{"id":1735,"date":"2024-03-09T00:20:39","date_gmt":"2024-03-09T06:20:39","guid":{"rendered":"https:\/\/tncomputermedics.com\/?p=1735"},"modified":"2024-03-09T00:20:43","modified_gmt":"2024-03-09T06:20:43","slug":"penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security","status":"publish","type":"post","link":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/","title":{"rendered":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?"},"content":{"rendered":"\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-could-you-explain-aws-security\"><strong>Could you explain AWS security?<\/strong><\/h4>\n\n\n\n<p>AWS Security equips organizations with the necessary tools and resources to safeguard their applications, services, and data in the cloud. This information is crucial for businesses as it allows them to pinpoint weak spots, uncover any harmful behavior, keep an eye on traffic trends for any unusual patterns, and stop unauthorized entry. The text covers encryption, authentication, risk assessment, and compliance monitoring features.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-is-it-possible-to-test-your-cloud-security\"><strong>Is it possible to test your cloud security?<\/strong><\/h4>\n\n\n\n<p>Of course. Penetration testing plays a crucial role in security strategies, especially for assessing the security of cloud-based applications. Organizations can effortlessly establish penetration tests using AWS Security in just a few steps. This guarantees the protection of their applications, services, and data from potential threats.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-how-does-aws-penetration-testing-work\"><strong>How does AWS penetration testing work?<\/strong><\/h4>\n\n\n\n<p>Penetration testing in AWS involves a combination of automated tools and manual testing methods. Initiating the process involves conducting a vulnerability assessment to pinpoint areas of risk and potential weaknesses. After identifying the vulnerabilities, penetration testers can proceed to test the system by simulating attacks. It assists organizations in pinpointing any security vulnerabilities that may exist in their cloud-based applications, services, and data.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Title-Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\" alt=\"\" class=\"wp-image-1738\" srcset=\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Title-Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png 600w, https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Title-Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security-300x200.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-benefits-of-penetration-testing-in-aws\"><strong>Benefits of Penetration Testing in AWS<\/strong><\/h4>\n\n\n\n<p>Penetration testing helps organizations improve their understanding of the security status of their cloud-based infrastructure. This can assist businesses in pinpointing areas of risk and taking proactive measures to address potential threats before they escalate. Furthermore, it can assist organizations in maintaining the security and compliance of their applications, services, and data according to industry regulations.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-in-conclusion\"><strong>In conclusion<\/strong><\/h4>\n\n\n\n<p>Conducting penetration testing is crucial for cloud security, as it allows organizations to pinpoint vulnerabilities in their cloud infrastructure. AWS Security equips businesses with the necessary tools to easily perform vulnerability assessments and penetration tests. By implementing proper resources and processes, organizations can maintain the security of their applications, services, and data. Get in touch with us today.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<script type=\"text\/javascript\">var gform;gform||(document.addEventListener(\"gform_main_scripts_loaded\",function(){gform.scriptsLoaded=!0}),window.addEventListener(\"DOMContentLoaded\",function(){gform.domLoaded=!0}),gform={domLoaded:!1,scriptsLoaded:!1,initializeOnLoaded:function(o){gform.domLoaded&&gform.scriptsLoaded?o():!gform.domLoaded&&gform.scriptsLoaded?window.addEventListener(\"DOMContentLoaded\",o):document.addEventListener(\"gform_main_scripts_loaded\",o)},hooks:{action:{},filter:{}},addAction:function(o,n,r,t){gform.addHook(\"action\",o,n,r,t)},addFilter:function(o,n,r,t){gform.addHook(\"filter\",o,n,r,t)},doAction:function(o){gform.doHook(\"action\",o,arguments)},applyFilters:function(o){return gform.doHook(\"filter\",o,arguments)},removeAction:function(o,n){gform.removeHook(\"action\",o,n)},removeFilter:function(o,n,r){gform.removeHook(\"filter\",o,n,r)},addHook:function(o,n,r,t,i){null==gform.hooks[o][n]&&(gform.hooks[o][n]=[]);var e=gform.hooks[o][n];null==i&&(i=n+\"_\"+e.length),gform.hooks[o][n].push({tag:i,callable:r,priority:t=null==t?10:t})},doHook:function(n,o,r){var t;if(r=Array.prototype.slice.call(r,1),null!=gform.hooks[n][o]&&((o=gform.hooks[n][o]).sort(function(o,n){return o.priority-n.priority}),o.forEach(function(o){\"function\"!=typeof(t=o.callable)&&(t=window[t]),\"action\"==n?t.apply(null,r):r[0]=t.apply(null,r)})),\"filter\"==n)return r[0]},removeHook:function(o,n,t,i){var r;null!=gform.hooks[o][n]&&(r=(r=gform.hooks[o][n]).filter(function(o,n,r){return!!(null!=i&&i!=o.tag||null!=t&&t!=o.priority)}),gform.hooks[o][n]=r)}});<\/script>\n                <div class='gf_browser_unknown gform_wrapper gform-theme gform-theme--foundation gform-theme--framework gform-theme--orbital' data-form-theme='orbital' data-form-index='0' id='gform_wrapper_1' ><style>#gform_wrapper_1[data-form-index=\"0\"].gform-theme,[data-parent-form=\"1_0\"]{--gf-color-primary: #204ce5;--gf-color-primary-rgb: 32, 76, 229;--gf-color-primary-contrast: #fff;--gf-color-primary-contrast-rgb: 255, 255, 255;--gf-color-primary-darker: #001AB3;--gf-color-primary-lighter: #527EFF;--gf-color-secondary: #fff;--gf-color-secondary-rgb: 255, 255, 255;--gf-color-secondary-contrast: #112337;--gf-color-secondary-contrast-rgb: 17, 35, 55;--gf-color-secondary-darker: #F5F5F5;--gf-color-secondary-lighter: #FFFFFF;--gf-color-out-ctrl-light: rgba(17, 35, 55, 0.1);--gf-color-out-ctrl-light-rgb: 17, 35, 55;--gf-color-out-ctrl-light-darker: rgba(104, 110, 119, 0.35);--gf-color-out-ctrl-light-lighter: #F5F5F5;--gf-color-out-ctrl-dark: #585e6a;--gf-color-out-ctrl-dark-rgb: 88, 94, 106;--gf-color-out-ctrl-dark-darker: #112337;--gf-color-out-ctrl-dark-lighter: rgba(17, 35, 55, 0.65);--gf-color-in-ctrl: #fff;--gf-color-in-ctrl-rgb: 255, 255, 255;--gf-color-in-ctrl-contrast: #112337;--gf-color-in-ctrl-contrast-rgb: 17, 35, 55;--gf-color-in-ctrl-darker: #F5F5F5;--gf-color-in-ctrl-lighter: #FFFFFF;--gf-color-in-ctrl-primary: #204ce5;--gf-color-in-ctrl-primary-rgb: 32, 76, 229;--gf-color-in-ctrl-primary-contrast: #fff;--gf-color-in-ctrl-primary-contrast-rgb: 255, 255, 255;--gf-color-in-ctrl-primary-darker: #001AB3;--gf-color-in-ctrl-primary-lighter: #527EFF;--gf-color-in-ctrl-light: rgba(17, 35, 55, 0.1);--gf-color-in-ctrl-light-rgb: 17, 35, 55;--gf-color-in-ctrl-light-darker: rgba(104, 110, 119, 0.35);--gf-color-in-ctrl-light-lighter: #F5F5F5;--gf-color-in-ctrl-dark: #585e6a;--gf-color-in-ctrl-dark-rgb: 88, 94, 106;--gf-color-in-ctrl-dark-darker: #112337;--gf-color-in-ctrl-dark-lighter: rgba(17, 35, 55, 0.65);--gf-radius: 3px;--gf-font-size-secondary: 14px;--gf-font-size-tertiary: 13px;--gf-icon-ctrl-number: url(\"data:image\/svg+xml,%3Csvg width='8' height='14' viewBox='0 0 8 14' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath fill-rule='evenodd' clip-rule='evenodd' d='M4 0C4.26522 5.96046e-08 4.51957 0.105357 4.70711 0.292893L7.70711 3.29289C8.09763 3.68342 8.09763 4.31658 7.70711 4.70711C7.31658 5.09763 6.68342 5.09763 6.29289 4.70711L4 2.41421L1.70711 4.70711C1.31658 5.09763 0.683417 5.09763 0.292893 4.70711C-0.0976311 4.31658 -0.097631 3.68342 0.292893 3.29289L3.29289 0.292893C3.48043 0.105357 3.73478 0 4 0ZM0.292893 9.29289C0.683417 8.90237 1.31658 8.90237 1.70711 9.29289L4 11.5858L6.29289 9.29289C6.68342 8.90237 7.31658 8.90237 7.70711 9.29289C8.09763 9.68342 8.09763 10.3166 7.70711 10.7071L4.70711 13.7071C4.31658 14.0976 3.68342 14.0976 3.29289 13.7071L0.292893 10.7071C-0.0976311 10.3166 -0.0976311 9.68342 0.292893 9.29289Z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-icon-ctrl-select: url(\"data:image\/svg+xml,%3Csvg width='10' height='6' viewBox='0 0 10 6' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath fill-rule='evenodd' clip-rule='evenodd' d='M0.292893 0.292893C0.683417 -0.097631 1.31658 -0.097631 1.70711 0.292893L5 3.58579L8.29289 0.292893C8.68342 -0.0976311 9.31658 -0.0976311 9.70711 0.292893C10.0976 0.683417 10.0976 1.31658 9.70711 1.70711L5.70711 5.70711C5.31658 6.09763 4.68342 6.09763 4.29289 5.70711L0.292893 1.70711C-0.0976311 1.31658 -0.0976311 0.683418 0.292893 0.292893Z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-icon-ctrl-search: url(\"data:image\/svg+xml,%3Csvg version='1.1' xmlns='http:\/\/www.w3.org\/2000\/svg' width='640' height='640'%3E%3Cpath d='M256 128c-70.692 0-128 57.308-128 128 0 70.691 57.308 128 128 128 70.691 0 128-57.309 128-128 0-70.692-57.309-128-128-128zM64 256c0-106.039 85.961-192 192-192s192 85.961 192 192c0 41.466-13.146 79.863-35.498 111.248l154.125 154.125c12.496 12.496 12.496 32.758 0 45.254s-32.758 12.496-45.254 0L367.248 412.502C335.862 434.854 297.467 448 256 448c-106.039 0-192-85.962-192-192z' fill='rgba(17, 35, 55, 0.65)'\/%3E%3C\/svg%3E\");--gf-label-space-y-secondary: var(--gf-label-space-y-md-secondary);--gf-ctrl-border-color: #686e77;--gf-ctrl-size: var(--gf-ctrl-size-md);--gf-ctrl-label-color-primary: #112337;--gf-ctrl-label-color-secondary: #112337;--gf-ctrl-choice-size: var(--gf-ctrl-choice-size-md);--gf-ctrl-checkbox-check-size: var(--gf-ctrl-checkbox-check-size-md);--gf-ctrl-radio-check-size: var(--gf-ctrl-radio-check-size-md);--gf-ctrl-btn-font-size: var(--gf-ctrl-btn-font-size-md);--gf-ctrl-btn-padding-x: var(--gf-ctrl-btn-padding-x-md);--gf-ctrl-btn-size: var(--gf-ctrl-btn-size-md);--gf-ctrl-btn-border-color-secondary: #686e77;--gf-ctrl-file-btn-bg-color-hover: #EBEBEB;--gf-field-pg-steps-number-color: rgba(17, 35, 55, 0.8);}<\/style>\n                        <div class='gform_heading'>\n                            <h2 class=\"gform_title\">Contact Us<\/h2>\n                            <p class='gform_description'><\/p>\n                        <\/div><form method='post' enctype='multipart\/form-data'  id='gform_1'  action='\/wp-json\/wp\/v2\/posts\/1735' data-formid='1' novalidate>\n                        <div class='gform-body gform_body'><div id='gform_fields_1' class='gform_fields top_label form_sublabel_above description_above'><div id=\"field_1_6\" class=\"gfield gfield--type-text gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_6\" ><label class='gfield_label gform-field-label' for='input_1_6'>Name<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_6' id='input_1_6' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_1_2\" class=\"gfield gfield--type-email gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_2\" ><label class='gfield_label gform-field-label' for='input_1_2'>Email<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_email'>\n                            <input name='input_2' id='input_1_2' type='email' value='' class='large'    aria-required=\"true\" aria-invalid=\"false\"  \/>\n                        <\/div><\/div><div id=\"field_1_4\" class=\"gfield gfield--type-phone gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_4\" ><label class='gfield_label gform-field-label' for='input_1_4'>Phone<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_phone'><input name='input_4' id='input_1_4' type='tel' value='' class='large'   aria-required=\"true\" aria-invalid=\"false\"   \/><\/div><\/div><div id=\"field_1_5\" class=\"gfield gfield--type-text gfield--width-half gfield_contains_required field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_5\" ><label class='gfield_label gform-field-label' for='input_1_5'>Subject<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='ginput_container ginput_container_text'><input name='input_5' id='input_1_5' type='text' value='' class='large'     aria-required=\"true\" aria-invalid=\"false\"   \/> <\/div><\/div><div id=\"field_1_3\" class=\"gfield gfield--type-textarea gfield_contains_required field_sublabel_above gfield--has-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_3\" ><label class='gfield_label gform-field-label' for='input_1_3'>Message<span class=\"gfield_required\"><span class=\"gfield_required gfield_required_text\">(Required)<\/span><\/span><\/label><div class='gfield_description' id='gfield_description_1_3'>Please let us know what&#039;s on your mind. Have a question for us? Ask away.<\/div><div class='ginput_container ginput_container_textarea'><textarea name='input_3' id='input_1_3' class='textarea medium'  aria-describedby=\"gfield_description_1_3\" maxlength='600'  aria-required=\"true\" aria-invalid=\"false\"   rows='10' cols='50'><\/textarea><\/div><\/div><div id=\"field_1_7\" class=\"gfield gfield--type-captcha gfield--width-full field_sublabel_above gfield--no-description field_description_above gfield_visibility_visible\"  data-js-reload=\"field_1_7\" ><label class='gfield_label gform-field-label' for='input_1_7'>Captcha<\/label><div id='input_1_7' class='ginput_container ginput_recaptcha' data-sitekey='6LcK0kkpAAAAALn3ZtVowbVf-WTN_wrfEruA2NEk'  data-theme='light' data-tabindex='0'  data-badge=''><\/div><\/div><\/div><\/div>\n        <div class='gform_footer top_label'> <input type='submit' id='gform_submit_button_1' class='gform_button button' value='SEND A MESSAGE'  onclick='if(window[\"gf_submitting_1\"]){return false;}  if( !jQuery(\"#gform_1\")[0].checkValidity || jQuery(\"#gform_1\")[0].checkValidity()){window[\"gf_submitting_1\"]=true;}  ' onkeypress='if( event.keyCode == 13 ){ if(window[\"gf_submitting_1\"]){return false;} if( !jQuery(\"#gform_1\")[0].checkValidity || jQuery(\"#gform_1\")[0].checkValidity()){window[\"gf_submitting_1\"]=true;}  jQuery(\"#gform_1\").trigger(\"submit\",[true]); }' \/> \n            <input type='hidden' class='gform_hidden' name='is_submit_1' value='1' \/>\n            <input type='hidden' class='gform_hidden' name='gform_submit' value='1' \/>\n            \n            <input type='hidden' class='gform_hidden' name='gform_unique_id' value='' \/>\n            <input type='hidden' class='gform_hidden' name='state_1' value='WyJbXSIsIjliMzQ4MGIxOTMwYWU0ZWIxYmE0ZWZhZmMxY2QwZjY4Il0=' \/>\n            <input type='hidden' class='gform_hidden' name='gform_target_page_number_1' id='gform_target_page_number_1' value='0' \/>\n            <input type='hidden' class='gform_hidden' name='gform_source_page_number_1' id='gform_source_page_number_1' value='1' \/>\n            <input type='hidden' name='gform_field_values' value='' \/>\n            \n        <\/div>\n                        <input type=\"hidden\" id=\"ct_checkjs_caf1a3dfb505ffed0d024130f58c5cfa\" name=\"ct_checkjs\" value=\"0\" \/><script >setTimeout(function(){var ct_input_name = \"ct_checkjs_caf1a3dfb505ffed0d024130f58c5cfa\";if (document.getElementById(ct_input_name) !== null) {var ct_input_value = document.getElementById(ct_input_name).value;document.getElementById(ct_input_name).value = document.getElementById(ct_input_name).value.replace(ct_input_value, '0d023493218022e1f4933d62fc7ec74ec0c7f922f4664bcc4f311231d3ce5100');}}, 1000);<\/script><label class=\"apbct_special_field\" id=\"apbct_label_id1211\" for=\"apbct__email_id__gravity_form_1211\">1211<\/label><input \n        id=\"apbct__email_id__gravity_form_1211\" \n        class=\"apbct_special_field apbct__email_id__gravity_form\"\n        autocomplete=\"off\" \n        name=\"apbct__email_id__gravity_form_1211\"  \n        type=\"text\" \n        value=\"1211\" \n        size=\"30\" \n        apbct_event_id=\"1211\"\n        maxlength=\"200\" \n    \/><input \n        id=\"apbct_event_id_gravity_form_1211\"\n        class=\"apbct_special_field\"\n        name=\"apbct_event_id\"\n        type=\"hidden\" \n        value=\"1211\" \n            \/><\/form>\n                        <\/div><script>\ngform.initializeOnLoaded( function() {gformInitSpinner( 1, 'https:\/\/tncomputermedics.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', false );jQuery('#gform_ajax_frame_1').on('load',function(){var contents = jQuery(this).contents().find('*').html();var is_postback = contents.indexOf('GF_AJAX_POSTBACK') >= 0;if(!is_postback){return;}var form_content = jQuery(this).contents().find('#gform_wrapper_1');var is_confirmation = jQuery(this).contents().find('#gform_confirmation_wrapper_1').length > 0;var is_redirect = contents.indexOf('gformRedirect(){') >= 0;var is_form = form_content.length > 0 && ! is_redirect && ! is_confirmation;var mt = parseInt(jQuery('html').css('margin-top'), 10) + parseInt(jQuery('body').css('margin-top'), 10) + 100;if(is_form){jQuery('#gform_wrapper_1').html(form_content.html());if(form_content.hasClass('gform_validation_error')){jQuery('#gform_wrapper_1').addClass('gform_validation_error');} else {jQuery('#gform_wrapper_1').removeClass('gform_validation_error');}setTimeout( function() { \/* delay the scroll by 50 milliseconds to fix a bug in chrome *\/  }, 50 );if(window['gformInitDatepicker']) {gformInitDatepicker();}if(window['gformInitPriceFields']) {gformInitPriceFields();}var current_page = jQuery('#gform_source_page_number_1').val();gformInitSpinner( 1, 'https:\/\/tncomputermedics.com\/wp-content\/plugins\/gravityforms\/images\/spinner.svg', false );jQuery(document).trigger('gform_page_loaded', [1, current_page]);window['gf_submitting_1'] = false;}else if(!is_redirect){var confirmation_content = jQuery(this).contents().find('.GF_AJAX_POSTBACK').html();if(!confirmation_content){confirmation_content = contents;}setTimeout(function(){jQuery('#gform_wrapper_1').replaceWith(confirmation_content);jQuery(document).trigger('gform_confirmation_loaded', [1]);window['gf_submitting_1'] = false;wp.a11y.speak(jQuery('#gform_confirmation_message_1').text());}, 50);}else{jQuery('#gform_1').append(contents);if(window['gformRedirect']) {gformRedirect();}}jQuery(document).trigger('gform_post_render', [1, current_page]);gform.utils.trigger({ event: 'gform\/postRender', native: false, data: { formId: 1, currentPage: current_page } });} );} );\n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>Could you explain AWS security? AWS Security equips organizations with the necessary tools and resources to safeguard their applications, services, and data in the cloud. This information is crucial for businesses as it allows them to pinpoint weak spots, uncover any harmful behavior, keep an eye on traffic trends for any unusual patterns, and stop unauthorized entry. The text covers encryption, authentication, risk assessment, and compliance monitoring features. Is it[&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1737,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[85],"tags":[],"class_list":["post-1735","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.7 (Yoast SEO v23.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security? - Expert in Cyber Security and Computer Repair Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?\" \/>\n<meta property=\"og:description\" content=\"Could you explain AWS security? AWS Security equips organizations with the necessary tools and resources to safeguard their applications, services, and data in the cloud. This information is crucial for businesses as it allows them to pinpoint weak spots, uncover any harmful behavior, keep an eye on traffic trends for any unusual patterns, and stop unauthorized entry. The text covers encryption, authentication, risk assessment, and compliance monitoring features. Is it[&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Expert in Cyber Security and Computer Repair Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tncomputermedics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-09T06:20:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-09T06:20:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"tncm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TNComputerMedic\" \/>\n<meta name=\"twitter:site\" content=\"@TNComputerMedic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tncm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\"},\"author\":{\"name\":\"tncm\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9\"},\"headline\":\"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?\",\"datePublished\":\"2024-03-09T06:20:39+00:00\",\"dateModified\":\"2024-03-09T06:20:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\"},\"wordCount\":325,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/tncomputermedics.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\",\"articleSection\":[\"Cybersecurity Insights\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\",\"url\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\",\"name\":\"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security? - Expert in Cyber Security and Computer Repair Services\",\"isPartOf\":{\"@id\":\"https:\/\/tncomputermedics.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\",\"datePublished\":\"2024-03-09T06:20:39+00:00\",\"dateModified\":\"2024-03-09T06:20:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage\",\"url\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\",\"contentUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png\",\"width\":1600,\"height\":900,\"caption\":\"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tncomputermedics.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tncomputermedics.com\/#website\",\"url\":\"https:\/\/tncomputermedics.com\/\",\"name\":\"Expert in Cyber Security and Computer Repair Services\",\"description\":\"TN Computer Medics\",\"publisher\":{\"@id\":\"https:\/\/tncomputermedics.com\/#organization\"},\"alternateName\":\"TN Computer Medics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tncomputermedics.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":[\"Organization\",\"Place\",\"ProfessionalService\"],\"@id\":\"https:\/\/tncomputermedics.com\/#organization\",\"name\":\"TN Computer Medics\",\"alternateName\":\"Expert in Cyber Security and Computer Repair Services\",\"url\":\"https:\/\/tncomputermedics.com\/\",\"logo\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tncomputermedics\",\"https:\/\/x.com\/TNComputerMedic\",\"https:\/\/www.pinterest.com\/tncomputermedics\/\",\"https:\/\/twitter.com\/TNComputerMedic\",\"https:\/\/www.linkedin.com\/company\/tncomputermedics\/\",\"https:\/\/www.youtube.com\/@TNComputerMedics\",\"https:\/\/www.instagram.com\/tncomputermedic\/\"],\"address\":{\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"35.813080\",\"longitude\":\"-86.368850\"},\"telephone\":[\"(615) 806-1535\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"08:00\",\"closes\":\"18:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\"],\"opens\":\"10:00\",\"closes\":\"16:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\"],\"opens\":\"11:00\",\"closes\":\"16:00\"}],\"email\":\"hello@tncomputermedics.com\",\"areaServed\":\"Murfreesboro, Nashville, Brentwood, Berry Hill, Franklin, Mount Juliet, Hermitage, Chattanooga, Tullahoma\",\"priceRange\":\"$$\",\"paymentAccepted\":\"American Express, Mastercard, Visa\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9\",\"name\":\"tncm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g\",\"caption\":\"tncm\"},\"sameAs\":[\"https:\/\/tncomputermedics.com\"],\"url\":\"https:\/\/tncomputermedics.com\/author\/e4572b8864bd281d\/\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-place-address\",\"streetAddress\":\"1715 -K South Rutherford Blvd\",\"addressLocality\":\"Murfreesboro\",\"postalCode\":\"37130\",\"addressRegion\":\"Tennessee\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo\",\"url\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png\",\"contentUrl\":\"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png\",\"width\":300,\"height\":110,\"caption\":\"TN Computer Medics\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Murfreesboro\" \/>\n<meta name=\"geo.position\" content=\"35.813080;-86.368850\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security? - Expert in Cyber Security and Computer Repair Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/","og_locale":"en_US","og_type":"article","og_title":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?","og_description":"Could you explain AWS security? AWS Security equips organizations with the necessary tools and resources to safeguard their applications, services, and data in the cloud. This information is crucial for businesses as it allows them to pinpoint weak spots, uncover any harmful behavior, keep an eye on traffic trends for any unusual patterns, and stop unauthorized entry. The text covers encryption, authentication, risk assessment, and compliance monitoring features. Is it[&hellip;]","og_url":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/","og_site_name":"Expert in Cyber Security and Computer Repair Services","article_publisher":"https:\/\/www.facebook.com\/tncomputermedics","article_published_time":"2024-03-09T06:20:39+00:00","article_modified_time":"2024-03-09T06:20:43+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png","type":"image\/png"}],"author":"tncm","twitter_card":"summary_large_image","twitter_creator":"@TNComputerMedic","twitter_site":"@TNComputerMedic","twitter_misc":{"Written by":"tncm","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#article","isPartOf":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/"},"author":{"name":"tncm","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9"},"headline":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?","datePublished":"2024-03-09T06:20:39+00:00","dateModified":"2024-03-09T06:20:43+00:00","mainEntityOfPage":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/"},"wordCount":325,"commentCount":2,"publisher":{"@id":"https:\/\/tncomputermedics.com\/#organization"},"image":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png","articleSection":["Cybersecurity Insights"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/","url":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/","name":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security? - Expert in Cyber Security and Computer Repair Services","isPartOf":{"@id":"https:\/\/tncomputermedics.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage"},"image":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage"},"thumbnailUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png","datePublished":"2024-03-09T06:20:39+00:00","dateModified":"2024-03-09T06:20:43+00:00","breadcrumb":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#primaryimage","url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png","contentUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/03\/Penetration-Testing-in-AWS-Is-it-Possible-to-Assess-Your-Cloud-Security.png","width":1600,"height":900,"caption":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security"},{"@type":"BreadcrumbList","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tncomputermedics.com\/"},{"@type":"ListItem","position":2,"name":"Penetration Testing in AWS: Is it Possible to Assess Your Cloud Security?"}]},{"@type":"WebSite","@id":"https:\/\/tncomputermedics.com\/#website","url":"https:\/\/tncomputermedics.com\/","name":"Expert in Cyber Security and Computer Repair Services","description":"TN Computer Medics","publisher":{"@id":"https:\/\/tncomputermedics.com\/#organization"},"alternateName":"TN Computer Medics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tncomputermedics.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":["Organization","Place","ProfessionalService"],"@id":"https:\/\/tncomputermedics.com\/#organization","name":"TN Computer Medics","alternateName":"Expert in Cyber Security and Computer Repair Services","url":"https:\/\/tncomputermedics.com\/","logo":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo"},"image":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/tncomputermedics","https:\/\/x.com\/TNComputerMedic","https:\/\/www.pinterest.com\/tncomputermedics\/","https:\/\/twitter.com\/TNComputerMedic","https:\/\/www.linkedin.com\/company\/tncomputermedics\/","https:\/\/www.youtube.com\/@TNComputerMedics","https:\/\/www.instagram.com\/tncomputermedic\/"],"address":{"@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"35.813080","longitude":"-86.368850"},"telephone":["(615) 806-1535"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"08:00","closes":"18:30"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday"],"opens":"10:00","closes":"16:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday"],"opens":"11:00","closes":"16:00"}],"email":"hello@tncomputermedics.com","areaServed":"Murfreesboro, Nashville, Brentwood, Berry Hill, Franklin, Mount Juliet, Hermitage, Chattanooga, Tullahoma","priceRange":"$$","paymentAccepted":"American Express, Mastercard, Visa"},{"@type":"Person","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/c8c029d25ece0f7bb0bc470c97f158a9","name":"tncm","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69459e0fd6239a36b405b7ba7e1d3036?s=96&d=mm&r=g","caption":"tncm"},"sameAs":["https:\/\/tncomputermedics.com"],"url":"https:\/\/tncomputermedics.com\/author\/e4572b8864bd281d\/"},{"@type":"PostalAddress","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-place-address","streetAddress":"1715 -K South Rutherford Blvd","addressLocality":"Murfreesboro","postalCode":"37130","addressRegion":"Tennessee","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/tncomputermedics.com\/penetration-testing-in-aws-is-it-possible-to-assess-your-cloud-security\/#local-main-organization-logo","url":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png","contentUrl":"https:\/\/tncomputermedics.com\/wp-content\/uploads\/2024\/01\/logo.png","width":300,"height":110,"caption":"TN Computer Medics"}]},"geo.placename":"Murfreesboro","geo.position":{"lat":"35.813080","long":"-86.368850"},"geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/1735"}],"collection":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/comments?post=1735"}],"version-history":[{"count":1,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/1735\/revisions"}],"predecessor-version":[{"id":1739,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/posts\/1735\/revisions\/1739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/media\/1737"}],"wp:attachment":[{"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/media?parent=1735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/categories?post=1735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tncomputermedics.com\/wp-json\/wp\/v2\/tags?post=1735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}