{"id":9153,"date":"2024-05-07T15:26:00","date_gmt":"2024-05-07T20:26:00","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9153"},"modified":"2025-04-03T12:09:25","modified_gmt":"2025-04-03T17:09:25","slug":"akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/","title":{"rendered":"Protecting DNS Infrastructure from Resource Exhaustion Attacks"},"content":{"rendered":"\n<p>The Domain Name System (DNS) functions as the phonebook of the internet. It serves to translate IP addresses into readable domain names, enabling end users to access web applications and application programming interfaces (APIs) through fast and reliable internet connections. DNS infrastructure was designed as the building block of the internet, not as a security control point, resulting in DNS servers being viewed as an easy target vulnerable to attack. Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Threats to DNS Infrastructure<\/h2>\n\n\n\n<p>In the evolving landscape of DNS infrastructure, threats pose serious risks to the speed, availability and operation to enterprises\u2019 DNS services. Among these threats are DNS floods, which overwhelm servers with a barrage of requests for resources, effectively rendering them unavailable to legitimate queries. The&nbsp;<a href=\"https:\/\/www.akamai.com\/resources\/state-of-the-internet\/attack-superhighway-a-deep-dive-on-malicious-dns-traffic\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Akamai - Shield NS53 Blog - 2024 - Resource\">2023 Akamai Attack Superhighway State of the Internet<\/a>&nbsp;report underscores the increasing concern surrounding DNS denial of service attacks across various industry sectors, a trend that is expected to continue to escalate in the future. With DNS infrastructure handling up to seven trillion DNS requests a day, multistage attacks have become the primary mode of attack for the modern threat actor. Through collaborative efforts, attackers have found increasing success by working together and combining different tools during a single attack.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Resource Exhaustion Attacks<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Akamai-Shield-NS53_Blog-Preview.jpg\" alt=\"Akamai Shield DNS 53 Blog Embedded Image 2024\" class=\"wp-image-9437\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Akamai-Shield-NS53_Blog-Preview.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/Akamai-Shield-NS53_Blog-Preview-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Resource exhaustion presents in both people and technology. Exhaustion in people is often the result of staffing challenges, lean crews managing multiple aspects of the network while simultaneously defending against attacks. If one aspect of the network falls under attack, it takes away from their ability to manage and oversee other areas. On the technological side, resource exhaustion attacks seek to overload one piece of the network\u2014a DNS server, a hardware tool, a next-generation firewall\u2014to the point where it can no longer function because it was not designed to handle a heavy amount of traffic. This style of attack can last anywhere from a few minutes to a continuous attack that lasts for days.<\/p>\n\n\n\n<p>Distributed Denial of Service (DDoS), a type of resource exhaustion attack, simulates thousands of computers attempting to access the same resource simultaneously until it can no longer function. The website under attack becomes unavailable due to the sudden onslaught of false traffic that it is unable to manage. DNS is a common target for these DDoS style attacks because the critical services of websites and applications are reliant on the process of domain names translating to IP addresses being uninterrupted. Mitigating this form of malicious traffic presents a challenge, as these servers typically only have access to the IP address of the resolver. Consequently, any attempt to limit traffic based on this address usually results in false positives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Securing DNS Infrastructure<\/h2>\n\n\n\n<p>By implementing a reverse proxy solution that protects on-prem and hybrid DNS infrastructure, organizations can defend existing DNS hardware tools from globally distributed attacks like resource exhaustion and DDoS. Organizations can ensure access to online services and applications remain available by re-routing traffic through an advanced DNS proxy server and filtering out malicious traffic during attacks in real time. An intelligent reverse proxy solution that deploys through an authoritative DNS change made in a domain controller and does not require replacing any existing tools helps organizations identify legitimate traffic from attack traffic. A solution with proactive security policies eliminates time spent on configuring individual settings or having to change them over time. Organizations that use hardware DNS receive the advantage of continued availability and enhanced security of existing investments and solutions that are critical to their network without having to make any major network adjustments. Through real-time monitoring of DNS infrastructure health and performance, organizations can increase the reliability of routing, security and availability of their existing DNS hardware solutions.<\/p>\n\n\n\n<p>With the increase in remote work in the wake of the COVID-19 pandemic, it has become harder to detect and prevent resource exhaustion attacks. DNS resolution for website and application performance is critical, organizations must invest in adequate DNS infrastructure rather than relying on two or three servers to connect with end users. Adoption of a proactive approach that can identify and mitigate vulnerabilities at each stage of the data journey is pivotal to ensuring that DNS infrastructure is secure amid the evolving threat landscape.<\/p>\n\n\n\n<p><em><strong>Learn more about how to protect your enterprise from resource exhaustion attacks with&nbsp;<a href=\"https:\/\/www.akamai.com\/products\/edge-dns#shield-ns53-module\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Akamai - Shield NS53 Blog - 2024 - Bottom CTA \">Akamai Shield NS53,<\/a>&nbsp;a bidirectional reverse proxy service.<\/em><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\"><\/head>","protected":false},"excerpt":{"rendered":"<p>The Domain Name System (DNS) functions as the phonebook of the internet. It serves to translate IP addresses into readable domain names, enabling end users to access web applications and application programming interfaces (APIs) through fast and reliable internet connections. &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9918,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[600,2,1493],"tags":[285,476],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft<\/title>\n<meta name=\"description\" content=\"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-07T20:26:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T17:09:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1215\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Protecting DNS Infrastructure from Resource Exhaustion Attacks\",\"datePublished\":\"2024-05-07T20:26:00+00:00\",\"dateModified\":\"2025-04-03T17:09:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\"},\"wordCount\":752,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg\",\"keywords\":[\"Akamai\",\"digital experience\"],\"articleSection\":[\"Customer Experience &amp; Engagement\",\"Cybersecurity\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\",\"name\":\"Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg\",\"datePublished\":\"2024-05-07T20:26:00+00:00\",\"dateModified\":\"2025-04-03T17:09:25+00:00\",\"description\":\"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg\",\"width\":1215,\"height\":882,\"caption\":\"Akamai Shield DNS 53 Blog Preview Image 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting DNS Infrastructure from Resource Exhaustion Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft","description":"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/","og_locale":"en_US","og_type":"article","og_title":"Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft","og_description":"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/","og_site_name":"| Carahsoft","article_published_time":"2024-05-07T20:26:00+00:00","article_modified_time":"2025-04-03T17:09:25+00:00","og_image":[{"width":1215,"height":882,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Protecting DNS Infrastructure from Resource Exhaustion Attacks","datePublished":"2024-05-07T20:26:00+00:00","dateModified":"2025-04-03T17:09:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/"},"wordCount":752,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg","keywords":["Akamai","digital experience"],"articleSection":["Customer Experience &amp; Engagement","Cybersecurity","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/","url":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/","name":"Protecting DNS Infrastructure from Resource Exhaustion Attacks | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg","datePublished":"2024-05-07T20:26:00+00:00","dateModified":"2025-04-03T17:09:25+00:00","description":"Protecting DNS servers is critical since a threat to an organization\u2019s servers also has the capacity to impact enterprise operations, profitability and trust with end users.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/05\/Akamai-Shield-NS53_Post-Preview-copy.jpg","width":1215,"height":882,"caption":"Akamai Shield DNS 53 Blog Preview Image 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/akamai-dns-shield-ns53-infrastructure-resource-exhaustion-attacks-blog-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Protecting DNS Infrastructure from Resource Exhaustion Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9153"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=9153"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9153\/revisions"}],"predecessor-version":[{"id":9439,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9153\/revisions\/9439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9918"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=9153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=9153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=9153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}