{"id":68551,"date":"2023-02-24T10:24:43","date_gmt":"2023-02-24T15:24:43","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=68551"},"modified":"2024-08-15T16:28:33","modified_gmt":"2024-08-15T20:28:33","slug":"it-governance-vs-compliance","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance","title":{"rendered":"IT Governance vs. Compliance: What\u2019s the Difference?"},"content":{"rendered":"\n

The line between IT governance and compliance<\/a> can easily become blurred as organizations grow and increase in operational complexity. Although both strategies are designed to protect the organization from the same risks, there are some key differences. <\/p>\n\n\n\n

In this post, you\u2019ll learn more about IT governance vs. compliance and how companies can combine them to enhance organizational security. <\/p>\n\n\n\n

What Is Governance in IT?<\/h2>\n\n\n\n

IT governance is an integral element of a Governance, Risk (Management), and Compliance (GRC) system that organizations can leverage to improve the management of their IT infrastructures. <\/p>\n\n\n\n

It ensures that IT investments support the organization\u2019s core business objectives by effectively managing IT risks. By adhering to a formal framework, companies can generate measurable output toward achieving their objectives and goals. <\/p>\n\n\n\n

The need for IT governance practices is primarily fueled by the enactment of various laws and regulations, such as the Sarbanes-Oxley Act (SOX) and General Data Protection Regulation (GDPR), which were passed in response to several high-profile deception cases and corporate frauds. <\/p>\n\n\n\n

There are three primary objectives of an IT governance program:<\/p>\n\n\n\n

    \n
  1. Allow the company to demonstrate quantifiable results against its business objectives and goals<\/li>\n\n\n\n
  2. Allow the organization to comply with relevant legal and regulatory obligations, such as those in SOX and GDPR<\/li>\n\n\n\n
  3. Allow the organization to assure its stakeholders that the business\u2019s IT services conform to the best standards<\/li>\n<\/ol>\n\n\n\n

    The easiest way to implement an IT governance structure is to start with a standard that various industry experts use. Some of the IT governance frameworks that you can leverage include: <\/p>\n\n\n\n

    IT Service Management (ITIL)<\/h3>\n\n\n\n

    ITIL<\/a> is a framework for IT service management that companies can leverage to ensure that their IT services support core business processes. To achieve this goal, ITIL defines five management best practices, including service strategy, design, transition, operation, and continuous service improvement, that organizations must adhere to. <\/p>\n\n\n\n

    Committee of Sponsoring Organizations of the Treadway Commission (COSO)<\/h3>\n\n\n\n

    This model provides a framework organizations can use to evaluate their internal controls. Unlike other IT governance frameworks such as COBIT or ITIL that focus on IT aspects, COSO<\/a> concentrates on business elements such as fraud deterrence and enterprise risk management (ERM). <\/p>\n\n\n\n

    What Is Compliance in IT?<\/h2>\n\n\n\n

    IT compliance is a set of guidelines an organization must adhere to in order to ensure its business processes are secure. Each guideline within the IT compliance framework defines rules for data, digital communication, and IT infrastructure. The primary objective of IT compliance is to ensure that the company meets the security and privacy of certain countries, markets, and customers. <\/p>\n\n\n\n

    For example, certain countries have enforced strict privacy laws like the European Union\u2019s GDPR and California\u2019s Privacy Act, i.e., California Consumer Privacy Act (CCPA). At the same time, some markets, such as healthcare and finance, are heavily regulated. Some customers may also demand that the organization complies with unique privacy or confidential standards. <\/p>\n\n\n\n

    Each IT compliance standard has its own requirements. However, many of the regulations today have overlapping needs. For example, while the Health Insurance Portability and Accountability Act (HIPAA) protects healthcare data and the Payment Card Industry Data Security Standard (PCI DSS) secures financial data, both have similar controls for data storage, encryption, and authorization. <\/p>\n\n\n\n\n

    \n
    \n \"JumpCloud\"\n <\/div>\n
    \n

    \n The IT Manager\u2019s Guide to Data Compliance Hygiene <\/p>\n

    \n How to ace your audit <\/p>\n <\/div>\n

    \n Get the Guide <\/a>\n <\/div>\n<\/div>\n\n\n\n\n

    Key Similarities and Differences Between IT Governance and Compliance<\/h2>\n\n\n\n

    Both IT governance and compliance are essential components of GRC. Both strategies aim to increase visibility into risks, vulnerabilities, and threats. In addition, they also help an organization craft measures that protect it against negative internal audits, financial litigation, and penalties. <\/p>\n\n\n\n

    However, although the two IT strategies are built into GRC, their focus is different. IT governance focuses on the organization\u2019s use of IT to achieve their plans. It provides a formal structure that helps align IT strategy with business goals, allowing companies to achieve measurable results with their IT infrastructures. <\/p>\n\n\n\n

    IT compliance, on the other hand, largely focuses on cybersecurity, monitoring, and protecting the privacy of user data in line with legal and regulatory requirements. It addresses specific third-party standards that require organizations to deploy defined IT systems for effective security. <\/p>\n\n\n\n

    How To Implement Governance and Compliance in Your Organization<\/h2>\n\n\n\n

    With increasing reliance on hybrid and remote workplaces, it can be highly challenging for small to medium-sized enterprises (SMEs) to meet the needs of a distributed workforce while adhering to governance and compliance structures. <\/p>\n\n\n\n

    A key tool in an IT admins\u2019 tool belt for the successful implementation of governance and compliance frameworks is a cohesive identity and access management (IAM)<\/a> strategy. When deployed correctly, IAM provides secure access to enterprise assets \u2014 whether those resources are hosted on-prem or in the cloud, and whether employees are working in office or remotely from Windows, Mac, or Linux devices.<\/p>\n\n\n\n

    If you\u2019re a cost-conscious IT admin looking to streamline your stack or automate compliance<\/a>, the JumpCloud Directory Platform is a comprehensive IAM solution that can help your organization ensure it\u2019s adhering to the highest IT governance and compliance standards, from multi-factor authentication<\/a> (MFA) to full disk encryption (FDE)<\/a> to audit reporting and more.<\/p>\n\n\n\n

    IT Compliance: As Painless As Enforce, Prove, Repeat.<\/h2>\n\n\n\n

    Ready to start getting compliant? JumpCloud\u2019s IT Compliance Quickstart Guide<\/a> was designed to get IT professionals the resources they need to prepare for an audit or shore up their IT security baseline. Visit the IT Compliance Quickstart Guide now.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.<\/p>\n","protected":false},"author":131,"featured_media":46186,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2337],"tags":[],"collection":[2775],"platform":[],"funnel_stage":[3015],"coauthors":[2568],"acf":[],"yoast_head":"\nIT Governance vs. Compliance: What\u2019s the Difference? - JumpCloud<\/title>\n<meta name=\"description\" content=\"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Governance vs. Compliance: What\u2019s the Difference?\" \/>\n<meta property=\"og:description\" content=\"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-24T15:24:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-15T20:28:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"498\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelsey Kinzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelsey Kinzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\"},\"author\":{\"name\":\"Kelsey Kinzer\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13\"},\"headline\":\"IT Governance vs. Compliance: What\u2019s the Difference?\",\"datePublished\":\"2023-02-24T15:24:43+00:00\",\"dateModified\":\"2024-08-15T20:28:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\"},\"wordCount\":959,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg\",\"articleSection\":[\"Remote Work\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\",\"url\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\",\"name\":\"IT Governance vs. Compliance: What\u2019s the Difference? - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg\",\"datePublished\":\"2023-02-24T15:24:43+00:00\",\"dateModified\":\"2024-08-15T20:28:33+00:00\",\"description\":\"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg\",\"width\":780,\"height\":498,\"caption\":\"person carrying a briefcase\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Governance vs. Compliance: What\u2019s the Difference?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13\",\"name\":\"Kelsey Kinzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/08f33caaabd3e83507748fcc2d575a67\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g\",\"caption\":\"Kelsey Kinzer\"},\"description\":\"Kelsey is a passionate storyteller and Content Writer at JumpCloud. She is particularly inspired by the people who drive innovation in B2B tech. When away from her screen, you can find her climbing mountains and (unsuccessfully) trying to quit cold brew coffee.\",\"sameAs\":[\"https:\/\/jumpcloud.com\/blog\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Governance vs. Compliance: What\u2019s the Difference? - JumpCloud","description":"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance","og_locale":"en_US","og_type":"article","og_title":"IT Governance vs. Compliance: What\u2019s the Difference?","og_description":"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.","og_url":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance","og_site_name":"JumpCloud","article_published_time":"2023-02-24T15:24:43+00:00","article_modified_time":"2024-08-15T20:28:33+00:00","og_image":[{"width":780,"height":498,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg","type":"image\/jpeg"}],"author":"Kelsey Kinzer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kelsey Kinzer","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance"},"author":{"name":"Kelsey Kinzer","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13"},"headline":"IT Governance vs. Compliance: What\u2019s the Difference?","datePublished":"2023-02-24T15:24:43+00:00","dateModified":"2024-08-15T20:28:33+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance"},"wordCount":959,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg","articleSection":["Remote Work"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance","url":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance","name":"IT Governance vs. Compliance: What\u2019s the Difference? - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg","datePublished":"2023-02-24T15:24:43+00:00","dateModified":"2024-08-15T20:28:33+00:00","description":"Discover the key differences between IT governance vs. compliance and how to leverage them to enhance your organization\u2019s security posture.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2020\/05\/sec-cyber-compliance-preparation.jpg","width":780,"height":498,"caption":"person carrying a briefcase"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/it-governance-vs-compliance#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"IT Governance vs. Compliance: What\u2019s the Difference?"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/c4e9aeadd98cafbd216d3134ad10ab13","name":"Kelsey Kinzer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/08f33caaabd3e83507748fcc2d575a67","url":"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a16ebe214c820d6c288597039b7e89f?s=96&d=mm&r=g","caption":"Kelsey Kinzer"},"description":"Kelsey is a passionate storyteller and Content Writer at JumpCloud. She is particularly inspired by the people who drive innovation in B2B tech. When away from her screen, you can find her climbing mountains and (unsuccessfully) trying to quit cold brew coffee.","sameAs":["https:\/\/jumpcloud.com\/blog"]}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/68551"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=68551"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/68551\/revisions"}],"predecessor-version":[{"id":114224,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/68551\/revisions\/114224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/46186"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=68551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=68551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=68551"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=68551"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=68551"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=68551"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=68551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}