{"id":2323,"date":"2020-03-18T03:49:19","date_gmt":"2020-03-18T00:49:19","guid":{"rendered":"http:\/\/kusuaks7\/?p=1928"},"modified":"2023-12-27T13:13:16","modified_gmt":"2023-12-27T13:13:16","slug":"five-web-application-security-best-practices-for-2020","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/five-web-application-security-best-practices-for-2020\/","title":{"rendered":"Five Web Application Security Best Practices For 2020"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2323\" class=\"elementor elementor-2323\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-32e2c170 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"32e2c170\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5661f4ac\" data-id=\"5661f4ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10331648 elementor-widget elementor-widget-text-editor\" data-id=\"10331648\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYour website is the first fundamental component of your online presence. Whether you are using your website for business, a personal portfolio, or a hobby blog, it is likely to be the focal point of contact between your brand and audience that you are trying to reach.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd61697 elementor-widget elementor-widget-text-editor\" data-id=\"bd61697\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nA well-built website will attract and convert customers in any industry. Like all valuable things, however, a good website will naturally be a target for hackers, who can easily uproot your website with vulnerabilities.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3288005 elementor-widget elementor-widget-text-editor\" data-id=\"3288005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<b><i>In a recent report released by a <\/i><\/b><a href=\"https:\/\/www.entrepreneur.com\/article\/335195\" rel=\"noopener\"><b><i>study<\/i><\/b><\/a><b><i> has conferred that more than 150,000 small-business websites could be infected with malware at any given moment in the U.S. alone.<\/i><\/b><b><i>\u00a0<\/i><\/b>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d06d7c elementor-widget elementor-widget-heading\" data-id=\"6d06d7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><h1>Why you should opt for Web Application Security Best Practices?<\/h1><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f3e53 elementor-widget elementor-widget-text-editor\" data-id=\"c5f3e53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWith web application development, being one of the key resources in every organization\u2019s business development strategies, it becomes all the way more important for web application developers to consider building a more intelligent and more secure web application.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c829d0c elementor-widget elementor-widget-text-editor\" data-id=\"c829d0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAlso, since any new technology becomes outdated in a couple of months, a continued focus on web application security is of paramount importance.\n<p align=\"center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <b>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5831a8a elementor-widget elementor-widget-text-editor\" data-id=\"5831a8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe early years saw the usage of intranet on a large scale with critical company data being stored in local data servers, placed in house. For both users and applications, spread all across the world, and critical data being very vulnerable to hacking, web application security is more important than ever. In addition, with each innovative mind behind the development of a website, there is also an equally creative mind, discovering ways and means to enter critical data.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0b3348 elementor-widget elementor-widget-text-editor\" data-id=\"d0b3348\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<b><i>So, what do you think are the best practices that can be followed in 2020 to ensure a strong web application security? Let\u2019s find out.<\/i><\/b><b>\u00a0<\/b>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e0c01b elementor-widget elementor-widget-heading\" data-id=\"2e0c01b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3><b>1.\u00a0\u00a0\u00a0 <\/b><b>Follow Secure Coding Practices: <\/b><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdc510c elementor-widget elementor-widget-text-editor\" data-id=\"cdc510c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor every web developer, it is important to think about web application security, right from the development stage itself.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7ebdee elementor-widget elementor-widget-text-editor\" data-id=\"e7ebdee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThough the major focus lies in making the application work, web developers would do a great job, if they can simultaneously include security features like authentication and password management, accessibility control management, communication security protocols and data security, while they build the application.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2da09f elementor-widget elementor-widget-text-editor\" data-id=\"d2da09f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nIt will save a lot of time and effort while they test their first prototype at a later stage.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93af334 elementor-widget elementor-widget-heading\" data-id=\"93af334\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><b>2.\u00a0\u00a0\u00a0 <\/b><b>Strengthen the Web Servers:<\/b><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37fc98e elementor-widget elementor-widget-text-editor\" data-id=\"37fc98e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWeb servers play an important role and you must be very well aware from the fact that they have critical impact on the project.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71e737a elementor-widget elementor-widget-text-editor\" data-id=\"71e737a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIn addition to safeguarding the website itself, it would be a good practice to think about securing each and every network component itself, which is associated with the development process.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f92f3b elementor-widget elementor-widget-text-editor\" data-id=\"9f92f3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWeb servers forms a pivotal part of project development and it is always a safe practice to strengthen those servers against being vulnerable to cyber-attacks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae59de elementor-widget elementor-widget-heading\" data-id=\"1ae59de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3><b>3.\u00a0\u00a0\u00a0 <\/b><b>Use a Web Application Firewall:<\/b><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f85f79 elementor-widget elementor-widget-text-editor\" data-id=\"4f85f79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><b>\u00a0<\/b><\/p>\nThere are many types of firewalls that you can use to protect your website, some are hardware based and others solely software.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c6c7c7 elementor-widget elementor-widget-text-editor\" data-id=\"6c6c7c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nThey analyze every bit of traffic in and out of your website server and prevent most hacking attempts.\u00a0 Nowadays, the most popular choices are cloud-based.\u00a0 There\u2019ll be some initial cost bearing, but it\u2019ll be worth it in the long run.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a55305 elementor-widget elementor-widget-text-editor\" data-id=\"0a55305\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nEnterprises should choose a very secure base to develop their own website.\u00a0 If you\u2019re running an e-commerce business or any other type of business which contains sensitive information, you really should consider simulating an attack so you can find and plug vulnerabilities quickly and effectively.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ef3c01 elementor-widget elementor-widget-heading\" data-id=\"6ef3c01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><b>4.\u00a0\u00a0\u00a0 <\/b><b>Install SSL:<\/b><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a26f7ab elementor-widget elementor-widget-text-editor\" data-id=\"a26f7ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHave you ever noticed that some websites have a green icon in the corner of the URL field of your browser? That\u2019s a badge showcasing that those sites have activated encrypted SSL protocol, which protects your user\u2019s\u00a0 information as its shuttled between your website and database.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-382f322 elementor-widget elementor-widget-text-editor\" data-id=\"382f322\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe encryption makes it much more difficult for anyone to access your website and its traffic without authorization.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7dba27 elementor-widget elementor-widget-text-editor\" data-id=\"a7dba27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFixing this will not only secure your website but also give an SEO boost, since Google prefers to rank websites that are more secure. Your clients will value your extra outstanding endeavors to keep their information secure and will likely be encouraged to patronize your business rather than a competitor lacking the extra layer of security.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba35484 elementor-widget elementor-widget-heading\" data-id=\"ba35484\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><h3><b>5.\u00a0\u00a0\u00a0 <\/b><b>Back Up Regularly:<\/b><\/h3><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c17c07b elementor-widget elementor-widget-text-editor\" data-id=\"c17c07b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIf all your prior precautions fail and still you find yourself in the middle of the hacking bubble then only a recent backup can help you recover fully.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b46d1f9 elementor-widget elementor-widget-text-editor\" data-id=\"b46d1f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tYou can reset the frequency to as often as you want, even up to multiple times a day. The more frequent, the better, and it\u2019s best to use a rolling save system so you have multiple backups in case you need to isolate the exact time for a problem occurred.\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5562f6 elementor-widget elementor-widget-text-editor\" data-id=\"c5562f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nIn addition, your backups should be both on-site and off-site so that even in the worst attacks, you can still recover fully without any stretch. Aside from security break assaults, cataclysmic events or breakdowns, web-have server farms have been known to bring about changeless loss of information, so keeping duplicates of your site reinforcements close can likewise prove to be useful to keep up issue free circumstances.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1e4b92 elementor-widget elementor-widget-heading\" data-id=\"e1e4b92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><b>Conclusion:<\/b><\/h2><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef04279 elementor-widget elementor-widget-text-editor\" data-id=\"ef04279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWeb Applications are critical a resource and still the most favored resource for companies to project themselves and their products to a global audience.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40a4709 elementor-widget elementor-widget-text-editor\" data-id=\"40a4709\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nHowever at the same time it is vital that these applications are secure at all times and free from any attacks to get hacked and misused. For better clarity on web application security architecture, hire web app developer<b> <\/b>to keep things moving in the right direction.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d16b76f elementor-widget elementor-widget-text-editor\" data-id=\"d16b76f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe above suggestions if practiced can go a long way ensuring just that.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Like all valuable things, however, a good website will naturally be a target for hackers, who can easily uproot your website with vulnerabilities. Web Applications are critical a resource and still the most favored resource for companies to project themselves and their products to a global audience. However at the same time it is vital that these applications are secure at all times and free from any attacks to get hacked and misused. For better clarity on web application security architecture, hire web app developer to keep things moving in the right direction.<\/p>\n","protected":false},"author":747,"featured_media":8261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[187],"tags":[95],"ppma_author":[3596],"class_list":["post-2323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bigdata-cloud","tag-big-data-amp-technology"],"authors":[{"term_id":3596,"user_id":747,"is_guest":0,"slug":"shifa-martin","display_name":"Shifa Martin","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Martin","first_name":"Shifa","job_title":"","description":"Shifa Martin is a Technical Writer and IT analyst at <a href=\"https:\/\/bit.ly\/3aoDgD2\" target=\"_blank\" rel=\"noopener\">VALUECODERS<\/a>-&nbsp; An Indian software development company. She is profound in writing on all the latest technologies such as Blockchain, AR\/VR, Artificial Intelligence and much more.&nbsp;&nbsp;"}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/747"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2323"}],"version-history":[{"count":6,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2323\/revisions"}],"predecessor-version":[{"id":35221,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2323\/revisions\/35221"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8261"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2323"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}