{"id":26587,"date":"2025-12-02T01:02:38","date_gmt":"2025-12-02T06:02:38","guid":{"rendered":"https:\/\/it-prosolution.com\/?page_id=26587"},"modified":"2025-12-02T01:21:13","modified_gmt":"2025-12-02T06:21:13","slug":"cmmc-compliance-solutions","status":"publish","type":"page","link":"https:\/\/it-prosolution.com\/trust-center\/compliance-and-regulation\/cmmc-compliance-solutions\/","title":{"rendered":"CMMC Compliance Solutions | IPS \u2013 Secure Your Federal Contracts"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26587\" class=\"elementor elementor-26587\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d4d339c elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"d4d339c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c5fd614\" data-id=\"c5fd614\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c56587 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"8c56587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><h1 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">CMMC<\/span><span class=\"aux-head-highlight\">Compliance Solutions<\/span><\/h1><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1060fc elementor-widget elementor-widget-text-editor\" data-id=\"a1060fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>From basic FCI protection to advanced CUI security, IPS guides your organization through every CMMC level, ensuring compliance and resilience against cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cba1ff elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"6cba1ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/it-prosolution.com\/booking\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk with Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7c30f27\" data-id=\"7c30f27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d84c26c elementor-widget elementor-widget-image\" data-id=\"d84c26c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"755\" height=\"471\" src=\"https:\/\/it-prosolution.com\/trust-center\/wp-content\/uploads\/sites\/19\/2025\/10\/CMMC-Logo.webp\" class=\"attachment-large size-large wp-image-26592\" alt=\"CMMC-Logo\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0a8029 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a0a8029\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3109be1\" data-id=\"3109be1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51c1c03 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"51c1c03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">U.S. Cybersecurity Maturity Model Certification (CMMC)<\/span><span class=\"aux-head-highlight\">with IPS<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd82fcc aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-text-editor\" data-id=\"bd82fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"aux-bus2-title-divider\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2537bc2 elementor-widget elementor-widget-text-editor\" data-id=\"2537bc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"292\" data-end=\"761\">IPS helps organizations meet the U.S. Department of Defense (DoD) requirements for cybersecurity through the Cybersecurity Maturity Model Certification (CMMC). Contractors and subcontractors in the defense industrial base (DIB) must implement the security controls outlined in NIST SP 800-171 r2 to protect Controlled Unclassified Information (CUI), as required by DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting.<\/p><p data-start=\"763\" data-end=\"1013\">Additionally, contractors handling Federal Contract Information (FCI) must comply with FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems. IPS supports organizations in meeting these requirements efficiently and securely.<\/p><p data-start=\"1015\" data-end=\"1419\">The DoD officially launched CMMC on October 15, 2024 via 32 CFR part 170, with the rule effective December 16, 2024. The acquisition rule (48 CFR Parts 204, 212, 217, and 252) published September 10, 2025, amended DFARS 252.204-7021 to require CMMC certification for covered contractors. This rule is effective November 10, 2025, embedding CMMC requirements directly into DoD contracts.<\/p><p data-start=\"1421\" data-end=\"1527\">IPS provides the expertise and tools to guide your organization through every step of CMMC compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-378005f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"378005f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c60180\" data-id=\"2c60180\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ffb80c elementor-widget elementor-widget-aux_modern_heading\" data-id=\"7ffb80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">IPS<\/span><span class=\"aux-head-highlight\">CMMC Levels<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-38c6e4b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"38c6e4b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0ef6dd6\" data-id=\"0ef6dd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d05780c elementor-widget elementor-widget-icon-box\" data-id=\"d05780c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLevel 1: Basic Safeguarding of FCI\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFocus: Protect basic Federal Contract Information (FCI), such as contract numbers or delivery schedules.\n\nRequirements: 15 fundamental cybersecurity practices, e.g., regular password changes, antivirus installation.\n\nAssessment: Annual self-assessment.\n\nApplicability: All contractors handling FCI. Ideal for smaller organizations with limited exposure to sensitive data.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-65e6cd0\" data-id=\"65e6cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a08763 elementor-widget elementor-widget-icon-box\" data-id=\"7a08763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLevel 2: Broad Protection of CUI\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFocus: Safeguard Controlled Unclassified Information (CUI), including sensitive data subject to dissemination controls.\n\nRequirements: 110 security practices aligned with NIST SP 800-171 r2, including:\n\nMaintaining a System Security Plan (SSP)\n\nLogging and monitoring CUI assets\n\nVulnerability scanning and remediation\n\nAssessment: Defined by contract; may require self-assessment or third-party assessment (C3PAO).\n\nApplicability: Contractors handling CUI.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5708599\" data-id=\"5708599\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b0c7352 elementor-widget elementor-widget-icon-box\" data-id=\"b0c7352\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tLevel 3: Advanced Protection of CUI\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tFocus: Protect highly sensitive CUI against Advanced Persistent Threats (APTs).\n\nRequirements: All Level 2 requirements, plus additional practices from NIST SP 800-172, including:\n\nComprehensive incident response planning\n\nContinuous monitoring programs\n\nSupply chain security management\n\nAssessment: Government-led by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).\n\nPrerequisite: Must first achieve Level 2.\n\nApplicability: Contractors on highly sensitive government projects.\n\nHigher CMMC levels correspond to higher data sensitivity and stricter security controls. IPS ensures your organization is prepared for any required level.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b0217bb elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"b0217bb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a4003d5\" data-id=\"a4003d5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1afddc1 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"1afddc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">How IPS<\/span><span class=\"aux-head-highlight\">Supports CMMC Compliance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-152721d elementor-widget elementor-widget-text-editor\" data-id=\"152721d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"3430\" data-end=\"3517\">IPS leverages advanced cloud and IT solutions to simplify CMMC compliance, including:<\/p><ul data-start=\"3519\" data-end=\"4109\"><li data-start=\"3519\" data-end=\"3635\"><p data-start=\"3521\" data-end=\"3635\">Cloud &amp; Workspace Solutions: We help configure systems, storage, and applications to meet CMMC requirements.<\/p><\/li><li data-start=\"3636\" data-end=\"3760\"><p data-start=\"3638\" data-end=\"3760\">Continuous Monitoring &amp; Security Controls: IPS implements robust monitoring, auditing, and vulnerability management.<\/p><\/li><li data-start=\"3761\" data-end=\"3933\"><p data-start=\"3763\" data-end=\"3933\">Documentation &amp; Assessment Support: IPS provides guidance for System Security Plans (SSP), CMMC Customer Responsibility Matrices (CRM), and third-party assessments.<\/p><\/li><li data-start=\"3934\" data-end=\"4109\"><p data-start=\"3936\" data-end=\"4109\">Data Boundary &amp; FedRAMP Compliance: For cloud deployments, IPS ensures sensitive data stays within required jurisdictions and complies with FedRAMP High standards.<\/p><\/li><\/ul><p data-start=\"4111\" data-end=\"4244\">With IPS, your organization can confidently achieve and maintain CMMC certification, protecting your contracts, data, and reputation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CMMCCompliance Solutions From basic FCI protection to advanced CUI security, IPS guides your organization through every CMMC level, ensuring compliance and resilience against cyber threats. Talk with Us U.S. Cybersecurity Maturity Model Certification (CMMC)with IPS \u00a0 IPS helps organizations meet the U.S. Department of Defense (DoD) requirements for cybersecurity through the Cybersecurity Maturity Model Certification (CMMC). Contractors and subcontractors in the defense industrial base (DIB) must implement the security controls outlined in NIST SP 800-171 r2 to protect Controlled Unclassified Information (CUI), as required by DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting. Additionally, contractors handling Federal Contract Information (FCI) must comply with FAR 52.204-21, Basic Safeguarding of Covered Contractor Information Systems. IPS supports organizations in meeting these requirements efficiently and securely. The DoD officially launched CMMC on October 15, 2024 via 32 CFR part 170, with the rule effective December 16, 2024. The acquisition rule (48 CFR Parts 204, 212, 217, and 252) published September 10, 2025, amended DFARS 252.204-7021 to require CMMC certification for covered contractors. This rule is effective November 10, 2025, embedding CMMC requirements directly into DoD contracts. IPS provides the expertise and tools to guide your organization through every step of CMMC compliance. IPSCMMC Levels Level 1: Basic Safeguarding of FCI Focus: Protect basic Federal Contract Information (FCI), such as contract numbers or delivery schedules. Requirements: 15 fundamental cybersecurity practices, e.g., regular password changes, antivirus installation. Assessment: Annual self-assessment. Applicability: All contractors handling FCI. Ideal for smaller organizations with limited exposure to sensitive data. Level 2: Broad Protection of CUI Focus: Safeguard Controlled Unclassified Information (CUI), including sensitive data subject to dissemination controls. Requirements: 110 security practices aligned with NIST SP 800-171 r2, including: Maintaining a System Security Plan (SSP) Logging and monitoring CUI assets Vulnerability scanning and remediation Assessment: Defined by contract; may require self-assessment or third-party assessment (C3PAO). Applicability: Contractors handling CUI. Level 3: Advanced Protection of CUI Focus: Protect highly sensitive CUI against Advanced Persistent Threats (APTs). Requirements: All Level 2 requirements, plus additional practices from NIST SP 800-172, including: Comprehensive incident response planning Continuous monitoring programs Supply chain security management Assessment: Government-led by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC). Prerequisite: Must first achieve Level 2. Applicability: Contractors on highly sensitive government projects. Higher CMMC levels correspond to higher data sensitivity and stricter security controls. IPS ensures your organization is prepared for any required level. How IPSSupports CMMC Compliance IPS leverages advanced cloud and IT solutions to simplify CMMC compliance, including: Cloud &amp; Workspace Solutions: We help configure systems, storage, and applications to meet CMMC requirements. Continuous Monitoring &amp; Security Controls: IPS implements robust monitoring, auditing, and vulnerability management. Documentation &amp; Assessment Support: IPS provides guidance for System Security Plans (SSP), CMMC Customer Responsibility Matrices (CRM), and third-party assessments. Data Boundary &amp; FedRAMP Compliance: For cloud deployments, IPS ensures sensitive data stays within required jurisdictions and complies with FedRAMP High standards. With IPS, your organization can confidently achieve and maintain CMMC certification, protecting your contracts, data, and reputation.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":409,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-26587","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/26587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/comments?post=26587"}],"version-history":[{"count":1,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/26587\/revisions"}],"predecessor-version":[{"id":31562,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/26587\/revisions\/31562"}],"up":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/409"}],"wp:attachment":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/media?parent=26587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}