{"id":476,"date":"2026-03-13T09:44:15","date_gmt":"2026-03-13T09:44:15","guid":{"rendered":"https:\/\/cotocus.org\/blog\/?p=476"},"modified":"2026-03-13T09:51:59","modified_gmt":"2026-03-13T09:51:59","slug":"upgrade-your-cloud-security-skills-with-aws-certified-security-specialty","status":"publish","type":"post","link":"https:\/\/cotocus.org\/blog\/upgrade-your-cloud-security-skills-with-aws-certified-security-specialty\/","title":{"rendered":"Upgrade Your Cloud Security Skills with AWS Certified Security Specialty"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"763\" height=\"438\" src=\"https:\/\/cotocus.org\/blog\/wp-content\/uploads\/2026\/03\/image-3.png\" alt=\"\" class=\"wp-image-477\" srcset=\"https:\/\/cotocus.org\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 763w, https:\/\/cotocus.org\/blog\/wp-content\/uploads\/2026\/03\/image-3-300x172.png 300w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>In the modern digital landscape, data is viewed as the most valuable asset, yet it is also seen as a significant liability if not managed correctly. It has been observed by industry veterans that the difference between a successful enterprise and a failed one often comes down to how risk is mitigated. The cloud has changed the fundamental rules of protection, and as a result, a new kind of guardian is required to navigate these complexities.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/devopsschool.com\/certification\/aws-certified-security-specialty-scs-c02.html\" id=\"https:\/\/devopsschool.com\/certification\/aws-certified-security-specialty-scs-c02.html\"><strong>AWS Certified Security \u2013 Specialty<\/strong> <\/a>is recognized as the ultimate blueprint for these guardians. It is not merely treated as a certificate to be collected; it is seen as a strategic commitment to protecting the future of digital business and maintaining the trust of global users.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">What is AWS Certified Security \u2013 Specialty?<\/h2>\n\n\n\n<p>The AWS Certified Security \u2013 Specialty is defined as an advanced technical credential that validates an individual&#8217;s ability to design, implement, and manage a secure cloud environment. A heavy focus is placed on high-stakes domains such as incident response, automated monitoring, and complex data encryption. It is intended for those who have already mastered the basics of the cloud and are ready to specialize in defense.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why it Matters in Today\u2019s Ecosystem<\/h3>\n\n\n\n<p>The traditional &#8220;castle and moat&#8221; security model is seen to have failed in the face of modern threats. In a world of remote work and automated software deployments, security must be embedded into every line of code and every infrastructure change. This certification ensures that the &#8220;Zero Trust&#8221; philosophy is not just a concept, but a functional reality. By mastering these skills, the risk of data breaches is significantly lowered, and the resilience of the organization is increased.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Certifications are Important for Engineers and Managers<\/h3>\n\n\n\n<p>For engineers, a higher level of technical credibility is achieved, which often leads to more specialized roles and higher responsibilities. For managers, the assurance that their teams can handle a major security crisis is provided. In competitive markets across India and the global tech hub, this certification is used as a critical filter to identify professionals who can truly protect an organization\u2019s reputation and financial health.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Certification Overview Table<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Track<\/strong><\/td><td><strong>Level<\/strong><\/td><td><strong>Who it\u2019s for<\/strong><\/td><td><strong>Prerequisites<\/strong><\/td><td><strong>Skills Covered<\/strong><\/td><td><strong>Recommended Order<\/strong><\/td><\/tr><\/thead><tbody><tr><td>Security<\/td><td>Specialty<\/td><td>Cloud Guardians, Security Architects<\/td><td>Hands-on Cloud experience<\/td><td>Risk Mitigation, IAM, KMS, Logging<\/td><td>After Associate Certs<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Provider:<\/strong> <a href=\"https:\/\/devopsschool.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>DevOpsSchool <\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Choose DevOpsSchool?<\/h3>\n\n\n\n<p>DevOpsSchool is chosen by many because a hands-on, mentor-led approach is prioritized over simple memorization of facts. Real-world breach scenarios are simulated in a safe environment so that engineers are prepared for actual crises. The curriculum is kept updated with the latest security trends, ensuring that learners are always at the cutting edge. Furthermore, a lifelong network of security experts is provided to every student, offering a community of support that lasts long after the training is completed.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Certification Deep-Dive<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is this certification?<\/h3>\n\n\n\n<p>A deep technical exploration of the entire AWS security stack is provided. It is specifically designed to turn cloud generalists into specialized security experts who can navigate the most complex infrastructure challenges.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who should take this certification?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Security Professionals:<\/strong> Those who are tasked with maintaining compliance in highly regulated industries like finance and healthcare.<\/li>\n\n\n\n<li><strong>Architects:<\/strong> Professionals who are responsible for securing multi-account environments and complex networking setups.<\/li>\n\n\n\n<li><strong>Senior Engineers:<\/strong> Developers and operations experts who wish to lead DevSecOps initiatives within their organizations.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Skills you will gain<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advanced Identity Control:<\/strong> Complex IAM policies, cross-account permissions, and resource-based controls are mastered to ensure the principle of least privilege.<\/li>\n\n\n\n<li><strong>Encryption Mastery:<\/strong> The full lifecycle of data protection, including key creation, rotation, and deletion using KMS and CloudHSM, is understood.<\/li>\n\n\n\n<li><strong>Automated Threat Detection:<\/strong> Intelligence-driven systems like GuardDuty, Inspector, and Security Hub are utilized to identify and alert on attacks in real-time.<\/li>\n\n\n\n<li><strong>Incident Response Architecture:<\/strong> The ability to automate the containment and remediation of security breaches using Lambda and CloudWatch is developed.<\/li>\n\n\n\n<li><strong>Governance and Compliance:<\/strong> Tools like AWS Config and Audit Manager are mastered to ensure that the infrastructure remains in a compliant state at all times.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Real-world projects after certification<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated Firewall Management:<\/strong> A dynamic system is built to automatically update WAF rules based on emerging global threat intelligence feeds.<\/li>\n\n\n\n<li><strong>Secure Data Lake Architecture:<\/strong> A data lake is designed where every piece of data is encrypted at rest and in transit, and access is audited at a granular level.<\/li>\n\n\n\n<li><strong>Automated Resource Remediation:<\/strong> Custom code is written to automatically isolate or shut down any compromised EC2 instance within seconds of a threat detection.<\/li>\n\n\n\n<li><strong>Centralized Governance Dashboard:<\/strong> A centralized &#8220;Single Pane of Glass&#8221; dashboard is created to monitor the security posture of an entire global organization across hundreds of accounts.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Preparation Plan<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">7\u201314 Days Plan (The Expert Review)<\/h4>\n\n\n\n<p>A rapid, high-intensity review of the five exam domains is conducted. Official security whitepapers are analyzed, and practice exams are taken to identify any remaining knowledge gaps in IAM and KMS. This plan is typically utilized by those who already manage cloud security on a daily basis.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">30 Days Plan (The Deep Dive)<\/h4>\n\n\n\n<p>At least one hour of hands-on lab work is performed every day to build muscle memory. Real-world scenarios involving cross-account access and VPC peering security are practiced in a lab environment. Official study guides and technical documentation are thoroughly analyzed.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">60 Days Plan (The Mastery Path)<\/h4>\n\n\n\n<p>A full-scale, secure architecture is built from scratch in a personal AWS account. Every major security service is integrated, and &#8220;security chaos engineering&#8221; is performed to see if the defenses hold under pressure. This path is recommended for those who are transitioning into a security specialty from a different background.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Common mistakes to avoid<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ignoring Policy Logic:<\/strong> IAM policies are often misunderstood because the underlying JSON logic and evaluation order are ignored.<\/li>\n\n\n\n<li><strong>Focusing Only on Tools:<\/strong> It is often forgotten that security tools are only effective when they are backed by a solid risk management strategy.<\/li>\n\n\n\n<li><strong>Skipping Official FAQs:<\/strong> The official AWS service FAQs are sometimes skipped, even though they contain vital information often tested in the exam.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Best next certification after this<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Same Track:<\/strong> AWS Certified Solutions Architect \u2013 Professional (to master high-level system design).<\/li>\n\n\n\n<li><strong>Cross-Track:<\/strong> AWS Certified DevOps Engineer \u2013 Professional (to master the automation of security pipelines).<\/li>\n\n\n\n<li><strong>Leadership:<\/strong> CISM (Certified Information Security Manager) for those looking to move into executive management roles.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> Choose Your Learning Path<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">DevOps Path<\/h3>\n\n\n\n<p>The automation of security checks within the deployment pipeline is mastered. This is best for those who want to ensure that &#8220;Security as Code&#8221; is a standard practice in their team.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DevSecOps Path<\/h3>\n\n\n\n<p>The &#8220;Shift Left&#8221; philosophy is fully embraced. This path is intended for those who want to find and fix vulnerabilities during the early development stages rather than after deployment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Site Reliability Engineering (SRE) Path<\/h3>\n\n\n\n<p>Security is treated as a fundamental component of system reliability. This path is for those who focus on maintaining uptime and data integrity even during a cyber-attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">AIOps \/ MLOps Path<\/h3>\n\n\n\n<p>The security of artificial intelligence models and the privacy of training data is prioritized. This is chosen by professionals working with sensitive machine learning workloads.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DataOps Path<\/h3>\n\n\n\n<p>The protection of data movement, processing, and storage is emphasized. This path is ideal for data engineers and database administrators who handle massive volumes of sensitive info.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">FinOps Path<\/h3>\n\n\n\n<p>The cost and efficiency of security tools are managed. It is designed for those who need to ensure that security logging and monitoring remain within the organizational budget.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> Role \u2192 Recommended Certifications Mapping<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>DevOps Engineer:<\/strong> AWS Certified DevOps Engineer \u2013 Professional is the target.<\/li>\n\n\n\n<li><strong>SRE:<\/strong> AWS Certified SysOps Administrator \u2013 Associate is often chosen first.<\/li>\n\n\n\n<li><strong>Platform Engineer:<\/strong> AWS Certified Solutions Architect \u2013 Professional is the long-term goal.<\/li>\n\n\n\n<li><strong>Cloud Engineer:<\/strong> AWS Certified Security \u2013 Specialty is highly prioritized for this role.<\/li>\n\n\n\n<li><strong>Security Engineer:<\/strong> AWS Certified Security \u2013 Specialty is considered a mandatory credential.<\/li>\n\n\n\n<li><strong>Data Engineer:<\/strong> AWS Certified Data Engineer \u2013 Associate is recommended for foundational data security.<\/li>\n\n\n\n<li><strong>FinOps Practitioner:<\/strong> FinOps Certified Practitioner is the preferred track for financial specialists.<\/li>\n\n\n\n<li><strong>Engineering Manager:<\/strong> AWS Certified Cloud Practitioner is taken to gain a broad, strategic overview of the platform.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> Next Certifications to Take<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Same-track:<\/strong> AWS Certified Solutions Architect \u2013 Professional is taken to master high-level design at scale.<\/li>\n\n\n\n<li><strong>Cross-track:<\/strong> CKA (Certified Kubernetes Administrator) is pursued to master the security of containerized workloads.<\/li>\n\n\n\n<li><strong>Leadership:<\/strong> CISSP (Certified Information Systems Security Professional) is recommended for those aiming for C-suite positions.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Training &amp; Certification Support Institutions<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">DevOpsSchool<\/h3>\n\n\n\n<p>A highly practical and immersive learning environment is maintained. Real-world projects are used to bridge the gap between theoretical knowledge and actual industry requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cotocus<\/h3>\n\n\n\n<p>Niche technical training and high-end consulting are offered. The focus is kept on advanced cloud security, governance, and enterprise-grade architecture.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ScmGalaxy<\/h3>\n\n\n\n<p>A massive community resource for SCM, DevOps, and cloud tools is provided. It is used by thousands of engineers for daily troubleshooting and deep-dive learning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">BestDevOps<\/h3>\n\n\n\n<p>Simplified and structured learning paths are created for complex cloud technologies, making them accessible to engineers at all stages of their careers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">devsecopsschool.com<\/h3>\n\n\n\n<p>Dedicated training for building secure software delivery pipelines is delivered, with a focus on integrating security tools into CI\/CD.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">sreschool.com<\/h3>\n\n\n\n<p>The principles of system reliability, toil reduction, and incident management are taught with a focus on modern cloud standards and security.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">aiopsschool.com<\/h3>\n\n\n\n<p>Education on how to use artificial intelligence to improve, automate, and secure IT operations is provided here.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">dataopsschool.com<\/h3>\n\n\n\n<p>The security and entire lifecycle of data\u2014from ingestion to storage\u2014is mastered through their specialized and practical curriculum.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">finopsschool.com<\/h3>\n\n\n\n<p>Professionals are taught how to manage the financial impact of the cloud while maintaining a strong and robust security posture.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> FAQs Section<\/h2>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Is this certification worth the effort?<\/strong><br> Yes, security specialists are among the most highly sought-after professionals in the tech industry today.<\/li>\n\n\n\n<li><strong>How does it improve a resume?<\/strong><br> It acts as a global validation of an individual&#8217;s ability to protect complex enterprise data.<\/li>\n\n\n\n<li><strong>Is hands-on experience required for the exam?<\/strong> <br>Yes, the exam is designed to test practical problem-solving skills rather than just theory.<\/li>\n\n\n\n<li><strong>Can it be taken without previous AWS certifications?<\/strong><br> It can be, but an Associate-level understanding of the platform is highly recommended.<\/li>\n\n\n\n<li><strong>Is the exam expensive?<\/strong> <br>The cost is 300 USD, which is seen as a high-value investment in long-term career growth.<\/li>\n\n\n\n<li><strong>Does it cover private or hybrid clouds?<\/strong> <br>The core security principles are universal, but the specific tools and configurations are AWS-native.<\/li>\n\n\n\n<li><strong>Is the certification recognized in the Indian market?<\/strong> <br>Yes, it is a top-tier requirement for major Indian IT firms and global product companies.<\/li>\n\n\n\n<li><strong>How long is the typical study period?<\/strong><br> Usually, 8 to 12 weeks of consistent study are required for a thorough and successful preparation.<\/li>\n\n\n\n<li><strong>What is the passing mark for the exam?<\/strong> <br>A scaled score of 750 out of 1000 is required for a passing grade.<\/li>\n\n\n\n<li><strong>Is the exam proctored?<\/strong> <br>Yes, it can be taken at a physical testing center or from home with a secure online proctor.<\/li>\n\n\n\n<li><strong>Are retakes allowed if the first attempt is failed?<\/strong> <br>Yes, a 14-day waiting period is enforced before a second attempt can be made.<\/li>\n\n\n\n<li><strong>Does it help in securing remote jobs?<\/strong> <br>Yes, cloud security is one of the most flexible and remote-friendly technical roles available.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"> AWS Security Specialty Specifics<\/h3>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Which AWS service is most tested?<\/strong> <br>AWS Identity and Access Management (IAM) is considered the most critical service in the exam.<\/li>\n\n\n\n<li><strong>Is encryption a major part of the syllabus?<\/strong> <br>Yes, a deep understanding of KMS, CloudHSM, and data-at-rest encryption is essential.<\/li>\n\n\n\n<li><strong>Are standard security groups enough for the exam?<\/strong> <br>No, advanced networking topics like VPC Flow Logs and PrivateLink are also heavily covered.<\/li>\n\n\n\n<li><strong>How much focus is placed on the WAF?<\/strong><br> It is a key topic for securing web-facing applications against common external threats.<\/li>\n\n\n\n<li><strong>Is CloudTrail important for passing the exam?<\/strong><br> Yes, it serves as the foundation for the logging, auditing, and monitoring domain.<\/li>\n\n\n\n<li><strong>Does the exam cover the security of serverless functions?<\/strong><br> Yes, securing Lambda functions and API Gateway is a growing part of the curriculum.<\/li>\n\n\n\n<li><strong>Is compliance with global standards like PCI-DSS covered?<\/strong><br> Yes, the shared responsibility model for meeting these compliance standards is tested.<\/li>\n\n\n\n<li><strong>Are multi-account organizations discussed?<\/strong><br> Yes, managing security across many accounts using AWS Organizations and SCPs is a frequent topic.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> Testimonials<\/h2>\n\n\n\n<p><strong>Aman<\/strong><\/p>\n\n\n\n<p>The shift from being a generalist to a true specialist was made possible by this training. The focus was kept on real-world risk management throughout the course.<\/p>\n\n\n\n<p><strong>Priya<\/strong><\/p>\n\n\n\n<p>A deep, practical understanding of data protection was gained here. Career clarity has improved significantly since the completion of this specialized training.<\/p>\n\n\n\n<p><strong>Karthik<\/strong><\/p>\n\n\n\n<p>The confidence required to handle a major enterprise security audit was provided by the mentors. The hands-on labs were a total game-changer for my skills.<\/p>\n\n\n\n<p><strong>Siddharth<\/strong><\/p>\n\n\n\n<p>&#8220;Strategic thinking within the cloud ecosystem was developed. This certification is seen as a must for anyone serious about a career in cloud security.<\/p>\n\n\n\n<p><strong>Neha<\/strong><\/p>\n\n\n\n<p>The training at DevOpsSchool helped it be realized that security is everyone&#8217;s responsibility. My technical skills have grown immensely because of this program.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"> Conclusion<\/h2>\n\n\n\n<p>In conclusion, the <strong>AWS Certified Security \u2013 Specialty<\/strong> is regarded as a vital strategic asset for the modern engineer. Long-term career benefits are secured by those who understand that cloud security is a continuous and evolving journey. By following a structured learning plan and utilizing expert institutional support, the challenges of the modern cloud can be turned into significant opportunities for professional growth.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In the modern digital landscape, data is viewed as the most valuable asset, yet it is also seen as a significant liability if not managed correctly. It has been&hellip;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[92,98,95,97,93,96,94],"class_list":["post-476","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-awscertifiedsecurityspecialty","tag-awscloudsecurity","tag-awssecurity","tag-awssecurityguide","tag-awssecuritylearning","tag-awssecurityskills","tag-cloudsecurity"],"_links":{"self":[{"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/posts\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":2,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/posts\/476\/revisions"}],"predecessor-version":[{"id":480,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/posts\/476\/revisions\/480"}],"wp:attachment":[{"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/categories?post=476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cotocus.org\/blog\/wp-json\/wp\/v2\/tags?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}