{"id":30535,"date":"2025-12-02T01:02:39","date_gmt":"2025-12-02T06:02:39","guid":{"rendered":"https:\/\/it-prosolution.com\/?page_id=30535"},"modified":"2025-12-08T18:21:22","modified_gmt":"2025-12-08T23:21:22","slug":"owasp-compliance","status":"publish","type":"page","link":"https:\/\/it-prosolution.com\/trust-center\/compliance-and-regulation\/owasp-compliance\/","title":{"rendered":"OWASP Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30535\" class=\"elementor elementor-30535\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f5de45f elementor-reverse-mobile elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"f5de45f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-33906c7\" data-id=\"33906c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9cd348 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"f9cd348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">OWASP<\/span><span class=\"aux-head-highlight\">Compliance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-315dc3f elementor-widget elementor-widget-heading\" data-id=\"315dc3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Application &amp; API Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d977767 elementor-widget elementor-widget-text-editor\" data-id=\"d977767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"273\" data-end=\"670\">IPS follows OWASP best practices to secure web applications, APIs, and cloud workloads against the most common and critical modern cyber threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd15051 elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"dd15051\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/it-prosolution.com\/booking\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk to Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e6ffb37\" data-id=\"e6ffb37\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-57f2f65 elementor-widget elementor-widget-image\" data-id=\"57f2f65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"348\" src=\"https:\/\/it-prosolution.com\/trust-center\/wp-content\/uploads\/sites\/19\/2025\/12\/OWASP-Compliance.png\" class=\"attachment-full size-full wp-image-31889\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bc992f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4bc992f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7102996\" data-id=\"7102996\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8a496b6 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"8a496b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">How IPS Implements<\/span><span class=\"aux-head-highlight\">OWASP Compliance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2a1963 elementor-widget elementor-widget-text-editor\" data-id=\"e2a1963\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IPS builds your security roadmap, risk profile, and protection strategy based on NIST CSF to improve maturity and reduce vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7070ad2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"7070ad2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-39e6234\" data-id=\"39e6234\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e838a6 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"7e838a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6d73f2 elementor-widget elementor-widget-heading\" data-id=\"d6d73f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure Application Architecture<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15a6077 elementor-widget elementor-widget-text-editor\" data-id=\"15a6077\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IPS designs applications using OWASP secure coding principles, preventing common vulnerabilities from the start.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-298733d\" data-id=\"298733d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c853ade elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c853ade\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56ff0f6 elementor-widget elementor-widget-heading\" data-id=\"56ff0f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">API Security Hardening<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e1b5ba elementor-widget elementor-widget-text-editor\" data-id=\"4e1b5ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We apply OWASP API Security Top 10 to protect your services, gateways, microservices, and integrations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-d06acf9\" data-id=\"d06acf9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c442acb elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"c442acb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0adc3 elementor-widget elementor-widget-heading\" data-id=\"0f0adc3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Code Review &amp; Vulnerability Testing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78d1056 elementor-widget elementor-widget-text-editor\" data-id=\"78d1056\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IPS performs secure code analysis, scanning, and penetration testing aligned with OWASP methodologies.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-acedc09\" data-id=\"acedc09\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca0be7f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ca0be7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc89295 elementor-widget elementor-widget-heading\" data-id=\"cc89295\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud &amp; Web App Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df2b91b elementor-widget elementor-widget-text-editor\" data-id=\"df2b91b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1638\" data-end=\"1732\">We secure cloud-hosted applications using OWASP cloud controls and IPS OneSecure\u2122 protections.<\/p><h3 data-start=\"1734\" data-end=\"1768\">\u00a0<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-143c21d\" data-id=\"143c21d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8197e56 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"8197e56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5038f18 elementor-widget elementor-widget-heading\" data-id=\"5038f18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cloud &amp; Web App Protection<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21b9e9e elementor-widget elementor-widget-text-editor\" data-id=\"21b9e9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1638\" data-end=\"1732\">We secure cloud-hosted applications using OWASP cloud controls and IPS OneSecure\u2122 protections.<\/p><h3 data-start=\"1734\" data-end=\"1768\">\u00a0<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55136bf elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"55136bf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-722fee8\" data-id=\"722fee8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15e75a6 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"15e75a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Why OWASP<\/span><span class=\"aux-head-highlight\">Matters<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86aefb1 elementor-widget elementor-widget-text-editor\" data-id=\"86aefb1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>Reduces the risk of application breaches<\/li><li>Strengthens API and microservice security<\/li><li>Prevents common coding errors<\/li><li>Enhances compliance with SOC 2, ISO 27001, and NIST<\/li><li>Ensures secure user interactions and data handling<\/li><li>Protects cloud, SaaS, and web applications end-to-end<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-db3573b elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"db3573b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-27c4ffa\" data-id=\"27c4ffa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b86f3a8 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"b86f3a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">OWASP<\/span><span class=\"aux-head-highlight\">+ IPS<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f441b4d elementor-widget elementor-widget-text-editor\" data-id=\"f441b4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2205\" data-end=\"2374\">With IPS, OWASP isn\u2019t just a checklist \u2014 it\u2019s embedded into design, development, deployment, and continuous security operations across every application and API you run.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>OWASPCompliance Application &amp; API Security IPS follows OWASP best practices to secure web applications, APIs, and cloud workloads against the most common and critical modern cyber threats. Talk to Us How IPS ImplementsOWASP Compliance IPS builds your security roadmap, risk profile, and protection strategy based on NIST CSF to improve maturity and reduce vulnerabilities. Secure Application Architecture IPS designs applications using OWASP secure coding principles, preventing common vulnerabilities from the start. API Security Hardening We apply OWASP API Security Top 10 to protect your services, gateways, microservices, and integrations. Code Review &amp; Vulnerability Testing IPS performs secure code analysis, scanning, and penetration testing aligned with OWASP methodologies. Cloud &amp; Web App Protection We secure cloud-hosted applications using OWASP cloud controls and IPS OneSecure\u2122 protections. \u00a0 Cloud &amp; Web App Protection We secure cloud-hosted applications using OWASP cloud controls and IPS OneSecure\u2122 protections. \u00a0 Why OWASPMatters Reduces the risk of application breaches Strengthens API and microservice security Prevents common coding errors Enhances compliance with SOC 2, ISO 27001, and NIST Ensures secure user interactions and data handling Protects cloud, SaaS, and web applications end-to-end OWASP+ IPS With IPS, OWASP isn\u2019t just a checklist \u2014 it\u2019s embedded into design, development, deployment, and continuous security operations across every application and API you run.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":409,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-30535","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/30535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/comments?post=30535"}],"version-history":[{"count":1,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/30535\/revisions"}],"predecessor-version":[{"id":31931,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/30535\/revisions\/31931"}],"up":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/409"}],"wp:attachment":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/media?parent=30535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}