{"id":58,"date":"2007-08-01T04:38:00","date_gmt":"2007-08-01T04:38:00","guid":{"rendered":"http:\/\/mayanktrivedi.net\/technotes\/2007\/08\/01\/pci-dss-simplified-approach\/"},"modified":"2022-04-06T20:23:49","modified_gmt":"2022-04-06T20:23:49","slug":"pci-dss-simplified-approach","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2007\/08\/01\/pci-dss-simplified-approach\/","title":{"rendered":"PCI-DSS &#8211; Simplified Approach"},"content":{"rendered":"<div>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">PCI-DSS compliance can be achieved with effective and efficient mapping of control requirements with either the ISO 27001 or the COBIT framework as already established and accepted across the world and industry segments.<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">But whatever framework we follow for PCI-DSS Compliance, following steps must be followed in order to ensure that the compliance is being targeted under the right Category viz &#8211; Merchant \/ Service Provider and for the right level &#8211; (Level 4 through 1 for merchants and Level 3 through 1 for Service providers).<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">1.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">             <\/span><\/span>Identify the category &#8211; Payment Gateways, Processors, Call Centers\/BPOs would fall under the Service Provider category whereas the Merchant category as the name clearly sets out would have the endpoints where the customer transactions take place.<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">2.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">             <\/span><\/span>Identify the level applicable for the organization &#8211; <o:p><\/o:p><\/p>\n<p><span style=\"font-family:Symbol;font-size:100%;\"><span style=\";font-family:Symbol;font-size:12;\"  >\u00b7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>For Merchants &#8211; Level 4 to Level 1, <o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Any merchant processing less than 20,000 e-commerce transactions per year, and all other merchants processing up to 1,000,000 transactions per year.<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Level 3 is for the merchants processing 20,000 to 1,000,000 e-commerce transactions per year<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Level 2 is for the merchants processing merchant processing 1,000,000 to 6,000,000 transactions per year.<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Level 1 is for the merchants, regardless of acceptance channel, processing over 6,000,000 Visa transactions per year.<br \/>(there is one catch for the merchants for selecting the level irrespective of the size of operations &#8211; Any merchant that has suffered a breach that resulted in an account data compromise would also be treated as Level 1. Moreover, for level one, the transaction limit as defined could be composite score of transaction for all the brands of Credit\/debit cards forming the PCI Council, or could be the single brand.)<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Symbol;font-size:100%;\"><span style=\";font-family:Symbol;font-size:12;\"  >\u00b7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>For Service Providers \u2013 Level 3 to Level 1<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Any service provider that stores, processes, or transmits less than 1,000,000 accounts\/transactions annually.<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>Any service provider that stores, processes, or transmits more than 1,000,000 accounts\/transactions annually.<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Wingdings;font-size:100%;\"><span style=\";font-family:Wingdings;font-size:12;\"  >\u00a7<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span style=\"font-size:7;\">          <\/span><\/span>All payment gateways and processors (Member\/non member for any of the credit\/debit card network)<o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span lang=\"EN-IN\"  style=\"font-size:12;\">3.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span lang=\"EN-IN\"  style=\"font-size:7;\">             <\/span><\/span><span lang=\"EN-IN\">Establish the Validation Action required for each level \u2013 <\/span><o:p><\/o:p><\/p>\n<table style=\"border: 1pt solid windowtext;\" border=\"1\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Level<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Validation Action<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">(For Merchants)<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Validated By<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >1<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Annual On-site PCI Data Security Assessment<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Quarterly Network Scan<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Qualified Security Assessor or Internal Audit if signed   by Officer of the company<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Approved Scanning Vendor<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >2<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Annual PCI Self-Assessment Questionnaire<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Quarterly Network Scan<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Merchant<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  > <\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Approved Scanning Vendor<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >3<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Annual PCI Self-Assessment Questionnaire <\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Quarterly Network Scan<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Merchant<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  > <\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Approved Scanning Vendor<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >4*<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Annual PCI Self-Assessment Questionnaire<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Quarterly Network Scan<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\" valign=\"top\">\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Merchant<\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  > <\/span><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Verdana;font-size:100%;\"><span style=\";font-family:Verdana;font-size:12;\"  >Approved Scanning Vendor<\/span><\/span><o:p><\/o:p><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"\"><span style=\"font-family:Verdana;font-size:78%;\"><span style=\";font-family:Verdana;font-size:8;\"  >*<span>The PCI DDS requires that all merchants perform external network scanning to achieve compliance. Acquirers may require submission of scan reports and\/or questionnaires by level 4 merchants. <\/span><\/span><\/span><o:p><\/o:p><\/p>\n<table style=\"border: 1pt solid windowtext;\" border=\"1\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Level<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 159.35pt;\" width=\"212\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Validation Action<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">For Service Providers<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 243pt;\" width=\"324\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Validated By<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">1<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 159.35pt;\" valign=\"top\" width=\"212\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Annual On-Site PCI Data Security Assessment<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Quarterly Network Scan<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 243pt;\" valign=\"top\" width=\"324\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Qualified Security Assessor<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Approved Scanning Vendor<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">2<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 159.35pt;\" valign=\"top\" width=\"212\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Annual On-Site PCI Data Security Assessment<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Quarterly Network Scan<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 243pt;\" valign=\"top\" width=\"324\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Qualified Security Assessor <o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Approved Scanning Vendor<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt;\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">3<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 159.35pt;\" valign=\"top\" width=\"212\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Annual PCI Self-Assessment Questionnaire<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Quarterly Network Scan<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1pt solid windowtext; padding: 0.75pt; width: 243pt;\" valign=\"top\" width=\"324\">\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Service Provider<o:p><\/o:p><\/span><\/span><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Approved Scanning Vendor<o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span lang=\"EN-IN\"  style=\"font-size:12;\">4.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span lang=\"EN-IN\"  style=\"font-size:7;\">             <\/span><\/span><span lang=\"EN-IN\">Download the self assessment questionnaire from <a href=\"https:\/\/www.pcisecuritystandards.org\/tech\/supporting_documents.htm\">https:\/\/www.pcisecuritystandards.org\/tech\/supporting_documents.htm<\/a> for a quick self assessment about the current scenario or the organization has a choice for hiring a Service Provider \/ Consultant for the same.  Other Self-Audit resources are available from SANS, IT Security Magazine, and the individual bloggers.<\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span lang=\"EN-IN\"  style=\"font-size:12;\">5.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span lang=\"EN-IN\"  style=\"font-size:7;\">             <\/span><\/span><span lang=\"EN-IN\">Identify the approach to take in order to fix the issues identified on the first run of the Self Assessment Questionnaire.  One thing that needs to be made clear is the steps to be taken here onwards must also be compliant to the other certifications relevant for the merchant\/service provider.  It is hence recommendable to use either ISO 27001 or COBIT as the base framework.<\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span lang=\"EN-IN\"  style=\"font-size:12;\">6.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span lang=\"EN-IN\"  style=\"font-size:7;\">             <\/span><\/span><span lang=\"EN-IN\">Have all the relevant documentation in place including the Information Security Policy, Procedures, Processes and the respective records as evidence of compliance.<\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span lang=\"EN-IN\"  style=\"font-size:12;\">7.<span style=\"font-size-adjust: none; font-stretch: normal;\"><\/span><\/span><\/span><span style=\"font-size:78%;\"><span lang=\"EN-IN\"  style=\"font-size:7;\">             <\/span><\/span><span lang=\"EN-IN\">Select the QSA\/ASV from the approved list as available on <a href=\"https:\/\/www.pcisecuritystandards.org\/resources\/index.htm\">https:\/\/www.pcisecuritystandards.org\/resources\/index.htm<\/a><\/span><o:p><\/o:p><\/p>\n<p><span style=\"font-family:Times New Roman;font-size:100%;\"><span style=\"font-size:12;\">Once the Audit is conducted the QSA\/ASV, the report would then be submitted to the PCI Council along with required recommendations, but that is no the end of the road.  The journey of Compliance to PCI-DSS has just begun and it would be a never ending journey to head to.  There may be road-blocks, but there is NO Dead End <\/span><\/span><span style=\"font-family:Wingdings;\"><span style=\"font-family:Wingdings;\">J<\/span><\/span><o:p><\/o:p><\/p>\n<p><st1:personname st=\"on\"><b><i><span style=\"font-family:Times New Roman;font-size:100%;color:navy;\"><span style=\"font-weight: bold; font-style: italic;font-size:12;color:navy;\"  >Mayank Trivedi<\/span><\/span><\/i><\/b><\/st1:personname> <o:p><\/o:p><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PCI-DSS compliance can be achieved with effective and efficient mapping of control requirements with either the ISO 27001 or the COBIT framework as already established and accepted across the world and industry segments. But whatever framework we follow for PCI-DSS Compliance, following steps must be followed in order to ensure that the compliance is being &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,30],"tags":[],"class_list":["post-58","post","type-post","status-publish","format-standard","hentry","category-pci-dss-and-framework-selection","category-pci-dss-compliance-approach","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/58","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"predecessor-version":[{"id":199,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/58\/revisions\/199"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}