{"id":16389,"date":"2023-01-17T12:33:20","date_gmt":"2023-01-17T17:33:20","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=16389"},"modified":"2023-01-17T12:48:32","modified_gmt":"2023-01-17T17:48:32","slug":"iri-data-masking","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/","title":{"rendered":"IRI Data Masking"},"content":{"rendered":"<p>When it comes to protecting your data, there are two processes that could be considered absolutely fundamental: finding out which of your data is sensitive and where it can be located, and then actually protecting that data. The former is sensitive data discovery, which we have already discussed in previous blogs in this series. The latter can encompass a few different things, such as encryption, redaction, or the topic of this blog, data masking. Note that some vendors, including <a href=\"https:\/\/www.iri.com\/\">IRI<\/a>, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.<\/p>\n<p>Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. This comes pretty close to just being a redaction. Less rudimentary techniques might involve picking a random selection from a list (for instance, masking a name by randomly picking from a list of common names) or randomly generating a numerical entry in the same format (a credit card number, say). Really advanced solutions might use synthetic data generation to generate entire \u201cfake\u201d data sets that contain no sensitive information but that replicate the high-level statistical makeup of the original data set. The idea in general is to replace real, sensitive data with fake data that looks real, or at least close enough for development and testing purposes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16391 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2023\/01\/Fig-1-Masking-RDBMS-data--300x97.jpg\" alt=\"\" width=\"745\" height=\"241\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/Fig-1-Masking-RDBMS-data--300x97.jpg 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/Fig-1-Masking-RDBMS-data--1024x330.jpg 1024w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/Fig-1-Masking-RDBMS-data--768x247.jpg 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/Fig-1-Masking-RDBMS-data--scaled.jpg 1110w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig 1 \u2013 Masking RDBMS data<\/em><\/p>\n<p>Note that the methods discussed above largely concern irreversible, static data masking. Reversible masking is less secure, for obvious reasons, but allows you to revert to the original data if needed, while dynamic masking refrains from replacing the data at source in favor of altering the view of that data for any users who aren\u2019t privileged enough to see what it really is. In either case, this is a way of protecting your sensitive data when replacing it in its entirety would be impractical.<\/p>\n<p>There are a few obvious ways to judge data masking solutions. The first and second are the sophistication and variety of the masking techniques available: we have already described several. An additional facet of this that we haven\u2019t mentioned so far is the ability to maintain referential integrity during the masking process, and thus mask consistently across an entire system. This leads to the third point, which is the variety of data sources that can be masked on. Although being able to mask on structured data sources such as RDBMSs is largely table stakes, masking semi-structure\/unstructured data, whether on NoSQL databases or individual documents, spreadsheets, images and the like are very much not. Moreover, being able to mask consistently \u2013 and while maintaining referential integrity \u2013 across all of these sources at once, and thus over your entire enterprise, can be very important.<\/p>\n<p>The latter is an area in which IRI\u2019s data masking capabilities perform very well. Voracity provides a cornucopia of supported <a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\">data sources<\/a> for masking as well as for its other functionality, including both structured and unstructured data, and offers specialized <a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\">products<\/a> designed for managing structured data (IRI FieldShield), unstructured data (DarkShield) and Excel data (CellShield), which very much includes masking. Notably, DarkShield will allow you to not just detect and remove sensitive data from images and documents, but also to replace that data with new, masked data. This sort of functionality is usually reserved for relational data. It\u2019s also worth noting that DarkShield has become something of a jack-of-all-trades product as far as masking is concerned, and it can handle structured data very capably as well.<\/p>\n<p>IRI provides a variety of masking <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\">functions<\/a> that can be leveraged inside masking jobs, that can themselves be created, executed, and managed via IRI Workbench. In fact, in this instance Workbench is positioned as something of a centralized view into all of your masking functionality, across your entire environment. Referential integrity is always maintained within these functions via the generation of consistent ciphertext, and the complete list of functions includes character-level scrambling, blurring (which introduces random noise within a specified range to numeric values), hashing, encoding, (format-preserving) encryption, tokenization, redaction, filtering, byte shifting, and more.<\/p>\n<p>You can also build your own field-level masking functions externally and integrate them via an API. All masking functions can be applied conditionally via masking rules (associating specific masking functions to specific classes of data, for example) and you can combine two or more masking functions together and apply them simultaneously, effectively nesting one within the other and saving you from passing over all the applicable data multiple times. Finally, Voracity also provides <a href=\"https:\/\/www.iri.com\/solutions\/test-data#techniques\">synthetic<\/a> (test) data generation, which can be used to generate replacement data alongside the platform\u2019s more dedicated masking functionality. We will discuss this capability in more detail in the next article in this series.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to protecting your data, there are two processes that could be considered absolutely fundamental: finding out which of your data is sensitive and where it can be located, and then actually protecting that data. The former is sensitive data discovery, which we have already discussed in previous blogs in this series. The<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\" title=\"IRI Data Masking\">Read More<\/a><\/div>\n","protected":false},"author":188,"featured_media":16393,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,217,34],"tags":[14,1442],"class_list":["post-16389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri","category-business","tag-data-masking","tag-iri-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IRI Data Masking - IRI<\/title>\n<meta name=\"description\" content=\"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IRI Data Masking - IRI\" \/>\n<meta property=\"og:description\" content=\"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-17T17:33:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-17T17:48:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"977\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Howard, Bloor Research\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Howard, Bloor Research\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\"},\"author\":{\"name\":\"Daniel Howard, Bloor Research\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/9099cd77d0c3653574d152e6897fa38f\"},\"headline\":\"IRI Data Masking\",\"datePublished\":\"2023-01-17T17:33:20+00:00\",\"dateModified\":\"2023-01-17T17:48:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\"},\"wordCount\":825,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg\",\"keywords\":[\"data masking\",\"IRI business\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\",\"name\":\"IRI Data Masking - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg\",\"datePublished\":\"2023-01-17T17:33:20+00:00\",\"dateModified\":\"2023-01-17T17:48:32+00:00\",\"description\":\"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg\",\"width\":977,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IRI Data Masking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/9099cd77d0c3653574d152e6897fa38f\",\"name\":\"Daniel Howard, Bloor Research\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9386a20e3db8c225dffad46b5ba7c313?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9386a20e3db8c225dffad46b5ba7c313?s=96&d=blank&r=g\",\"caption\":\"Daniel Howard, Bloor Research\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/dhoward\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IRI Data Masking - IRI","description":"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/","og_locale":"en_US","og_type":"article","og_title":"IRI Data Masking - IRI","og_description":"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/","og_site_name":"IRI","article_published_time":"2023-01-17T17:33:20+00:00","article_modified_time":"2023-01-17T17:48:32+00:00","og_image":[{"width":977,"height":250,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","type":"image\/jpeg"}],"author":"Daniel Howard, Bloor Research","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Daniel Howard, Bloor Research","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/"},"author":{"name":"Daniel Howard, Bloor Research","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/9099cd77d0c3653574d152e6897fa38f"},"headline":"IRI Data Masking","datePublished":"2023-01-17T17:33:20+00:00","dateModified":"2023-01-17T17:48:32+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/"},"wordCount":825,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","keywords":["data masking","IRI business"],"articleSection":["Data Masking\/Protection","IRI","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/","name":"IRI Data Masking - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","datePublished":"2023-01-17T17:33:20+00:00","dateModified":"2023-01-17T17:48:32+00:00","description":"Data masking, then, is the replacement of data (most often sensitive data) with desensitized, usually randomized data. The sophistication of this process varies dramatically. In a very basic form, you might just replace a piece of data with a string of X characters. Note that some vendors, including IRI, position encryption and\/or redaction as part of data masking, so we will use the latter as a catch-all term \u2013 but be aware that sometimes there is a distinction.","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","width":977,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IRI Data Masking"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/9099cd77d0c3653574d152e6897fa38f","name":"Daniel Howard, Bloor Research","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9386a20e3db8c225dffad46b5ba7c313?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9386a20e3db8c225dffad46b5ba7c313?s=96&d=blank&r=g","caption":"Daniel Howard, Bloor Research"},"url":"https:\/\/beta.iri.com\/blog\/author\/dhoward\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/01\/BR-998-IRI-Data-Masking-banner-977-x-250px-.jpg","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16389"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=16389"}],"version-history":[{"count":7,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16389\/revisions"}],"predecessor-version":[{"id":16398,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16389\/revisions\/16398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/16393"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=16389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=16389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=16389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}