{"id":21974,"date":"2022-09-28T12:47:09","date_gmt":"2022-09-28T10:47:09","guid":{"rendered":"https:\/\/www.solvinity.com\/?post_type=downloads&#038;p=21974"},"modified":"2025-07-10T14:56:16","modified_gmt":"2025-07-10T12:56:16","slug":"whitepaper-public-cloud-security","status":"publish","type":"downloads","link":"https:\/\/www.solvinity.com\/nl\/download\/whitepaper-public-cloud-security\/","title":{"rendered":"Whitepaper &#8211; Public Cloud Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"21974\" class=\"elementor elementor-21974\" data-elementor-post-type=\"downloads\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2a22396 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2a22396\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-780964c\" data-id=\"780964c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe813f5 elementor-widget elementor-widget-heading\" data-id=\"fe813f5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">Download whitepaper<br><div style=\"color:#905A8B\">Public Cloud Security<\/div><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e3804d elementor-widget elementor-widget-heading\" data-id=\"8e3804d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Strategische keuzes voor een veilige IT-omgeving<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5e2fd1 elementor-widget elementor-widget-text-editor\" data-id=\"b5e2fd1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div title=\"Page 3\"><p>De public cloud biedt talloze voordelen, maar de beveiliging ervan kent de nodige uitdagingen. Binnen het spanningsveld van razendsnelle cloud ontwikkelingen, een groeiend aantal cyberaanvallen en een krappe IT-arbeidsmarkt moet je je weg zien te vinden. De noodzaak van een gedegen securitystrategie &#8211; die verder gaat dan alleen IT en doorlopend moet worden bijgestuurd &#8211; is duidelijk. Met de juiste keuzes vooraf kun je jouw organisatie een hoop onnodige kosten en risico\u2019s besparen.\u00a0<\/p><p>Dit whitepaper behandelt aan de hand van vijf \u2018lagen\u2019 de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving. Elk hoofdstuk bevat concrete handvatten waarmee je richting kunt geven aan jouw public cloud strategie.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38f6415 elementor-align-left elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"38f6415\" data-element_type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Een andere mentaliteit<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fundamentele keuzes<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Cruciale hulpmiddelen voor netwerksecurity<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Veiligheid op applicatieniveau<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Bescherming tegen externe dreigingen<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">De menselijke factor<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Voortdurende borging<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-198acb4 extern-form elementor-widget elementor-widget-html\" data-id=\"198acb4\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div\n        data-form-id='d13b62ae-daa1-ef11-8a6a-000d3ab430a2'\n        data-form-api-url='https:\/\/public-eur.mkt.dynamics.com\/api\/v1.0\/orgs\/f4566b4e-8e51-4260-9b9b-684cf61bff5d\/landingpageforms'\n        data-cached-form-url='https:\/\/assets-eur.mkt.dynamics.com\/f4566b4e-8e51-4260-9b9b-684cf61bff5d\/digitalassets\/forms\/d13b62ae-daa1-ef11-8a6a-000d3ab430a2' ><\/div>\n        <script src = 'https:\/\/cxppusa1formui01cdnsa01-endpoint.azureedge.net\/eur\/FormLoader\/FormLoader.bundle.js' ><\/script>\n        <script>document.documentElement.lang = navigator.language;<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14d86d5 elementor-hidden-phone\" data-id=\"14d86d5\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ccc3b56 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ccc3b56\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4db627b\" data-id=\"4db627b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c642fa1 elementor-hidden-phone\" data-id=\"c642fa1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-740a52d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"740a52d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e67567c\" data-id=\"e67567c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8879377 elementor-widget elementor-widget-spacer\" data-id=\"8879377\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving. <\/p>\n","protected":false},"featured_media":22009,"parent":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[52],"tags":[],"class_list":["post-21974","downloads","type-downloads","status-publish","format-standard","has-post-thumbnail","hentry","category-white-paper-nl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Whitepaper - Public Cloud Security - Solvinity<\/title>\n<meta name=\"description\" content=\"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitepaper - Public Cloud Security - Solvinity\" \/>\n<meta property=\"og:description\" content=\"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Solvinity\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-10T12:56:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"435\" \/>\n\t<meta property=\"og:image:height\" content=\"210\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/download\/whitepaper-public-cloud-security\/\",\"url\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/\",\"name\":\"Whitepaper - Public Cloud Security - Solvinity\",\"isPartOf\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg\",\"datePublished\":\"2022-09-28T10:47:09+00:00\",\"dateModified\":\"2025-07-10T12:56:16+00:00\",\"description\":\"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage\",\"url\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg\",\"contentUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg\",\"width\":435,\"height\":210},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.solvinity.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Downloads\",\"item\":\"https:\/\/www.solvinity.com\/nl\/download\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper &#8211; Public Cloud Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#website\",\"url\":\"https:\/\/www.solvinity.com\/nl\/\",\"name\":\"Solvinity\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.solvinity.com\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#organization\",\"name\":\"Solvinity\",\"url\":\"https:\/\/www.solvinity.com\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png\",\"contentUrl\":\"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png\",\"width\":344,\"height\":72,\"caption\":\"Solvinity\"},\"image\":{\"@id\":\"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper - Public Cloud Security - Solvinity","description":"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"nl_NL","og_type":"article","og_title":"Whitepaper - Public Cloud Security - Solvinity","og_description":"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.","og_url":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/","og_site_name":"Solvinity","article_modified_time":"2025-07-10T12:56:16+00:00","og_image":[{"width":435,"height":210,"url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.solvinity.com\/nl\/download\/whitepaper-public-cloud-security\/","url":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/","name":"Whitepaper - Public Cloud Security - Solvinity","isPartOf":{"@id":"https:\/\/www.solvinity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg","datePublished":"2022-09-28T10:47:09+00:00","dateModified":"2025-07-10T12:56:16+00:00","description":"Lees meer over de belangrijkste aandachtspunten en valkuilen voor een veilig ingerichte public cloud-omgeving.","breadcrumb":{"@id":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#primaryimage","url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg","contentUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2022\/09\/public_cloud_security_435x210.jpg","width":435,"height":210},{"@type":"BreadcrumbList","@id":"https:\/\/www.solvinity.com\/nl\/white-paper-public-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.solvinity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Downloads","item":"https:\/\/www.solvinity.com\/nl\/download\/"},{"@type":"ListItem","position":3,"name":"Whitepaper &#8211; Public Cloud Security"}]},{"@type":"WebSite","@id":"https:\/\/www.solvinity.com\/nl\/#website","url":"https:\/\/www.solvinity.com\/nl\/","name":"Solvinity","description":"","publisher":{"@id":"https:\/\/www.solvinity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.solvinity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.solvinity.com\/nl\/#organization","name":"Solvinity","url":"https:\/\/www.solvinity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png","contentUrl":"https:\/\/www.solvinity.com\/wp-content\/uploads\/2019\/08\/solvinity-logo.png","width":344,"height":72,"caption":"Solvinity"},"image":{"@id":"https:\/\/www.solvinity.com\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/downloads\/21974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/downloads"}],"about":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/types\/downloads"}],"version-history":[{"count":44,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/downloads\/21974\/revisions"}],"predecessor-version":[{"id":30211,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/downloads\/21974\/revisions\/30211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/media\/22009"}],"wp:attachment":[{"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/media?parent=21974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/categories?post=21974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solvinity.com\/nl\/wp-json\/wp\/v2\/tags?post=21974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}