{"id":11357,"date":"2025-01-30T08:44:07","date_gmt":"2025-01-30T08:44:07","guid":{"rendered":"https:\/\/cloudkul.com\/blog\/?p=11357"},"modified":"2025-01-30T08:44:09","modified_gmt":"2025-01-30T08:44:09","slug":"aws-web-application-firewall-waf","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/","title":{"rendered":"AWS WAF(Web Application Firewall)"},"content":{"rendered":"\n<p>We are witnessing remarkable technological developments that are transforming the way the world functions in only a few years.<\/p>\n\n\n\n<p>Websites, online apps, and servers are prime targets for cyber-attackers seeking new ways to launch attacks.<\/p>\n\n\n\n<p>Web app security measures, including Web Application Firewalls (WAFs), are in high demand to protect an organization&#8217;s critical assets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Web Application Firewall?<\/h2>\n\n\n\n<p>A <strong><a href=\"https:\/\/cloudkul.com\/blog\/why-we-should-consider-waf-for-ecommerce-store\/\">web application firewall <\/a>(WAF)<\/strong> secures your web apps by filtering, monitoring, and as well as blocking threatening requests.<\/p>\n\n\n\n<p>As you may know, this is the app&#8217;s first line of defense against internet traffic.<\/p>\n\n\n\n<p>Generally, attackers use proxy to anonymize their identity, in the same way, a WAF protects the web app server details from a potentially dangerous client by acting as a reverse proxy.<\/p>\n\n\n\n<p>A WAF is controlled by a set of rules known as policies. WAF can act more powerfully with custom rules according to the organization&#8217;s needs.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/WAF.drawio.png\"><img loading=\"lazy\" decoding=\"async\" width=\"761\" height=\"381\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/WAF.drawio.png\" alt=\"WAF\" class=\"wp-image-11374\"\/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What is AWS WAF?<\/strong><\/h2>\n\n\n\n<p>AWS WAF is a web application firewall that helps protect web applications from threats by allowing you to set up rules that allow, reject, or count web requests based on parameters you specify.<\/p>\n\n\n\n<p>IP addresses, HTTP headers, HTTP body, URI strings, SQL injection, and cross-site scripting are among the conditions, You can either utilize AWS&#8217;s default security rules or create your own.<\/p>\n\n\n\n<p>To provide you with more flexibility, these rules can be enforced on a per-application basis.<\/p>\n\n\n\n<p>When the associated service receives requests for your websites, it sends them to AWS WAF to be inspected for compliance with your rules.<\/p>\n\n\n\n<p>When a request fulfills one of your rules&#8217; conditions, AWS WAF advises the underlying service to block or accept the request, depending on the action you specify.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/AWS-WAF-logo.png\"><img loading=\"lazy\" decoding=\"async\" width=\"231\" height=\"297\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/AWS-WAF-logo.png\" alt=\"WAF\" class=\"wp-image-11368\"\/><\/a><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Types of Rule Groups <\/h3>\n\n\n\n<p>There are 3 types of Rules Groups &#8211; <\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Managed Rule Group<\/h6>\n\n\n\n<p>Managed rule groups are created and maintained for you by <a href=\"https:\/\/cloudkul.com\/blog\/aws-firewall-manager-managing-firewall-rules\/\">AWS Managed Rules<\/a> and AWS Marketplace merchants.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Own Rule Group<\/h6>\n\n\n\n<p>These are those rules which are created and maintained by the user only.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Mixed Rules<\/h6>\n\n\n\n<p><a href=\"https:\/\/cloudkul.com\/blog\/aws-firewall-manager-managing-firewall-rules\/\">AWS Firewall Manager <\/a>and <a href=\"https:\/\/cloudkul.com\/blog\/aws-shield-protection-against-ddos-attacks\/\">Shield Advanced <\/a>have their rule groups that they own and control.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How these rules work <\/h3>\n\n\n\n<p>We use AWS WAF rules based on certain criteria like &#8211;<\/p>\n\n\n\n<ul>\n<li>Malicious scripts are embedded in online applications by attackers to exploit security flaws (known as\u00a0<a href=\"https:\/\/cloudkul.com\/blog\/magento-2-xss-secure-your-magento2-store-from-xss\/\">Cross-site scripting (XSS)<\/a>).<\/li>\n\n\n\n<li>SQL code with a high probability of being malicious. By injecting these malicious SQL codes into a web request, attackers attempt to steal data from your database.\u00a0(Known as <a href=\"https:\/\/cloudkul.com\/blog\/magento-2-sql-injection-how-to-secure-your-store-against-sql-injection\/\">SQL injection<\/a>).<\/li>\n\n\n\n<li>Requests originated from which IP addresses.<\/li>\n\n\n\n<li>Requests come from geographical locations.<\/li>\n\n\n\n<li>Length of specified query strings.<\/li>\n\n\n\n<li>We can further use regular expressions to specify strings that appear in the request.<\/li>\n\n\n\n<li>In addition, AWS WAF allows you to combine statements in a rule using logical statements for AND, OR, and NOT.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of using AWS WAF<\/h2>\n\n\n\n<ul>\n<li>AWS WAF provides near-real-time visibility into your web traffic, which you may use to develop new Amazon CloudWatch rules or alerts.<\/li>\n\n\n\n<li>You can rapidly get started and secure your web application or APIs against typical risks with Managed Rules for AWS WAF.<\/li>\n\n\n\n<li>Managed rules are updated automatically as new issues arise, therefore, allowing you to spend more time developing applications.<\/li>\n\n\n\n<li>WAF supports hundreds of rules, which may check any element of a web request with minimal latency impact on incoming traffic.<\/li>\n\n\n\n<li>You can centrally define and maintain your rules with AWS Firewall Manager integration, and reuse them across all the web apps you need to secure.<\/li>\n\n\n\n<li>Bot(such as search crawlers)&nbsp;Control-managed rule groups are available through AWS WAF and can be used in combination with other rules to secure your apps. This is a useful feature, but it is not free.<\/li>\n\n\n\n<li>In addition, AWS WAF makes it simple to set up and safeguard applications that are hosted on Amazon CloudFront as part of your<a href=\"https:\/\/cloudkul.com\/blog\/what-is-content-delivery-network\/\"> CDN solution<\/a>, the Application <a href=\"https:\/\/cloudkul.com\/blog\/how-to-setup-aws-network-load-balancer\/\">Load Balancer<\/a>, Amazon API Gateway for REST APIs, or AWS AppSync for GraphQL APIs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Limitations<\/h2>\n\n\n\n<h6 class=\"wp-block-heading\">Security Expertise<\/h6>\n\n\n\n<p>AWS WAF can identify malicious attempts and deal with them individually, but using it effectively requires highly specialized abilities.<\/p>\n\n\n\n<p>As a result, consumers may have to learn about vulnerabilities and prepare for them.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Limited Security<\/h6>\n\n\n\n<p>AWS WAF isn&#8217;t intended to be a comprehensive security platform. However, It is not designed to defend against a wide range of threats.<\/p>\n\n\n\n<p>Even when it comes to the risks it does address, the security it provides is often inadequate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How does AWS WAF work?<\/h2>\n\n\n\n<p>AWS WAF lets you monitor HTTP and HTTPS requests to Amazon CloudFront, API Gateway REST APIs, Application Load Balancers, and AWS AppSync GraphQL APIs.<\/p>\n\n\n\n<p>You can also forbid access to your application using either source IP or geolocation with AWS WAF.<\/p>\n\n\n\n<p>Amazon CloudFront, API Gateway, Application Load Balancer, or AWS AppSync responds to requests with the requested content. <\/p>\n\n\n\n<p>It can also return an HTTP 403 status code (Forbidden), based on conditions you define, such as IP addresses or query string values.<\/p>\n\n\n\n<p>When a request is blocked, you can also configure CloudFront to return a custom error page.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/AWS-WAF-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"368\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/AWS-WAF-2-1024x368.png\" alt=\"WAF\" class=\"wp-image-11366\"\/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">AWS WAF Pricing<\/h2>\n\n\n\n<ul>\n<li>You&#8217;ll pay for each web ACL you build, as well as each rule you add to each web ACL.<\/li>\n\n\n\n<li>You will also pay for the number of web requests that the web ACL processes.<\/li>\n\n\n\n<li>All AWS Regions have the same pricing.<\/li>\n\n\n\n<li>So, monthly costs will be calculated on an hourly basis<\/li>\n\n\n\n<li>And, you will also pay for rules that you establish within rule groups.<\/li>\n\n\n\n<li>In addition, each rule group or managed rule group that you add to your web ACL will be charged $1.00 per month (prorated hourly).<\/li>\n<\/ul>\n\n\n\n<p>The prices for AWS WAF are the same as in the table below &#8211; <\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter is-style-stripes\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><strong>Resource Type<\/strong><\/td><td><strong>Price<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Web ACL<\/td><td>$5.00 per month(prorated hourly)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Rule<\/td><td>$1.00 per month(prorated hourly)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Request<\/td><td>$0.60 per 1 million Requests<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Another well-known WAF provider<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Cloudflare WAF<\/h3>\n\n\n\n<p>The Cloudflare WAF protects apps and APIs from DDoS attacks, bots, anomalies, malicious payloads, and browser supply chain attacks, forming the core of our advanced security portfolio.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Key Features &#8211; <\/h6>\n\n\n\n<ul>\n<li>Layered protection from multiple WAF rulesets<\/li>\n\n\n\n<li>WAF Machine learning-based detections<\/li>\n\n\n\n<li>Updated rules for <a href=\"https:\/\/cloudkul.com\/blog\/impact-of-zero-day-attacks-on-a-companys-productivity\/\">zero-day protection<\/a><\/li>\n\n\n\n<li>Data loss prevention<\/li>\n\n\n\n<li>Exposed Credential Checks<\/li>\n\n\n\n<li>SSL\/TLS<\/li>\n\n\n\n<li><a href=\"https:\/\/cloudkul.com\/blog\/how-to-prevent-ddos-in-magento-2\/\">DDoS Mitigation<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>WAFs are a specific form of Level 7 firewall that can inspect web traffic. Websites, web apps, and API services are all protected by WAFs.<\/p>\n\n\n\n<p>Cloud-based WAFs are platform-independent, simple to set up, as well as scalable. WAFs can monitor, and analyze traffic in real, and notify administrators of any potential threats within no time.<\/p>\n\n\n\n<p>In our next log, we will be discussing another security-managed service of AWS i.e., <strong><a href=\"https:\/\/cloudkul.com\/blog\/aws-shield-protection-against-ddos-attacks\/\">AWS Shield<\/a><\/strong> for protection against DDoS Attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need Support?<\/h2>\n\n\n\n<p>Thank You for reading this Blog!<\/p>\n\n\n\n<p>For further more interesting blogs, keep in touch with us. If you need any kind of support, simply raise a ticket at\u00a0<strong><a href=\"https:\/\/webkul.uvdesk.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/webkul.uvdesk.com\/en\/<\/a>.<\/strong><\/p>\n\n\n\n<p><strong>You may also visit our Magento development services and quality\u00a0<\/strong> <strong><a href=\"https:\/\/store.webkul.com\/Magento-2.html\">Magento 2 Extensions<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>For further help or queries, please\u00a0<a href=\"https:\/\/cloudkul.com\/contact\/\">contact<\/a>\u00a0us or raise a\u00a0<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\">ticket<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are witnessing remarkable technological developments that are transforming the way the world functions in <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":29,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[32,2,87,341,340],"tags":[16,722,3,304,231,302,303],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AWS WAF(Web Application Firewall) - Cloudkul<\/title>\n<meta name=\"description\" content=\"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AWS WAF(Web Application Firewall) - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-30T08:44:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-30T08:44:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/WAF.drawio.png\" \/>\n<meta name=\"author\" content=\"Tanya Garg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/CloudWebkul\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\",\"name\":\"AWS WAF(Web Application Firewall) - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2025-01-30T08:44:07+00:00\",\"dateModified\":\"2025-01-30T08:44:09+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984\"},\"description\":\"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.\",\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AWS WAF(Web Application Firewall)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984\",\"name\":\"Tanya Garg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Tanya Garg\"},\"description\":\"Business Developer Executive at Webkul\",\"sameAs\":[\"https:\/\/cloudkul.com\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/CloudWebkul\"],\"url\":\"https:\/\/cloudkul.com\/blog\/author\/tanyagarg-bd037\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AWS WAF(Web Application Firewall) - Cloudkul","description":"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/","og_locale":"en_US","og_type":"article","og_title":"AWS WAF(Web Application Firewall) - Cloudkul","og_description":"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.","og_url":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/","og_site_name":"Cloudkul","article_published_time":"2025-01-30T08:44:07+00:00","article_modified_time":"2025-01-30T08:44:09+00:00","og_image":[{"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2022\/03\/WAF.drawio.png"}],"author":"Tanya Garg","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/CloudWebkul","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/","url":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/","name":"AWS WAF(Web Application Firewall) - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2025-01-30T08:44:07+00:00","dateModified":"2025-01-30T08:44:09+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984"},"description":"A WAF secures your web apps by filtering, monitoring, and blocking threatening HTTP\/S traffic, as well as preventing unauthorized data from exiting the app.","breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/aws-web-application-firewall-waf\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AWS WAF(Web Application Firewall)"}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/65b93d1aa584abd012eb60a25839b984","name":"Tanya Garg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ea334eba6adf9dfe79873bc0bee8dad?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Tanya Garg"},"description":"Business Developer Executive at Webkul","sameAs":["https:\/\/cloudkul.com\/","https:\/\/twitter.com\/https:\/\/twitter.com\/CloudWebkul"],"url":"https:\/\/cloudkul.com\/blog\/author\/tanyagarg-bd037\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11357"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=11357"}],"version-history":[{"count":73,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11357\/revisions"}],"predecessor-version":[{"id":19688,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/11357\/revisions\/19688"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=11357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=11357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=11357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}