{"id":13918,"date":"2024-04-03T10:00:22","date_gmt":"2024-04-03T09:00:22","guid":{"rendered":"https:\/\/ee.yelkdev.site\/?p=13918"},"modified":"2024-12-09T16:48:49","modified_gmt":"2024-12-09T16:48:49","slug":"how-to-secure-your-first-generative-ai-integration","status":"publish","type":"post","link":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/","title":{"rendered":"How to secure your first generative AI integration"},"content":{"rendered":"<p>Generative AI is already providing businesses with exciting functionality and productivity gains. However, it isn\u2019t always easy to understand the security implications of GenAI tools. Engineering teams wanting to use or explore these tools may therefore struggle to gain security approval.<\/p>\n<p>Most organisations have a regulatory responsibility to risk assess new software. These risk assessments include exercises like architectural reviews, data protection assessments, penetration tests and procurement processes. There are several reasons these activities are difficult when evaluating GenAI tools:<\/p>\n<ul>\n<li aria-level=\"1\">GenAI tools are new, and many security analysts are unclear on how they work, what they\u2019re used for, how data flows through them and what new threats are emerging on a seemingly daily basis.<\/li>\n<li aria-level=\"1\">Companies hosting GenAI tools are still maturing, and until recently, have lacked clear policies and guarantees around privacy and data protection.<\/li>\n<li aria-level=\"1\">There is a lack of industry-standard benchmarks, security policies, reference architectures or hardening guides, which traditionally help security analysts gain confidence when assessing unfamiliar technologies.<\/li>\n<li aria-level=\"1\">High-profile news stories covering misuse of GenAI tools create a negative picture and raise concerns of reputational damage.<\/li>\n<\/ul>\n<p>We see risk assessment teams asking, \u201cHow much more risks will using GenAI expose us to?\u201d without understanding how tools work and what security guarantees tool providers are offering.<\/p>\n<p>Here\u2019s how you can plan a successful security review of Gen-AI-backed systems and secure them in your organisation.<\/p>\n<h2>Fill in the knowledge gaps with a clear proof-of-concept<\/h2>\n<p>The key to securing any emerging technology is for your engineering teams to be proactive, helping to fill knowledge gaps for security teams and making risk assessments as easy as possible.<\/p>\n<p>First, your engineering team must get their hands dirty with a proof-of-concept (POC) and understand the tool\u2019s functionality, security controls and data flows. Often, engineers are still learning how to use this new technology, so hands-on experience and getting to know the ins-and-outs of the tool are the best ways to produce all the information your security reviewers need to do their jobs.<\/p>\n<p>Gaining approval for a POC can be a challenge, but we\u2019ve seen teams succeed by raising a proposal with a clear and documented low-risk scope; meaning no internal or personal data, no output in front of customers and no integrations with production systems. Using test or public data, isolated environments, and even virtual workstations can all help teams to gain approval.<\/p>\n<p>Once a POC is complete, put together an information pack that allows any security reviewer to fully understand the data flow and any security controls available. Show a demo of how the tool works, provide a clear explanation of its features, and draw out a data flow diagram, like the below:<\/p>\n<img decoding=\"async\" src=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/03\/image-3-1200x878.png\" alt=\"\" width=\"1200\" height=\"878\" \/>\n<p>With a clear demonstration of functionality, security controls and data flow, your security reviewers have enough understanding and information to carry out an architectural risk assessment, just as they would for any other system or tool.<\/p>\n<h2>Choose a tool with strong policy guarantees<\/h2>\n<p>All organisations we\u2019ve worked with have a policy on procuring SaaS tools that process data. These checks are necessary to comply with data protection regulations, as well as due diligence to protect from damage caused by a SaaS provider failure.<\/p>\n<p>Until recently, popular AI tool providers like OpenAI had very basic privacy and data protection policies, some of which were missing explicit answers or guarantees in respect to these (very important) areas.. For many organisations, these unclear policies were part of their decision not to use AI tools.<\/p>\n<p>We\u2019ve seen many providers reaching a level of policy maturity, especially with emerging enterprise offerings (for example <a href=\"https:\/\/openai.com\/enterprise-privacy\" target=\"_blank\" rel=\"noopener\">OpenAI\u2019s enterprise privacy policy<\/a>), so we recommend you engage with the procurement process again to re-evaluate available policies.<\/p>\n<h2>Create a threat model on how the tool could be abused<\/h2>\n<p>One of the most compelling aspects of GenAI tools are the almost-unlimited ways they can be used, seemingly restricted only by the prompts that can be imagined. From a risk assessment perspective, somebody needs to prove that potential abuse of this unlimited functionality has been assessed.<\/p>\n<p>The best way to reason about these potential misuse scenarios is to carry out a threat-modelling exercise, in which you work with your security teams to identify ways an attacker could misuse a system, and then design security controls to prevent this from happening.<\/p>\n<p>Ensure that engineering and security teams are familiar with new <a href=\"https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/assets\/PDF\/OWASP-Top-10-for-LLMs-2023-slides-v1_1.pdf\" target=\"_blank\" rel=\"noopener\">GenAI-specific threats<\/a>. Then, hold a session with your engineering and security team to run through each point of the system data flow diagram, with the mindset of an attacker. Brainstorm different ways the system could be misused and which security controls could be implemented.<\/p>\n<p>An example finding from a threat modelling session around employees using ChatGPT might be:<\/p>\n<img decoding=\"async\" src=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/image-5.png\" alt=\"\" width=\"1076\" height=\"294\" \/>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=TtRFQPlRYK4\">This talk by AWS<\/a> provides an excellent walkthrough of carrying out a full threat model of\u00a0generative AI\u00a0workloads.<\/p>\n<p>If a team can bring together engineering and security\/risk teams to produce a robust risk assessment using shared understanding, architectural reviews, strong vendor policies and threat models, we\u2019ve seen a clear path for organisations to begin experimenting and productionising GenAI tools.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generative AI is already providing businesses with exciting functionality and productivity gains. However, it isn\u2019t always easy to understand the security implications of GenAI tools. Engineering teams wanting to use or explore these tools may therefore struggle to gain security approval. Most organisations have a regulatory responsibility to risk assess new software. These risk assessments [&hellip;]<\/p>\n","protected":false},"author":177,"featured_media":20313,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[412,179],"tags":[99,445,426,699],"location":[397],"class_list":["post-13918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-data","tag-ai","tag-engineering","tag-generative-ai","tag-generative-ai-integration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Secure Your First Generative AI Integration<\/title>\n<meta name=\"description\" content=\"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to secure your first generative AI integration | Equal Experts\" \/>\n<meta property=\"og:description\" content=\"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\" \/>\n<meta property=\"og:site_name\" content=\"Equal Experts\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-03T09:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-09T16:48:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/03\/Blog_Lead-24.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chris Rutter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to secure your first generative AI integration | Equal Experts\" \/>\n<meta name=\"twitter:description\" content=\"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.\" \/>\n<meta name=\"twitter:creator\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:site\" content=\"@EqualExperts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Rutter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\"},\"author\":{\"name\":\"Chris Rutter\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d\"},\"headline\":\"How to secure your first generative AI integration\",\"datePublished\":\"2024-04-03T09:00:22+00:00\",\"dateModified\":\"2024-12-09T16:48:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\"},\"wordCount\":853,\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp\",\"keywords\":[\"AI\",\"Engineering\",\"Generative AI\",\"generative ai integration\"],\"articleSection\":[\"AI\",\"Data\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\",\"url\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\",\"name\":\"How to Secure Your First Generative AI Integration\",\"isPartOf\":{\"@id\":\"https:\/\/www.equalexperts.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp\",\"datePublished\":\"2024-04-03T09:00:22+00:00\",\"dateModified\":\"2024-12-09T16:48:49+00:00\",\"description\":\"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp\",\"width\":1170,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.equalexperts.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to secure your first generative AI integration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.equalexperts.com\/#website\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"name\":\"Equal Experts\",\"description\":\"Making Software. Better.\",\"publisher\":{\"@id\":\"https:\/\/www.equalexperts.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.equalexperts.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.equalexperts.com\/#organization\",\"name\":\"Equal Experts\",\"url\":\"https:\/\/www.equalexperts.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"contentUrl\":\"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg\",\"width\":719,\"height\":340,\"caption\":\"Equal Experts\"},\"image\":{\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/EqualExperts\",\"https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d\",\"name\":\"Chris Rutter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g\",\"caption\":\"Chris Rutter\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Secure Your First Generative AI Integration","description":"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/","og_locale":"en_GB","og_type":"article","og_title":"How to secure your first generative AI integration | Equal Experts","og_description":"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.","og_url":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/","og_site_name":"Equal Experts","article_published_time":"2024-04-03T09:00:22+00:00","article_modified_time":"2024-12-09T16:48:49+00:00","og_image":[{"width":1200,"height":514,"url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/03\/Blog_Lead-24.png","type":"image\/png"}],"author":"Chris Rutter","twitter_card":"summary_large_image","twitter_title":"How to secure your first generative AI integration | Equal Experts","twitter_description":"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.","twitter_creator":"@EqualExperts","twitter_site":"@EqualExperts","twitter_misc":{"Written by":"Chris Rutter","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#article","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/"},"author":{"name":"Chris Rutter","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d"},"headline":"How to secure your first generative AI integration","datePublished":"2024-04-03T09:00:22+00:00","dateModified":"2024-12-09T16:48:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/"},"wordCount":853,"publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp","keywords":["AI","Engineering","Generative AI","generative ai integration"],"articleSection":["AI","Data"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/","url":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/","name":"How to Secure Your First Generative AI Integration","isPartOf":{"@id":"https:\/\/www.equalexperts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage"},"image":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp","datePublished":"2024-04-03T09:00:22+00:00","dateModified":"2024-12-09T16:48:49+00:00","description":"There\u2019s huge interest in enterprise AI adoption but security is a stumbling block to approval in many cases. Here\u2019s how to plan a successful security review of LLM-backed systems.","breadcrumb":{"@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#primaryimage","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2024\/04\/Blog_Thumbnail-24.png.webp","width":1170,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.equalexperts.com\/blog\/ai\/how-to-secure-your-first-generative-ai-integration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.equalexperts.com\/"},{"@type":"ListItem","position":2,"name":"How to secure your first generative AI integration"}]},{"@type":"WebSite","@id":"https:\/\/www.equalexperts.com\/#website","url":"https:\/\/www.equalexperts.com\/","name":"Equal Experts","description":"Making Software. Better.","publisher":{"@id":"https:\/\/www.equalexperts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.equalexperts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.equalexperts.com\/#organization","name":"Equal Experts","url":"https:\/\/www.equalexperts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","contentUrl":"https:\/\/www.equalexperts.com\/wp-content\/uploads\/2018\/08\/Equal_Experts_Logo_CMYK_Colour.jpg","width":719,"height":340,"caption":"Equal Experts"},"image":{"@id":"https:\/\/www.equalexperts.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EqualExperts","https:\/\/www.linkedin.com\/company\/equal-experts\/?viewAsMember=true"]},{"@type":"Person","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/ad9dae197df3aee28640aec4aae6392d","name":"Chris Rutter","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.equalexperts.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/635323bd22fcffbb5e13e7c64ea86e62085b4670944ec98fb6fae5f202b7db35?s=96&d=mm&r=g","caption":"Chris Rutter"}}]}},"_links":{"self":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/13918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/comments?post=13918"}],"version-history":[{"count":0,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/posts\/13918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/media\/20313"}],"wp:attachment":[{"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/media?parent=13918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/categories?post=13918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/tags?post=13918"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/www.equalexperts.com\/wp-json\/wp\/v2\/location?post=13918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}