{"id":6226,"date":"2021-03-16T14:58:09","date_gmt":"2021-03-16T09:28:09","guid":{"rendered":"https:\/\/www.skynats.com\/?p=6226"},"modified":"2021-08-06T15:39:27","modified_gmt":"2021-08-06T10:09:27","slug":"steps-to-secure-linux-server","status":"publish","type":"post","link":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/","title":{"rendered":"7 steps to securing your Linux server"},"content":{"rendered":"\n<p>&nbsp;<\/p>\n\n\n\n<p>This blog represents the bare minimum needed to harden a Linux server.<\/p>\n\n\n\n<p>&nbsp;Enabling an additional security layer is necessary depending on how a server is used. These layers can include things like individual application configurations, intrusion detection software, and enabling access controls, e.g., two-factor authentication.&nbsp;<\/p>\n\n\n\n<p>These 7 steps securing Linux server will help you to secure the Linux server and we do assist our clients with several Linux queries under the <a href=\"https:\/\/www.skynats.com\/linux-server-management\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"color:#016f9f\" class=\"has-inline-color\">server management<\/span><\/a> plan.\u00a0<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Update your server<\/strong><\/li><\/ol>\n\n\n\n<p>The first step of securing the server is by updating the local repositories and upgrading the operating system and then install the application by applying the latest patches.<\/p>\n\n\n\n<p>On Ubuntu and Debian:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt update &amp;&amp; sudo apt upgrade -y\n<\/code><\/pre>\n\n\n\n<p>On Fedora, CentOS, or RHEL:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo dnf upgrade<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Create a new privileged user account<\/li><\/ol>\n\n\n\n<p>Later, you need to create a new user account. You shouldn&#8217;t log the server as a&nbsp;<strong>root<\/strong>. Instead, create your account (&#8220;<strong>&lt;user&gt;<\/strong>&#8220;), give it&nbsp;<strong>sudo<\/strong>&nbsp;rights, and use it to log into a server.<\/p>\n\n\n\n<p>Start by creating a new user:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ adduser &lt;username&gt;<\/code><\/pre>\n\n\n\n<p>Give your new user account&nbsp;<strong>sudo<\/strong>&nbsp;rights by appending (<strong>-a<\/strong>) the&nbsp;<strong>sudo<\/strong>&nbsp;group (<strong>-G<\/strong>) to the user&#8217;s group membership:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ usermod -a -G sudo &lt;username&gt;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Upload your SSH key<\/li><\/ol>\n\n\n\n<p>To login into the new server, you need an SSH key. By using the ssh-copy-id command you can upload a pre-generated SSH key to the new server.&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ ssh-copy-id &lt;username&gt;@ip_address<\/code><\/pre>\n\n\n\n<p>Now you can log into your new server without having to type in a password.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Secure SSH<\/li><\/ol>\n\n\n\n<p>&nbsp;Making three changes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Disable SSH password authentication<\/li><li>Restrict&nbsp;<strong>root&nbsp;<\/strong>from logging in remotely<\/li><li>Restrict access to IPv4 or IPv6<\/li><\/ul>\n\n\n\n<p>Open&nbsp;<strong>\/etc\/ssh\/sshd_config<\/strong>&nbsp;using your text editor of choice and ensure lines:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>PasswordAuthentication yes\nPermitRootLogin yes\nlook like this:\nPasswordAuthentication no\nPermitRootLogin no<\/code><\/pre>\n\n\n\n<p>Later, you can modify the address-family option by restricting the SSH service to either IPv4 or IPv6.Use the only IPV4 to change(which should be fine for most folks) make a change:<\/p>\n\n\n\n<p>AddressFamily inet<\/p>\n\n\n\n<p>Now, Restart the SSH service to make changes enable.<\/p>\n\n\n\n<p>Note: it&#8217;s better to have two active connection to the server before restarting the SSH server, by having an extra connection that would allow fixing anything when something goes wrong.<\/p>\n\n\n\n<p>On Ubuntu:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo service sshd restart<\/code><\/pre>\n\n\n\n<p>On Fedora or CentOS or anything using Systemd:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo systemctl restart sshd<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Enable a firewall<\/li><\/ol>\n\n\n\n<p>&nbsp;Install the firewall, enable it, and configure only you allow network traffic that designates. Uncomplicated Firewall (UFW) is an easy-to-use interface to&nbsp;<strong>iptables<\/strong>&nbsp;that greatly simplifies the process of configuring a firewall.<\/p>\n\n\n\n<p>You can install UFW with:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt install ufw<\/code><\/pre>\n\n\n\n<p>By default, the UFW will allow the outgoing connection but rejects all incoming connection on the server that reaches through the internet<\/p>\n\n\n\n<p>Anything that tries to connect through the server is denied.<\/p>\n\n\n\n<p>Ensure you log in by enabling access to SSH, HTTP, and HTTPS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo ufw allow ssh\n$ sudo ufw allow http\n$ sudo ufw allow https\nThen enable UFW:\n$ sudo ufw enable<\/code><\/pre>\n\n\n\n<p>You can see what services are allowed and denied with:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo ufw status<\/code><\/pre>\n\n\n\n<p>If you ever want to disable UFW, you can do so by typing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo ufw disable<\/code><\/pre>\n\n\n\n<p>Use firewall-cmd, which is already installed and integrated into some distributions.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Install Fail2ban<\/li><\/ol>\n\n\n\n<p>Fail2ban vulnerabilities that will examine server logs looking for repeated or automated attacks. If any are found, the firewall alert will block the attacker&#8217;s IP address either permanently or for a specified amount of time.<\/p>\n\n\n\n<p>You can install Fail2ban by typing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt install fail2ban -y<\/code><\/pre>\n\n\n\n<p>copy configuration file:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo cp \/etc\/fail2ban\/jail.conf \/etc\/fail2ban\/jail.local<\/code><\/pre>\n\n\n\n<p>Restart Fail2ban:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo service fail2ban restart<\/code><\/pre>\n\n\n\n<p>That&#8217;s all there is to it.&nbsp;<\/p>\n\n\n\n<p>The software will ensure examining all the log files looking for attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Later, the app will build up a list of a banned IP address. You can view the list with the help of the SSH service current status.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo fail2ban-client status ssh<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Remove unused network-facing services<\/li><\/ol>\n\n\n\n<p>Most of the Linux based operating system that comes with a few network-facing services enabled, you can remove whatever you wish to. by running network services command<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo ss -atpu<\/code><\/pre>\n\n\n\n<p>Depending upon the operating system<\/p>\n\n\n\n<p>The output from&nbsp;<strong>ss<\/strong>&nbsp;will differ depending on your operating system. This is an example of what you might see. It shows that the SSH (sshd) and Ngnix (nginx) services are listening and ready for connection:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>tcp LISTEN 0 128 *:http *:* users:((\"nginx\",pid=22563,fd=7))\ntcp LISTEN 0 128 *:ssh *:* users:((\"sshd\",pid=685,fd=3))<\/code><\/pre>\n\n\n\n<p>How you go about removing an unused service (&#8220;<strong>&lt;service_name&gt;<\/strong>&#8220;) will vary on the operating system and the package manager uses.<\/p>\n\n\n\n<p>To remove an unused service on Debian\/Ubuntu:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo apt purge &lt;service_name&gt;<\/code><\/pre>\n\n\n\n<p>To remove an unused service on Red Hat\/CentOS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ sudo yum remove &lt;service_name&gt;<\/code><\/pre>\n\n\n\n<p>Run&nbsp;<strong>ss -atup<\/strong>&nbsp;again to verify that the unused services are no longer installed and running.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;<\/strong>In short, introduce you to basic Linux server security. While it focuses on Debian\/Ubuntu, you can apply everything presented here to other Linux distributions.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; This blog represents the bare minimum needed to harden a Linux server. &nbsp;Enabling an additional security layer is necessary depending on how a server is used. These layers can include things like individual application configurations, intrusion detection software, and enabling access controls, e.g., two-factor authentication.&nbsp; These 7 steps securing Linux server will help you [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,239,230,229],"tags":[531],"class_list":["post-6226","post","type-post","status-publish","format-standard","hentry","category-blog","category-linux","category-rhel-7","category-rhel8","tag-linux-server-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>7 steps to securing your Linux server | 24\/7 Server Support<\/title>\n<meta name=\"description\" content=\"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 steps to securing your Linux server\" \/>\n<meta property=\"og:description\" content=\"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/\" \/>\n<meta property=\"og:site_name\" content=\"Server Management Services | Cloud Management | Skynats\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/skynats\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-16T09:28:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-06T10:09:27+00:00\" \/>\n<meta name=\"author\" content=\"Nabeela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:site\" content=\"@skynatstech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nabeela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/\"},\"author\":{\"name\":\"Nabeela\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/2968118a72bea0868796abf1237ab3e0\"},\"headline\":\"7 steps to securing your Linux server\",\"datePublished\":\"2021-03-16T09:28:09+00:00\",\"dateModified\":\"2021-08-06T10:09:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/\"},\"wordCount\":754,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"keywords\":[\"Linux Server Security\"],\"articleSection\":[\"Blog\",\"Linux\",\"RHEL 7\",\"RHEL8\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/\",\"name\":\"7 steps to securing your Linux server | 24\\\/7 Server Support\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\"},\"datePublished\":\"2021-03-16T09:28:09+00:00\",\"dateModified\":\"2021-08-06T10:09:27+00:00\",\"description\":\"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/steps-to-secure-linux-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 steps to securing your Linux server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"name\":\"Server Management Services | Cloud Management | Skynats\",\"description\":\"Server Management and Cloud Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#organization\",\"name\":\"Skynats Technologies\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"contentUrl\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Sknats-Logo-New-whole.png\",\"width\":989,\"height\":367,\"caption\":\"Skynats Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/skynats\",\"https:\\\/\\\/x.com\\\/skynatstech\",\"https:\\\/\\\/www.instagram.com\\\/skynatstech\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/skynats-technologies\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCvTAjrFJ4_E2MJKwlDHomlg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.skynats.com\\\/blog\\\/#\\\/schema\\\/person\\\/2968118a72bea0868796abf1237ab3e0\",\"name\":\"Nabeela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g\",\"caption\":\"Nabeela\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"7 steps to securing your Linux server | 24\/7 Server Support","description":"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/","og_locale":"en_US","og_type":"article","og_title":"7 steps to securing your Linux server","og_description":"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.","og_url":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/","og_site_name":"Server Management Services | Cloud Management | Skynats","article_publisher":"https:\/\/www.facebook.com\/skynats","article_published_time":"2021-03-16T09:28:09+00:00","article_modified_time":"2021-08-06T10:09:27+00:00","author":"Nabeela","twitter_card":"summary_large_image","twitter_creator":"@skynatstech","twitter_site":"@skynatstech","twitter_misc":{"Written by":"Nabeela","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/#article","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/"},"author":{"name":"Nabeela","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/2968118a72bea0868796abf1237ab3e0"},"headline":"7 steps to securing your Linux server","datePublished":"2021-03-16T09:28:09+00:00","dateModified":"2021-08-06T10:09:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/"},"wordCount":754,"commentCount":0,"publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"keywords":["Linux Server Security"],"articleSection":["Blog","Linux","RHEL 7","RHEL8"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/","url":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/","name":"7 steps to securing your Linux server | 24\/7 Server Support","isPartOf":{"@id":"https:\/\/www.skynats.com\/blog\/#website"},"datePublished":"2021-03-16T09:28:09+00:00","dateModified":"2021-08-06T10:09:27+00:00","description":"Update your server- first step of securing the server is by updating the local repositories and upgrading the operating system.","breadcrumb":{"@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.skynats.com\/blog\/steps-to-secure-linux-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.skynats.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 steps to securing your Linux server"}]},{"@type":"WebSite","@id":"https:\/\/www.skynats.com\/blog\/#website","url":"https:\/\/www.skynats.com\/blog\/","name":"Server Management Services | Cloud Management | Skynats","description":"Server Management and Cloud Management","publisher":{"@id":"https:\/\/www.skynats.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.skynats.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.skynats.com\/blog\/#organization","name":"Skynats Technologies","url":"https:\/\/www.skynats.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","contentUrl":"https:\/\/www.skynats.com\/blog\/wp-content\/uploads\/2021\/08\/Sknats-Logo-New-whole.png","width":989,"height":367,"caption":"Skynats Technologies"},"image":{"@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/skynats","https:\/\/x.com\/skynatstech","https:\/\/www.instagram.com\/skynatstech\/","https:\/\/www.linkedin.com\/company\/skynats-technologies","https:\/\/www.youtube.com\/channel\/UCvTAjrFJ4_E2MJKwlDHomlg"]},{"@type":"Person","@id":"https:\/\/www.skynats.com\/blog\/#\/schema\/person\/2968118a72bea0868796abf1237ab3e0","name":"Nabeela","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12a999d0e3cd16cf2383c5551b39d00d6ddc2d035a2581ce5d85fce0762d0372?s=96&d=mm&r=g","caption":"Nabeela"}}]}},"_links":{"self":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/6226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/comments?post=6226"}],"version-history":[{"count":0,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/posts\/6226\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/media?parent=6226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/categories?post=6226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skynats.com\/blog\/wp-json\/wp\/v2\/tags?post=6226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}