{"id":13441,"date":"2025-09-03T07:16:30","date_gmt":"2025-09-02T22:16:30","guid":{"rendered":"https:\/\/aireviewirush.com\/?p=13441"},"modified":"2025-09-03T07:16:30","modified_gmt":"2025-09-02T22:16:30","slug":"defending-azure-infrastructure-from-silicon-to-methods","status":"publish","type":"post","link":"https:\/\/aireviewirush.com\/?p=13441","title":{"rendered":"Defending Azure Infrastructure from silicon to methods"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>\n\t\t\tAt Microsoft, safe design begins on the basis of our computing stack\u2014the silicon degree\u2014and extends by each layer of the cloud.\t\t<\/p>\n<p class=\"wp-block-paragraph\">At Microsoft, safe design begins on the basis of our computing stack\u2014the silicon degree\u2014and extends by each layer of the cloud. Since launching the Safe Future Initiative (SFI)\u2014a company-wide dedication to safety, we proceed to prioritize delivering merchandise and options which might be <em>safe by design<\/em>, <em>safe by default<\/em>, and <em>safe in operation<\/em>.<\/p>\n<p class=\"wp-block-paragraph\">SFI sits on the core of Azure\u2019s method to designing {hardware} methods, reshaping the structure, deployment, and operations of our bodily cloud and AI infrastructure. Azure is redefining workload safety from the datacenter to the sting. Our complete method consists of <a href=\"https:\/\/azure.microsoft.com\/en-us\/products\/virtual-machines\/boost\" target=\"_blank\" rel=\"noopener\">Azure Enhance<\/a>, which isolates management and information planes for digital machines; the <a href=\"https:\/\/techcommunity.microsoft.com\/blog\/AzureInfrastructureBlog\/securing-azure-infrastructure-with-silicon-innovation\/4293834\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Built-in HSM<\/a>, a customized safety chip offering FIPS 140-3 Stage 3 key safety inside our servers; and <a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/\" target=\"_blank\" rel=\"noopener\">confidential computing<\/a>, which protects information in-use by hardware-based trusted execution environments (TEEs).\u202f<\/p>\n<p class=\"wp-block-paragraph\">Microsoft has additionally made ongoing efforts to advance systematic safety audits and contribute to the open-source neighborhood by Caliptra\u2014a silicon root-of-trust designed to anchor safety in {hardware}. Combining these initiatives with applied sciences comparable to confidential computing and code transparency companies, our goal is to make sure that each part within the provide chain will be securely verified.\u202f<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"289\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch.jpg\" alt=\"Building blocks of Azure\u2019s hardware security\u202fArchitecture\u202f.\" class=\"wp-image-45796\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch.jpg 624w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/arch-300x139.jpg 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\"\/><figcaption class=\"wp-element-caption\"><em>Determine 1: Constructing blocks of Azure\u2019s {hardware} safety\u202fStructure\u202f<\/em>.<\/figcaption><\/figure>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\" role=\"button\"><label for=\"item-69ef853d270e2\" ><span class=\"\"><span style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input aria-label=\"Toggle\" aria-label=\"item-69ef853d270e2\"  type=\"checkbox\" id=\"item-69ef853d270e2\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Objective_constructed_silicon_for_defense-in-depth%E2%80%AF\" title=\"Objective constructed silicon for defense-in-depth\u202f\">Objective constructed silicon for defense-in-depth\u202f<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Confidential_Computing_affords_a_spectrum_of_ensures\" title=\"Confidential Computing affords a spectrum of ensures\">Confidential Computing affords a spectrum of ensures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Hardware_Safety_Transparency\" title=\"{Hardware} Safety Transparency\">{Hardware} Safety Transparency<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Enhancing_safety_with_Code_Transparency_Companies\" title=\"Enhancing safety with Code Transparency Companies\">Enhancing safety with Code Transparency Companies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Staying_safe_with_Microsoft\" title=\"Staying safe with Microsoft\">Staying safe with Microsoft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/aireviewirush.com\/?p=13441\/#Azure_Enhance\" title=\"Azure Enhance\">Azure Enhance<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\" id=\"purpose-built-silicon-for-defense-in-depth\"><span class=\"ez-toc-section\" id=\"Objective_constructed_silicon_for_defense-in-depth%E2%80%AF\"><\/span>Objective constructed silicon for defense-in-depth\u202f<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/azure-boost\/overview\" target=\"_blank\" rel=\"noopener\"><strong>Azure Enhance<\/strong><\/a> serves because the system\u2019s\u202fsafety controller, managing safe entry to Azure. Solely methods with a verified and accredited safety configuration are granted entry.\u202f<\/p>\n<p class=\"wp-block-paragraph\">To reinforce safety and efficiency, Azure Enhance\u202foffloads management aircraft companies\u202ffrom the host CPU to a devoted Azure Enhance system controller. This setup creates a {hardware} separation \u202fbetween Azure\u2019s management aircraft\u2014working on the Azure Enhance controller\u2014and buyer workloads\u2014working on the CPU\u2014making certain robust isolation and safety.<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/aka.ms\/AzureIntegratedHSM\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Built-in HSM<\/a> is a server native {Hardware} Safety Module (HSM) for high-assurance workloads. It&#8217;s designed to fulfill the stringent necessities of the Federal Info Processing Requirements (FIPS) 140-3 Stage 3 safety necessities, requiring robust isolation, tamper-resistant {hardware}, identity-based authentication, and computerized zeroization. Azure Built-in HSM protects keys in-use, by making certain keys all the time stay throughout the bounds of the HSM.\u202f<\/p>\n<p class=\"wp-block-paragraph\">In contrast to centralized distant HSM companies, Azure Built-in HSM eliminates community roundtrips for key operations and avoids the necessity to launch keys into the workload atmosphere. As an alternative of counting on distant entry, the Azure Built-in HSM is securely certain to the native workload and offers oracle-style key utilization to approved companies throughout the native atmosphere.\u202f<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><img decoding=\"async\" alt=\"A hand holding Azure Integrated HSM, a security chip.\" class=\"wp-image-45678 webp-format\" style=\"box-shadow:var(--wp--preset--shadow--natural)\" srcset=\"\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/image-26.webp\"\/><\/figure>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/delivering-consistency-and-transparency-for-cloud-hardware-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Datacenter Safe Management Module<\/a> (DC-SCM)\u2014DC-SCM is a safety and server management module that incorporates Hydra\u2014a security-focused Board Administration Controller (BMC) design, with an built-in root-of-trust and hardware-based safety safety on all administration interfaces.\u202fThis root of belief restricts unauthorized entry to BMC firmware and ensures the firmware is authenticated and cryptographically measured.\u202f<\/p>\n<h2 class=\"wp-block-heading\" id=\"confidential-computing-offers-a-spectrum-of-guarantees\"><span class=\"ez-toc-section\" id=\"Confidential_Computing_affords_a_spectrum_of_ensures\"><\/span>Confidential Computing affords a spectrum of ensures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/solutions\/confidential-compute\/\" target=\"_blank\" rel=\"noopener\"><strong>Confidential computing<\/strong><\/a> makes use of hardware-based Trusted Execution Environments (TEEs) to guard workloads\u2014comparable to digital machines\u2014from different system software program, together with the hypervisor.\u202f<\/p>\n<p class=\"wp-block-paragraph\">Microsoft, a founding member of the <a href=\"https:\/\/confidentialcomputing.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">Confidential Computing Consortium<\/a>, works intently with CPU and GPU producers to design and combine confidential computing applied sciences instantly into their {hardware}. Earlier this 12 months on the Confidential Computing Summit we <a href=\"https:\/\/www.confidentialcomputingsummit.com\/e\/ccs25\/page\/on-demand-content\" target=\"_blank\" rel=\"noreferrer noopener\">outlined a spectrum of ensures<\/a> customers can allow with confidential computing after they port their purposes, together with:\u202f\u00a0<\/p>\n<ol start=\"1\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>On<\/strong> by default, is the raise and shift present purposes with minimal change.\u202f\u202f\u00a0<\/li>\n<li class=\"wp-block-list-item\">Construct <strong>in<\/strong> confidential computing by designing companies and purposes that make deeper use of hardware-based protections.<\/li>\n<li class=\"wp-block-list-item\">Leverage clear confidential computing to achieve deeper insights into how confidential companies work together and function securely.<\/li>\n<\/ol>\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"269\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc.jpg\" alt=\"A diagram of a diagram\" class=\"wp-image-45797\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc.jpg 552w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/08\/cc-300x146.jpg 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\"\/><figcaption class=\"wp-element-caption\"><em><em>Determine 2. Confidential Computing\u2014Spectrum of Ensures<\/em><\/em>.<\/figcaption><\/figure>\n<p class=\"wp-block-paragraph\">Azure has essentially the most complete portfolio of <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/confidential-computing\/overview-azure-products\" target=\"_blank\" rel=\"noreferrer noopener\">confidential computing options<\/a>, together with confidential digital machines, containers, generative AI, and companies like Azure Confidential Ledger, Azure Attestation, and Managed HSM\u2014every designed to guard code and information all through its lifecycle utilizing hardware-backed safety.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"hardware-security-transparency\"><span class=\"ez-toc-section\" id=\"Hardware_Safety_Transparency\"><\/span>{Hardware} Safety Transparency<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/delivering-consistency-and-transparency-for-cloud-hardware-security\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Caliptra<\/strong><\/a>\u202fis a {hardware} root of belief that performs a crucial function in securing gadgets. It anchors the chain of belief instantly in silicon, establishing foundational safety properties that help the integrity of higher-level options. This basis offers workloads the power to confirm the code and configuration of the underlying platform, enabling workloads set up belief within the {hardware} platform.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Caliptra is a totally open-source silicon root of belief developed by a collaboration between Microsoft, AMD, Google, and NVIDIA. In April, we launched Caliptra 2.0, which included Adams Bridge\u2014an open-source accelerator designed for post-quantum resilient cryptography. This integration made Caliptra the primary open-source root of belief to characteristic hardened post-quantum cryptography, driving broader adoption throughout the {hardware} ecosystem.\u00a0<\/p>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/techcommunity.microsoft.com\/blog\/azureinfrastructureblog\/ocp-safe-a-systematic-hardware-security-appraisal-framework\/3955265\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Systematic Safety Critiques<\/strong><\/a> play a crucial function in defending {hardware} infrastructure, which depends on each low-level {hardware} options and the firmware that runs on prime of them. Guaranteeing firmware safety entails rigorous code scanning, steady safety critiques, and hardware-based attestation.\u202f<\/p>\n<p class=\"wp-block-paragraph\">Traditionally, Microsoft performed these critiques internally. To reinforce transparency and lengthen safety assurance past Microsoft, we partnered with Google and the Open Compute Mission in 2023 to ascertain <a href=\"https:\/\/www.opencompute.org\/projects\/ocp-safe-program\" target=\"_blank\" rel=\"noreferrer noopener\">OCP SAFE<\/a>\u2014a framework for systematic safety critiques.<\/p>\n<p class=\"wp-block-paragraph\">Beneath OCP SAFE, accredited Safety Overview Suppliers (SRPs) carry out unbiased evaluations and challenge verifiable endorsements of a producer\u2019s safety compliance. These endorsements function trusted proof, supporting safe gadget attestations and reinforcing confidence within the {hardware} provide chains.\u202f<\/p>\n<h2 class=\"wp-block-heading\" id=\"enhancing-security-with-code-transparency-services\"><span class=\"ez-toc-section\" id=\"Enhancing_safety_with_Code_Transparency_Companies\"><\/span>Enhancing safety with Code Transparency Companies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learn.microsoft.com\/en-us\/dotnet\/api\/overview\/azure\/security.codetransparency-readme?view=azure-dotnet-preview\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Code Transparency Companies<\/strong><\/a> (CTS) is an immutable ledger know-how constructed to fulfill the requirements of Provide Chain Integrity, Transparency, and Belief (<a href=\"https:\/\/scitt.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCITT<\/a>). It operates solely inside\u202fconfidential computing environments, enhancing belief in Azure\u2019s {hardware} and firmware by making certain that each part is verifiably safe\u202f.<\/p>\n<p class=\"wp-block-paragraph\">CTS addresses key challenges in firmware provenance, integrity, and auditability throughout each first-party and third-party provide chains. When paired with a\u202fsilicon root of belief like Caliptra, and supported by audits comparable to OCP-SAFE, CTS ensures that {hardware} and firmware are approved, non-repudiable, and immutably auditable.\u202f<\/p>\n<p class=\"wp-block-paragraph\">Immediately, CTS is a central part in Azure\u2019s confidential cloud companies.\u202fAlong with Azure\u2019s personal utilization, CTS will likely be obtainable as a managed service\u2014permitting Azure prospects to create and function their very own transparency service situations.\u202f<\/p>\n<h2 class=\"wp-block-heading\" id=\"staying-secure-with-microsoft\"><span class=\"ez-toc-section\" id=\"Staying_safe_with_Microsoft\"><\/span>Staying safe with Microsoft<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"wp-block-paragraph\">Microsoft\u2019s Safe Future Initiative (SFI) offers a guiding framework for constructing safe and reliable cloud infrastructure. By embedding safety into each layer\u2014from silicon to methods to companies\u2014Azure takes a defense-in-depth method to cloud safety. By way of improvements like Azure Enhance, Azure Built-in HSM, and confidential computing, and thru collaborative efforts comparable to Caliptra, OCP SAFE, and SCITT, Microsoft shouldn&#8217;t be solely securing right this moment\u2019s workloads but additionally laying the muse for a safer and clear future.\u202f<\/p>\n<aside class=\"cta-block cta-block--align-left cta-block--has-image wp-block-msx-cta\" data-bi-an=\"CTA Block\">\n<div class=\"cta-block__content\">\n<div class=\"cta-block__image-container\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-1024x575.jpg\" class=\"cta-block__image\" alt=\"A colorful lines on a white background\" srcset=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-1024x575.jpg 1024w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-300x169.jpg 300w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1-768x432.jpg 768w, https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2025\/06\/Azure_Blog_Abstract-04_1260x708-1.jpg 1260w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/>\t\t\t<\/div>\n<div class=\"cta-block__body\">\n<h2 class=\"cta-block__headline\"><span class=\"ez-toc-section\" id=\"Azure_Enhance\"><\/span>Azure Enhance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p class=\"cta-block__text\">Discover next-generation Azure infrastructure.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/aside><\/div>\n<p><script>\n\t\tfunction facebookTracking() {\n\t\t\t!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n\t\t\t\tn.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;\n\t\t\t\tn.push=n;n.loaded=!0;n.version='2.0';n.queue=[];t=b.createElement(e);t.async=!0;\n\t\t\t\tt.src=v;t.type=\"ms-delay-type\";t.setAttribute('data-ms-type','text\/javascript');\n\t\t\t\ts=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,\n\t\t\t\tdocument,'script','https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n\t\t\tfbq('init', '1770559986549030');\n\t\t\t\t\t\tfbq('track', 'PageView');\n\t\t\t\t\t}\n\t<\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Microsoft, safe design begins on the basis of our computing stack\u2014the silicon degree\u2014and extends by each layer of the cloud. At Microsoft, safe design begins on the basis of our computing stack\u2014the silicon degree\u2014and extends by each layer of the cloud. Since launching the Safe Future Initiative (SFI)\u2014a company-wide dedication to safety, we proceed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":13443,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":{"0":"post-13441","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cloud-computing"},"_links":{"self":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/13441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13441"}],"version-history":[{"count":1,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/13441\/revisions"}],"predecessor-version":[{"id":13442,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/posts\/13441\/revisions\/13442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=\/wp\/v2\/media\/13443"}],"wp:attachment":[{"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aireviewirush.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}