{"id":57530,"date":"2024-06-17T14:33:47","date_gmt":"2024-06-17T14:33:47","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/07\/28\/fips-140-2-password-requirements\/"},"modified":"2024-06-17T14:33:47","modified_gmt":"2024-06-17T14:33:47","slug":"fips-140-2-password-requirements","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/","title":{"rendered":"FIPS 140-2 Password Requirements"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2063Are \u200dyou using secure passwords for your \u200cdata\u200d and accounts? In order to ensure optimal data\u200d security, you\u200c must adhere \u2062to the FIPS \u200c140-2 Password\u200b Requirements. These standards \u2064are set forth \u2064by the\u200b US \u200cGovernment \u200dand\u2064 aim to ensure the effectiveness of passwords. FIPS 140-2 Password Requirements\u2062 require\u200d passwords to be at \u200bleast \u20648 characters long, including \u200cat least \u2064one\u2062 capital\u2062 letter, one\u2063 lowercase,\u00a0 \u00a0 \u00a0 one symbol, and one \u200cnumber. \u2064Furthermore, these passwords\u200c should \u200dbe changed on a regular basis for ultimate safety. With these measures,\u2063 businesses \u200cand\u2063 individuals \u2064can ensure that their data \u2064is protected\u2063 from\u200d malicious third parties. Dig more into this article to learn more about FIPS 140-2 Password Requirements.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#1_Understanding%E2%80%8B_the_Basics_of_FIPS_140-2_Password%E2%80%8B_Requirements\" >1. Understanding\u200b the Basics of FIPS 140-2 Password\u200b Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#2_How_to_Strengthen_your%E2%80%8B_Password_with_FIPS_140-2_Password_Requirements\" >2. How to Strengthen your\u200b Password with FIPS 140-2 Password Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#3%E2%80%8D_Tips_to_Meet%E2%81%A3_FIPS_140-2_%E2%81%A3Password_Requirements\" >3.\u200d Tips to Meet\u2063 FIPS 140-2 \u2063Password Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#4_The_Benefits_of_Strict_%E2%80%8DAdherence_to%E2%81%A2_FIPS_140-2%E2%81%A4_Password%E2%81%A3_Rules\" >4. The Benefits of Strict \u200dAdherence to\u2062 FIPS 140-2\u2064 Password\u2063 Rules<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#FIPS_140-2_Password_Requirements_Summary\" >FIPS 140-2 Password Requirements Summary<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/fips-140-2-password-requirements\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-understanding-the-basics-of-fips-140-2-password-requirements\"><span class=\"ez-toc-section\" id=\"1_Understanding%E2%80%8B_the_Basics_of_FIPS_140-2_Password%E2%80%8B_Requirements\"><\/span>1. Understanding\u200b the Basics of FIPS 140-2 Password\u200b Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>FIPS 140-2 Password Requirements is\u2063 an essential security standard issued\u200b by the \u200dUS government.<\/strong> Developed in 2001,\u200b it has become the benchmark \u200bfor protecting \u200dsensitive data that\u200c is used in \u2063all federal government departments and information systems. It is designed to protect data from unauthorized access \u2064and ensure that all <a href=\"https:\/\/logmeonce.com\/consumer-password-manager-and-password-recovery\/pricing-and-comparison\/\">security-related practices comply<\/a>\u2063 with government\u2064 regulations.\u200b Here \u200dare some of\u200b the basics\u2064 to understand\u2062 about\u2064 FIPS 140-2 \u200cpassword \u200crequirements:<\/p>\n<ul>\n<li>Minimum\u200c character length of 8 characters<\/li>\n<li>At least one \u2064upper case letter<\/li>\n<li>At least \u200bone digit or special character<\/li>\n<li>Cannot contain username or \u2063parts of it<\/li>\n<li>Needs to\u2064 be changed at least every \u206390 days<\/li>\n<\/ul>\n<p>It is important to understand that passwords need to be constructed in\u200b a\u2063 way\u200d that is\u200b hard to \u2063guess\u200d and \u200cshould \u2063also be changed regularly. Using a combination of \u200dupper case letters, lower case letters, digits, and special characters is an ideal way to create a secure password \u200cin line\u2064 with FIPS 140-2 standards Password Requirements. \u200bAdditional security measures such\u200c as \u200btwo-factor authentication systems, password reset questions, or biometrics authentication are recommended to ensure\u200b the security of\u200d your data \u2062to\u2062 the highest possible standards.<\/p>\n<h2 id=\"2-how-to-strengthen-your-password-with-fips-140-2\"><span class=\"ez-toc-section\" id=\"2_How_to_Strengthen_your%E2%80%8B_Password_with_FIPS_140-2_Password_Requirements\"><\/span>2. How to Strengthen your\u200b Password with FIPS 140-2 Password Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>FIPS \u2064140-2 Password Requirements<\/b> is a United\u2064 States federal\u200b government technical security standard \u200dused to accredit \u2063cryptographic modules for protecting sensitive information. Securing confidential information is important, and strong passwords are\u200d an important\u2063 first step. Here are a few tips to strengthen a\u200b password with\u2063 FIPS 140-2 Password Requirements:<\/p>\n<ul>\n<li>Pick \u2062a long \u2063password:\u2062 Create a password that has at \u2063least 12 characters.<\/li>\n<li>Include symbols \u200cand \u200cnumbers: \u200dA strong password \u2064should always contain numbers\u2063 or symbols in addition\u2063 to \u2063letters.<\/li>\n<li>Avoid common words:\u2064 Common words are \u200ceasy to guess, so\u200d don\u2019t use them in your password.<\/li>\n<li>Avoid using \u2063personal information: Personal information\u200d like\u200b birth dates, \u2062addresses and phone \u200dnumbers can be easily guessed, so \u200dit\u2019s best to avoid \u200busing it in a \u200dpassword.<\/li>\n<li>Don\u2019t \u200breuse passwords: Remembering lots of passwords can be tricky. Try\u2063 using a \u2063<a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">reliable password \u200cmanager app<\/a> to keep track of\u2063 them.<\/li>\n<li>Change your password regularly: \u200dIt\u2019s \u200dimportant\u200d to regularly\u200c update a \u200dpassword\u200d at least \u2064once every six months.<\/li>\n<\/ul>\n<p>FIPS\u200d 140-2 Password Requirements \u200dalso uses key lockdown techniques to protect keys \u200bfrom\u2062 tampering. Keys can be locked in the cryptographic device itself or stored \u200din a hardware security module that\u200c is \u200bFIPS 140-2 Password Requirements approved.\u2063 With FIPS \u200c140-2 Password Requirements,\u2064 you can rest\u200d assured\u2062 that the encryption will be the\u200d strongest \u2063when\u2063 it comes to \u2064protecting \u200cyour important data.<\/p>\n<h2 id=\"3-tips-to-meet-fips-140-2-password-security-requirements\"><span class=\"ez-toc-section\" id=\"3%E2%80%8D_Tips_to_Meet%E2%81%A3_FIPS_140-2_%E2%81%A3Password_Requirements\"><\/span>3.\u200d Tips to Meet\u2063 FIPS 140-2 \u2063Password Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Creating strong passwords is essential to remain compliant with FIPS 140-2 Password Requirements. To ensure \u2062you\u2019re following the password security guidelines defined \u200cin \u2062this standard,\u2063 here are three \u200dhelpful\u200d tips:<\/p>\n<ul>\n<li><strong>Create long passwords:<\/strong> \u200c Longer passwords \u2062are harder \u200dto crack since they\u200b employ greater complexity.\u2064 Aim\u2063 for\u2064 passwords\u200c that are at \u200bleast 12-16 \u2064characters \u2062long.<\/li>\n<li><strong>Include\u2062 special characters:<\/strong> A combination of\u200b capital and lowercase letters, \u2062numbers, and \u2062special characters \u2063makes a\u200d password \u2062even\u200b more\u200d secure.<\/li>\n<li><strong>Don\u2019t re-use \u200bpasswords:<\/strong> \u200d It may \u200cbe \u2062tempting\u200b to re-use\u200c old \u200bpasswords but don\u2019t! \u2062When you do that, you \u200dput your security at risk.<\/li>\n<\/ul>\n<p>FIPS \u2063140-2\u2064 Password Requirements also sets a requirement to \u2062regularly review and change passwords. To ensure your passwords\u200d are always as secure as\u2064 possible, you should\u2064 periodically\u2064 change them. It\u2019s helpful \u2064to\u2063 make a habit\u2063 of changing passwords every \u2063few\u200b months.<\/p>\n<h2 id=\"4-the-benefits-of-strict-adherence-to-fips-140-2-password-rules\"><span class=\"ez-toc-section\" id=\"4_The_Benefits_of_Strict_%E2%80%8DAdherence_to%E2%81%A2_FIPS_140-2%E2%81%A4_Password%E2%81%A3_Rules\"><\/span>4. The Benefits of Strict \u200dAdherence to\u2062 FIPS 140-2\u2064 Password\u2063 Rules<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When\u200d it comes\u2064 to the\u2064 security \u200cof\u200c a company\u2019s sensitive \u2064data, one can never be too careful. Strict \u200cadherence \u200bto the FIPS 140-2 Password Requirements is \u200ban important asset in keeping the data safe\u2062 from malicious\u2062 actors. \u2064Here \u2064are some of\u2064 the\u2062 benefits of following the rules set out in the FIPS\u200d 140-2 Password Requirements:<\/p>\n<ul>\n<li><strong>Clear Rules and Standards<\/strong>:\u200c Strict adherence to these guidelines ensure that everyone within the company is \u2062aware of the criteria \u200dfor\u200b securing the data, and\u200b that all \u2064steps are taken\u200b to \u200bminimize any potential risks.<\/li>\n<li><strong>Increased\u2062 Security<\/strong>: The\u2063 guidelines provide best-practices\u2062 that \u200dcompanies should adopt\u2064 in order to mitigate\u200d the threats of malicious actors looking to\u2062 exploit weaknesses in \u2064their security systems.<\/li>\n<li><strong>Better Protection\u2064 Against Attacks<\/strong>:\u2064 By\u2063 following the secure\u2063 protocols set out\u2063 in the\u200c FIPS 140-2 Password Requirements, it increases the difficulty for malicious actors\u200c to gain\u2064 access\u200c to sensitive\u200b data and become\u200c the\u200b target of \u200ca\u2064 data breach.<\/li>\n<\/ul>\n<p>Following the\u200d FIPS\u200d 140-2 Password Requirements thoroughly ensures that \u2064all data is kept\u200c as safe as possible. Following the standards\u2063 meticulously\u200c result in better \u2063protection and peace of mind for \u2063those\u2064 responsible \u200bfor the data. At the end of the day, the goal of any\u200b organization is to ensure \u2063that their data is \u200dsafeguarded\u200d and secure.<\/p>\n<p>FIPS 140-2 is a set of requirements for <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/fips\/140\/2\/final\" target=\"_blank\" rel=\"noopener nofollow\">cryptographic<\/a> modules that are used by the US federal government and other regulated industries. These requirements cover a wide range of topics, including password encryption and management. The FIPS 140-2 standard mandates the use of strong passwords and encryption algorithms to protect sensitive information. Password requirements include the use of character classes, symmetric encryption, and secure modes of operation. Key file management, configuration file encryption, and property value encryption are also important components of FIPS 140-2 compliance. Source: National Institute of Standards and Technology (NIST) Special Publication 800-140, FIPS PUB 140-2.<\/p>\n<p>FIPS 140-2 Password Requirements encompass a comprehensive list of comma delimited keywords that define error messages, certified enterprise software, software for cloud applications, software for containers, automation products, source products, relevant properties, qualitative levels, learning paths, server components, customer solutions, System Status, source IT industry events, AnsibleFest Register, cloud application development, container-based environments, and more.<\/p>\n<p>The FIPS 140-2 compliance ensures that password management systems meet stringent security criteria set by the National Institute of Standards and Technology (NIST). When deploying FIPS-compliant password databases, organizations must adhere to specific encryption algorithms, authentication processes, and system logging capabilities to ensure data protection and security. By following FIPS guidelines, companies can enhance their password management practices and protect sensitive information effectively. Sources: National Institute of Standards and Technology (NIST), FIPS 140-2 Security Requirements for Cryptographic Modules.<\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<caption>\n<h2><span class=\"ez-toc-section\" id=\"FIPS_140-2_Password_Requirements_Summary\"><\/span>FIPS 140-2 Password Requirements Summary<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/caption>\n<tbody>\n<tr>\n<th style=\"background-color: lightgray; font-weight: bold; font-size: 1.1em;\">Key Points<\/th>\n<th style=\"background-color: lightgray; font-weight: bold; font-size: 1.1em;\">Description<\/th>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center; font-weight: bold;\">Minimum Length<\/td>\n<td style=\"text-align: center;\">8 characters<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"text-align: center; font-weight: bold;\">Character Requirements<\/td>\n<td style=\"text-align: center;\">At least 1 uppercase, 1 lowercase, 1 symbol, 1 number<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center; font-weight: bold;\">Change Frequency<\/td>\n<td style=\"text-align: center;\">Every 90 days<\/td>\n<\/tr>\n<tr style=\"background-color: white;\">\n<td style=\"text-align: center; font-weight: bold;\">Strong Password Tips<\/td>\n<td style=\"text-align: center;\">Long passwords, include symbols and numbers, avoid common words<\/td>\n<\/tr>\n<tr style=\"background-color: lightblue;\">\n<td style=\"text-align: center; font-weight: bold;\">Security Benefits<\/td>\n<td style=\"text-align: center;\">Clear rules and standards, increased security, better protection against attacks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q:\u2062 What are the requirements for a password\u2063 under Fips 140-2 guidelines?<br \/>\nA: \u200bFips\u200b 140-2\u200b Password Requirements require a password\u200d to have at least \u200beight characters, including some combination of at least two \u2064of the following four \u200ccategories: uppercase letters, lowercase letters,\u2063 numbers, and \u200cspecial characters. The password should\u200b also\u200b not \u2064use \u2062obvious words \u200dor phrases. \u2062It should be unique and \u2063hard for someone else to \u200dguess.<\/p>\n<p>Q: What are the FIPS 140-2 password requirements?<br \/>\nA: FIPS 140-2 password requirements are regulations set by the Federal Information Processing Standards (FIPS) that dictate the standards for cryptographic algorithms and security requirements for protecting sensitive information. These requirements include using FIPS-compliant algorithms, secure connections, and password encryption.<\/p>\n<p>Q: What is the significance of FIPS 140-2 compliant passwords?<br \/>\nA: FIPS 140-2 compliant passwords ensure that user passwords meet the necessary security requirements as defined by the FIPS certification standard. This helps in protecting sensitive data and ensuring a secure operational environment.<\/p>\n<p>Q: How can FIPS 140-2 mode be enabled for cryptographic algorithms?<br \/>\nA: FIPS 140-2 mode can be enabled by selecting FIPS-compliant algorithms and implementations when configuring cryptographic software. This ensures that the algorithms used meet the FIPS 140-2 security compliance standards.<\/p>\n<p>Q: What are the key considerations for ensuring FIPS 140-2 compliance in password databases?<br \/>\nA: Key considerations for FIPS 140-2 compliance in password databases include using FIPS-compliant encryption algorithms, storing password credentials securely, and avoiding plain text passwords. It is essential to follow best practices for password storage and encryption.<\/p>\n<p>Q: What are some common errors that can occur when failing to meet FIPS 140-2 password requirements?<br \/>\nA: Errors such as failure to enable FIPS mode, using non-compliant encryption algorithms, and storing passwords in plain text can lead to non-compliance with FIPS 140-2 standards. It is important to follow the specified password requirements to avoid potential security vulnerabilities.<\/p>\n<p>Sources:<br \/>\n1. Federal Information Processing Standards (FIPS) Publication 140-2: https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.140-2.pdf<br \/>\n2. National Institute of Standards and Technology (NIST) Cryptographic Module Validation Program (CMVP): https:\/\/csrc.nist.gov\/Projects\/cryptographic-module-validation-program<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To ensure your passwords\u2064 meet the\u200d FIPS\u200d 140-2 requirements, create a FREE\u200c LogMeOnce account\u200d today. Secure password management with two-factor authentication, biometric verification, and auto-fill are\u2062 just \u2063some of the\u200b features you \u2063get \u2062with your \u200caccount. LogMeOnce \u200bis committed to creating\u2062 a secure digital\u200b environment where users can \u200bstore their\u200c passwords and \u200bconfidential information in\u200d a\u2062 <a href=\"https:\/\/logmeonce.com\/\">secure \u2063and safe place<\/a>. FIPS 140-2 password requirements are\u2062 quickly becoming\u2062 an industry standard, so don\u2019t\u200d wait to start\u2063 creating a secure \u200bpassword management \u2064with LogMeOnce. FIPS\u2064 140-2 \u2062password requirements are \u200dvital for the security of any online account, so get started\u200c with LogMeOnce \u2063today and start protecting your sensitive information now. \u200b<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2063Are \u200dyou using secure passwords for your \u200cdata\u200d and accounts? In order to ensure optimal data\u200d security, you\u200c must adhere \u2062to the FIPS \u200c140-2 Password\u200b Requirements. These standards \u2064are set forth \u2064by the\u200b US \u200cGovernment \u200dand\u2064 aim to ensure the effectiveness of passwords. FIPS 140-2 Password Requirements\u2062 require\u200d passwords to be at \u200bleast \u20648 characters [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[18730,18731,14493,5199,996],"class_list":["post-57530","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-140-2","tag-security-standards","tag-fips","tag-password-requirements","tag-passwords"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/57530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=57530"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/57530\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=57530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=57530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=57530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}