{"id":113680,"date":"2018-04-10T15:51:55","date_gmt":"2018-04-10T19:51:55","guid":{"rendered":"https:\/\/www.bu.edu\/tech\/?page_id=113680"},"modified":"2022-12-19T09:52:03","modified_gmt":"2022-12-19T14:52:03","slug":"vulnerability-management-policy","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/tech\/about\/policies\/vulnerability-management-policy\/","title":{"rendered":"Vulnerability Management Policy"},"content":{"rendered":"<h1>Vulnerability Management Policy<\/h1>\n<p>Approved by Tracy Schroeder, Vice President of Information Services &amp; Technology, April 9<sup>th<\/sup>, 2018. <span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW118279134 BCX0\"><span class=\"NormalTextRun SCXW118279134 BCX0\">Last reviewed by the Vulnerability Advisory Board, December 15,2022.<\/span><\/span><span class=\"EOP SCXW118279134 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><a name=\"_Toc507588572\"><\/a>Purpose and Scope<\/h2>\n<p><span data-contrast=\"auto\">Information Security (InfoSec) is charged with helping to protect the University\u2019s electronic information. To do so, InfoSec conducts regular scans of the entire enterprise looking for misconfigured and\/or unsecured electronic devices. InfoSec then works with IS&amp;T, IT Partners, and other units, to verify and remediate discovered vulnerabilities, especially when a new threat has been discovered.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The policy applies to all IS&amp;T managed systems.\u00a0 All non-IS&amp;T IT organizations at the university are strongly encouraged to adopt this policy as well.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><a name=\"_Toc507588573\"><\/a>Baseline expectations<\/h2>\n<p><span data-contrast=\"auto\">Per University Policy <\/span><a href=\"https:\/\/www.bu.edu\/policies\/minimum-security-standards\/\"><span data-contrast=\"none\">Minimum Security Standards<\/span><\/a> <span data-contrast=\"auto\">systems are expected to be running currently supported operating systems, patched, and maintained regularly.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In compliance with that policy, individuals responsible for systems connected to the University network are expected to allocate or obtain resources to remediate issues identified by the vulnerability scans that are not otherwise being addressed by regular patching.\u00a0<\/span><\/p>\n<h2><a name=\"_Toc507588574\"><\/a>Program Management<\/h2>\n<p><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW54318385 BCX0\"><span class=\"NormalTextRun SCXW54318385 BCX0\">Vulnerability <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">Management is a <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">Service Component <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">of <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">the <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">Server Security <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">Services <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">Client Service<\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">.\u00a0 The Director <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">of Information Security is the S<\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">ervice <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">O<\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">wner <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">and <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">is <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">responsible for the oversight of this <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">program.<\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">\u00a0 <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">The Director <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">shall <\/span><span class=\"NormalTextRun SCXW54318385 BCX0\">appoint a Service Component Manager, who also serves as the Vulnerability Manager under this policy.<\/span><\/span><\/p>\n<h3><a name=\"_Toc507588575\"><\/a>Technology<\/h3>\n<p><span class=\"NormalTextRun SCXW185110630 BCX0\">Vulnerability management tools evaluate patch levels<\/span><span class=\"NormalTextRun SCXW185110630 BCX0\"> and apply patches<\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">, <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">scan for and fix <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">configuration weaknesses, and identify software vulnerabilities on electronic devices and the software applications running on them. <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">Common vulnerability management tools consist of patch management tools, vulnerability scanners, and reporting and validation tools.<\/span><span class=\"NormalTextRun SCXW185110630 BCX0\"> Vulnerability scanning tools <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">work by performing <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">authenticated and unauthenticated <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">checks.\u00a0 <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">Authenticated <\/span><span class=\"NormalTextRun SCXW185110630 BCX0\">checks are required as they are significantly more accurate.\u00a0<\/span><\/p>\n<h4>Authentication Requirements for Scanning<\/h4>\n<p><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW82182710 BCX0\"><span class=\"NormalTextRun SCXW82182710 BCX0\">Scanning <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">technologies work best by performing checks<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\"> directly on the systems.\u00a0 A <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">service account<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\"> or equivalent<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\"> with <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">appropriate <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">privileges <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">is <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">need<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">ed<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\"> <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">for<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\"> these tools to work effectively.<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">\u00a0 The <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">Vulnerability <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">Manager shall supply documentation on how to configure the needed <\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">privileges<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">.<\/span><span class=\"NormalTextRun SCXW82182710 BCX0\">\u00a0<\/span><\/span><\/p>\n<h3><a name=\"_Toc507588576\"><\/a>Process<\/h3>\n<p><span data-contrast=\"auto\">The Director of Information Security shall charter a Vulnerability Advisory Board (VAB), led by the Vulnerability Manager and consisting of members as detailed in the VAB charter.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The VAB meets regularly to review and evaluate patch and vulnerability scan data, assign priorities to vulnerabilities, and determine what remediation projects will be assigned and executed for the upcoming days\/month(s).\u00a0 Emergency VAB meetings will take place on an as needed basis to deal with urgent threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The VAB creates and assigns remediation projects, reports on progress in remediating vulnerabilities, escalates issues and risks relating to non-remediated vulnerabilities, and authorizes Systems Administration to assign patch and reboot schedules on behalf of unresponsive system owners.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><a name=\"_Toc507588577\"><\/a>Remediation Target Priorities<\/h3>\n<p><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW36171865 BCX0\"><span class=\"NormalTextRun SCXW36171865 BCX0\">The following table defines how remediation priorities will be assigned and the target resolution timeframe for vulnerabilities in each priority <\/span><span class=\"NormalTextRun SCXW36171865 BCX0\">rank<\/span><span class=\"NormalTextRun SCXW36171865 BCX0\">.\u00a0 The use of \u201cdays\u201d versus \u201cbusiness days\u201d in expressing times is significant \u2013 not all vulnerabilities can wait until the start of the next business day.<\/span><\/span><span class=\"EOP SCXW36171865 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<table width=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"127\"><strong><u>Priority Rank<\/u><\/strong><\/td>\n<td width=\"167\"><strong><u>Definition<\/u><\/strong><\/td>\n<td colspan=\"2\" width=\"178\"><strong><u>Initial Assignment<\/u><\/strong><\/td>\n<td colspan=\"2\" width=\"177\"><strong><u>Target Resolution<\/u><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>P1<\/strong><\/td>\n<td colspan=\"3\" width=\"203\">Vulnerability that is remotely exploitable with no compensating controls<\/td>\n<td colspan=\"2\" width=\"177\">1 day<\/td>\n<td width=\"161\">2 days<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>P2<\/strong><\/td>\n<td colspan=\"3\" width=\"203\">Vulnerability that is remotely exploitable with compensating controls<\/td>\n<td colspan=\"2\" width=\"177\">2 business days<\/td>\n<td width=\"161\">1 week<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>P3<\/strong><\/td>\n<td colspan=\"3\" width=\"203\">Vulnerability that is not remotely exploitable<\/td>\n<td colspan=\"2\" width=\"177\">routine patching<\/td>\n<td width=\"161\">45-60 days<\/td>\n<\/tr>\n<tr>\n<td width=\"108\"><strong>P4<\/strong><\/td>\n<td colspan=\"3\" width=\"203\">Vulnerability that cannot immediately be exploited.<\/td>\n<td colspan=\"2\" width=\"177\">routine patching<\/td>\n<td width=\"161\">90 days<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW233384785 BCX0\"><span class=\"NormalTextRun SCXW233384785 BCX0\">It may be necessary to further prioritize hosts within <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">the<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\"> priority <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">rankings above<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">. \u00a0Hosts should be prioritized according to Data Classification with hosts containing Restricted Use data remediated first. \u00a0<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">Note that some c<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">ompliance <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">requirements like PCI <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">might dictate shorter resolution time frames. <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">Once Restricted Use systems are secured the remainder should be remediated according to risk, considering the impact of a breach and the likelihood of compromise. \u00a0The use of private network <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">a<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">ddressing,<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\"> and other compensating controls <\/span><span class=\"NormalTextRun SCXW233384785 BCX0\">may<\/span><span class=\"NormalTextRun SCXW233384785 BCX0\"> be used to prioritize the list. \u00a0 The VAB may provide additional guidance on a case-by-case basis.<\/span><\/span><span class=\"EOP SCXW233384785 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><a name=\"_Toc507588578\"><\/a>Exemptions from the Scanning Process<\/h3>\n<p><span data-contrast=\"auto\">Vulnerability management scanning is an essential practice for a secure organization and the goal is to have 100% participation.\u00a0 If participation creates issues for a system, the system owner or administrator shall work directly with Information Security and\/or the VAB to review possible options.\u00a0 Those options might include disabling a specific vulnerability check that may be causing an issue.\u00a0 An approach that solves the specific problem will be preferred over a general exemption as more general exemptions may cause critical vulnerabilities to be missed.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Exemptions from vulnerability scanning for an entire system will be granted only after a Risk Acceptance Form has been signed by the head of the unit and submitted to Information<\/span> <span data-contrast=\"auto\">Security to obtain approval from the Vice President of IS&amp;T or an assigned designee. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Note: Private network and\/or departmental or host-based firewall rules are generally not considered sufficient compensating controls because these rules are often disabled and\/or removed for troubleshooting purposes which would leave these systems open to attack.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><a name=\"_Toc507588579\"><\/a>Authority<\/h2>\n<p><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\">University Policy <\/span><\/span><a class=\"Hyperlink SCXW3619696 BCX0\" href=\"https:\/\/www.bu.edu\/policies\/minimum-security-standards\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun Underlined SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">Minimum Security<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\"> <\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">Standards<\/span><\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\"> <\/span><\/span><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\">states, that &#8220;systems should be routinely scanned for vulnerabilities and discovered vulnerabilities should be remediated swiftly.&#8221; <\/span><span class=\"NormalTextRun SCXW3619696 BCX0\">I<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\">n accordance with the\u00a0<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\"> <\/span><\/span><a class=\"Hyperlink SCXW3619696 BCX0\" href=\"https:\/\/www.bu.edu\/policies\/cybersecurity-training-compliance-and-remediation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun Underlined SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">Cybersecurity Training, Compliance, a<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">n<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">d<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\"> Remediation<\/span><\/span><\/a><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\"> policy<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun Underlined SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">,<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">\u00a0<\/span><\/span><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\"> IS&amp;T will conduct routine scans and audits of computing technologies connected to the university network for vulnerabilities which may indicate a lack of compliance with the <\/span><\/span><a class=\"Hyperlink SCXW3619696 BCX0\" href=\"https:\/\/www.bu.edu\/policies\/minimum-security-standards\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun Underlined SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">Minimum Secu<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">r<\/span><span class=\"NormalTextRun SCXW3619696 BCX0\" data-ccp-charstyle=\"Hyperlink\">ity Standards<\/span><\/span><\/a><span data-contrast=\"auto\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW3619696 BCX0\"><span class=\"NormalTextRun SCXW3619696 BCX0\">.<\/span><\/span><span class=\"EOP SCXW3619696 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><a name=\"_Toc507588580\"><\/a><span>References<\/span><\/h3>\n<p><a href=\"https:\/\/www.bu.edu\/tech\/services\/security\/server\/vulnerability-management\/\"><span data-contrast=\"none\">Vulnerability Management Service Page<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bu.edu\/policies\/minimum-security-standards\/\"><span data-contrast=\"none\">Minimum Security Standards<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bu.edu\/policies\/cybersecurity-training-compliance-and-remediation\/\"><span data-contrast=\"none\">Cybersecurity Training, Compliance, and Remediation<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Management Policy Approved by Tracy Schroeder, Vice President of Information Services &amp; Technology, April 9th, 2018. Last reviewed by the Vulnerability Advisory Board, December 15,2022.\u00a0 Purpose and Scope Information Security (InfoSec) is charged with helping to protect the University\u2019s electronic information. To do so, InfoSec conducts regular scans of the entire enterprise looking for&#8230;<\/p>\n","protected":false},"author":13352,"featured_media":0,"parent":21310,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113680"}],"collection":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/users\/13352"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/comments?post=113680"}],"version-history":[{"count":10,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113680\/revisions"}],"predecessor-version":[{"id":143073,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/113680\/revisions\/143073"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/pages\/21310"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/tech\/wp-json\/wp\/v2\/media?parent=113680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}