{"id":219,"date":"2017-08-13T13:11:49","date_gmt":"2017-08-13T13:11:49","guid":{"rendered":"https:\/\/www.imperva.com\/learn\/?post_type=data_security&#038;p=219"},"modified":"2023-12-20T17:17:07","modified_gmt":"2023-12-20T17:17:07","slug":"data-classification","status":"publish","type":"data_security","link":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/","title":{"rendered":"Data Classification"},"content":{"rendered":"<h2>What is Data Classification<\/h2>\n<p>Data classification tags data according to its type, sensitivity, and value to the organization if altered, stolen, or destroyed. It helps an organization understand the value of its data, determine whether the data is at risk, and implement controls to mitigate risks. Data classification also helps an organization comply with relevant industry-specific regulatory mandates such as <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/sox\/\">SOX<\/a>, <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/hipaa\/\">HIPAA<\/a>, <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/pci-dss-certification\/\">PCI DSS<\/a>, and <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/gdpr\/\">GDPR<\/a>.<\/p>\n<p><a href=\"\/blog\/top-challenges-to-implementing-data-privacy-nailing-down-discovery-and-classification-first-is-key\/\">Blog: Top Challenges to Implementing Data Privacy: Nailing Down Discovery and Classification First is Key.<\/a><\/p>\n<h2>Data Sensitivity Levels<\/h2>\n<p>Data is classified according to its sensitivity level\u2014high, medium, or low.<\/p>\n<ul>\n<li><strong>High sensitivity data<\/strong>\u2014if compromised or destroyed in an unauthorized transaction, would have a catastrophic impact on the organization or individuals. For example, financial records, intellectual property, authentication data.<\/li>\n<li><strong>Medium sensitivity data<\/strong>\u2014intended for internal use only, but if compromised or destroyed, would not have a catastrophic impact on the organization or individuals. For example, emails and documents with no confidential data.<\/li>\n<li><strong>Low sensitivity data<\/strong>\u2014intended for public use. For example, public website content.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1404 size-full\" src=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg\" alt=\"data classification sensitivity\" width=\"969\" height=\"200\" srcset=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg 969w, https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity-300x62.jpg 300w, https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity-768x159.jpg 768w\" sizes=\"auto, (max-width: 969px) 100vw, 969px\" \/><\/p>\n<h2>Data Sensitivity Best Practices<\/h2>\n<p>Since the high, medium, and low labels are somewhat generic, a best practice is to use labels for each sensitivity level that make sense for your organization. Two widely-used models are shown below.<\/p>\n<table>\n<thead>\n<tr>\n<td><b>SENSITIVITY<\/b><\/td>\n<td><b>MODEL 1<\/b><\/td>\n<td><b>MODEL 2<\/b><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><b>High<\/b><\/td>\n<td>Confidential<\/td>\n<td>Restricted<\/td>\n<\/tr>\n<tr>\n<td><b>Medium<\/b><\/td>\n<td>Internal Use Only<\/td>\n<td>Sensitive<\/td>\n<\/tr>\n<tr>\n<td><b>Low<\/b><\/td>\n<td>Public<\/td>\n<td>Unrestricted<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>If a database, file, or other data resource includes data that can be classified at two different levels, it\u2019s best to classify all the data at the higher level.<\/p>\n<p><a href=\"\/solutions\/data-discovery-and-classification\/\">Solution Spotlight: Enable Data Discovery and Classification.<\/a><\/p>\n<h2>Types of Data Classification<\/h2>\n<p>Data classification can be performed based on content, context, or user selections:<\/p>\n<ul>\n<li><strong>Content-based classification<\/strong>\u2014involves reviewing files and documents, and classifying them<\/li>\n<li><strong>Context-based classification<\/strong>\u2014involves classifying files based on meta data like the application that created the file (for example, accounting software), the person who created the document (for example, finance staff), or the location in which files were authored or modified (for example, finance or legal department buildings).<\/li>\n<li><strong>User-based classification<\/strong>\u2014involves classifying files according to a manual judgement of a knowledgeable user. Individuals who work with documents can specify how sensitive they are\u2014they can do so when they create the document, after a significant edit or review, or before the document is released.<\/li>\n<\/ul>\n<h2>Data States and Data Format<\/h2>\n<p>Two additional dimensions of data classifications are:<\/p>\n<ul>\n<li><strong>Data states<\/strong>\u2014data exists in one of three states\u2014at rest, in process, or in transit. Regardless of state, data classified as confidential must remain confidential.<\/li>\n<li><strong>Data format<\/strong>\u2014data can be either structured or unstructured. Structured data are usually human readable and can be indexed. Examples of structured data are database objects and spreadsheets. Unstructured data are usually not human readable or indexable. Examples of unstructured data are source code, documents, and binaries. Classifying structured data is less complex and time-consuming than classifying unstructured data.<\/li>\n<\/ul>\n<p><a href=\"\/blog\/how-organizations-manage-to-understand-millions-of-unstructured-data-files-at-scale\/\">Blog: How Organizations Manage to Understand Millions of Unstructured Data Files at Scale.<\/a><\/p>\n<h2>Data Discovery<\/h2>\n<p>Classifying data requires knowing the location, volume, and context of data. Most modern businesses store large volumes of data, which may be spread across multiple repositories:<\/p>\n<ul>\n<li>Databases deployed on-premises or in the cloud<\/li>\n<li>Big data platforms<\/li>\n<li>Collaboration systems such as Microsoft SharePoint<\/li>\n<li>Cloud storage services such as Dropbox and Google Docs<\/li>\n<li>Files such as spreadsheets, PDFs, or emails<\/li>\n<\/ul>\n<p>Before you can perform data classification, you must perform accurate and comprehensive data discovery. Automated tools can help discover sensitive data at large scale. See our article on <a href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-discovery\/\">Data Discovery<\/a> for more information.<\/p>\n<h2>The Relation Between Data Classification and Compliance<\/h2>\n<p>Data classification must comply with relevant regulatory and industry-specific mandates, which may require classification of different data attributes. For example, the Cloud Security Alliance (CSA) requires that data and data objects must include data type, jurisdiction of origin and domicile, context, legal constraints, sensitivity, etc. PCI DSS does not require origin or domicile tags.<\/p>\n<h2>Creating Your Data Classification Policy<\/h2>\n<p>A data classification policy defines who is responsible for data classification\u2014typically by defining Program Area Designees (PAD) who are responsible for classifying data for different programs or organizational units.<\/p>\n<p>The data classification policy should consider the following questions:<\/p>\n<ul>\n<li>Which person, organization or program created and\/or owns the information?<\/li>\n<li>Which organizational unit has the most information about the content and context of the<br \/>\ninformation?<\/li>\n<li>Who is responsible for the integrity and accuracy of the data?<\/li>\n<li>Where is the information stored?<\/li>\n<li>Is the information subject to any regulations or compliance standards, and what are the penalties associated with non-compliance?<\/li>\n<\/ul>\n<p>Data classification can be the responsibility of the information creators, subject matter experts, or those responsible for the correctness of the data.<\/p>\n<p>The policy also determines the data classification process: how often data classification should take place, for which data, which type of data classification is suitable for different types of data, and what technical means should be used to classify data. The data classification policy is part of the overall information security policy, which specifies how to protect sensitive data.<\/p>\n<h2>Data Classification Examples<\/h2>\n<p>Following are common examples of data that may be classified into each sensitivity level.<\/p>\n<table>\n<thead>\n<tr>\n<td><b>Sensitivity Level<\/b><\/td>\n<td><b>Examples<\/b><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><b>High<\/b><\/td>\n<td>Credit card numbers (PCI) or other financial account numbers, customer personal data, FISMA protected information, privileged credentials for IT systems, protected health information (HIPAA), Social Security numbers, intellectual property, employee records.<\/td>\n<\/tr>\n<tr>\n<td><b>Medium<\/b><\/td>\n<td>Supplier contracts, IT service management information, student education records (FERPA), telecommunication systems information, internal correspondence not including confidential data.<\/td>\n<\/tr>\n<tr>\n<td><b>Low<\/b><\/td>\n<td>Content of public websites, press releases, marketing materials, employee directory.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"ddos-banner\"><div class=\"wrap\"><p>See how Imperva Data Security Solutions can help you with data classification.<\/p>\n<div class=\"cta-container\">\n                                                    <a class=\"impv-yellow-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Request demo\"  gtm-track  target=\"_self\" href=\"javascript:openModal('modalid3533', '\/learn\/banner\/virtual\/request-demo\/', 'Personal Demo Request | Imperva');\">Request demo<\/a>\n                                                    <a class=\"gst-yellow-dark-text-btn\"  event-action=\"Click\"  event-category=\"LC Banner\"  event-label=\"Learn more\"  gtm-track  target=\"_self\" href=\"https:\/\/www.imperva.com\/products\/database-discovery-assessment\/\">Learn more<\/a>\n                                                <\/div><\/div><\/div><h2>Imperva Data Protection Solutions<\/h2>\n<p>Imperva provides automated data discovery and classification, which reveals the location, volume, and context of data on premises and in the cloud.<\/p>\n<p>In addition to data classification, Imperva protects your data wherever it lives\u2014on premises, in the cloud and in hybrid environments. It also provides security and IT teams with full visibility into how the data is being accessed, used, and moved around the organization.<\/p>\n<p>Our comprehensive approach relies on multiple layers of protection, including:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.imperva.com\/resources\/resource-library\/datasheets\/securesphere-database-activity-monitoring-and-database-firewall\/\"><strong>Database firewall<\/strong><\/a>\u2014blocks SQL injection and other threats, while evaluating for known vulnerabilities.<\/li>\n<li><strong>User rights management<\/strong>\u2014monitors data access and activities of privileged users to identify excessive, inappropriate, and unused privileges.<\/li>\n<li><strong><a href=\"https:\/\/www.imperva.com\/products\/data-masking\/\">Data masking<\/a> and encryption<\/strong>\u2014obfuscates sensitive data so it would be useless to the bad actor, even if somehow extracted.<\/li>\n<li><strong><a href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-loss-prevention-dlp\/\">Data loss prevention<\/a> (DLP)<\/strong>\u2014inspects data in motion, at rest on servers, in cloud storage, or on endpoint devices.<\/li>\n<li><a href=\"https:\/\/www.imperva.com\/learn\/data-security\/ueba-user-and-entity-behavior-analytics\/\"><strong>User behavior analytics<\/strong><\/a>\u2014establishes baselines of data access behavior, uses machine learning to detect and alert on abnormal and potentially risky activity.<\/li>\n<li><a href=\"https:\/\/www.imperva.com\/products\/database-discovery-assessment\/\"><strong>Data discovery and classification<\/strong><\/a>\u2014reveals the location, volume, and context of data on premises and in the cloud.<\/li>\n<li><a href=\"https:\/\/www.imperva.com\/products\/data-protection\/\"><strong>Database activity monitoring<\/strong><\/a>\u2014monitors relational databases, data warehouses, big data and mainframes to generate real-time alerts on policy violations.<\/li>\n<li><a href=\"https:\/\/www.imperva.com\/products\/behavior-analytics\/\"><strong>Alert prioritization<\/strong><\/a>\u2014Imperva uses AI and machine learning technology to look across the stream of security events and prioritize the ones that matter most.<\/li>\n<\/ul>\n","protected":false},"featured_media":0,"template":"","categories":[23],"class_list":["post-219","data_security","type-data_security","status-publish","hentry","category-data-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Data Classification? | Best Practices &amp; Data Types | Imperva<\/title>\n<meta name=\"description\" content=\"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels &amp; data types.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Data Classification? | Best Practices &amp; Data Types | Imperva\" \/>\n<meta property=\"og:description\" content=\"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels &amp; data types.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Center\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-20T17:17:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Itamar Verta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/\",\"name\":\"What is Data Classification? | Best Practices & Data Types | Imperva\",\"isPartOf\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg\",\"datePublished\":\"2017-08-13T13:11:49+00:00\",\"dateModified\":\"2023-12-20T17:17:07+00:00\",\"description\":\"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels & data types.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage\",\"url\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg\",\"contentUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg\",\"width\":969,\"height\":200,\"caption\":\"data classification sensitivity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.imperva.com\/learn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DataSec\",\"item\":\"https:\/\/www.imperva.com\/learn\/data-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data Classification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#website\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"name\":\"Learning Center\",\"description\":\"Imperva\",\"publisher\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.imperva.com\/learn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#organization\",\"name\":\"Imperva Inc\",\"url\":\"https:\/\/www.imperva.com\/learn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"contentUrl\":\"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg\",\"width\":1200,\"height\":627,\"caption\":\"Imperva Inc\"},\"image\":{\"@id\":\"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Data Classification? | Best Practices & Data Types | Imperva","description":"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels & data types.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/","og_locale":"en_US","og_type":"article","og_title":"What is Data Classification? | Best Practices & Data Types | Imperva","og_description":"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels & data types.","og_url":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/","og_site_name":"Learning Center","article_modified_time":"2023-12-20T17:17:07+00:00","og_image":[{"url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes","Written by":"Itamar Verta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/","url":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/","name":"What is Data Classification? | Best Practices & Data Types | Imperva","isPartOf":{"@id":"https:\/\/www.imperva.com\/learn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage"},"image":{"@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg","datePublished":"2017-08-13T13:11:49+00:00","dateModified":"2023-12-20T17:17:07+00:00","description":"Data classification helps organizations comply with industry and regulatory mandates. Learn more about classification levels & data types.","breadcrumb":{"@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#primaryimage","url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg","contentUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2020\/03\/data-classification-sensitivity.jpg","width":969,"height":200,"caption":"data classification sensitivity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.imperva.com\/learn\/data-security\/data-classification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.imperva.com\/learn\/"},{"@type":"ListItem","position":2,"name":"DataSec","item":"https:\/\/www.imperva.com\/learn\/data-security\/"},{"@type":"ListItem","position":3,"name":"Data Classification"}]},{"@type":"WebSite","@id":"https:\/\/www.imperva.com\/learn\/#website","url":"https:\/\/www.imperva.com\/learn\/","name":"Learning Center","description":"Imperva","publisher":{"@id":"https:\/\/www.imperva.com\/learn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.imperva.com\/learn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.imperva.com\/learn\/#organization","name":"Imperva Inc","url":"https:\/\/www.imperva.com\/learn\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/","url":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","contentUrl":"https:\/\/www.imperva.com\/learn\/wp-content\/uploads\/sites\/13\/2023\/06\/Linkedin-FB-OG-sharing.jpeg","width":1200,"height":627,"caption":"Imperva Inc"},"image":{"@id":"https:\/\/www.imperva.com\/learn\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security"}],"about":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/types\/data_security"}],"version-history":[{"count":9,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/219\/revisions"}],"predecessor-version":[{"id":2525,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/data_security\/219\/revisions\/2525"}],"wp:attachment":[{"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/media?parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.imperva.com\/learn\/wp-json\/wp\/v2\/categories?post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}