{"id":82512,"date":"2026-03-07T11:20:52","date_gmt":"2026-03-07T16:20:52","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/blog\/?p=82512"},"modified":"2026-03-03T11:26:52","modified_gmt":"2026-03-03T16:26:52","slug":"zero-trust-security-bare-metal-servers","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/","title":{"rendered":"Zero Trust Security on Bare Metal Servers"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-1024x538.png\" alt=\"Zero Trust Security on Bare Metal Servers hero\" class=\"wp-image-82513\" srcset=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-1024x538.png 1024w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-300x158.png 300w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-768x403.png 768w, https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">&#8220;Never trust, always verify&#8221; is a useful principle. On bare metal servers, it&#8217;s also an implementation challenge that most hosting guides skip over. The zero trust model was developed to address the failure of perimeter-based security \u2014 the assumption that anything inside the network boundary is trustworthy. That assumption breaks down in every real infrastructure&hellip; <\/p><\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Traditional Perimeter Security Fails on Dedicated Infrastructure<\/strong><\/h2>\n\n\n\n<p>A typical dedicated server sits behind a firewall that allows traffic from specific ports. Once traffic reaches the server, internal services often communicate with each other without additional authentication. MySQL listens on 3306 and accepts connections from the local network. Redis is accessible to any process running on the server. Application code runs with broad filesystem permissions.<\/p>\n\n\n\n<p>This works fine until something inside the perimeter is compromised. A web shell uploaded through a vulnerable WordPress plugin can now reach MySQL directly. A compromised application process can read files belonging to other applications. The perimeter held; the interior didn&#8217;t.<\/p>\n\n\n\n<p>Zero trust addresses this by removing the concept of &#8220;trusted internal&#8221; entirely. Every access request \u2014 whether from an external user or an internal service \u2014 is authenticated, authorized, and logged.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Identity-Based Access Control for Services<\/strong><\/h2>\n\n\n\n<p>The foundation of zero trust at the service level is ensuring that services authenticate to each other, not just to external users.<\/p>\n\n\n\n<p><strong>Database access<\/strong>: MySQL should not accept connections from 127.0.0.1 without credentials scoped to the minimum necessary permissions. Create application-specific database users rather than using root:<\/p>\n\n\n\n<p>&#8212; Create a user for the application with only required privileges<\/p>\n\n\n\n<p>CREATE USER &#8216;appname&#8217;@&#8217;127.0.0.1&#8217; IDENTIFIED BY &#8216;strong_random_password&#8217;;<\/p>\n\n\n\n<p>GRANT SELECT, INSERT, UPDATE, DELETE ON appname_db.* TO &#8216;appname&#8217;@&#8217;127.0.0.1&#8217;;<\/p>\n\n\n\n<p>FLUSH PRIVILEGES;<\/p>\n\n\n\n<p>&#8212; Verify privileges<\/p>\n\n\n\n<p>SHOW GRANTS FOR &#8216;appname&#8217;@&#8217;127.0.0.1&#8217;;<\/p>\n\n\n\n<p>The web application connects as appname and can only access appname_db. Even if this credential is exposed, the blast radius is limited to one database.<\/p>\n\n\n\n<p><strong>Redis access<\/strong>: Redis by default accepts all connections without authentication on localhost. Enable authentication in \/etc\/redis\/redis.conf:<\/p>\n\n\n\n<p>requirepass your_strong_redis_password<\/p>\n\n\n\n<p>bind 127.0.0.1<\/p>\n\n\n\n<p>With a strong password and binding to loopback only, Redis connections require both network proximity and the correct credential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Network Segmentation with Namespaces and VLANs<\/strong><\/h2>\n\n\n\n<p>For multi-application environments on a single dedicated server, Linux network namespaces provide application-level network isolation without requiring separate hardware:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Create an isolated network namespace for an application\n\nip netns add appname_ns\n\n# Create a veth pair (virtual ethernet cable)\n\nip link add veth0 type veth peer name veth1\n\n# Move one end into the namespace\n\nip link set veth1 netns appname_ns\n\n# Configure addressing\n\nip addr add 192.168.100.1\/30 dev veth0\n\nip netns exec appname_ns ip addr add 192.168.100.2\/30 dev veth1\n\n# Bring interfaces up\n\nip link set veth0 up\n\nip netns exec appname_ns ip link set veth1 up<\/code><\/pre>\n\n\n\n<p>Processes running within the namespace can only reach the network addresses explicitly configured for them. They cannot directly access databases or services bound to the host network without passing through a controlled gateway.<\/p>\n\n\n\n<p>For simpler multi-tenant isolation, nftables rules can enforce communication policies between applications on the same server:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># Only allow MySQL connections from the application's specific process user (via UID match)\n\nnft add rule inet filter output skuid 1001 tcp dport 3306 accept\n\nnft add rule inet filter output tcp dport 3306 drop<\/code><\/pre>\n\n\n\n<p>This allows only processes running as UID 1001 (the application user) to connect to MySQL \u2014 all other processes are blocked at the kernel level.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Micro-Segmentation for Intra-Server Traffic<\/strong><\/h2>\n\n\n\n<p><strong>AppArmor<\/strong> (Ubuntu\/Debian) and <strong>SELinux<\/strong> (RHEL\/AlmaLinux\/Rocky Linux) provide mandatory access control at the kernel level, restricting what files, network resources, and system calls a process can access regardless of Unix permissions.<\/p>\n\n\n\n<p>An AppArmor profile for Nginx that restricts it to only the resources it needs:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/etc\/apparmor.d\/usr.sbin.nginx:\n\n#include &lt;tunables\/global>\n\n\/usr\/sbin\/nginx {\n\n\u00a0\u00a0#include &lt;abstractions\/base>\n\n\u00a0\u00a0#include &lt;abstractions\/nameservice>\n\n\u00a0\u00a0capability net_bind_service,\n\n\u00a0\u00a0capability setuid,\n\n\u00a0\u00a0capability setgid,\n\n\u00a0\u00a0\/var\/www\/** r,\n\n\u00a0\u00a0\/etc\/nginx\/** r,\n\n\u00a0\u00a0\/var\/log\/nginx\/** w,\n\n\u00a0\u00a0\/run\/nginx.pid rw,\n\n\u00a0\u00a0# Deny everything else\n\n\u00a0\u00a0deny \/home\/** rwx,\n\n\u00a0\u00a0deny \/root\/** rwx,\n\n\u00a0\u00a0deny \/etc\/shadow r,\n\n}<\/code><\/pre>\n\n\n\n<p>With this profile enforced, even if an attacker achieves code execution within the Nginx process, they cannot read \/etc\/shadow, access user home directories, or write outside of \/var\/log\/nginx\/. The kernel enforces these constraints regardless of what the attacker&#8217;s code attempts.<\/p>\n\n\n\n<p><a href=\"https:\/\/ubuntu.com\/server\/docs\/apparmor\">AppArmor documentation<\/a> covers profile development and enforcement modes. Start in complain mode (logging violations without blocking) to verify your profile before switching to enforce.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Zero Trust Access for Administrative Access<\/strong><\/h2>\n\n\n\n<p>Applying zero trust to SSH access means replacing static credentials with short-lived, identity-verified certificates.<\/p>\n\n\n\n<p><strong>HashiCorp Vault SSH Certificate Authority<\/strong> issues SSH certificates that expire after a configurable duration \u2014 30 minutes, 1 hour, 8 hours. An engineer authenticates to Vault with their identity credentials, receives a short-lived SSH certificate, and uses it to connect to the server. If the certificate is stolen, it expires shortly. If the engineer leaves the organization, revoking their Vault access immediately ends their ability to obtain new certificates.<\/p>\n\n\n\n<p><a href=\"https:\/\/developer.hashicorp.com\/vault\/docs\/secrets\/ssh\">Vault&#8217;s SSH secrets engine documentation<\/a> covers setup for both server-side verification and client certificate issuance.<\/p>\n\n\n\n<p>For teams not ready to deploy Vault, a simpler zero trust improvement for SSH is <strong>IP allowlisting<\/strong> combined with <strong>certificate rotation<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># In \/etc\/ssh\/sshd_config\n\n# Match only connections from corporate VPN or jump host IP\n\nMatch Address 10.0.0.0\/8\n\n\u00a0\u00a0PasswordAuthentication no\n\n\u00a0\u00a0PubkeyAuthentication yes\n\nMatch Address *\n\n\u00a0\u00a0DenyUsers *<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Logging and Continuous Verification<\/strong><\/h2>\n\n\n\n<p>Zero trust without logging is just hope. Every access decision needs an audit trail. For a dedicated server:<\/p>\n\n\n\n<p><strong>SSH access logging<\/strong>: Confirm sshd logs to \/var\/log\/auth.log (Debian) or \/var\/log\/secure (RHEL). Every login attempt, successful or failed, with source IP and username.<\/p>\n\n\n\n<p><strong>Application-level audit logging<\/strong>: Ensure your application logs authenticated user actions, not just requests. Log the identity of who performed each operation, not just that the operation occurred.<\/p>\n\n\n\n<p><strong>Centralized log shipping<\/strong>: Log data stored only on the compromised server can be deleted by an attacker. Ship logs to a remote syslog receiver or cloud logging service that the server cannot write-delete to.<\/p>\n\n\n\n<p><strong>Periodic access review<\/strong>: Monthly review of all active SSH keys in \/root\/.ssh\/authorized_keys and each user&#8217;s ~\/.ssh\/authorized_keys. Remove keys belonging to former employees, former contractors, or systems that no longer need access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Zero Trust Is a Continuous Process, Not a Deployment<\/strong><\/h2>\n\n\n\n<p>The organizations with the strongest security posture on dedicated infrastructure didn&#8217;t deploy zero trust in a weekend. They started with the highest-risk access paths \u2014 SSH, database connections \u2014 and added identity verification and logging there first. Then they moved inward, hardening service-to-service communication and process-level access controls.<\/p>\n\n\n\n<p>InMotion&#8217;s Premier Care managed service includes the foundational security configuration appropriate for a production dedicated server. Teams operating under strict compliance requirements or threat models \u2014 financial services, healthcare, regulated data \u2014 typically layer additional zero trust controls on top of that baseline.<\/p>\n\n\n\n<p><strong>Related reading<\/strong>: <strong><a href=\"https:\/\/www.inmotionhosting.com\/blog\/server-hardening-best-practices-dedicated-servers\/\">Server Hardening Best Practices<\/a><\/strong> | <strong><a href=\"https:\/\/www.inmotionhosting.com\/blog\/ddos-protection-strategies-dedicated-infrastructure\/\">DDoS Protection Strategies for Dedicated Infrastructure<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Never trust, always verify&#8221; is a useful principle. On bare metal servers, it&#8217;s also an implementation challenge that most hosting guides skip over. The zero trust model was developed to address the failure of perimeter-based security \u2014 the assumption that anything inside the network boundary is trustworthy. That assumption breaks down in every real infrastructure scenario: compromised credentials, insider threats, lateral movement after an initial breach.<br \/>Applying zero trust to a dedicated server doesn&#8217;t mean buying a product. It means rearchitecting how access decisions are made at every layer of the stack.<\/p>\n","protected":false},"author":116,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[355],"tags":[],"class_list":["post-82512","post","type-post","status-publish","format-standard","hentry","category-dedicated-server-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust Security on Bare Metal Servers | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"Implement zero trust security on bare metal dedicated servers. Network segmentation, identity-based access controls, and micro-segmentation strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust Security on Bare Metal Servers | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"Implement zero trust security on bare metal dedicated servers. Network segmentation, identity-based access controls, and micro-segmentation strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-07T16:20:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sam Page\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:site\" content=\"@inmotionhosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sam Page\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust Security on Bare Metal Servers | InMotion Hosting","description":"Implement zero trust security on bare metal dedicated servers. Network segmentation, identity-based access controls, and micro-segmentation strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust Security on Bare Metal Servers | InMotion Hosting","og_description":"Implement zero trust security on bare metal dedicated servers. Network segmentation, identity-based access controls, and micro-segmentation strategies.","og_url":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/","og_site_name":"InMotion Hosting Blog","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting","article_published_time":"2026-03-07T16:20:52+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers.png","type":"image\/png"}],"author":"Sam Page","twitter_card":"summary_large_image","twitter_creator":"@inmotionhosting","twitter_site":"@inmotionhosting","twitter_misc":{"Written by":"Sam Page","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/"},"author":{"name":"Sam Page","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/b459c4b748083c4f8431d5312e795796"},"headline":"Zero Trust Security on Bare Metal Servers","datePublished":"2026-03-07T16:20:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/"},"wordCount":897,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-1024x538.png","articleSection":["Dedicated Server Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/","url":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/","name":"Zero Trust Security on Bare Metal Servers | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers-1024x538.png","datePublished":"2026-03-07T16:20:52+00:00","description":"Implement zero trust security on bare metal dedicated servers. Network segmentation, identity-based access controls, and micro-segmentation strategies.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#primaryimage","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers.png","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2026\/03\/Zero-Trust-Security-on-Bare-Metal-Servers.png","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/blog\/zero-trust-security-bare-metal-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Dedicated Server Articles","item":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-hosting\/"},{"@type":"ListItem","position":3,"name":"Zero Trust Security on Bare Metal Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/blog\/#website","url":"https:\/\/www.inmotionhosting.com\/blog\/","name":"InMotion Hosting Blog","description":"Web Hosting Strategy, Trends and Security","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/blog\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/blog\/wp-content\/uploads\/2019\/11\/imh-logo-all-colors-big.jpg","width":1630,"height":430,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting","https:\/\/x.com\/inmotionhosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/blog\/#\/schema\/person\/b459c4b748083c4f8431d5312e795796","name":"Sam Page","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/35c230f33cd7aacf52f0f53bc02230a2ee7840b5b221af549d491ab98f65a363?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/35c230f33cd7aacf52f0f53bc02230a2ee7840b5b221af549d491ab98f65a363?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/35c230f33cd7aacf52f0f53bc02230a2ee7840b5b221af549d491ab98f65a363?s=96&r=g","caption":"Sam Page"},"url":"https:\/\/www.inmotionhosting.com\/blog\/author\/samp\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":355,"name":"Dedicated Server Articles","slug":"dedicated-server-hosting","link":"https:\/\/www.inmotionhosting.com\/blog\/dedicated-server-hosting\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/users\/116"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/comments?post=82512"}],"version-history":[{"count":1,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82512\/revisions"}],"predecessor-version":[{"id":82514,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/posts\/82512\/revisions\/82514"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/media?parent=82512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/categories?post=82512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/blog\/wp-json\/wp\/v2\/tags?post=82512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}