{"id":1054,"date":"2025-01-15T18:58:32","date_gmt":"2025-01-15T18:58:32","guid":{"rendered":"https:\/\/ziondatasolutions.com\/?page_id=1054"},"modified":"2025-02-25T18:25:50","modified_gmt":"2025-02-25T18:25:50","slug":"cmmc","status":"publish","type":"page","link":"https:\/\/ziondatasolutions.com\/?page_id=1054","title":{"rendered":"What is the CMMC?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"408\" src=\"https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-1024x408.jpeg\" alt=\"\" class=\"wp-image-1236\" srcset=\"https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-1024x408.jpeg 1024w, https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-300x119.jpeg 300w, https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-768x306.jpeg 768w, https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-1536x612.jpeg 1536w, https:\/\/ziondatasolutions.com\/wp-content\/uploads\/2025\/02\/AdobeStock_924328121-2048x815.jpeg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-4f66986395fb8012b92b442c6ca85b62\">What is the CMMC Certification?<\/h2>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-fd87cd2df73dc48041f859cd425eda3f\">The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to enhance the cybersecurity practices of organizations that work with the Department of Defense (DoD). As threats to sensitive information continue to evolve, the CMMC aims to provide a standardized approach to safeguarding Controlled Unclassified Information (CUI) and ensuring that contractors implement robust security protocols. The goal of the CMMC is to establish a baseline of cybersecurity across the defense industrial base, ultimately reducing risks and protecting critical data.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-097acdf5e3fbba8f52bff2a262bba9ce\">The CMMC is structured around five distinct maturity levels, each building upon the previous one. Level 1 represents the most basic cyber hygiene practices, focusing on the implementation of essential safeguarding measures. As organizations progress through the levels, they are required to adopt more advanced security practices, culminating at Level 5, which emphasizes optimized, sophisticated cybersecurity capabilities. Each level not only defines specific goals and practices but also dictates the required documentation and processes necessary for achieving certification.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-8242231b48dce5158af33bda7c288cea\">Securing CMMC certification is mandatory for any organization wishing to bid on DoD contracts. To be certified, entities must undergo an assessment by a C3PAO (Certified Third-Party Assessment Organization). The evaluation will examine how well the organization adheres to the prescribed practices and processes at the intended maturity level. Organizations are encouraged to implement the necessary controls and prepare thoroughly in order to meet the defined standards. Overall, the CMMC framework serves not only as a compliance measure but also as a catalyst for improving cybersecurity posture across the defense supply chain, making it an essential consideration for all contractors involved in defense work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-77df8397a1d82bd322a67fe59638ae4b\">The Role of Registered Practitioner Organizations (RPOs)<\/h2>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-2274063b48b4f75d1e113dd622b234c5\">Registered Practitioner Organizations (RPOs) play a vital role in the Cybersecurity Maturity Model Certification (CMMC) process, serving as key facilitators that help organizations navigate the complexities of this certification. RPOs are accredited entities comprising experienced cybersecurity professionals who possess a profound understanding of CMMC requirements and standards. Their primary function is to offer advisory services that support organizations in aligning their practices with the CMMC framework, ensuring they meet the requisite compliance standards for the certification process.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-9b7de232cb1c1a0487f09619d06e7090\">One of the significant advantages of partnering with an RPO is the access it provides to a pool of experienced professionals who possess extensive knowledge in cybersecurity best practices and CMMC protocols. These experts can tailor their guidance to meet the specific needs of an organization, addressing unique challenges and providing customized solutions that enhance overall preparedness. This tailored support is crucial as it aids organizations in identifying gaps in their current cybersecurity posture, thus enabling them to formulate effective strategies for improvement.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-e43ed335a011ec773fa62cff1354ba44\">Furthermore, RPOs assist organizations in understanding and interpreting the various components of the CMMC standards, which can often be overwhelming due to their complexity. By simplifying these requirements, RPOs empower businesses to implement necessary changes more efficiently. This assistance not only streamlines the preparation process for a CMMC audit but also cultivates a robust cybersecurity culture within the organization.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-f592251bc10bdf005a462fe2fe5b467f\">In summary, the collaboration with Registered Practitioner Organizations is instrumental for organizations seeking to achieve CMMC certification. Through their specialized knowledge and tailored guidance, RPOs help organizations navigate the intricate certification process, ultimately enhancing their ability to comply with CMMC standards effectively.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-1eb21df0c6582029bc332e58ad96206f\">How Zion Data Solutions Prepares You for a C3PAO Audit<\/h2>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-c7856bf72d191ea40fe955e6db59c51e\">Zion Data Solutions, as a registered practitioner organization (RPO), specializes in guiding clients through the complex landscape of CMMC certification in preparation for a C3PAO audit. The preparation process involves a structured approach tailored to meet the specific compliance needs of each organization. One of the first steps is conducting a comprehensive gap assessment. This evaluation enables clients to identify any deficiencies in their current security posture relative to the CMMC requirements. By pinpointing these gaps, organizations can develop a strategic plan to address the areas needing improvement.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-24ec1d7521b586dbd59ca9fb38a48e21\">Once the gaps have been identified, Zion Data Solutions assists organizations in implementing an effective security framework that aligns with CMMC standards. This framework not only helps in complying with specific requirements but also enhances the overall security environment. Experts at Zion provide guidance on best practices, helping clients integrate necessary controls and processes into their existing systems seamlessly.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-aaf0631c006e7c8298db9758b129ce65\">Another crucial aspect of preparation is staff training. Recognizing that a well-informed workforce is vital for compliance, Zion Data Solutions offers a range of training programs aimed at educating employees on security protocols, policies, and best practices. This training empowers staff members to take an active role in maintaining security measures and ensures that everyone understands their responsibilities within the framework of CMMC compliance.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-b23ef17cc6f8978a6cdf5a787f26cd22\">Ongoing support is a cornerstone of the services provided by Zion Data Solutions. Organizations can expect continuous assistance throughout their journey to certification, allowing for adjustments and improvements as needed. The expertise of Zion&#8217;s professionals helps ensure that clients are not only prepared for their C3PAO audit but also positioned for long-term compliance success. By employing proven methodologies and industry knowledge, Zion Data Solutions optimally prepares organizations for the challenges of achieving CMMC certification.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-19f8f27ee2856eb1fad604c66a873940\">Importance of Successful C3PAO Audit and Long-Term Compliance<\/h2>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-6a3cd89caf33e4c31fb5a515d2d33b51\">Successfully passing a C3PAO audit represents a significant milestone for organizations seeking CMMC certification. This achievement not only validates an organization&#8217;s commitment to cybersecurity but also serves as a foundational step towards establishing a robust security posture. Achieving compliance with the CMMC framework offers numerous advantages that can resonate throughout the lifespan of a business, particularly for those contracting with the Department of Defense (DoD).<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-08f79b2156cb38f2ba4e182e76161ed3\">One of the most immediate benefits of maintaining CMMC compliance is the enhanced cybersecurity framework it provides. Organizations adhering to these standards are better equipped to manage and mitigate potential security risks. They can effectively safeguard sensitive data, not only complying with necessary regulations but also creating a layer of trust with their clients and partners. A strong cybersecurity posture can significantly reduce the likelihood of data breaches or cyber-attacks, which are increasingly prevalent in today\u2019s digital landscape.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-b28f38b0e48c8056c261ee6ae25726ea\">Moreover, organizations that achieve and maintain compliance are well-positioned to explore expanded business opportunities with the DoD and other federal agencies. Compliance with the CMMC framework is often a prerequisite for securing contracts in the defense sector, which means successfully navigating the audit can open doors to lucrative partnerships and projects. In an environment where cybersecurity is paramount, being able to demonstrate compliance can differentiate a business from its competitors.<\/p>\n\n\n\n<p class=\"has-white-color has-black-background-color has-text-color has-background has-link-color wp-elements-1c4c15294a4ca62ab74fe1d4174a701e\">To retain compliance beyond initial certification, organizations must cultivate a culture of continuous improvement. This involves regularly assessing and updating cybersecurity practices in alignment with the evolving CMMC requirements. By staying informed about potential changes in the CMMC framework and implementing proactive strategies, organizations can ensure they remain compliant in the long term. Continuous training and awareness initiatives can also significantly contribute to an organization\u2019s resilience against an increasingly complex cybersecurity threat landscape.<\/p>\n\n\n<style>\r\n\t.wpsm_sb_container_1058\t{\r\n\t\tposition: relative;\r\n\t\toverflow: hidden;\r\n\t\tdisplay:block;\r\n\t\twidth:100%;\r\n\t\t\t}\t\r\n\t.wpsm_sb_section_overlay_1058 \r\n\t{\r\n\t   padding-left:15px;\r\n\t   padding-right:15px;\r\n\t   padding-top:24px;\r\n\t   padding-bottom:24px;\r\n\t   \t\t\tbackground:transparent;\r\n\t\t\t\t\r\n\t}\r\n\t\r\n\t\t\t.wpsm_sb_section_title_1058 h3\r\n\t\t{\t\r\n\t\t\tmargin-top:15px !important;\r\n\t\t\tmargin-bottom:40px !important;\r\n\t\t\tdisplay:block;\r\n\t\t\toverflow:hidden;\r\n\t\t\tcolor:#000000;\r\n\t\t\tfont-size:40px;\r\n\t\t\tfont-weight:500;\r\n\t\t\ttext-align: center;\r\n\t\t\tline-height:normal;\r\n\t\t}\r\n\t\t\r\n\t.wpsm_sb_wrapper_1058{\r\n\t\tdisplay:block;\r\n\t\toverflow:hidden;\r\n\t}\r\n\t@media screen and (max-width: 1200px){\r\n\t\t\t\t.wpsm_sb_section_overlay_1058{  padding:30px 30px; }\r\n\t}\r\n\t@media screen and (max-width: 990px){\r\n\t\t.wpsm_sb_section_overlay_1058{  padding:12px; }\r\n\t}\r\n\t@media screen and (max-width: 600px){\r\n\t\t.wpsm_sb_section_overlay_1058{  padding:5px; }\r\n\t}\r\n\t\r\n\t.wpsm_sb_container_1058 .glyphicon{\r\n\t\tdisplay:inline-block;\r\n\t}\r\n\t\t\r\n\r\n<\/style><style>\r\n\r\n.wpsm_serviceBox_1058{\r\n    text-align: center;\r\n\tbackground:rgba(255,255,255,0.76);\r\n\tpadding:20px 10px;\r\n\tmargin:20px 0;\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_service_icon{\r\n    width: 70px;\r\n    height: 70px;\r\n    line-height: 70px;\r\n    border: 1px solid #dd9933;\r\n    color: #1e73be;\r\n    margin: 0 auto 30px;\r\n    position: relative;\r\n    z-index: 1;\r\n\ttransition: all 0.5s ease 0s;\r\n\t-ms-transition: all 0.5s ease 0s;\r\n\t-webkit-transition: all 0.5s ease 0s;\r\n\t-moz-transition: all 0.5s ease 0s;\r\n\t-o-transition: all 0.5s ease 0s;\r\n}\r\n\r\n.wpsm_serviceBox_1058 .wpsm_service_icon img, .wpsm_serviceBox_1058 .wpsm_service_icon i{\r\n   position:absolute;\r\n   top: 50%;\r\n   left: 50%;\r\n\tcolor: #1e73be;\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_service_icon i\r\n,.wpsm_serviceBox_1058 .wpsm_service_icon img{\r\n\t\t\t\twidth: 30px;\r\n\t\t\theight: 30px;\r\n\t\t\tmargin-top: -15px;\r\n\t\t\tmargin-left: -15px; \r\n\t\t\tfont-size: 30px;\r\n\t\t\t}\r\n.wpsm_serviceBox_1058 .wpsm_service_icon img{\r\n   \t}\r\n.wpsm_serviceBox_1058:hover .wpsm_service_icon{\r\n    color: #000000 !important;\r\n\tborder: 1px solid #ffffff !important;\r\n}\r\n.wpsm_serviceBox_1058:hover .wpsm_service_icon i{\r\n    color: #000000 !important;\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_service_icon:after{\r\n    content: \"\";\r\n    width: 100%;\r\n    height: 100%;\r\n    position: absolute;\r\n    top: 0;\r\n    left: 0;\r\n    background: #1e73be;\r\n    z-index: -1;\r\n    transform: scale(0);\r\n\t-ms-transform: scale(0);\r\n\t-webkit-transform: scale(0);\r\n\t-moz-transform: scale(0);\r\n\t-o-transform: scale(0);\r\n\t\r\n    transition: all 0.3s ease 0s;\r\n\t-ms-transition: all 0.3s ease 0s;\r\n\t-webkit-transition: all 0.3s ease 0s;\r\n\t-moz-transition: all 0.3s ease 0s;\r\n\t-o-transition: all 0.3s ease 0s;\r\n}\r\n.wpsm_serviceBox_1058:hover .wpsm_service_icon:after{\r\n    transform: scale(1);\r\n\t-ms-transform: scale(1);\r\n\t-webkit-transform: scale(1);\r\n\t-moz-transform: scale(1);\r\n\t-o-transform: scale(1);\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_title{\r\n    font-size: 20px;\r\n    color: #000000;\r\n    margin: 0 0 15px 0;\r\n\tline-height:1.6;\r\n\tpadding:0;\r\n\t}\r\n.wpsm_serviceBox_1058 .wpsm_description{\r\n    font-size: 14px;\r\n    color :#000000;\r\n    margin: 0 0 30px 0;\r\n\tline-height:1.6;\r\n\tpadding:0;\r\n\t}\r\n.wpsm_serviceBox_1058 .wpsm_service_content .wpsm_read_more{\r\n    display: inline-block;\r\n    padding: 10px 30px;\r\n    border: 1px solid #dd8e18;\r\n    font-weight: 600;\r\n    color: #ffffff;\r\n\tfont-size: 16px;\r\n    position: relative;\r\n    z-index: 1;\r\n\t-webkit-box-shadow:none;\r\n\tbox-shadow:none;\r\n    transition: all 0.5s ease 0s;\r\n\t-ms-transition: all 0.5s ease 0s;\r\n\t-webkit-transition: all 0.5s ease 0s;\r\n\t-moz-transition: all 0.5s ease 0s;\r\n\t-o-transition: all 0.5s ease 0s;\r\n\ttext-decoration: none;\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_service_content .wpsm_read_more i{\r\n    font-weight: 600;\r\n    color: #ffffff;\r\n\tfont-size: 16px;\r\n\tvertical-align:middle !important;\r\n }\r\n.wpsm_serviceBox_1058:hover .wpsm_service_content .wpsm_read_more{\r\n    color: #1e73be !important;\r\n\tborder: 1px solid #1e73be !important;\r\n\ttext-decoration: none;\r\n}\r\n.wpsm_serviceBox_1058:hover .wpsm_service_content .wpsm_read_more i{\r\n    color: #1e73be !important;\r\n\tvertical-align:middle !important;\r\n}\r\n.wpsm_serviceBox_1058 .wpsm_service_content .wpsm_read_more:after{\r\n    content: \"\";\r\n    width: 100%;\r\n    height: 100%;\r\n    position: absolute;\r\n    top: 0;\r\n    left: 0;\r\n    background: #dd8e18;\r\n    transform: scale(1);\r\n\t-ms-transform: scale(1);\r\n\t-webkit-transform: scale(1);\r\n    z-index: -1;\r\n    transition: all 0.3s ease 0s;\r\n\t-ms-transition: all 0.3s ease 0s;\r\n\t-webkit-transition: all 0.3s ease 0s;\r\n\t-moz-transition: all 0.3s ease 0s;\r\n\t-o-transition: all 0.3s ease 0s;\r\n}\r\n.wpsm_serviceBox_1058:hover .wpsm_read_more:after{\r\n    transform: scale(0);\r\n\t-ms-transform: scale(0);\r\n\t-webkit-transform: scale(0);\r\n\t-moz-transform: scale(0);\r\n\t-o-transform: scale(0);\r\n}\r\n@media only screen and (max-width: 990px){\r\n    .wpsm_serviceBox_1058{ margin-bottom: 30px; }\r\n}\r\n\t\r\n<\/style>\r\n\t\t\t<style><\/style><div class=\"wpsm_sb_container_1058\">\r\n\t<div class=\"wpsm_sb_section_overlay_1058\">\r\n\t\t<div class='wpsm_sb_section_title_1058 text-center'><h3>CMMC<\/h3><\/div>\t\t<!-- Wrapper div start -->\r\n\t\t<div class='wpsm_sb_wrapper_1058' id='wpsm_service_box_grid_1058'> \r\n\t\t\t\t\t\t\t<div class=\"col-md-4 col-sm-6\">\r\n\t\t\t\t\t<div class=\"wpsm_serviceBox_1058\" id=\"wpsm_serviceBox_1058_1\">\r\n\t\t\t\t\t\t<div class=\"wpsm_service_icon\" >\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class='fa fa-laptop'><\/i>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"wpsm_service_content\">\r\n\t\t\t\t\t\t\t<h3 class=\"wpsm_title\">CMMC Readiness<\/h3>\r\n\t\t\t\t\t\t\t<p class=\"wpsm_description\">What Is CMMC? The Cybersecurity Maturity Model Certification (CMMC) is a unified standard designed to enhance the cybersecurity posture of organizations operating within the Defense Industrial Base (DIB). More importantly, it provides a framework for assessing and certifying the cybersecurity capabilities and practices of DIB contractors and subcontractors.<\/p>\r\n\t\t\t\t\t\t\t<a class='wpsm_read_more' href='https:\/\/ziondatasolutions.com\/?page_id=1116' >Request a Call<\/a>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<div class=\"col-md-4 col-sm-6\">\r\n\t\t\t\t\t<div class=\"wpsm_serviceBox_1058\" id=\"wpsm_serviceBox_1058_2\">\r\n\t\t\t\t\t\t<div class=\"wpsm_service_icon\" >\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class='fa fa-laptop'><\/i>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"wpsm_service_content\">\r\n\t\t\t\t\t\t\t<h3 class=\"wpsm_title\">Continuous Monitoring<\/h3>\r\n\t\t\t\t\t\t\t<p class=\"wpsm_description\">Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec feugiat.Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec feugiat.<\/p>\r\n\t\t\t\t\t\t\t<a class='wpsm_read_more' href='https:\/\/ziondatasolutions.com\/?page_id=1116' target='_blank'>Request a Call<\/a>\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div> <!-- Carouel\/Grid Wrapper end-->\r\n\t<\/div>\t<!-- Overlay end-->\r\n<\/div>\t<!-- Sb Container end-->\r\n \r\n<script>\r\njQuery(document).ready(function($){\r\n\r\n\t\/\/jQuery( window ).load(function() {\r\n\tvar col = new jColumn();\r\n\tcol.jcolumn('wpsm_serviceBox_1058');\r\n\t\/\/alert(1058);\r\n\t\/\/});\r\n\t\r\n\r\n});\/\/ready end\t\r\n<\/script>\t\t\t\t\n","protected":false},"excerpt":{"rendered":"<p>What is the CMMC Certification? The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to enhance the cybersecurity practices of organizations that work with the Department of Defense (DoD). As threats to sensitive information continue to evolve, the CMMC aims to provide a standardized approach to safeguarding Controlled Unclassified Information (CUI) and ensuring [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1054","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1054"}],"version-history":[{"count":8,"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1054\/revisions"}],"predecessor-version":[{"id":1237,"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=\/wp\/v2\/pages\/1054\/revisions\/1237"}],"wp:attachment":[{"href":"https:\/\/ziondatasolutions.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}