access Control List (ACL) is a set of firewall \u200crules that enable or\u200c deny traffic at the network level. \u2063ACLs\u200b are used\u200c to \u2063define access\u200b to subnets and provide more granular access\u2064 control\u2062 than AWS Security Groups.<\/p>\n<p>Both \u2064Security Group and <a href=\"https:\/\/docs.aws.amazon.com\/vpc\/latest\/userguide\/nacl-basics.html\" rel=\"nofollow noopener\" target=\"_blank\">Network ACLs<\/a> \u2062add a \u2062layer of security to keep \u200byour\u2063 application safe from malicious\u200d attacks. Security Groups act\u2063 like traffic control guards, allowing only specific\u2062 types of\u2064 traffic\u200c and rejecting all other \u200dtraffic. Network ACLs\u200b are like a \u2062gate with\u2062 an open\/close policy, meaning\u200b that specific traffic \u2064is\u2062 either allowed or denied. Network\u200b ACLs \u2063require more effort \u2064to administer \u2062and can be\u200d more time-consuming \u2062to update. However, \u2063they provide greater control \u2064over network access and are\u2063 more secure than\u200b security groups.<\/p>\n<ul>\n<li><strong>Security Groups<\/strong> act \u200clike \u2063traffic control guards, allowing only \u2062specific types \u200dof \u2063traffic and rejecting all other traffic.<\/li>\n<li><strong>Network ACLs<\/strong> \u2062are \u200blike a gate with\u2063 an open\/close policy, meaning that\u200c specific traffic is either allowed \u200bor denied.<\/li>\n<li>Both\u200d Security Groups and Network ACLs add a layer of security to\u200b keep\u2064 your \u200dapplication \u2064safe from malicious\u2063 attacks.<\/li>\n<\/ul>\n<h2 id=\"2-what-are-the-key-features-of-aws-security-group-and-network-acl\"><span class=\"ez-toc-section\" id=\"2_What%E2%81%A2_are_the_Key_Features_of_AWS_Security_Group_and_Network_ACL\"><\/span>2. What\u2062 are the Key Features of AWS Security Group and Network ACL?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Understanding AWS Security Group \u2062 <\/b><\/p>\n<p>AWS Security Groups are like virtual firewalls that allow traffic to and from resources. They \u200cact as a\u200c gatekeeper for applications that you\u200b run on\u200b the cloud, \u200dcontrolling \u2062both\u200b incoming and outgoing network traffic. Security \u200dGroups permit rules \u200bspecifying allowable IP addresses, port numbers and protocols to \u200bensure secure\u2063 access to services and resources. You can also create rules that block or\u2064 allow \u2063traffic\u200c from specific ports, IP \u200dranges, and\u2062 subsets of ports.<\/p>\n<p><b>Exploring\u2062 AWS Network \u2063ACLs<\/b><\/p>\n<p>AWS Network\u2062 ACLs also allow or deny traffic from\u2064 the\u200b internet using IP\u2062 address and port \u200branges. Network ACLs \u200care also \u200bstateless and do \u2063not track network connections within a VPC. Furthermore, Network ACLs\u2062 are assigned to Subnets in a VPC and support\u200b both inbound and outbound rules;\u200d fewer rules are supported than in \u200cSecurity\u200c Groups. The main difference \u200cbetween \u200cthem is that Network \u200cACLs are managed\u2064 at the\u200b subnet level, while Security\u200b Groups are\u2062 managed \u200dat \u200dthe instance level.<\/p>\n<p>Key\u200c features of AWS Security Groups and Network ACLs include:<\/p>\n<ul>\n<li>Defining\u200c traffic\u2062 control and access\u200b to Amazon EC2 instances<\/li>\n<li>Limiting traffic by IP address variance \u200band \u2062port \u2062ranges<\/li>\n<li>Tracking \u200dallowed connections with Security Groups,\u2062 while Network ACLs are \u2063stateless<\/li>\n<li>Restricting traffic by subnet and do not track\u200b network connections<\/li>\n<li>Defining separate inbound and\u200c outbound data filtering rules<\/li>\n<\/ul>\n<h2 id=\"3-how-aws-security-group-and-network-acl-are-different\"><span class=\"ez-toc-section\" id=\"3%E2%80%8D_How_AWS_Security_Group_and_Network_%E2%80%8BACL_Are_Different\"><\/span>3.\u200d How AWS Security Group and Network \u200bACL Are Different?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Differences Between AWS \u200dSecurity Group and Network ACL<\/b><\/p>\n<p>AWS Security Group and Network ACL \u200d(access control\u200d list) provide cloud \u2063users with two different \u2063ways to secure their cloud networks. Here are the key differences between\u200c these two\u2064 methods of security:<\/p>\n<ul>\n<li><b>Purpose:<\/b> Security groups \u2062control inbound and outbound \u200baccess to inbound ports, while Network ACLs block traffic to and \u2062from designated IP addresses. Network ACLs are used \u200bfor network-level\u2063 filtering, \u2063while Security Groups are used for endpoint \u2062security.<\/li>\n<li><b>Configuration:<\/b> Security Groups can be configured to \u200dallow\u2064 or\u200b deny\u200c access to specific ports, while\u200c Network ACLs \u2063offer more \u2063granular\u2062 control, allowing users to manage traffic to\u2062 and from specific \u200dIP and\u2063 port numbers.<\/li>\n<li><b>Options:<\/b> Network\u200d ACLs allow \u200dusers to set different types of rules, including \u2063whitelisting \u2063or blacklisting specific IP addresses. Security Groups \u2064are more limited in the rules they allow,\u200c providing users with a binary\u200c either\/or option.<\/li>\n<li><b>Traffic Tracking:<\/b> Network ACLs provide\u2064 more\u200c detailed\u2064 logging\u2063 of packets and \u200ctraffic flowing across\u2063 a\u2062 network, while Security Groups offer basic logging \u2064features.<\/li>\n<\/ul>\n<p>Overall, bothSecurity Groups and Network ACLs provide \u200bdifferent levels of security to the \u200bcloud network. \u200bWhile Security\u2064 Groups are easier to configure and provide more automated protection, Network ACLs offer more granular control, allowing users to manage traffic\u200d to and \u2063from specific \u2063IP\u200d and port\u2062 numbers.<\/p>\n<h2 id=\"4-keeping-your-cloud-environment-secure-with-aws-security-group-and-network-acl\"><span class=\"ez-toc-section\" id=\"4%E2%80%8D_Keeping_Your_Cloud_Environment_Secure_with_AWS_Security_Group_%E2%80%8Band_%E2%80%8DNetwork_ACL\"><\/span>4.\u200d Keeping Your Cloud Environment Secure with AWS Security Group \u200band \u200dNetwork ACL<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Amazon \u200dWeb \u200cServices (AWS) offers two important tools for \u2064ensuring your\u200b cloud \u200denvironment is secure: Security Group and Network\u200b Access Control \u2064List (ACL). \u2064With these\u2063 tools, you can\u2064 control access to your cloud resources and\u2063 protect your data. \u200c<\/p>\n<p>Security Group works like a firewall that allows or denies traffic to\u2062 and from EC2 instances. It\u200d provides \u200dan extra layer of security around your\u2064 cloud\u200c services,\u200c since\u200c you\u2019re \u200cthe \u200bone to decide which \u200dtraffic is allowed and which is blocked. With Network\u200b ACL,\u2062 you\u200c can \u2064control\u200b how\u2062 individual IP addresses access your applications. It operates on both incoming and\u200d outgoing traffic, and provides an extra \u200blayer of security at the subnet level.<\/p>\n<p>Both \u2062Security Groups and \u200dNetwork ACLs have similar \u200bfeatures, such as:<\/p>\n<ul>\n<li>Stateful inspection: ability to save state of connection to allow\u2062 reply traffic<\/li>\n<li>Inbound\u2063 and outbound filtering: control\u2064 access to \u200band from your\u2062 cloud environment<\/li>\n<li>Allow or block\u200b traffic based on IP address and \u200bport: limit access\u200b to the\u200c specific\u2064 IPs\u2062 and ports<\/li>\n<\/ul>\n<p>Using these tools in \u200dconjunction with other AWS\u200c security features is key\u200b to keeping\u200d your\u200c cloud \u2064environment secure, as they offer\u2064 an \u200badditional\u200d layer\u2062 of protection for your data \u200cand\u2064 applications.<\/p>\n<p>When comparing AWS Security Groups and Network ACLs, it is important to understand the additional layer of security that each provides within the Amazon Web Services environment. Security Groups are essentially a firewall that controls inbound and outbound traffic for instances, while Network ACLs operate at the network level and control traffic entering and leaving subnets. The default security in AWS includes default security groups and default NACLs, which can be modified to meet specific security requirements.<\/p>\n<p>Custom NACLs allow for separate rules for incoming and outgoing traffic, while security groups have numbered rules that control traffic on specific ports. Load balancers can be used to distribute traffic among multiple instances and also have rules in security groups for access control. It is essential to compare security group and NACL configurations to ensure the appropriate levels of access for different types of traffic, including internet, IPv6, SSH, and TCP.<\/p>\n<p>Access control rules within NACLs are defined with combinations of source and destination IP addresses, as well as specific ports for packet responses. The stateful and stateless nature of responses in NACLs also plays a role in determining the direction for responses and defending against potential threats at the infrastructure layer. In essence, the combination of security groups and NACLs provides a comprehensive security architecture for controlling access to resources within AWS.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;AWS Security Best Practices&#8221; &#8211; Amazon Web Services<br \/>\n&#8211; &#8220;AWS Network Security \u2013 AWS Virtual Private Cloud&#8221; &#8211; Amazon Web Services<br \/>\n&#8211; &#8220;AWS Security &#8211; Overview of Security Processes&#8221; &#8211; Amazon Web Services<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Comparison_of_AWS_Security_Group_and_Network_ACL\"><\/span>Comparison of AWS Security Group and Network ACL<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Feature<\/th>\n<th>Security Group<\/th>\n<th>Network ACL<\/th>\n<\/tr>\n<tr>\n<td>Functionality<\/td>\n<td>Firewall for EC2 instances<\/td>\n<td>Controls traffic at the subnet level<\/td>\n<\/tr>\n<tr>\n<td>Inbound\/Outbound Filtering<\/td>\n<td>Controls access to\/from cloud environment<\/td>\n<td>Operates on incoming and outgoing traffic<\/td>\n<\/tr>\n<tr>\n<td>Access Control<\/td>\n<td>Allow\/deny traffic based on IP and port<\/td>\n<td>Define rules for IP addresses and ports<\/td>\n<\/tr>\n<tr>\n<td>Stateful Inspection<\/td>\n<td>Save state of connection for reply traffic<\/td>\n<td>Determines direction for packet responses<\/td>\n<\/tr>\n<tr>\n<td>Customization<\/td>\n<td>Numbered rules for specific ports<\/td>\n<td>Separate rules for inbound\/outbound traffic<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What \u200bis the difference between AWS Security Group and Network ACL?<br \/>\nA:\u2062 AWS Security Group is like a virtual firewall \u200cfor your Amazon \u200dWeb Services (AWS) resources that helps keep \u200byour \u200baccount secure. Network Access Control Lists (ACL) are \u200ca \u200cset \u2062of\u200c rules that control network\u2064 traffic in \u2063and out of\u2062 your AWS\u200c VPC (Virtual\u2063 Private Cloud). Network ACLs are used\u200b to protect \u2062from network-level attacks whereas Security Groups \u2064are more for\u200d controlling traffic within an AWS \u2062account.<\/p>\n<p>Q: What are the differences between AWS Security Group and Network ACL?<br \/>\nA: AWS Security Group and Network ACL are two different components of network security in Amazon Virtual Private Cloud (VPC). Security Groups operate at the instance level, controlling inbound and outbound traffic based on security group rules. Network ACLs, on the other hand, operate at the subnet level, controlling traffic in and out of the subnet based on the rules defined.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<p>Q: What is the default behavior for inbound and outbound traffic for Security Groups?<br \/>\nA: By default, all outbound traffic is allowed and all inbound traffic is denied. Network ACLs, on the other hand, deny all inbound and outbound traffic by default and require explicit rules to allow traffic.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<p>Q: How do Security Group rules differ from Network ACL rules?<br \/>\nA: Security Group rules are stateful, meaning that if an inbound rule allows traffic in, the return traffic is automatically allowed out. Network ACL rules, on the other hand, are stateless, requiring explicit rules for both inbound and outbound traffic.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<p>Q: How does the level of defense provided by Security Groups and Network ACLs differ?<br \/>\nA: Security Groups provide a layer of defense at the instance level, while Network ACLs provide a layer of defense at the subnet level. Using both components together can create a more robust security posture.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<p>Q: Are there any additional charges for using Security Groups or Network ACLs in AWS?<br \/>\nA: There are no additional charges for using Security Groups or default Network ACLs in AWS. However, there may be additional charges for using custom Network ACLs.<br \/>\n(Source: Amazon VPC Pricing)<\/p>\n<p>Q: How can Security Groups and Network ACLs be used together to enhance network security?<br \/>\nA: By using Security Groups to control traffic at the instance level and Network ACLs to control traffic at the subnet level, organizations can create multiple layers of security to protect their resources from unauthorized access.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<p>Q: What is the difference between incoming rules and outgoing rules in Security Groups?<br \/>\nA: Incoming rules in Security Groups control the traffic allowed to enter an instance, while outgoing rules control the traffic allowed to leave an instance.<br \/>\n(Source: Amazon VPC Documentation)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes\u2062 to AWS security, there are a lot of options available, but \u2064Security Group vs Network ACL can create quite the dilemma for many \u2063users. A great\u200c way to\u2062 ensure you have safe and \u200csecure\u200b access\u2063 to your applications in AWS\u2062 is by\u2063 utilizing a free account\u2064 with LogMeOnce\u2019s Auto-login \u200dand SSO. With \u200btop-rated\u2064 customer\u2062 service, you\u2019ll be secure with their AWS \u2064Security \u2062Group and \u200dNetwork ACL\u2064 solutions.\u200b Visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce.com<\/a> today to \u200dcreate \u200dyour free account and experience\u2063 true security with the\u200b #1 \u200dcloud-based security solutions provider. \u200b<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s\u200b digital age, \u2062your \u200donline security is important for \u200dprotecting your data and preventing cyber-attacks. AWS (Amazon\u2064 Web Services) helps you keep your data secure with \u2062their security features. \u200cOne of those \u2063features is \u200cthe ability to use \u2064two different \u200clevels \u2062of security: AWS Security Group vs Network ACL (Access Control Lists). This article [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19736],"tags":[7232,5630,30977,7221,6775,10876,991,7764,781],"class_list":["post-106829","post","type-post","status-publish","format-standard","hentry","category-single-sign-on","tag-aws-2","tag-access-2","tag-acl","tag-compliance","tag-control","tag-group","tag-network","tag-policies","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/106829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=106829"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/106829\/revisions"}],"predecessor-version":[{"id":224895,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/106829\/revisions\/224895"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=106829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=106829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=106829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}