{"id":73054,"date":"2024-06-20T16:12:51","date_gmt":"2024-06-20T16:12:51","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/14\/mfa-requirements-for-pci-compliance\/"},"modified":"2024-08-25T04:16:31","modified_gmt":"2024-08-25T04:16:31","slug":"mfa-requirements-for-pci-compliance","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/","title":{"rendered":"MFA Requirements For Pci Compliance"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>For organizations\u200c that manage credit card data, the \u2064MFA Requirements\u2064 For PCI\u2063 Compliance \u2062are essential for secure data storage and processing. Multi-factor \u200cauthentication (MFA) is\u2063 a \u200dcritical \u200csecurity measure that organizations must\u2063 have in place in order to meet PCI guidelines and protect customer data. Effective\u2063 MFA\u2063 requires a variety of \u200dmethods to allow organizations to quickly authenticate users \u200dwithin their\u200d systems without compromising\u2064 data security. This article will\u2062 explore the basic requirements of MFA for\u200d PCI Compliance \u2063and\u2062 how organizations can leverage \u200btechnology to ensure that their customer data\u200d remains secure. With multiple authentication \u200cmethods such \u2063as \u200bbiometric authentication, mobile authentication, and security \u200ctokens, organizations can \u200cstrengthen their \u2064MFA Requirements For PCI Compliance while ensuring\u200b that\u200d customers\u2019 data \u2063is secure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#1_Meeting_PCI_%E2%80%8CCompliance_Requirements_with_a_Masters_Degree\" >1. Meeting PCI \u200cCompliance Requirements with a Master\u2019s Degree<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#2_What_You_Need_to_Know_%E2%81%A2About_Masters_of_Fine_Arts_Programs_and_PCI_Compliance\" >2. What You Need to Know \u2062About Master\u2019s of Fine Arts Programs and PCI Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#3_%E2%80%8CUnderstanding_the_%E2%81%A3Necessary_Requirements_for%E2%80%8D_MFA-level_PCI_Compliance\" >3. \u200cUnderstanding the \u2063Necessary Requirements for\u200d MFA-level PCI Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#4_How%E2%80%8B_to_Find_the_%E2%80%8BRight_MFA_Program_to_Achieve%E2%81%A3_PCI_Compliance_Goals\" >4. How\u200b to Find the \u200bRight MFA Program to Achieve\u2063 PCI Compliance Goals<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#Key_Requirements_for_MFA_in_PCI_Compliance\" >Key Requirements for MFA in PCI Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-requirements-for-pci-compliance\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-meeting-pci-compliance-requirements-with-a-masters-degree\"><span class=\"ez-toc-section\" id=\"1_Meeting_PCI_%E2%80%8CCompliance_Requirements_with_a_Masters_Degree\"><\/span>1. Meeting PCI \u200cCompliance Requirements with a Master\u2019s Degree<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Meeting \u2063PCI compliance \u2063requirements \u2063can be\u2064 a tricky business for organizations. \u200bIt is often seen as being the most complex and comprehensive undertaking within any company\u2019s security efforts. A master\u2019s degree\u200c can\u200c help organizations understand\u200c the implications of\u200d this process and \u2064devise\u200d effective strategies\u200d to stay compliant. Here are \u200dfew ways\u2064 in which a master\u2019s degree \u200dcan assist\u2063 organizations\u200b in achieving PCI Compliance:<\/p>\n<ul>\n<li><strong>Knowledge \u2064of the industry:<\/strong> Having a master\u2019s degree \u200cin a\u2062 relevant field gives\u200c organizations a better sense of the industry regulations \u2063and standards, which \u2063is key \u200bto navigating the intricacies of PCI Compliance.<\/li>\n<li><strong>Security expertise:<\/strong> Having\u2062 a \u2064master\u2019s \u2062degree also allows organizations to better understand \u2063the risks and security mechanisms, as\u2063 well as the importance of protecting \u2063customer \u200ddata \u2064and preserving the integrity of systems.<\/li>\n<li><strong>Certification:<\/strong> Achieving a\u200c master\u2019s degree\u2062 in a relevant field also gives organizations the \u200bopportunity \u2062to \u200bcertify their professionals to \u2064access the latest security standards and best\u2063 practices.<\/li>\n<\/ul>\n<p>At the end of the day, having a successful PCI Compliance \u2062program \u2062requires a comprehensive understanding\u200c of the \u2062nuances and considerations that \u2062come with it. With\u200b a master\u2019s \u2064degree, organizations can have\u2062 better \u2064expertise on the technological\u200d and legal\u200c aspects of this critical process.<\/p>\n<h2 id=\"2-what-you-need-to-know-about-masters-of-fine-arts-programs-and-pci-compliance\"><span class=\"ez-toc-section\" id=\"2_What_You_Need_to_Know_%E2%81%A2About_Masters_of_Fine_Arts_Programs_and_PCI_Compliance\"><\/span>2. What You Need to Know \u2062About Master\u2019s of Fine Arts Programs and PCI Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you\u2019re embarking \u2064on a career in \u2064the creative sector, a \u2064Master\u2019s of\u2064 Fine Arts program is a must. You\u2019ll need\u2063 to\u200b understand the different aspects of the\u2063 field,\u200d such\u200c as regulations, procedure and industry standards, in\u2064 order to succeed.<\/p>\n<p>One \u200cimportant thing to consider is \u2064PCI compliance. This stands for Payment Card Industry, and \u200drefers\u200d to \u200dregulations on how \u200ccredit cards can be processed. \u2063A college or university offering an MFA must comply \u200cwith this, or risk \u2063large fines and legal actions. Here\u2019s what you need to know: \u200b<\/p>\n<ul>\n<li><b>The regulations: <\/b>As part of the Payment Card \u2063Industry Data \u2062Security Standard,\u200c PCI requires \u2063organisations\u2063 to keep credit card numbers\u200d secure \u200band confidential at \u200call times.<\/li>\n<li><b>The roles:<\/b> MFA programs must also appoint someone, typically an IT\u2062 expert,\u200c who is responsible\u2064 for monitoring the\u200b college or \u2062university\u2019s compliance.<\/li>\n<li><b>The \u2064security: <\/b>The \u200dcardholders\u2019 security must also be taken into account. Encryption, firewalls \u2063and PCI-approved software can help protect their\u200b data.<\/li>\n<\/ul>\n<p>\u200c<\/p>\n<p>So if you\u2019re considering \u200benrolling in a Master\u2019s of Fine Arts \u2062program, make sure\u2064 the \u200ccollege or\u2063 university is \u2064compliant with PCI \u2062regulations. Doing this can ensure you\u2019re well-equipped to succeed and\u2063 advancing\u200c your career. \u2064<\/p>\n<h2 id=\"3-understanding-the-necessary-requirements-for-mfa-level-pci-compliance\"><span class=\"ez-toc-section\" id=\"3_%E2%80%8CUnderstanding_the_%E2%81%A3Necessary_Requirements_for%E2%80%8D_MFA-level_PCI_Compliance\"><\/span>3. \u200cUnderstanding the \u2063Necessary Requirements for\u200d MFA-level PCI Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Understanding \u200dPCI \u200cCompliance at the \u2064MFA Level<\/b><\/p>\n<p>Multi-factor authentication \u2062(MFA) is an increasingly popular security\u2063 requirement for payments\u200d and other sensitive transactions. MFA ensures that customers \u200dhave the \u2062most \u2063secure\u200c and reliable way of accessing sensitive data \u2062and resources. \u200bTo get your business\u2063 PCI compliant at the MFA level, there are \u200dsome \u2063things you\u2019ll need to be aware of.<\/p>\n<p>One of the \u200dprimary\u200b requirements \u2062is\u200c collecting\u200d and storing customer\u2019s authentication data. This data is usually collected as part of the\u2064 customer\u2019s login process, and must be stored securely. Some businesses choose to\u2062 use\u200d two-factor \u200dauthentication (2FA), which adds \u2062an \u200bextra layer of security, and might be required for certain\u200b industries.<\/p>\n<p>You\u2019ll also\u200c need \u200cto\u200c choose an \u2062MFA vendor. Look for\u200c one that provides reliable technology, is \u2063supported by \u200cstrong \u2064customer service, and meets your specific\u2062 security requirements.\u2064 Finally, make \u2062sure you\u2019re familiar with industry \u2062regulations and standards like the Payment Card Industry Data Security Standard (PCI DSS)\u200d and the Australasian Encryption Standard (AES).\u2063<\/p>\n<p>These requirements are essential for \u200dunderstanding and achieving MFA-level\u2063 PCI compliance. \u2063Taking\u200b the time to familiarize\u200d yourself with these requirements can help \u2062your business operate\u200c safely and effectively within the parameters of MFA-level PCI \u2062standards.<\/p>\n<h2 id=\"4-how-to-find-the-right-mfa-program-to-achieve-pci-compliance-goals\"><span class=\"ez-toc-section\" id=\"4_How%E2%80%8B_to_Find_the_%E2%80%8BRight_MFA_Program_to_Achieve%E2%81%A3_PCI_Compliance_Goals\"><\/span>4. How\u200b to Find the \u200bRight MFA Program to Achieve\u2063 PCI Compliance Goals<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It can\u2063 be difficult to identify the\u2064 right Master of Fine Arts \u2062(MFA) \u200dprogram to meet your\u200c Payment Card Industry (PCI) compliance goals. It\u2019s important to make sure that the program\u2063 can provide the level \u200bof security required for any accepted payment card information. Fortunately, there are a few tips\u200b to help \u2063you learn more and identify the right program to meet \u200dyour \u200dneeds.<\/p>\n<ul>\n<li><strong>Research\u200d the Program\u2019s CVSS<\/strong> \u2013 Make\u2062 sure\u2063 to research the\u200b CVSS score of the program\u2062 to ensure that it meets the \u2063latest\u2063 PCI \u2063requirements.<\/li>\n<li><strong>Check Compliance\u200c Requirements Regularly<\/strong>\u2013 The PCI compliance requirements are regularly \u2062changing, so make sure to stay up to \u2063date with \u2062any changes.<\/li>\n<li><strong>Have Regular \u200dSecurity Audits<\/strong> \u2013 Have regular\u2064 security\u200c audits performed on \u200ball programs for any payment card information stored or\u200b processed.<\/li>\n<\/ul>\n<p>The MFA\u200c program \u2063chosen should\u2063 have a proven track record of success\u2064 in \u2062data security and\u2063 meeting \u2062PCI standards. Additionally, any\u200b program chosen should also include the ability to meet the requirements of both \u200dVisa and Mastercard. Make sure to review these requirements when\u2062 researching the right MFA program to meet your PCI compliance goals.<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a crucial requirement for PCI compliance in ensuring secure access to sensitive data and systems within the payments industry. MFA involves the use of multiple authentication methods such as one-time passwords, biometrics, or security tokens to verify the identity of a user before granting access. This additional layer of security helps protect against potential consequences of unauthorized user access and reduces the risk of fraudulent activities in online transactions.<\/span><\/p>\n<p>The PCI DSS v4.0 specifically emphasizes the importance of MFA for remote access, non-console administrative access, and network security devices to uphold the level of security required for compliance. Organizations are encouraged to implement MFA systems that meet the requirements outlined in the 800-63B Digital Identity Guidelines to enhance user authentication practices and safeguard payment transactions. Additionally, compliance with MFA requirements also aligns with government regulations and industry standards set by major credit card companies such as Visa Inc., American Express, and JCB International.<\/p>\n<p>By incorporating MFA solutions like FIDO-based authentication or behavioral biometrics, organizations can strengthen their security controls and ensure a secure environment for user accounts and sensitive authentication processes. It is essential for businesses to regularly update their security frameworks and practices to address emerging threats and maintain compliance with PCI requirements for multi-factor authentication. Sources: PCI Security Standards Council<\/p>\n<p><span style=\"font-size: revert; color: initial;\">MFA requirements for PCI compliance are essential for ensuring the security of mobile devices and remote network access in various environments such as cloud environments. Multi-factor authentication, including biometric and behavioral authentication, is crucial for successful authentication and reducing the risk of fraud in credit card transactions. Previous versions of authentication processes are increasingly being replaced with stronger authentication requirements, including complex passwords with alphabetic and special characters, as well as physical and logical security tokens for access privileges.<\/span><\/p>\n<p>Compliance with PCI requirements, such as 8.4 and 8.5 multi-factor authentication systems, is necessary for organizations to protect user identity and reduce the risk of unauthorized access to resources. By implementing secure practices and access control policies, organizations can mitigate potential misconfigurations and ensure compliance with PCI standards. Sources: pcisecuritystandards.org<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Requirements_for_MFA_in_PCI_Compliance\"><\/span>Key Requirements for MFA in PCI Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Row<\/th>\n<th>Requirement<\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Understanding of PCI regulations<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Implementation of multi-factor authentication<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Utilization of biometric authentication<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Regular security audits for compliance<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Stay updated with PCI requirements<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Secure storage of user authentication data<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Choose reliable MFA vendor<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>Compliance with industry standards like PCI DSS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: \u200bWhat are the MFA Requirements\u2064 For PCI Compliance?<br \/>A:\u200d Multi-Factor Authentication (MFA)\u2062 is\u200c an important \u2064requirement for PCI \u2064Compliance.\u2063 MFA requires users to provide more\u2062 than\u200d one form of\u200d authentication when logging into \u2062an\u2062 online account. These \u2063forms can include passwords, security questions, \u2062fingerprint\u2062 scanning,\u200c or even a code sent\u200b to a \u200buser\u2019s cell phone. \u200dMFA \u200cadds an extra layer\u200b of security so your\u2062 data and payments are \u200bbetter protected from hackers or cyber\u200b attacks.<\/p>\n<p>\u00a0<\/p>\n<p>Q: What are the MFA requirements for PCI compliance?<br \/>A: The MFA requirements for PCI compliance involve using multiple independent factors for authentication to access the cardholder data environment. This includes something the user knows (such as a password), something the user has (such as a smart card or token device), and something the user is (such as biometric authentication like facial or voice recognition). This multi-factor authentication helps to prevent unauthorized access to sensitive cardholder data.<br \/><br \/>Q: What factors are considered for authentication in MFA?<br \/>A: The factors for authentication in MFA include possession factors (something the user has), knowledge factors (something the user knows), and inherence factors (something the user is). By combining multiple factors for authentication, organizations can implement stronger security measures to protect against unauthorized access.<br \/><br \/>Q: How does MFA help in ensuring network security?<br \/>A: MFA helps in ensuring network security by requiring users to authenticate through multiple means. This prevents a single authentication factor from being compromised and helps to reduce the risk of unauthorized access through methods such as replay attacks or brute force attacks. MFA also enhances security postures by requiring additional authentication factors for users trying to access the network.<br \/><br \/>Q: What are some examples of factors used in MFA?<br \/>A: Examples of factors used in MFA include something the user knows (such as a password or PIN), something the user has (such as a smart card or token device), and something the user is (such as biometric data like fingerprint or facial recognition). By combining these different types of factors, organizations can implement stronger authentication requirements to protect sensitive data.<br \/><br \/>Q: How does MFA benefit compliance with PCI DSS?<br \/>A: MFA benefits compliance with PCI DSS by helping organizations meet the requirement for multi-factor authentication outlined in the standard. By implementing MFA, organizations can enhance access security and reduce the risk of unauthorized access to cardholder data systems. This aligns with the security objectives of PCI DSS and helps organizations ensure compliance with industry regulations and standards.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-[20px] text-message flex w-full flex-col items-end gap-2 break-words [.text-message+&amp;]:mt-5 overflow-x-auto whitespace-pre-wrap\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"5842bc25-49b2-43f9-9e2a-c2f202e720d0\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>When it comes to meeting MFA requirements for PCI compliance, setting up a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account is the perfect solution. LogMeOnce delivers high-level security, allowing users to easily meet even the most complex MFA requirements for PCI compliance. With passwordless login and strong authentication, LogMeOnce provides a comprehensive solution for PCI compliance, MFA requirements, and enhanced security.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<p><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Learn the MFA requirements for PCI compliance and how they protect sensitive data. If you need to create an account, get a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. <\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[935,21463,1739,8990,11055,21464,21465],"class_list":["post-73054","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-cybersecurity","tag-compliance-guidelines","tag-data-security","tag-information-security","tag-mfa","tag-payment-card-industry","tag-pci-compliance"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=73054"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73054\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=73054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=73054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=73054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}