{"id":633,"date":"2018-02-23T17:06:41","date_gmt":"2018-02-23T17:06:41","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=633"},"modified":"2020-05-06T10:27:08","modified_gmt":"2020-05-06T17:27:08","slug":"part-1-4-practical-advice-to-network-and-security-operations","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/","title":{"rendered":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance"},"content":{"rendered":"<h1 id=\"toc-hId-474173167\">Part 1 &#8211; Introduction<\/h1>\n<p>The\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/General_Data_Protection_Regulation\" target=\"_self\" rel=\"nofollow noopener noreferrer\">General Data Protection Regulation\u00a0or GDPR\u00a0<\/a>is due to take effect on May 25, 2018. Although the regulation was designed by the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/European_Parliament\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">European Parliament<\/a>, the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Council_of_the_European_Union\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Council of the European Union<\/a>\u00a0and\u00a0for the individuals within the European Union, the impact of the regulation will be global. What follows is a four-part series containing some practical advice to support the efforts in achieving GDPR compliance in the core of your network operations and security.<\/p>\n<p>First, let\u2019s\u00a0be clear, Infoblox does not have a magic wand or solution that makes your organization GDPR compliant. This is because no one has a \u201csolution\u201d for GDPR because it involves a combination of people, process, and technology. There are of course tools to help with GDPR compliance to a greater or lesser extent and certainly, Infoblox technology can help in a network security context. But the suggestions presented here are applicable whether you are an Infoblox customer or not and are intended for network and security teams as you focus on supporting compliance.<\/p>\n<p>It is important to view compliance as an opportunity rather than an overhead. It is a chance to improve things you have been putting off and acts as a driver to check you are adhering to standard or \u201cbest\u201d practice.<\/p>\n<p>You may remember implementing ISO 9000 accreditation (BS 5750 in the UK). One of the key principles was to document what you were actually doing and ensure there was documentation showing you did what you said you did.<\/p>\n<p>The requirements of the GDPR are reminiscent of ISO 9000 accreditation, particularly the need to disclose any breach within 72 hours, along with the need for the details outlined in Article 33 of the GDPR. Working backward from the disclosure requirement, the assessment of any malicious activity becomes paramount. Processes around assessment will be critical in the context of GDPR, as will the evidence that they are being carried out.<\/p>\n<p>There is a compliance element to network security, including services such as DNS, DHCP and IP Address Management (DDI). In some cases, these services, and the processes and security they facilitate involve data relating to an identified data subject (\u201cpersonal data\u201d as defined by the GDPR). Data gathered from these services is critical to security (and hence GDPR) and the positive news is that DDI data is not \u201csensitive data\u201d as defined by GDPR, which is subject to additional protections and restrictions.<\/p>\n<p>There are 3 topics that reside at the intersection of GDPR and DDI:<\/p>\n<ul>\n<li><a href=\"\/community\/part-2-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Architecture review<\/a>\u00a0&#8211; Identify and reduce risk, focusing on DNS as a point of control and visibility.<\/li>\n<li><a href=\"\/community\/part-3-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Support of security operations<\/a>\u00a0&#8211; Assess the impact of potential malicious network activity along with information sharing, enriching context and signaling between security tools.<\/li>\n<li><a href=\"\/community\/part-4-4-practical-advice-to-network-and-security-operations\/\" target=\"_self\" rel=\"noopener noreferrer\">Governance around DDI data<\/a>\u00a0&#8211; DDI data really helps in terms of network security but some of it will fall under the GDPR as some DDI data relates to a person.<\/li>\n<\/ul>\n<p>Check out the blog for each topic for an in-depth analysis as well as for checklists to determine if you have achieved the identified objectives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part 1 &#8211; Introduction The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018. Although the regulation was designed by the\u00a0European Parliament, the\u00a0Council of the European Union\u00a0and\u00a0for the individuals within the European Union, the impact of the regulation will be global. What follows is a four-part series containing some practical advice to [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":636,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,43],"class_list":{"0":"post-633","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-gdpr","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance<\/title>\n<meta name=\"description\" content=\"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\" \/>\n<meta property=\"og:description\" content=\"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-23T17:06:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jim Mozley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jim Mozley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/\"},\"author\":{\"name\":\"Jim Mozley\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\"},\"headline\":\"[Part 1\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\",\"datePublished\":\"2018-02-23T17:06:41+00:00\",\"dateModified\":\"2020-05-06T17:27:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/feb-19.jpg\",\"keywords\":[\"DDI\",\"GDPR\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/\",\"name\":\"[Part 1\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/feb-19.jpg\",\"datePublished\":\"2018-02-23T17:06:41+00:00\",\"dateModified\":\"2020-05-06T17:27:08+00:00\",\"description\":\"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/feb-19.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/feb-19.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/part-1-4-practical-advice-to-network-and-security-operations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"[Part 1\\\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/0b615219b32a2c6209c9028af8b9ea10\",\"name\":\"Jim Mozley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_213_1744659534-96x96.jpg\",\"caption\":\"Jim Mozley\"},\"description\":\"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/jim-mozley\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","description":"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/","og_locale":"en_US","og_type":"article","og_title":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","og_description":"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/","og_site_name":"Infoblox Blog","article_published_time":"2018-02-23T17:06:41+00:00","article_modified_time":"2020-05-06T17:27:08+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg","type":"image\/jpeg"}],"author":"Jim Mozley","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jim Mozley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/"},"author":{"name":"Jim Mozley","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10"},"headline":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","datePublished":"2018-02-23T17:06:41+00:00","dateModified":"2020-05-06T17:27:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/"},"wordCount":517,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg","keywords":["DDI","GDPR"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/","url":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/","name":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg","datePublished":"2018-02-23T17:06:41+00:00","dateModified":"2020-05-06T17:27:08+00:00","description":"The\u00a0General Data Protection Regulation\u00a0or GDPR\u00a0is due to take effect on May 25, 2018.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/feb-19.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/part-1-4-practical-advice-to-network-and-security-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"[Part 1\/4] Practical Advice to Network and Security Operations Pros Regarding GDPR Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/0b615219b32a2c6209c9028af8b9ea10","name":"Jim Mozley","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_213_1744659534-96x96.jpg","caption":"Jim Mozley"},"description":"Jim Mozley has managed TLD and Protective DNS services that are part of the UK Critical National Infrastructure and TLDs for major global tech companies and brands. Jim has a long history with DNS (and DHCP &amp; IP Address Management), working with customers on implementation, migrations, education, bespoke development, integration, and DNS related threat intelligence. In his current role, Jim works on supporting customers in the intersection of security, regulatory compliance and technical standards. He truly believes that it always starts with DNS and Jim is passionate about using it as a foundational layer of network security. It might be the firewall, but it\u2019s probably DNS.","url":"https:\/\/www.infoblox.com\/blog\/author\/jim-mozley\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=633"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/633\/revisions"}],"predecessor-version":[{"id":1195,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/633\/revisions\/1195"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/636"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}