{"id":6507,"date":"2021-07-19T06:30:43","date_gmt":"2021-07-19T13:30:43","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6507"},"modified":"2021-07-19T13:15:51","modified_gmt":"2021-07-19T20:15:51","slug":"dns-as-a-security-tool-well-duh","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/","title":{"rendered":"DNS as a Security Tool?  Well, Duh!"},"content":{"rendered":"<p>I just finished reading Gartner&#8217;s new&#8211;and mercifully short\u2014report on using <a target=\"_blank\" href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/gartner-how-can-organizations-use-dns-to-improve-their-security-posture\" rel=\"noopener noreferrer\"><b>DNS to improve security posture<\/b><\/a>.<br \/>\n<a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/gartner-how-can-organizations-use-dns-to-improve-their-security-posture\"><img loading=\"lazy\" decoding=\"async\" style=\"float: right;width: 250px; margin-left: 25px; box-shadow: 0 0 10px #d7d7d7;\" class=\"alignnone size-full wp-image-6508\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-gartner-blog.png\" alt=\"\" width=\"556\" height=\"625\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png 556w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog-267x300.png 267w\" sizes=\"auto, (max-width: 556px) 100vw, 556px\" \/><\/a><\/p>\n<p>It&#8217;s encouraging to read Gartner analysts actively supporting DNS as an effective means of preventing, detecting and responding to security threats. Gartner obviously has tremendous reach as an organization, and with luck, this document will bring some organizations around to using DNS for security purposes that have been skeptical or simply slow to adopt until now.<\/p>\n<p>Gartner specifically calls out two issues that Infoblox has tried to highlight for some time:<\/p>\n<ol>\n<li style=\"margin-bottom:15px;\">The importance of having control over your organization&#8217;s DNS resolution. With this control, organizations can prevent its users, software and devices from communicating with malware command-and-control infrastructure and phishing sites, as well as much else. Logs of DNS resolution can be invaluable when analyzing successful compromises and trying to gauge their extent. Passive DNS data can be fed into machine learning algorithms to detect more subtle abuses.<\/li>\n<li>The threat of certain DNS over HTTPS (DoH) implementations to the previous, as some implementations (I&#8217;m looking at you, Firefox) ignore system- and network-derived DNS configuration to use an entirely different set of DNS servers. By allowing this circumvention of their own DNS infrastructure, organizations are not only giving their sensitive, private DNS telemetry to a DNS provider they have no formal relationship with, they&#8217;re also foregoing the many benefits that controlling your own DNS infrastructure can provide (see above).<\/li>\n<\/ol>\n<p>Gartner also mentions the utility of secure, cloud-based DNS services in protecting an increasingly remote workforce. DNS provides an ideal means of preventing corporate-owned devices from accessing hostile Internet resources, and gives an IT organization visibility into user and device activity that they&#8217;d otherwise likely lack.<\/p>\n<p>It&#8217;s not exactly a summer beach read, but highly recommended nonetheless!<\/p>\n<p>Read more about the <a href=\"https:\/\/www.infoblox.com\/resources\/whitepaper\/gartner-how-can-organizations-use-dns-to-improve-their-security-posture\"><b>Gartner&#8217;s latest analyst report <span style=\"font-size:20px;\">\u00bb<\/span><\/b> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I just finished reading Gartner&#8217;s new&#8211;and mercifully short\u2014report on using DNS to improve security posture. It&#8217;s encouraging to read Gartner analysts actively supporting DNS as an effective means of preventing, detecting and responding to security threats. Gartner obviously has tremendous reach as an organization, and with luck, this document will bring some organizations around to [&hellip;]<\/p>\n","protected":false},"author":178,"featured_media":6508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[30,526,360,15,252,510],"class_list":{"0":"post-6507","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dns","9":"tag-gartner","10":"tag-dns-security","11":"tag-security","12":"tag-doh","13":"tag-dns-over-https","14":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Infoblox DNS as a Security Tool? Well, Duh! | Infoblox<\/title>\n<meta name=\"description\" content=\"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS as a Security Tool? Well, Duh!\" \/>\n<meta property=\"og:description\" content=\"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-19T13:30:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-19T20:15:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"556\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cricket Liu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cricket Liu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/\"},\"author\":{\"name\":\"Cricket Liu\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\"},\"headline\":\"DNS as a Security Tool? Well, Duh!\",\"datePublished\":\"2021-07-19T13:30:43+00:00\",\"dateModified\":\"2021-07-19T20:15:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/\"},\"wordCount\":314,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cricket-gartner-blog.png\",\"keywords\":[\"DNS\",\"Gartner\",\"DNS Security\",\"Security\",\"DoH\",\"DNS over HTTPS\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/\",\"name\":\"Infoblox DNS as a Security Tool? Well, Duh! | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cricket-gartner-blog.png\",\"datePublished\":\"2021-07-19T13:30:43+00:00\",\"dateModified\":\"2021-07-19T20:15:51+00:00\",\"description\":\"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cricket-gartner-blog.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/cricket-gartner-blog.png\",\"width\":556,\"height\":625},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/dns-as-a-security-tool-well-duh\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DNS as a Security Tool? Well, Duh!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/bb6b62b1b99a7cbcd7c528d5763778d5\",\"name\":\"Cricket Liu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/cricket-new-96x96.jpg\",\"caption\":\"Cricket Liu\"},\"description\":\"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/cricket-liu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Infoblox DNS as a Security Tool? Well, Duh! | Infoblox","description":"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/","og_locale":"en_US","og_type":"article","og_title":"DNS as a Security Tool? Well, Duh!","og_description":"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?","og_url":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/","og_site_name":"Infoblox Blog","article_published_time":"2021-07-19T13:30:43+00:00","article_modified_time":"2021-07-19T20:15:51+00:00","og_image":[{"width":556,"height":625,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png","type":"image\/png"}],"author":"Cricket Liu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cricket Liu","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/"},"author":{"name":"Cricket Liu","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5"},"headline":"DNS as a Security Tool? Well, Duh!","datePublished":"2021-07-19T13:30:43+00:00","dateModified":"2021-07-19T20:15:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/"},"wordCount":314,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png","keywords":["DNS","Gartner","DNS Security","Security","DoH","DNS over HTTPS"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/","url":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/","name":"Infoblox DNS as a Security Tool? Well, Duh! | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png","datePublished":"2021-07-19T13:30:43+00:00","dateModified":"2021-07-19T20:15:51+00:00","description":"Gartner specifically calls out two issues that Infoblox has tried to highlight for some time. Gartner report referenced here is \u201cQuick Answer: How Can Organizations Use DNS to Improve Their Security Posture?","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/cricket-gartner-blog.png","width":556,"height":625},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/dns-as-a-security-tool-well-duh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"DNS as a Security Tool? Well, Duh!"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/bb6b62b1b99a7cbcd7c528d5763778d5","name":"Cricket Liu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/cricket-new-96x96.jpg","caption":"Cricket Liu"},"description":"Cricket is one of the world\u2019s leading experts on the Domain Name System (DNS) and serves as the liaison between Infoblox and the DNS community. Before joining Infoblox, he founded an internet consulting and training company, Acme Byte &amp; Wire, after running the hp.com domain at Hewlett-Packard. Cricket is a prolific speaker and author, having written a number of books including \u201cDNS and BIND,\u201d one of the most widely used references in the field, now in its fifth edition.","url":"https:\/\/www.infoblox.com\/blog\/author\/cricket-liu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/178"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6507"}],"version-history":[{"count":23,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6507\/revisions"}],"predecessor-version":[{"id":6550,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6507\/revisions\/6550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6508"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}