{"id":10941,"date":"2022-04-28T08:45:47","date_gmt":"2022-04-28T07:45:47","guid":{"rendered":"https:\/\/ee.yelkdev.site\/?p=10941"},"modified":"2025-04-02T03:42:12","modified_gmt":"2025-04-02T02:42:12","slug":"software-delivery-security-secure-delivery-playbook","status":"publish","type":"post","link":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/","title":{"rendered":"Five software delivery security pitfalls"},"content":{"rendered":"<p>The software delivery process has been transformed in the last decade, with the adoption of well-understood paths that incorporate functions such as testing, release management and operational support.<\/p>\n<p>These changes have enabled organisations to speed up time to market and improve service reliability. So why does security still feel so hard for so many product teams?<\/p>\n<p>In our <a href=\"https:\/\/playbooks.equalexperts.com\/secure-delivery-playbook\">Secure Delivery playbook<\/a>, we explain the principles and practices you can apply to security within continuous delivery. We\u2019ll also explain the security pitfalls that we encounter with customers, and how you can avoid them. The top five software delivery security challenges we\u2019ve identified are:<\/p>\n<ol>\n<li>Security gate bottlenecks<\/li>\n<li>Disruptive chunks of security work<\/li>\n<li>Lack of tangible value<\/li>\n<li>Unsuitable security policies and checklists<\/li>\n<li>Inefficient duplication of effort<\/li>\n<\/ol>\n<h2>1. Security Gate Bottlenecks<\/h2>\n<p>Product teams need to roll out new digital services to customers as quickly as possible, to gain rapid feedback and iterate on their minimum viable product. However, too often this process is held up by weeks or months, because of the need for lengthy risk assessments and penetration tests. These checks are carried out by an overloaded security team that doesn\u2019t have the capacity to meet multiple iterative launch deadlines.<\/p>\n<p>You can reduce this bottleneck by embedding security assurance ownership into product teams. If product teams understand what assurance is required from a security assessment, then they can proactively provide it through code scanning, threat modelling and just-in-time security controls. This means security teams can change their role from fully assessing each release to simply checking the provided evidence.<\/p>\n<p>The success statement you\u2019re looking for is:<\/p>\n<p>\u201cWe no longer wait for security teams to sign off that our release is secure, we provide security scan results and documented security controls in an agreed format which they quickly verify and use for assurance\u201d<\/p>\n<h2>2. Disruptive chunks of security work<\/h2>\n<p>It can be difficult to plan for the outcome of large, infrequent security reviews or audits. Teams are often required to take on large chunks of remedial security or compliance work, which can lead to combative negotiations, disruption and widespread risk acceptance.<\/p>\n<p>An effective way to reduce this disruption is by adopting security standards and controls earlier, in consultation with security teams. This means defining a clear set of standardised security requirements that are based on data sensitivity and system architecture. Additionally, shifting security requirements left towards the beginning of the delivery lifecycle means that product teams can design in controls from the start.<\/p>\n<p>This looks like:<\/p>\n<p>\u201cWe knew from product inception that our payment service would require service to service authentication and the encryption of card details. We planned this from the beginning and used agreed mechanisms that led to a very smooth delivery.\u201d<\/p>\n<h2>3. Lack of tangible value<\/h2>\n<p>Too often, security activities such as code scanning, risk assessment and remedial work are carried out with little discernible value, apart from being able to say, \u201cWe did what we needed to to pass security sign off\u201d.\u00a0 This makes it difficult to justify security activities against product needs, and to measure their value.<\/p>\n<p>This can be improved by measuring and owning security performance effectively. If you understand how security activities can be measured and used to provide assurance evidence, then you can prove vulnerabilities are fixed within timelines or that important security controls are widely adopted. This also means you can help teams take responsibility for owning security improvements and prioritising work.<\/p>\n<p>\u201cUsing our security dashboards, as a delivery owner I can demonstrate that 100% of my critical systems have granular database permissions, are regularly scanned for vulnerabilities against the OWASP top 10, and 95% of any vulnerabilities found are fixed within 14 days.\u201d<\/p>\n<h2>4. Unsuitable security checklists<\/h2>\n<p>It\u2019s important to define a set of technical security requirements and standards if you want to scale out security assurance effectively. However, in many cases the result is hundreds of questions in a spreadsheet, based on old and high-level industry standards. Such checklists are created in isolation by security teams, and rarely updated. This leads to security activities that are unsuitable for fast-changing tech stacks and modern design paradigms, such as microservices, serverless and composable front-ends.<\/p>\n<p>You can improve on this by co-developing useful, relevant and up-to-date security standards. Ensure standards are co-developed and co-owned by product and security teams, and regularly review and extend them to keep up with new technology or innovative system architectures.<\/p>\n<p>This looks like:<\/p>\n<p>\u201cOur security standards are seen as a valuable design toolkit for engineers and architects that provide early indication of security requirements and act as a blueprint when implementing security controls. \u201d<\/p>\n<h2>5. Inefficient duplication of effort<\/h2>\n<p>Security scans and\/or penetration tests for multiple digital services often find the same vulnerabilities over and over again, with multiple product teams carrying out the same remedial work or accepting the same business risks. This results in duplicated, expensive work and\/or increased security risk from cross-cutting control deficiencies that are too big for any one team to fix.<\/p>\n<p>You can remove the duplication with:<\/p>\n<ul>\n<li aria-level=\"1\">Focused penetration testing. You should review penetration test findings globally, and move towards in-depth, regular testing and scanning on cross-cutting areas such as web front-ends or shared infrastructure, while reducing testing on individual microservices.<\/li>\n<li aria-level=\"1\">In-depth remediation efforts. Tackle shared vulnerabilities by carefully standardising shared components such as base VM or container images, shared framework libraries or reverse-proxies, and fixing them regularly so teams get fixes \u201cfor free\u201d.<\/li>\n<\/ul>\n<p>This looks like:<\/p>\n<p>\u201cWe no longer pen test each new customer-facing website component before release, instead we test the whole site in-depth every 3 months and since we standardised our web server configuration we no longer receive hundreds of duplicated findings.\u201d<\/p>\n<p>In upcoming blog posts, I\u2019ll go into more detail on each of these pitfalls with some useful concrete techniques to avoid them. So, follow Equal Experts on <a href=\"https:\/\/x.com\/EqualExperts\">Twitter<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/equal-experts\/\">LinkedIn<\/a> for updates!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is your product team finding secure delivery a challenge? Download our secure delivery playbook to identify the top 5 security pitfalls in continuous development, and how to avoid them. <\/p>\n","protected":false},"author":177,"featured_media":10943,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[259,258,260,209,257,256],"location":[397],"class_list":["post-10941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-our-thinking","tag-continuous-development","tag-opsecdev","tag-secure-delivery","tag-software-delivery","tag-software-delivery-security","tag-software-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Five software delivery security pitfalls | Equal Experts<\/title>\n<meta name=\"description\" content=\"What are the top 5 software delivery security pitfalls, and how can you avoid them? Download our Secure Delivery playbook to find out more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five software delivery security pitfalls\" \/>\n<meta property=\"og:description\" content=\"Is your product team finding secure delivery a challenge? Download our secure delivery playbook to identify the top 5 security pitfalls in continuous development, and how to avoid them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\" \/>\n<meta property=\"og:site_name\" content=\"Equal Experts\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-28T07:45:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T02:42:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_FB.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chris Rutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Five software delivery security pitfalls\" \/>\n<meta name=\"twitter:description\" content=\"Is your product team finding secure delivery a challenge? Download our secure delivery playbook to identify the top 5 security pitfalls in continuous development, and how to avoid them.\" \/>\n<meta name=\"twitter:creator\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:site\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Rutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\"},\"author\":{\"name\":\"Chris Rutter\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d\"},\"headline\":\"Five software delivery security pitfalls\",\"datePublished\":\"2022-04-28T07:45:47+00:00\",\"dateModified\":\"2025-04-02T02:42:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\"},\"wordCount\":974,\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg\",\"keywords\":[\"continuous development\",\"opsecdev\",\"secure delivery\",\"software delivery\",\"software delivery security\",\"software security\"],\"articleSection\":[\"Our Thinking\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\",\"url\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\",\"name\":\"Five software delivery security pitfalls | Equal Experts\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg\",\"datePublished\":\"2022-04-28T07:45:47+00:00\",\"dateModified\":\"2025-04-02T02:42:12+00:00\",\"description\":\"What are the top 5 software delivery security pitfalls, and how can you avoid them? Download our Secure Delivery playbook to find out more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg\",\"width\":1200,\"height\":514},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.equalexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five software delivery security pitfalls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.equalexperts.com\/#website\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"name\":\"Equal Experts\",\"description\":\"Making Software. Better.\",\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.equalexperts.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.equalexperts.com\/#organization\",\"name\":\"Equal Experts\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"width\":719,\"height\":340,\"caption\":\"Equal Experts\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/EqualExperts\",\"https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d\",\"name\":\"Chris Rutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g\",\"caption\":\"Chris Rutter\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Five software delivery security pitfalls | Equal Experts","description":"What are the top 5 software delivery security pitfalls, and how can you avoid them? Download our Secure Delivery playbook to find out more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/","og_locale":"en_GB","og_type":"article","og_title":"Five software delivery security pitfalls","og_description":"Is your product team finding secure delivery a challenge? Download our secure delivery playbook to identify the top 5 security pitfalls in continuous development, and how to avoid them.","og_url":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/","og_site_name":"Equal Experts","article_published_time":"2022-04-28T07:45:47+00:00","article_modified_time":"2025-04-02T02:42:12+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_FB.jpg","type":"image\/jpeg"}],"author":"Chris Rutter","twitter_card":"summary_large_image","twitter_title":"Five software delivery security pitfalls","twitter_description":"Is your product team finding secure delivery a challenge? Download our secure delivery playbook to identify the top 5 security pitfalls in continuous development, and how to avoid them.","twitter_creator":"@EqualExperts","twitter_site":"@EqualExperts","twitter_misc":{"Written by":"Chris Rutter","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#article","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/"},"author":{"name":"Chris Rutter","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d"},"headline":"Five software delivery security pitfalls","datePublished":"2022-04-28T07:45:47+00:00","dateModified":"2025-04-02T02:42:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/"},"wordCount":974,"publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg","keywords":["continuous development","opsecdev","secure delivery","software delivery","software delivery security","software security"],"articleSection":["Our Thinking"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/","url":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/","name":"Five software delivery security pitfalls | Equal Experts","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg","datePublished":"2022-04-28T07:45:47+00:00","dateModified":"2025-04-02T02:42:12+00:00","description":"What are the top 5 software delivery security pitfalls, and how can you avoid them? Download our Secure Delivery playbook to find out more.","breadcrumb":{"@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#primaryimage","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2022\/04\/5SecurityPitfalls_blog_Lead.jpg","width":1200,"height":514},{"@type":"BreadcrumbList","@id":"https:\/\/www.equalexperts.com\/blog\/our-thinking\/software-delivery-security-secure-delivery-playbook\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.equalexperts.com\/"},{"@type":"ListItem","position":2,"name":"Five software delivery security pitfalls"}]},{"@type":"WebSite","@id":"https:\/\/www.equalexperts.com\/#website","url":"https:\/\/www.equalexperts.com\/","name":"Equal Experts","description":"Making Software. Better.","publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.equalexperts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.equalexperts.com\/#organization","name":"Equal Experts","url":"https:\/\/www.equalexperts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","width":719,"height":340,"caption":"Equal Experts"},"image":{"@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EqualExperts","https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true"]},{"@type":"Person","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d","name":"Chris Rutter","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g","caption":"Chris Rutter"}}]}},"_links":{"self":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/10941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/comments?post=10941"}],"version-history":[{"count":0,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/10941\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/media\/10943"}],"wp:attachment":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/media?parent=10941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/categories?post=10941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/tags?post=10941"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/location?post=10941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}