{"id":19144,"date":"2018-03-06T11:54:59","date_gmt":"2018-03-06T11:54:59","guid":{"rendered":"https:\/\/saga.rs\/cloud-security-who-is-responsible\/"},"modified":"2025-09-25T11:26:39","modified_gmt":"2025-09-25T11:26:39","slug":"cloud-security-who-is-responsible","status":"publish","type":"post","link":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/","title":{"rendered":"Cloud security \u2013 who is responsible?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_empty_space height=&#8221;10px&#8221;][vc_single_image image=&#8221;8484&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css=&#8221;&#8221;][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><strong>No matter which type of cloud services you choose, you are the ones who are the owners of the data and therefore responsible for the control of access and monitoring them. Further, in IaaS and PaaS model, you are responsible for application layer in the sense of access control, hardening, configurations, encryption, etc.<\/strong><\/p>\n<p>Safety is a primary concern for most organizations migrating to\u00a0<em>cloud\u00a0<\/em>services, but who is in fact responsible to ensure that these solutions are meeting security requirements?<\/p>\n<p>It is one of many questions, but very important, because security in the\u00a0<em>cloud\u00a0<\/em>is still a mystery to many companies.<\/p>\n<p>Researches show that most companies are migrating to\u00a0<em>cloud<\/em>\u00a0to reduce costs, and negligible percentage of them believe that they will enhance security. After a certain period of time and the use of\u00a0<em>cloud<\/em>\u00a0services, many of these companies have realized that\u00a0<em>cloud\u00a0<\/em>providers offer better security then their internal departments for IT security.<\/p>\n<p>A lot has been said about the security risks of data migration or systems into\u00a0<em>cloud<\/em>platforms so I will not dwell in this blog on that subject. The list of tested and certified\u00a0<em>cloud<\/em>\u00a0providers has became necessary, however, it seems that many organizations forget their own security practices and responsibilities when migrating to\u00a0<em>cloud<\/em>\u00a0solutions.<\/p>\n<p>We have here a key question, who is responsible for data security in the\u00a0<em>cloud<\/em>?<\/p>\n<p>The answer that arises here, as approach of the world\u2019s leading\u00a0<em>cloud<\/em>\u00a0providers to this challenge, is that responsibility is shared between them and the users of their services (<em>Shared Responsibility<\/em>). The division of responsibilities depends on the type of\u00a0<em>cloud<\/em>\u00a0service you choose: whether it is\u00a0<em>Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) or Software-as-a-Service (SaaS)?<\/em>If you, for example,choose IaaS,\u00a0<em>cloud<\/em>\u00a0service provider is responsible for the physical protection, location of Data Center and basic infrastructure security with the exception of the operating system. As you move from IaaS model to SaaS or PaaS, the accountability of the provider will be greater, and your responsibility lower.<\/p>\n<p>No matter which type of\u00a0<em>cloud<\/em>\u00a0service you choose,\u00a0<strong>you are always the ones who are the owners of data\u00a0<\/strong>and therefore are responsible for access control and its monitoring. Further, in IaaS and PaaS model, you are responsible for the application layer in the sense of access control,\u00a0<em>hardening<\/em>, configurations, encryption, etc.<\/p>\n<p>It is disturbing that many IT professionals from companies that use\u00a0<em>cloud<\/em>\u00a0services still consider that they are not responsible for the security of their data, which is in complete contradiction with the rules prescribed by Providers, and therefore are exposing their organizations to unnecessary risk.<\/p>\n<p>When using\u00a0<em>cloud\u00a0<\/em>services, you should apply all the same security measures you would apply to classic IT infrastructure. Given that IT resources are also used in the\u00a0<em>cloud<\/em>, security objectives must be defined in relation to the people, information, applications and infrastructure.<\/p>\n<p>It is equally crucial to determine who controls the various components of\u00a0<em>cloud<\/em>infrastructure. This defines where and how to implement safety measures, with special focus on data. At the end of the day, both, providers and users need to ensure data security.<strong>\u00a0Security in the\u00a0<\/strong><em>cloud<\/em><strong>\u00a0has to be teamwork!<\/strong><\/p>\n<p>Key items which as user of\u00a0<em>cloud<\/em>\u00a0services you need to fulfil in order to improve security at the highest level are:<\/p>\n<p>\u2013\u00a0 To define your security architecture in c<em>loud<\/em><\/p>\n<p>\u2013\u00a0 To define basics of security architecture for different scenarios of using\u00a0<em>cloud<\/em>services.<\/p>\n<p>Predefined minimal basic security architecture for the main scenarios of\u00a0<em>cloud\u00a0<\/em>usage in your organization will help to address some of the key security problems from the start. It will provide a minimum level of control, taking into account aspects, such as access and identity management, integration of security alarms into existing Security operations center (SOC), secure connections between the services in\u00a0<em>cloud\u00a0<\/em>and internal networks,\u00a0<em>backup and recovery<\/em>, and so on.<\/p>\n<p>The security architecture will also help in identifying where additional security tools are needed to help protecting them against security risks in the\u00a0<em>cloud.<\/em><\/p>\n<p>\u2013 Set limits. Understand where service provider responsibilities end and where your own start. It is not enough just to understand how data between your network and cloud will\u00a0 move, but how they will move across various\u00a0<em>cloud<\/em>\u00a0services. You need to clearly determine where there are risks and who provides what \u2013 where and how.<\/p>\n<p>\u2013 Follow service provider instructions regarding security<\/p>\n<p>\u2013\u00a0 Engage IT security expert<\/p>\n<p>\u2013\u00a0 Although you do not design or construct the system yourselves, but are buying ready-made\u00a0<em>cloud<\/em>\u00a0solution, you still need a certain level of security design. Including IT security expert in designing security will help you to identify how\u00a0<em>cloud\u00a0<\/em>solution integrates with your existing (security) architecture.<\/p>\n<p>\u2013\u00a0 Discover Shadow IT<\/p>\n<p><em>Cloud<\/em>\u00a0services that fall into this category are those for which IT department had no role in the selection and implementation, and maybe does not even know that they are used.<\/p>\n<p>Some workers, teams and even entire organizational units can use a variety of\u00a0<em>cloud\u00a0<\/em>services to become more productive in their jobs, bypassing IT department\u2019s approval, leading to security risks and other problems.<\/p>\n<p>Analyzing your\u00a0<em>proxy<\/em>\u00a0logs or usage of dedicated security solutions in the\u00a0<em>cloud<\/em>\u00a0will help you to find out which\u00a0<em>cloud<\/em>\u00a0solutions are used on your network. Comparison with authorized\u00a0<em>cloud<\/em>\u00a0services within the organization should provide full insight into the current situation.<\/p>\n<p>In dealing with this issue, I cannot neglect the coming GDPR (General Data Protection Regulation) Act, which comes into force this year, which has specific requirements on this issue. The law legislate items for which\u00a0<em>cloud\u00a0<\/em>services provider is not responsible, and each organization that stores \/ handles private data \u00a0must be aware of it and \u00a0prepare accordingly to be in compliance with GDPR. With these items in the law, the thesis of shared responsibility is additionally reinforced.<\/p>\n<p>The main GDPR requirements for\u00a0<em>cloud\u00a0<\/em>services are:<\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Familiarize with the location on which<em>\u00a0cloud<\/em>\u00a0providers process or store data.<\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protect your personal data<\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Use strong authentication (multifactorial authentication)<\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data encryption.<\/p>\n<p>\u2013\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data Processing Agreement (DPA):<\/p>\n<p>Sign an agreement on data processing with service providers in the\u00a0<em>cloud<\/em>, to make sure that personal information is properly protected and to undertake that they will not move data outside the EU.<\/p>\n<p><em>Cloud<\/em>\u00a0services are something that is becoming more common in\u00a0<em>enterprise<\/em>\u00a0systems and looking from security perspective, it has been shown in practice that if your people from IT security department are doing a good job in providing current\u00a0<em>on-premise<\/em>\u00a0systems, they will be even better in securing<em>\u00a0cloud<\/em>\u00a0services, because they can fully focus on the safety of certain items thanks to the model of shared responsibility.<\/p>\n<\/div>\n<p><\/div>\n<p>[\/vc_column_text][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>No matter which type of cloud services you choose, you are the ones who are the owners of the data and therefore responsible for the control of access and monitoring them. <\/p>\n","protected":false},"author":3,"featured_media":19146,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[],"class_list":{"0":"post-19144","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud security \u2013 who is responsible? - Saga<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud security \u2013 who is responsible? - Saga\" \/>\n<meta property=\"og:description\" content=\"No matter which type of cloud services you choose, you are the ones who are the owners of the data and therefore responsible for the control of access and monitoring them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\" \/>\n<meta property=\"og:site_name\" content=\"Saga\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-06T11:54:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T11:26:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d\"},\"headline\":\"Cloud security \u2013 who is responsible?\",\"datePublished\":\"2018-03-06T11:54:59+00:00\",\"dateModified\":\"2025-09-25T11:26:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\"},\"wordCount\":1133,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\",\"url\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\",\"name\":\"Cloud security \u2013 who is responsible? - Saga\",\"isPartOf\":{\"@id\":\"https:\/\/saga.rs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg\",\"datePublished\":\"2018-03-06T11:54:59+00:00\",\"dateModified\":\"2025-09-25T11:26:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg\",\"width\":1200,\"height\":799},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saga.rs\/en\/sample-page-2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud security \u2013 who is responsible?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saga.rs\/#website\",\"url\":\"https:\/\/saga.rs\/\",\"name\":\"Saga\",\"description\":\"A Noventiq Company\",\"publisher\":{\"@id\":\"https:\/\/saga.rs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saga.rs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/saga.rs\/#organization\",\"name\":\"Saga A Noventiq Company\",\"url\":\"https:\/\/saga.rs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"contentUrl\":\"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png\",\"width\":1596,\"height\":450,\"caption\":\"Saga A Noventiq Company\"},\"image\":{\"@id\":\"https:\/\/saga.rs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS\",\"https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs\",\"https:\/\/www.instagram.com\/saga_beograd\/\",\"https:\/\/www.youtube.com\/@SagaBeograd\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saga.rs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/saga.rs\/en\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud security \u2013 who is responsible? - Saga","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/","og_locale":"en_US","og_type":"article","og_title":"Cloud security \u2013 who is responsible? - Saga","og_description":"No matter which type of cloud services you choose, you are the ones who are the owners of the data and therefore responsible for the control of access and monitoring them.","og_url":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/","og_site_name":"Saga","article_publisher":"https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","article_published_time":"2018-03-06T11:54:59+00:00","article_modified_time":"2025-09-25T11:26:39+00:00","og_image":[{"width":1200,"height":799,"url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#article","isPartOf":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/"},"author":{"name":"admin","@id":"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d"},"headline":"Cloud security \u2013 who is responsible?","datePublished":"2018-03-06T11:54:59+00:00","dateModified":"2025-09-25T11:26:39+00:00","mainEntityOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/"},"wordCount":1133,"commentCount":0,"publisher":{"@id":"https:\/\/saga.rs\/#organization"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/","url":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/","name":"Cloud security \u2013 who is responsible? - Saga","isPartOf":{"@id":"https:\/\/saga.rs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage"},"image":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage"},"thumbnailUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg","datePublished":"2018-03-06T11:54:59+00:00","dateModified":"2025-09-25T11:26:39+00:00","breadcrumb":{"@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#primaryimage","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/09\/Bezbednost-je-u-Cloud-u-ko-je-odgovoran.jpg","width":1200,"height":799},{"@type":"BreadcrumbList","@id":"https:\/\/saga.rs\/en\/blog-en\/cloud-security-who-is-responsible\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saga.rs\/en\/sample-page-2\/"},{"@type":"ListItem","position":2,"name":"Cloud security \u2013 who is responsible?"}]},{"@type":"WebSite","@id":"https:\/\/saga.rs\/#website","url":"https:\/\/saga.rs\/","name":"Saga","description":"A Noventiq Company","publisher":{"@id":"https:\/\/saga.rs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saga.rs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/saga.rs\/#organization","name":"Saga A Noventiq Company","url":"https:\/\/saga.rs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/","url":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","contentUrl":"https:\/\/saga.rs\/wp-content\/uploads\/2025\/06\/Saga-35-color-.png","width":1596,"height":450,"caption":"Saga A Noventiq Company"},"image":{"@id":"https:\/\/saga.rs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sagabgd\/?locale=sr_RS","https:\/\/www.linkedin.com\/company\/saga-bg\/?originalSubdomain=rs","https:\/\/www.instagram.com\/saga_beograd\/","https:\/\/www.youtube.com\/@SagaBeograd"]},{"@type":"Person","@id":"https:\/\/saga.rs\/#\/schema\/person\/507df87840a659428c02cace53b5101d","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saga.rs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1388227c1ea26b656181327f2d9dabd6c4a87e2600d3de1944201aef29a8ed9c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/saga.rs\/en\/author\/admin\/"}]}},"menu_order":0,"_links":{"self":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/19144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/comments?post=19144"}],"version-history":[{"count":2,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/19144\/revisions"}],"predecessor-version":[{"id":19148,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/posts\/19144\/revisions\/19148"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media\/19146"}],"wp:attachment":[{"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/media?parent=19144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/categories?post=19144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saga.rs\/en\/wp-json\/wp\/v2\/tags?post=19144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}