{"id":245898,"date":"2025-02-14T17:56:44","date_gmt":"2025-02-14T17:56:44","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/"},"modified":"2025-02-14T17:56:44","modified_gmt":"2025-02-14T17:56:44","slug":"nist-it-asset-management","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/","title":{"rendered":"What Is NIST Asset Management and Its Importance?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the fast-evolving world of cybersecurity, the <strong>leaked password phenomenon<\/strong> has raised significant concerns among users and organizations alike. Recent <strong>data breaches<\/strong> have revealed passwords appearing in various leaks, often sourced from compromised databases or phishing attacks, highlighting the vulnerabilities that can arise from <strong>poor password management<\/strong>. These leaks not only compromise individual accounts but can also lead to larger security incidents, as attackers exploit reused or weak passwords to gain unauthorized access to <strong>sensitive information<\/strong>. For users, understanding the implications of leaked passwords is crucial; it emphasizes the importance of adopting strong, unique passwords and utilizing security measures like <strong>two-factor authentication<\/strong> to safeguard personal and professional data.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Understanding_NIST_Asset_Management_Framework\" >Understanding NIST Asset Management Framework<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Core_Benefits_for_Organizations\" >Core Benefits for Organizations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Essential_Components_and_Best_Practices\" >Essential Components and Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Implementation_Strategy_and_Guidelines\" >Implementation Strategy and Guidelines<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Risk_Management_and_Security_Considerations\" >Risk Management and Security Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Compliance_and_Regulatory_Requirements\" >Compliance and Regulatory Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#How_Long_Does_It_Typically_Take_to_Fully_Implement_NIST_Asset_Management\" >How Long Does It Typically Take to Fully Implement NIST Asset Management?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#What_Are_the_Average_Costs_Associated_With_NIST_Asset_Management_Implementation\" >What Are the Average Costs Associated With NIST Asset Management Implementation?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#Can_Small_Businesses_Effectively_Implement_NIST_Asset_Management_Practices\" >Can Small Businesses Effectively Implement NIST Asset Management Practices?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#How_Often_Should_Organizations_Update_Their_NIST_Asset_Management_Procedures\" >How Often Should Organizations Update Their NIST Asset Management Procedures?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#What_Certifications_Do_Professionals_Need_to_Manage_NIST_Asset_Management_Programs\" >What Certifications Do Professionals Need to Manage NIST Asset Management Programs?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/nist-it-asset-management\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>NIST Asset Management is a framework that helps organizations systematically track, organize, and protect their physical and digital assets.<\/li>\n<li>It establishes a structured approach to categorizing assets based on their importance, ensuring critical resources receive appropriate protection.<\/li>\n<li>The framework enhances organizational security by maintaining detailed records of asset locations, ownership, and access controls.<\/li>\n<li>NIST Asset Management reduces costs through better maintenance tracking and minimizes unnecessary asset replacements.<\/li>\n<li>It ensures regulatory compliance while providing continuous monitoring of assets to detect and respond to potential security threats.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_NIST_Asset_Management_Framework\"><\/span>Understanding NIST Asset Management Framework<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like organizing your favorite toys in special boxes, <strong>NIST asset management<\/strong> helps companies keep track of all their important stuff!<\/p>\n<p>Think of it as making a <strong>super-organized list<\/strong> of everything a company owns &#8211; from computers to special software.<\/p>\n<p>I&#039;ll tell you a secret: it&#039;s kind of like playing Pok&#xE9;mon! You know how you sort your <strong>Pok&#xE9;mon cards<\/strong> by type and power? That&#039;s exactly what NIST asset management does!<\/p>\n<p>Companies put their things into <strong>different groups<\/strong> &#8211; super important stuff (like secret codes), kind of important things (like work computers), and regular items (like regular phones).<\/p>\n<p>Have you ever made an <strong>inventory of your toys<\/strong>? That&#039;s what companies do too! This approach helps with <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/nist-risk-management-framework-rmf-guide\/\">continuous monitoring<\/a> of all company assets.<\/p>\n<p>They write down what they have, where it is, and how important it is. This helps them <strong>protect everything<\/strong>, just like you protect your favorite teddy bear!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Core_Benefits_for_Organizations\"><\/span>Core Benefits for Organizations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While some people think <strong>managing company stuff<\/strong> is boring, I&#039;m going to let you in on something super cool! When you take good care of your things, amazing stuff happens. It&#039;s like having a <strong>superpower<\/strong>!<\/p>\n<p>First, you keep everything safer &#8211; just like how you protect your favorite toy. You&#039;ll always know where things are, like having a special map.<\/p>\n<p>Next, you <strong>save money<\/strong>! Think of it like your piggy bank &#8211; when you take care of what you have, you don&#039;t need to buy new stuff as often.<\/p>\n<p>You also get to be <strong>like a detective<\/strong>, keeping track of everything with special tools. Following the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/grc-docs.com\/blogs\/nist-csf\/nist-csf-asset-management\">NIST Cybersecurity Framework<\/a> helps make sure everything is protected properly.<\/p>\n<p>And guess what? It helps you follow <strong>important rules<\/strong> too, just like following the rules in a board game makes it more fun!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Essential_Components_and_Best_Practices\"><\/span>Essential Components and Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize why taking care of company stuff is super cool, let&#039;s look at how to do it &#8211; like following a special recipe!<\/p>\n<p>Think of it like <strong>organizing your toys<\/strong> &#8211; first, you need to know what you have (that&#039;s called <strong>identification<\/strong>). Just like how you sort your LEGOs from your stuffed animals, we sort computer stuff into different groups. Implementing proper <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/nist-mfa-standards\/\">NIST MFA standards<\/a> ensures that our assets are better protected.<\/p>\n<p>I keep track of everything using <strong>special tools<\/strong>, kind of like how you use your toy box to keep things tidy! We also make sure only the <strong>right people<\/strong> can play with certain things &#8211; just like how your big sister&#039;s diary has a lock on it.<\/p>\n<p>And guess what? We <strong>check on everything<\/strong> all the time, like how you make sure your favorite teddy bear is safe and sound! This helps us follow <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.lansweeper.com\/blog\/cybersecurity\/complete-it-asset-management-for-simpler-nist\/\">NIST security standards<\/a> to keep everything protected.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementation_Strategy_and_Guidelines\"><\/span>Implementation Strategy and Guidelines<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Since putting together a fantastic <strong>asset management plan<\/strong> is like building the world&#039;s coolest LEGO castle, I&#039;ll show you how to do it step by step!<\/p>\n<p>First, we need a <strong>blueprint<\/strong> &#8211; that&#039;s our policy that tells everyone what to do, just like instructions for your favorite toy!<\/p>\n<p>Next, we&#039;ll make a <strong>list of all our treasures<\/strong> (that&#039;s what we call our assets). Think of it like organizing your favorite toys &#8211; some are super special, others are for everyday fun!<\/p>\n<p>I&#039;ll teach you how to sort them into groups, just like <strong>sorting candy by flavor<\/strong>. Regular <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.restack.io\/p\/open-source-tools-asset-tracking-answer-nist-guidelines\">risk assessments<\/a> help identify potential threats to your assets and keep them safe.<\/p>\n<p>We&#039;ll use cool <strong>computer tools<\/strong> to keep track of everything, like having a magical helper that counts your toys.<\/p>\n<p>Have you ever played a video game that saves your progress? That&#039;s exactly what these tools do for us!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Risk_Management_and_Security_Considerations\"><\/span>Risk Management and Security Considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Keeping your <strong>digital toys<\/strong> safe is just like <strong>protecting<\/strong> your favorite teddy bear from getting lost or damaged!<\/p>\n<p>Just as you wouldn&#039;t let your teddy get wet in the rain, we need to keep our computers and devices safe from &#034;digital rain&#034; &#8211; that&#039;s what we call bad stuff that could hurt them.<\/p>\n<p>Let me share some <strong>super cool ways<\/strong> I protect digital stuff, just like you&#039;d protect your toys:<\/p>\n<ul>\n<li>I check for &#034;owies&#034; (that&#039;s what we call problems) by scanning regularly.<\/li>\n<li>I make sure only the right people can play with the toys, like having a secret clubhouse password, which is similar to how <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-for-active-directory\/\">MFA enhances security<\/a> by requiring multiple methods for identity verification.<\/li>\n<li>I keep watching to make sure nothing strange is happening.<\/li>\n<li>I&#039;ve a special plan ready if something goes wrong, like having a Band-Aid ready for scrapes.<\/li>\n<\/ul>\n<p>We need to know what toys we have by making a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/clearedsystems.com\/asset-management-according-to-nist-sp-800-53-securing-your-digital-inventory\/\">detailed inventory list<\/a> of everything in our digital playground.<\/p>\n<p>Think of it like being a <strong>superhero guard<\/strong> for your digital playground &#8211; fun and important at the same time!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Compliance_and_Regulatory_Requirements\"><\/span>Compliance and Regulatory Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After keeping our <strong>digital toys<\/strong> safe, let&#039;s talk about <strong>following the rules<\/strong> &#8211; just like how you follow rules at recess!<\/p>\n<p>You know how there&#039;s a right way to use the slide and swings? Well, computers have special rules too!<\/p>\n<p>I need to make sure all our digital gadgets follow something called <strong>NIST rules<\/strong>. It&#039;s like having a <strong>safety checklist<\/strong> for your toys!<\/p>\n<p>When I follow these rules, it&#039;s like being the best hall monitor ever &#8211; keeping everything <strong>organized and secure<\/strong>. Have you ever sorted your LEGO blocks by color? That&#039;s exactly what I do with computer stuff!<\/p>\n<p>The best part? When we follow these rules, we stay out of trouble and keep everyone&#039;s information as safe as your secret cookie jar hiding spot! Following these guidelines helps us build <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.dataguard.com\/blog\/what-does-nist-compliance-mean\/\">trust with customers<\/a> and keeps our digital playground running smoothly.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_It_Typically_Take_to_Fully_Implement_NIST_Asset_Management\"><\/span>How Long Does It Typically Take to Fully Implement NIST Asset Management?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you straight up &#8211; setting up <strong>NIST asset management<\/strong> usually takes 6-12 months for most companies.<\/p>\n<p>It&#039;s like organizing your biggest toy collection ever! First, you&#039;ve got to count everything (that&#039;s your <strong>inventory<\/strong>), then put sticky labels on each item, and teach everyone the new rules.<\/p>\n<p>Sometimes it can take longer if you&#039;re a really <strong>big company<\/strong>, kind of like sorting through a giant box of LEGO pieces!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Are_the_Average_Costs_Associated_With_NIST_Asset_Management_Implementation\"><\/span>What Are the Average Costs Associated With NIST Asset Management Implementation?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll break down the costs for you!<\/p>\n<p>For <strong>small networks<\/strong> with 25-50 computers, you&#039;re looking at about $200,000.<\/p>\n<p>Medium-sized networks with 50-100 computers cost around $950,000.<\/p>\n<p>Big networks with 750-1500 computers? They&#039;re the priciest at $3.86 million!<\/p>\n<p>Think of it like buying ice cream &#8211; a small cone costs less than a giant sundae.<\/p>\n<p>The bigger your network, the more you&#039;ll spend.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Small_Businesses_Effectively_Implement_NIST_Asset_Management_Practices\"><\/span>Can Small Businesses Effectively Implement NIST Asset Management Practices?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I&#039;ll help you understand how <strong>small businesses<\/strong> can use NIST!<\/p>\n<p>Think of it like organizing your toys &#8211; it&#039;s totally doable. You can start small by making a list of your computers and phones, just like counting blocks.<\/p>\n<p>I&#039;ve seen tiny shops use <strong>simple spreadsheets<\/strong> to track their stuff. You don&#039;t need fancy tools &#8211; just start with <strong>basic steps<\/strong> and grow from there.<\/p>\n<p>What matters is being consistent!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Organizations_Update_Their_NIST_Asset_Management_Procedures\"><\/span>How Often Should Organizations Update Their NIST Asset Management Procedures?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend updating your <strong>NIST asset management procedures<\/strong> at least once a year.<\/p>\n<p>It&#039;s like <strong>cleaning your room<\/strong> &#8211; you can&#039;t just do it once and forget about it!<\/p>\n<p>You&#039;ll also want to make changes whenever big things happen, like getting new computers or changing how your company works.<\/p>\n<p>Think of it as keeping your security &#034;fresh and clean,&#034; just like changing your toothbrush every few months.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Certifications_Do_Professionals_Need_to_Manage_NIST_Asset_Management_Programs\"><\/span>What Certifications Do Professionals Need to Manage NIST Asset Management Programs?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend several <strong>key certifications<\/strong> for <strong>NIST asset management<\/strong>: CISSP (Certified Information Systems Security Professional), CompTIA Security+, and CISA (Certified Information Systems Auditor).<\/p>\n<p>While these aren&#039;t mandatory, they&#039;ll boost your expertise and credibility.<\/p>\n<p>You&#039;ll also want specific NIST framework training through the <strong>NIST professional development courses<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you delve into the importance of <strong>NIST asset management<\/strong>, don&#039;t overlook the critical role that <strong>password security<\/strong> plays in safeguarding your organization&#039;s assets. Just as you manage your physical and digital resources, it&#039;s essential to implement robust password management and passkey solutions to protect sensitive information. Weak passwords can lead to breaches that undermine all your hard work in asset management.<\/p>\n<p>Now is the perfect time to take action! I encourage you to explore comprehensive <strong>password management solutions<\/strong> that can streamline your security efforts. Check out <strong>LogMeOnce<\/strong>, which offers innovative tools for managing your passwords effectively. By signing up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can <strong>enhance your security posture<\/strong> and ensure that your organization&#039;s valuable resources remain protected. Don&#039;t wait&#x2014;take the first step toward <strong>better security today<\/strong>!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Protect your organization&#8217;s critical assets with NIST asset management, a powerful framework that revolutionizes security and operational efficiency.<\/p>\n","protected":false},"author":5,"featured_media":245897,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[36158,35939,36801],"class_list":["post-245898","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-asset-management-2","tag-cybersecurity-2","tag-nist-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245898"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245898\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245897"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}