{"id":189284,"date":"2025-05-31T15:46:18","date_gmt":"2025-05-31T19:46:18","guid":{"rendered":"https:\/\/armchairarcade.com\/perspectives\/?p=189284"},"modified":"2025-05-31T15:46:21","modified_gmt":"2025-05-31T19:46:21","slug":"how-cybersecurity-frameworks-like-nist-800-171-protect-your-data","status":"publish","type":"post","link":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","title":{"rendered":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data"},"content":{"rendered":"\n<p>While most compliance experts and CEOs comprehend the value of cybersecurity measures, security frameworks, like NIST SP 800-171, can make the process a bit too overwhelming. As an organization, you know a formal structure needs to be established: security standards that not only demand adherence to but also offer actionable insight.<\/p>\n\n\n\n<p>In retrospect, a security framework implies procedures and policies to maintain and establish certain security checkpoints\/controls. Speaking of which, one of the significant security-specific errors organizations make is reviewing compliance standards once and then forgetting about them.<\/p>\n\n\n\n<p>This is where adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.<\/p>\n\n\n\n<p>But before beginning, let\u2019s discuss the prerequisites first.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">NIST SP 800-171: What is it?<\/h2>\n\n\n\n<p>Reacting to an Obama-era directive, a more modern compliance framework\u2014NIST SP 800-171\u2014was used in 2017. Biden&#8217;s executive order reinforced the enhanced protections these laws demanded for private information, which government agencies must offer.<\/p>\n\n\n\n<p>The NIST SP 800-171, a special publication created by the federal agency National Institute of Standards and Technology (NIST), which <a href=\"https:\/\/www.cmu.edu\/iso\/compliance\/800-171\/index.html\">monitors third-party handling of government data<\/a>, is the source of the SP in its name.<\/p>\n\n\n\n<p>It provides a structure for protecting what is known as &#8220;controlled, unclassified information,&#8221; or CUI, for companies that cooperate or engage in contracts with government agencies. The main objective of NIST SP 800-171 is to create a broadly accepted norm for CUI definition and administration.<\/p>\n\n\n\n<p>CUI allows one to add personal information, medical records, communications, drawings, intellectual property, equipment specs, sensitive data, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Do NIST 800-171 Controls Benefit?<\/h2>\n\n\n\n<p>Although non-federal enterprises collaborating with the Department of Defense (DoD) must adhere to NIST 800 171, these controls can be implemented by any firm looking to improve its cybersecurity posture.<\/p>\n\n\n\n<p>Refer to the rundown to examine the advantages of putting NIST 800 171 controls into practice:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Adherence to Federal Laws<\/h3>\n\n\n\n<p>Organizations can improve cybersecurity procedures and adhere to CUI standards with the aid of NIST 800-171. More specifically, it supports frameworks like <a href=\"https:\/\/complianceforge.com\/compliance\/cmmc\"><strong>CMMC requirements<\/strong><\/a> and conforms to regulations like the Defense Federal Acquisition Regulation Supplement (DFARS).<\/p>\n\n\n\n<p>By putting NIST 800-171 measures in place, federal contractors can lower their risk of contract loss, data breaches, and possible legal repercussions for non-compliance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Improved Security<\/h3>\n\n\n\n<p>When CUI is compromised, it can damage commercial interests and cause privacy and national security problems. In retrospect, NIST 800 171 measures were created to guard against threats, breaches, and illegal access to sensitive data, including government, financial, and personally identifiable information.<\/p>\n\n\n\n<p>This shields defense contractors from cyberattacks caused by control flaws and security gaps through access controls, encryption, media protection, etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. International Competitiveness<\/h3>\n\n\n\n<p>An organization&#8217;s dedication to security and a culture of robust cybersecurity policies are demonstrated by NIST 800-171 controls.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?resize=1024%2C682&#038;ssl=1\" alt=\"Malware breaking into database on screen\" class=\"wp-image-189286\" srcset=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Malware-breaking-into-database-on-screen.jpg?w=1094&amp;ssl=1 1094w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Be competitive.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>To ensure compliance and protect data, certain measures must be put in place by any firm looking to collaborate with the US government or handle private data for regulated sectors. In addition to ensuring compliance, adhering to NIST 800-171 can increase your credibility and lead to new commercial prospects and foreign alliances.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Enhanced Security of the Supply Chain<\/h3>\n\n\n\n<p>In order to reduce supply chain risks, the controls also guarantee that subcontractors and contractors follow uniform security procedures. Encryption, frequent risk assessments, stringent access controls, and other measures reduce weak points and defend the supply chain ecosystem against intrusions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Support for Incident Response<\/h3>\n\n\n\n<p>To reduce the risk of breaches and extended business disruptions, the framework also mandates that organizations create, test, and execute an incident response strategy.<\/p>\n\n\n\n<p>Requirements, including proactive threat identification, logging, ongoing monitoring, and recovery activities, can strengthen the organization&#8217;s resilience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The NIST Five Pillars That Enable Data Protection<\/h2>\n\n\n\n<p>To create a thorough cybersecurity strategy, each of these five distinct functions represents a set of goals and tasks that must be completed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Identify<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2772918423000188\">first step in any cybersecurity strategy<\/a> should be to identify all the threats the company confronts and all the assets that need to be safeguarded.<\/p>\n\n\n\n<p>Your company can ensure controls are put in place to safeguard the data and vital business operations by evaluating risks and recording the locations of sensitive data storage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Protect<\/h3>\n\n\n\n<p>The next step is to identify scenarios and use cases for safeguarding each asset. To put it another way, this pillar determines what instruments, procedures, or activities ought to be employed to secure assets, provide sufficient data protection, and avert possible cybersecurity risks and consequences.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Detect<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"562\" src=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Computer-scientists-in-data-center-managing-and-maintaining-databases.jpg?resize=1000%2C562&#038;ssl=1\" alt=\"Computer scientists in data center managing and maintaining databases\" class=\"wp-image-189287\" srcset=\"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Computer-scientists-in-data-center-managing-and-maintaining-databases.jpg?w=1000&amp;ssl=1 1000w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Computer-scientists-in-data-center-managing-and-maintaining-databases.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Computer-scientists-in-data-center-managing-and-maintaining-databases.jpg?resize=150%2C84&amp;ssl=1 150w, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/Computer-scientists-in-data-center-managing-and-maintaining-databases.jpg?resize=768%2C432&amp;ssl=1 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Detect to protect.<\/figcaption><\/figure>\n<\/div>\n\n\n<p>The following pillar involves defining and developing procedures to promptly identify cybersecurity events and possible threats.<\/p>\n\n\n\n<p>For instance, tools that forecast and monitor user behavior or patterns can identify unusual activity. This will alert your company and assist you in preventing a possible breach before it happens.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Respond<\/h3>\n\n\n\n<p>The response pillar requires a specific reaction to the activity once an anomaly or threat has been identified. By doing this, you can be sure that your organization can establish a response to a cybersecurity problem quickly and effectively when it occurs.<\/p>\n\n\n\n<p>Depending on the behavior found and the asset&#8217;s significance, these processes may change. As stated differently, every response plan should be customized for every asset, use case, and threat behavior involved.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Recover<\/h3>\n\n\n\n<p>Last but not least, following an incident, the recovery pillar assists you in figuring out how to restore any damaged infrastructure and keep your company secure.<\/p>\n\n\n\n<p>The following steps will assist your company in recovering from an event and make sure a breach doesn&#8217;t occur again:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restoring IT assets&#8217; functionality and ensuring your systems are clean.<\/li>\n\n\n\n<li>Assessing the incident&#8217;s origin for any security flaws.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>Fundamentally, NIST SP 800-171 ensures that the government and its agencies may carry out critical tasks while guaranteeing the security of their data, even from individuals not directly affiliated with the federal government.<\/p>\n\n\n\n<p>Apart from the valuable advantages of NIST SP 800-171, the government may impose sanctions, including fines, if a partner organization fails to comply. Naturally, your company&#8217;s contract may be terminated with the possibility of losing your contractor status, and they may even file a lawsuit for damages for breach of contract. Additionally, depending on the seriousness of the matter, criminal charges may be brought because government information is involved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization. <\/p>\n","protected":false},"author":18661,"featured_media":189285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":false,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[15],"tags":[1821,3915],"class_list":["post-189284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial","tag-cybersecurity","tag-cybersecurity-frameworks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade<\/title>\n<meta name=\"description\" content=\"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade\" \/>\n<meta property=\"og:description\" content=\"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Armchair Arcade\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-31T19:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-31T19:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jonathan Adams\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:site\" content=\"@armchairarcade\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan Adams\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/\"},\"author\":{\"name\":\"Jonathan Adams\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/d07bd594a4c92ec802e13c5cc90d46a2\"},\"headline\":\"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data\",\"datePublished\":\"2025-05-31T19:46:18+00:00\",\"dateModified\":\"2025-05-31T19:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/\"},\"wordCount\":1036,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1\",\"keywords\":[\"cybersecurity\",\"cybersecurity frameworks\"],\"articleSection\":[\"Editorial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/\",\"name\":\"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1\",\"datePublished\":\"2025-05-31T19:46:18+00:00\",\"dateModified\":\"2025-05-31T19:46:21+00:00\",\"description\":\"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1\",\"width\":1920,\"height\":1281,\"caption\":\"Protect your data.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/2025\\\/05\\\/31\\\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"name\":\"Armchair Arcade\",\"description\":\"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003\",\"publisher\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\"},\"alternateName\":\"AA\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#organization\",\"name\":\"Armchair Arcade\",\"alternateName\":\"AA\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Google-250.png?fit=250%2C250&ssl=1\",\"width\":250,\"height\":250,\"caption\":\"Armchair Arcade\"},\"image\":{\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pages\\\/Armchair-Arcade\\\/141237783007\",\"https:\\\/\\\/x.com\\\/armchairarcade\",\"https:\\\/\\\/instagram.com\\\/bill_loguidice\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/billloguidice\",\"https:\\\/\\\/www.pinterest.com\\\/billloguidice\\\/armchair-arcade\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/BillLoguidice\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/#\\\/schema\\\/person\\\/d07bd594a4c92ec802e13c5cc90d46a2\",\"name\":\"Jonathan Adams\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Facebook-188.png?fit=96%2C96&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Facebook-188.png?fit=96%2C96&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/armchairarcade.com\\\/perspectives\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/Facebook-188.png?fit=96%2C96&ssl=1\",\"caption\":\"Jonathan Adams\"},\"description\":\"Correspondent for Armchair Arcade.\",\"url\":\"https:\\\/\\\/armchairarcade.com\\\/perspectives\\\/author\\\/jonathan-adams\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade","description":"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","og_locale":"en_US","og_type":"article","og_title":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade","og_description":"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.","og_url":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","og_site_name":"Armchair Arcade","article_publisher":"https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","article_published_time":"2025-05-31T19:46:18+00:00","article_modified_time":"2025-05-31T19:46:21+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg","type":"image\/jpeg"}],"author":"Jonathan Adams","twitter_card":"summary_large_image","twitter_creator":"@armchairarcade","twitter_site":"@armchairarcade","twitter_misc":{"Written by":"Jonathan Adams","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#article","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/"},"author":{"name":"Jonathan Adams","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/d07bd594a4c92ec802e13c5cc90d46a2"},"headline":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data","datePublished":"2025-05-31T19:46:18+00:00","dateModified":"2025-05-31T19:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/"},"wordCount":1036,"commentCount":0,"publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1","keywords":["cybersecurity","cybersecurity frameworks"],"articleSection":["Editorial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","url":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/","name":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data - Armchair Arcade","isPartOf":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#primaryimage"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1","datePublished":"2025-05-31T19:46:18+00:00","dateModified":"2025-05-31T19:46:21+00:00","description":"Adhering to NIST SP 800-171 regulations results in a strong security posture for the whole organization.","breadcrumb":{"@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#primaryimage","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1","width":1920,"height":1281,"caption":"Protect your data."},{"@type":"BreadcrumbList","@id":"https:\/\/armchairarcade.com\/perspectives\/2025\/05\/31\/how-cybersecurity-frameworks-like-nist-800-171-protect-your-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/armchairarcade.com\/perspectives\/"},{"@type":"ListItem","position":2,"name":"How Cybersecurity Frameworks Like NIST 800-171 Protect Your Data"}]},{"@type":"WebSite","@id":"https:\/\/armchairarcade.com\/perspectives\/#website","url":"https:\/\/armchairarcade.com\/perspectives\/","name":"Armchair Arcade","description":"Chronicling the complete history of videogames, computers, technology, and pop culture since 2003","publisher":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#organization"},"alternateName":"AA","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/armchairarcade.com\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/armchairarcade.com\/perspectives\/#organization","name":"Armchair Arcade","alternateName":"AA","url":"https:\/\/armchairarcade.com\/perspectives\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Google-250.png?fit=250%2C250&ssl=1","width":250,"height":250,"caption":"Armchair Arcade"},"image":{"@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/Armchair-Arcade\/141237783007","https:\/\/x.com\/armchairarcade","https:\/\/instagram.com\/bill_loguidice\/","https:\/\/www.linkedin.com\/in\/billloguidice","https:\/\/www.pinterest.com\/billloguidice\/armchair-arcade\/","https:\/\/www.youtube.com\/user\/BillLoguidice\/"]},{"@type":"Person","@id":"https:\/\/armchairarcade.com\/perspectives\/#\/schema\/person\/d07bd594a4c92ec802e13c5cc90d46a2","name":"Jonathan Adams","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/11\/Facebook-188.png?fit=96%2C96&ssl=1","url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/11\/Facebook-188.png?fit=96%2C96&ssl=1","contentUrl":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2016\/11\/Facebook-188.png?fit=96%2C96&ssl=1","caption":"Jonathan Adams"},"description":"Correspondent for Armchair Arcade.","url":"https:\/\/armchairarcade.com\/perspectives\/author\/jonathan-adams\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/05\/teal-LED-panel.jpg?fit=1920%2C1281&ssl=1","jetpack-related-posts":[{"id":189306,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/06\/02\/how-effective-is-data-erasure-software-for-data-protection\/","url_meta":{"origin":189284,"position":0},"title":"How Effective Is Data Erasure Software for Data Protection?","author":"A.K. Patel","date":"June 2, 2025","format":false,"excerpt":"Keep reading to discover essential ways to fortify your business's data management approach.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"HTML and CSS collage concept with person","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/06\/HTML-and-CSS-collage-concept-with-person.jpg?fit=1000%2C667&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/06\/HTML-and-CSS-collage-concept-with-person.jpg?fit=1000%2C667&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/06\/HTML-and-CSS-collage-concept-with-person.jpg?fit=1000%2C667&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/06\/HTML-and-CSS-collage-concept-with-person.jpg?fit=1000%2C667&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":185612,"url":"https:\/\/armchairarcade.com\/perspectives\/2024\/01\/24\/fortifying-the-virtual-fortress\/","url_meta":{"origin":189284,"position":1},"title":"Fortifying the Virtual Fortress: Cybersecurity, Crypto Payments, and the Shielding of Online Casino Platforms","author":"Jane Smith","date":"January 24, 2024","format":false,"excerpt":"his article delves into the evolving landscape of cyber threats, the role of cryptocurrency in online transactions, and the measures taken by online casinos to ensure a secure gaming environment.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Cryptocurrency security - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2024\/01\/4a8f050f-66ef-414a-a570-e58b48c9cdb7.jpg?fit=1024%2C1024&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":8011,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/07\/30\/pay-what-you-want-for-the-humble-book-bundle-cybersecurity-2-0-by-wiley\/","url_meta":{"origin":189284,"position":2},"title":"Pay what you want for The Humble Book Bundle: Cybersecurity 2.0 by Wiley","author":"Bill Loguidice","date":"July 30, 2018","format":false,"excerpt":"The Humble Book Bundle: Cybersecurity 2.0 by Wiley Here's the link. Offer ends 2018-08-13 11:00:00 PDT. Secure yourself a new bundle.\u00a0We've teamed up with Wiley for the next generation of cybersecurity book bundle. Get titles like\u00a0Advanced Penetration Testing, Investigating Cryptocurrencies, The Shellcoder's Handbook, The Art of Memory Forensics, and\u00a0Security Engineering.\u2026","rel":"","context":"In &quot;Sale&quot;","block_context":{"text":"Sale","link":"https:\/\/armchairarcade.com\/perspectives\/category\/sale\/"},"img":{"alt_text":"Pay what you want for The Humble Book Bundle: Cybersecurity 2.0 by Wiley","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/07\/cybersecurity2_book_bundle-twitter-post2.png?fit=1024%2C512&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":7747,"url":"https:\/\/armchairarcade.com\/perspectives\/2018\/06\/19\/pay-what-you-want-for-the-humble-software-bundle-cybersecurity\/","url_meta":{"origin":189284,"position":3},"title":"Pay what you want for The Humble Software Bundle: Cybersecurity!","author":"Bill Loguidice","date":"June 19, 2018","format":false,"excerpt":"The Humble Software Bundle: Cybersecurity Here's the link. Offer expires 2018-07-03 11:00:00 PDT. Feeling insecure? Get this bundle.\u00a0Keep yourself safe on the net with our newest software bundle! Get applications like Dashlane Premium, Private Internet Access, and SpiderOak One Backup. Plus, your purchase can support Electronic Frontier\u00a0Foundation \u2013 or a\u2026","rel":"","context":"In &quot;Sale&quot;","block_context":{"text":"Sale","link":"https:\/\/armchairarcade.com\/perspectives\/category\/sale\/"},"img":{"alt_text":"Pay what you want for The Humble Software Bundle: Cybersecurity!","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2018\/06\/cybersecurity_softwarebundle-facebook-post-mpa.png?fit=1200%2C630&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":179222,"url":"https:\/\/armchairarcade.com\/perspectives\/2021\/10\/22\/cybersecurity\/","url_meta":{"origin":189284,"position":4},"title":"Why and how cybersecurity must be taken seriously","author":"Jane Smith","date":"October 22, 2021","format":false,"excerpt":"This article will examine a few simple tips that you can use to improve your cybersecurity levels.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Why and how cybersecurity must be taken seriously","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2021\/10\/pexels-tima-miroshnichenko-5380792.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":190556,"url":"https:\/\/armchairarcade.com\/perspectives\/2025\/08\/22\/high-risk-payment-solutions-in-africa-and-their-challenges\/","url_meta":{"origin":189284,"position":5},"title":"Understanding High Risk Payment Solutions and Challenges in Africa&#8217;s Financial Market","author":"A.K. Patel","date":"August 22, 2025","format":false,"excerpt":"Explore the challenges and opportunities in high-risk payment systems across Africa. Understand the impact on businesses and consumers in this evolving financial landscape.","rel":"","context":"In &quot;Editorial&quot;","block_context":{"text":"Editorial","link":"https:\/\/armchairarcade.com\/perspectives\/category\/editorial\/"},"img":{"alt_text":"Financial concept with african map - Generated with AI","src":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Gemini_Generated_Image_ef1alxef1alxef1a.png?fit=737%2C737&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Gemini_Generated_Image_ef1alxef1alxef1a.png?fit=737%2C737&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Gemini_Generated_Image_ef1alxef1alxef1a.png?fit=737%2C737&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/armchairarcade.com\/perspectives\/wp-content\/uploads\/2025\/08\/Gemini_Generated_Image_ef1alxef1alxef1a.png?fit=737%2C737&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/p5dH5R-NeY","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/189284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/users\/18661"}],"replies":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/comments?post=189284"}],"version-history":[{"count":0,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/posts\/189284\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media\/189285"}],"wp:attachment":[{"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/media?parent=189284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/categories?post=189284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/armchairarcade.com\/perspectives\/wp-json\/wp\/v2\/tags?post=189284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}