{"id":876,"date":"2025-10-21T13:22:37","date_gmt":"2025-10-21T13:22:37","guid":{"rendered":"http:\/\/axilthemes.com\/themes\/axilnews\/?p=876"},"modified":"2025-10-24T13:24:06","modified_gmt":"2025-10-24T13:24:06","slug":"magazine-belie-ves-little-will-change-in-22-6a-football-battles","status":"publish","type":"post","link":"https:\/\/grcfincrimetoday.org\/index.php\/2025\/10\/21\/magazine-belie-ves-little-will-change-in-22-6a-football-battles\/","title":{"rendered":"SECURITY GRC \u2013 WHAT, WHY, HOW &#038; WHEN?"},"content":{"rendered":"\r\n<p>&nbsp;<\/p>\r\n<blockquote>\r\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-2598 aligncenter\" src=\"https:\/\/tynesideinnovation.com\/grcfincrimetoday\/wp-content\/uploads\/2025\/10\/Screenshot-5-1-300x177.png\" alt=\"\" width=\"368\" height=\"217\" srcset=\"https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/Screenshot-5-1-300x177.png 300w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/Screenshot-5-1-600x353.png 600w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/Screenshot-5-1-768x452.png 768w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/Screenshot-5-1.png 976w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><\/p>\r\n<p>Charles Robert Darwin, 1809 \u2013 1882<\/p>\r\n<\/blockquote>\r\n\r\n\r\n\r\n<p>Change is constant, we may like it or not. But it is the truth. It can not be stopped. Change may come from both internal and external forces and requirements. They may be small or big and more or less impactful. What we know, is still, that change is constant. And this is one of those things that Security GRC when it comes to the security universe, can support to manage in a more controlled and systematic way. Managing change is only one part of the benefits that may come from Security GRC. But before we dive further into the benefits and the rest of this article, I will put some more context around the subject \u2013&gt; Security GRC.<\/p>\r\n<p>GRC stands for Governance, Risk Management &amp; Compliance. This article is about Security GRC.<\/p>\r\n<p>The purpose of this article is to put my own words on the subject. I have already kind of, in several articles talked about it and explained what it is from each letter in the acronym. But this article will serve as a short summary of what Security GRC is and also shine some light on the why, how, and when.<\/p>\r\n<p>Security GRC is not something unique to the security industry or discipline. It is a discipline and practice that the security industry has adopted. GRC has been a thing in several other industries before it reached security. Some of these are:<\/p>\r\n<ul>\r\n<li>Finance<\/li>\r\n<li>Medical<\/li>\r\n<li>Healthcare<\/li>\r\n<li>Insurance<\/li>\r\n<li>Energy<\/li>\r\n<\/ul>\r\n<p>What these industries have in common, and have had for decades, is that they are highly regulated. SOX is one of the regulations for finance, HIIPA applies to healthcare, and FDA applies to food and drugs, PCI-DSS is applicable when payment cards are used for digital transactions.<\/p>\r\n<p>These are just a few examples. The list of regulations has through the years increased and still does. Almost each and every industry is today, to some extent more or less regulated. GDPR for example is one of those regulations that impacts a very high span of organizations. In Europe, almost each and every organization is impacted.<\/p>\r\n<p>Regulations related to AI are another example and when technology drives the the increased need for further compliance through regulations. As you might already know and have figured out, the last regulation that an organization will need to comply with has not been invented or developed at this point. There is more to come and the list will be made longer. The piles of regulations will increase. The requirements related to compliance will not go away.<\/p>\r\n<p><img decoding=\"async\" class=\" wp-image-2599 aligncenter\" src=\"https:\/\/tynesideinnovation.com\/grcfincrimetoday\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-adaptable-300x201.png\" alt=\"\" width=\"327\" height=\"219\" srcset=\"https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-adaptable-300x201.png 300w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-adaptable-600x402.png 600w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-adaptable.png 712w\" sizes=\"(max-width: 327px) 100vw, 327px\" \/><\/p>\r\n\r\n\r\n\r\n<p>Change is constant. Adaptability is key. Security GRC<\/p>\r\n\r\n\r\n\r\n<p>A commonly confused practice within GRC is the G, Governance. Many confuse Governance with Management. There is a difference and it\u2019s pretty obvious when put into context.<\/p>\r\n<p>Governance is, short and simple, about the bigger picture and less about the details. It is about setting the direction, strategy, and vision. These \u201c bigger picture\u201d things are (in general and shall be) the board\u2019s responsibility. The execution of the day-to-day activities is operationalized by the organization and starts out with the CEO. The CEO is not the one who will do all the work but will delegate the responsibility and accountability to the team around him\/her, also known as the Executive Management Team, EMT (consisting of roles such as for example CFO, CMO, CIO, CISO, COO, CRO and so forth). The EMT delegates the operationalization, to some extent or fully, to their team members (Vice Presidents, Directors etcetera). The execution of the objectives to achieve the strategy, set by the governing body (the board), is managed throughout the organization.<\/p>\r\n<p>This is somewhat of a simplified description of how the chain of delegation and governance may take place. Depending on, for example, the operational model and structure of an organization may contribute to the picture looking a bit different. The structure I have described is not set in stone but gives a good overview of the overall idea.<\/p>\r\n<p><img decoding=\"async\" class=\" wp-image-2602 aligncenter\" src=\"https:\/\/tynesideinnovation.com\/grcfincrimetoday\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-300x167.png\" alt=\"\" width=\"349\" height=\"194\" srcset=\"https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-300x167.png 300w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-scaled-600x334.png 600w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-1024x571.png 1024w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-768x428.png 768w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-1536x856.png 1536w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-corporate-grc-2048x1141.png 2048w\" sizes=\"(max-width: 349px) 100vw, 349px\" \/><\/p>\r\n<pre>Sorry, I know! The text is very small and might be hard to read. Use the zoom function if possible, I think the illustration is valuable to study.<\/pre>\r\n<p>The takeaway is that the model I described for how Governance can be applied to several parts of an organization to achieve the same outcomes. For example IT Governance, Financial Governance, Business Governance, Security Governance, and so forth. For each part of an organizational entity, a leadership committee (I.e., governance) establishes the strategy.<\/p>\r\n<p>The strategy for example Corporate Finance is developed by the leadership committee which delegates the accountability and responsibility for managing the execution of the objectives to the roles and responsibilities in the Finance organization to operationalize the strategy.<\/p>\r\n<p>The Corporate Finance Strategy is not something that takes place in isolation, it is aligned as a part of the overall corporate strategy in direction with the board\u2019s strategy for the organization.<\/p>\r\n<p>Properly established Governance will provide control, transparency, direction, ethics, and separation of responsibilities. Generally, Governance is responsible for the \u201cWhat\u201d and Management is responsible for the \u201cHow\u201d.<\/p>\r\n<p>How things are carried out in reality may though take a different form between organizations. When theory meets reality those may not always align. More or less, every organization has some form of Governance in place that serves as a decision-making body for where those \u201cbigger picture\u201d things are discussed and decided on. And for Governance to function it need leadership. Governance can\u2019t exist without leadership. Establishing Governance does not equate to that leadership being accomplished. These are two different things but they go hand in hand.<\/p>\r\n<p>There is certainly more that can and should be said about Governance but I will stop here for now. Let\u2019s jump into the What, Why, When, &amp; How explanation of Security GRC.<\/p>\r\n<h1 class=\"wp-block-heading\"><strong>WHAT?<\/strong><\/h1>\r\n<p class=\"has-text-align-justify\">In this article,\u00a0<em>Security GRC<\/em>\u00a0is explained as:<\/p>\r\n<p class=\"has-text-align-justify has-large-font-size\"><em>A structured and holistic discipline covering the practices of Governance, Risk Management, and Compliance, ie. GRC.<\/em><\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p class=\"has-text-align-justify\">As you may see there are fewer wordings in this explanation about \u201csecurity\u201d or something such as protection, resilience, detection etcetera. These things affect\u00a0<em>Security GRC<\/em>\u00a0or may be an outcome of the work. How the objectives are managed and actualized in alignment with the strategic direction, i.e.\u00a0<em>Governance<\/em>.<\/p>\r\n<p class=\"has-text-align-justify\"><em>Security GRC<\/em>\u00a0is a subset of\u00a0<em>Corporate GRC<\/em>\u00a0which is focused on the management and oversight of security efforts. This means that\u00a0<em>Security GRC<\/em>\u00a0in an organization is a part of a bigger puzzle as explained earlier in this article. It does not and shall not operate in isolation from the rest of the organization.\u00a0<em>Security GRC<\/em>\u00a0shall be integrated with\u00a0<em>Corporate GRC<\/em>, other\u00a0<em>GRC\u00a0<\/em>disciplines, and the rest of the organization.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-2603 aligncenter\" src=\"https:\/\/tynesideinnovation.com\/grcfincrimetoday\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-300x134.png\" alt=\"\" width=\"358\" height=\"160\" srcset=\"https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-300x134.png 300w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-scaled-600x268.png 600w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-1024x457.png 1024w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-768x343.png 768w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-1536x685.png 1536w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-expalined-2048x914.png 2048w\" sizes=\"(max-width: 358px) 100vw, 358px\" \/><\/p>\r\n<pre>Sorry, I know! The text is very small and might be hard to read. Use the zoom function if possible, I think the illustration is valuable to study.<\/pre>\r\n<p class=\"has-text-align-justify\">Security is a team sport and so is\u00a0<em>Security GRC<\/em>. This is not something that is a one-man show or something that only is a thing taking place in a security team. This is a discipline that is established to support the organization it exists in. And yes, a tool or software for\u00a0<em>Security GRC<\/em>, that helps out to automate things such as evidence collection, risk reporting, and data classification, is and can be a part of the puzzle but this is not a unicorn solution.<\/p>\r\n<p class=\"has-text-align-justify\">Before a tool or software implementation of a\u00a0<em>Security GRC<\/em>\u00a0tool, other things should be established. Let\u2019s call these things foundational components of\u00a0<em>Security GRC.<\/em>\u00a0These things equate to for example structure, frameworks, and processes. And of course, you need to have support for the change from your stakeholders and sponsors. A tool or software should rather, as I see it, be a natural progression in an organization\u2019s maturity journey of\u00a0<em>Security GRC\u00a0<\/em>rather than the absolute starting point.<\/p>\r\n<p class=\"has-text-align-justify\">This principle is not unique to\u00a0<em>Security\u00a0<\/em>GRC though, it applies to pretty much more or less all aspects of an organization\u2019s maturity journey. If an organization does not have\u00a0<em>people\u00a0<\/em>and\u00a0<em>processes\u00a0<\/em>available and educated on a certain subject\/discipline\/skill\/&lt;etcetera&gt;\u00a0<em>technology\u00a0<\/em>will provide less value. I have seen this mistake several times in a bunch of different forms of projects throughout my career. IT Service Management, Risk Management, Identity &amp; Access Management, and Cloud Security Governance just to mention a couple examples. The list could have been made longer but I will stop here for now.<\/p>\r\n<h1 class=\"wp-block-heading\"><strong>WHY<\/strong><\/h1>\r\n<p>The values gained for an organization that chooses to establish\u00a0<em>Security GRC<\/em>\u00a0can provide:<\/p>\r\n<p class=\"has-text-align-justify has-large-font-size\"><em>Ensured compliance, mitigation of risks, and contributed to an improved security posture, and cyber resilience in alignment with the organization\u2019s strategic objectives.<\/em><\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p class=\"has-text-align-justify\">An organization that chooses to establish\u00a0<em>Security GRC<\/em>\u00a0will gain positive effects and value addition from managing the three practices (<em>Governance, Risk Management, &amp; Compliance<\/em>) in synchronization. Each of the three practices within\u00a0<em>GRC\u00a0<\/em>is and shall be seen as a unique perspective which all serve the same overall purpose. Go back to the picture above in the\u00a0<em>What<\/em>\u00a0section and study the descriptions.<\/p>\r\n<p class=\"has-text-align-justify\">The practices together form a\u00a0<em>system<\/em>\u00a0and a holistic structure that operates as a totality. The value generated for an organization by synchronizing and integrating the three practices may for example be:<\/p>\r\n<ul class=\"wp-block-list\">\r\n<li>reduced or elimination of duplicated efforts<\/li>\r\n<li>increased efficiency through the usage of common processes and methods<\/li>\r\n<li>increased insight and understanding of the organization\u2019s security and compliance posture<\/li>\r\n<li>improved alignment of investments in relation to the organization\u2019s strategic direction<\/li>\r\n<\/ul>\r\n<p>&nbsp;<\/p>\r\n<h1 class=\"wp-block-heading\"><strong>HOW<\/strong><\/h1>\r\n<p>The establishment of\u00a0<em>Security GRC<\/em>\u00a0in an organization:<\/p>\r\n<p class=\"has-text-align-justify has-large-font-size\"><em>Shall be adapted toward the organization\u2019s culture and not the other way around.<\/em><\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p class=\"has-text-align-justify\">The form of how\u00a0<em>Security GRC<\/em>\u00a0is established may differ between organizations. A very mature organization, for example operating in the Finance industry, will have a more \u201ccomplex\u201d setup compared to a start-up company developing software. Both these organizations need some form of\u00a0<em>Security GRC<\/em>\u00a0but the practical implementation will differ. The reasons for it, are for example but are not limited to:<\/p>\r\n<ul class=\"wp-block-list\">\r\n<li>Culture<\/li>\r\n<li>Regulations<\/li>\r\n<li>Organizational size<\/li>\r\n<li>Geographical spread<\/li>\r\n<li>Operating model<\/li>\r\n<li>Organizational history<\/li>\r\n<li>Organizational structure<\/li>\r\n<\/ul>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p class=\"has-text-align-justify\">I think it is very accurate to say that there is no one-size-fits-all\u00a0<em>Security GRC<\/em>\u00a0setup that can be copy-pasted into each and every organization. There are of course general recommendations and principles that make up a good starting point, but these are just that. Even the best theoretical principle or model may not become best friends with security in reality.\u00a0<a href=\"https:\/\/henrikparkkinen.com\/2023\/11\/21\/security-in-reality\/\" target=\"_blank\" rel=\"noreferrer noopener\">In this article, I share some of my thoughts about Security in reality<\/a>.<\/p>\r\n<p>&nbsp;<\/p>\r\n<h1 class=\"wp-block-heading\"><strong>WHEN<\/strong><\/h1>\r\n<p><em>Security GRC<\/em>\u00a0shall be established when:<\/p>\r\n<p class=\"has-text-align-justify has-large-font-size\"><em>The organization is mature enough and sponsoring for the implementation is established with key stakeholders.<\/em><\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p class=\"has-text-align-justify\">If an organization is not \u201cmature\u201d enough to establish\u00a0<em>Security GRC<\/em>\u00a0or the decision is not sponsored by key stakeholders the journey should not start. I am by no means saying the establishment is or shall be a cakewalk but if an organization lacks the understanding of \u201cwhy\u201d\u00a0<em>Security GRC<\/em>\u00a0is needed, the conversation must start here.<\/p>\r\n<p class=\"has-text-align-justify\">A very big part of an organization\u2019s maturity, related to security (independent of its\u00a0<em>GRC\u00a0<\/em>or something else), starts from an awareness point. If the organization and the key stakeholders are not aware of\u00a0<em>why<\/em>\u00a0that security thing is needed this is the starting point. And to establish this form of awareness is usually not something that is accomplished through one meeting or as a quick discussion at the coffee machine.<\/p>\r\n<p class=\"has-text-align-justify\">It is up to you as a security leader to influence your key stakeholders and decision-makers in your organization to understand why\u00a0<em>Security GRC<\/em>\u00a0is needed. You need to create awareness and explain\u00a0<em>why, what, when,\u00a0<\/em>and<em>\u00a0how<\/em>\u00a0<em>Security GRC<\/em>\u00a0is needed. If you identify that an organization is in need of it, don\u2019t sit and wait for it to happen. It is up to you to lead the way. You need to influence your organization to realize the values of it. Communication. It\u2019s up to you as a security leader.<\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<h1 class=\"wp-block-heading\"><strong>EPILOGUE<\/strong><\/h1>\r\n<p class=\"has-text-align-justify\">Most organizations have some sort of Governance established. In some places, it is more formalized, in other places less. My observation of why this is the case is due to what an organization requires or how mature they are.<\/p>\r\n<p class=\"has-text-align-justify\">Just because you as a security leader identify the need for an organization to implement\u00a0<em>Security GRC<\/em>\u00a0does not mean they are mature enough for the change. Or that they actually need it in the way you want to implement it. And the key thing here is \u201cchange\u201d. Change requires inclusion and to create inclusion leadership is required.<\/p>\r\n<p>&nbsp;<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2604 aligncenter\" src=\"https:\/\/tynesideinnovation.com\/grcfincrimetoday\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-change-231x300.png\" alt=\"\" width=\"231\" height=\"300\" srcset=\"https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-change-231x300.png 231w, https:\/\/grcfincrimetoday.org\/wp-content\/uploads\/2025\/10\/grc-what-why-how-when-grc-change.png 405w\" sizes=\"(max-width: 231px) 100vw, 231px\" \/><\/p>\r\n<pre>How big is the change? How fast is the change? How &lt;insert&gt; is the change? What we know about change, is that it is constant. Adaptability is key. The reality will constantly be changing.<\/pre>\r\n<p class=\"has-text-align-justify\">Implementing\u00a0<em>Security GRC<\/em>\u00a0is a change, small or big of course depending on where the starting point is\u2026as I explained earlier in the article. Adopt the change and establishment of\u00a0<em>Security GRC<\/em>\u00a0to fit into your organization, it will never, or with a very small chance, work the other way around.<\/p>\r\n<p class=\"has-text-align-justify\">And implementing\u00a0<em>Security GRC<\/em>\u00a0is not about implementing a certain tool or software. This may be a part of the establishment but should not be the first place or starting point. This is how many organizations do it, and I understand it. Going with a tool\/software implementation before the establishment of adequate core processes and structuring, such as for example a Governance structure &amp; framework, Risk Management framework &amp; processes, Compliance framework &amp; auditing processes will most likely turn out in a less optimal outcome. I wouldn\u2019t recommend the starting point to be from a tooling\/software orientation. It should be the other way around \u2013&gt; structure, frameworks, and processes.<\/p>\r\n<p class=\"has-text-align-justify\">You are the expert who is there to show the way, know the way, and go the way. Actions speak louder than words but before you start taking action on this subject, make sure to have your sponsors and key stakeholders with you on the change. This is key to any change.<\/p>\r\n<div class=\"wp-block-spacer\" aria-hidden=\"true\">\u00a0<\/div>\r\n<p><em>Henrik Parkkinen<\/em><\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Charles Robert Darwin, 1809 \u2013 1882 Change is constant, we may like it or not. But it is the truth. It can not be stopped. Change may come from both internal and external forces and requirements. They may be small or big and more or less impactful. What we know, is still, that change<\/p>\n","protected":false},"author":1,"featured_media":2601,"comment_status":"open","ping_status":"open","sticky":true,"template":"elementor_theme","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[146],"tags":[],"class_list":["post-876","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","sticky"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/876","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/comments?post=876"}],"version-history":[{"count":5,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/876\/revisions"}],"predecessor-version":[{"id":2605,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/posts\/876\/revisions\/2605"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/media\/2601"}],"wp:attachment":[{"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/media?parent=876"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/categories?post=876"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grcfincrimetoday.org\/index.php\/wp-json\/wp\/v2\/tags?post=876"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}