{"id":53,"date":"2023-08-01T20:02:27","date_gmt":"2023-08-01T18:02:27","guid":{"rendered":"http:\/\/cybersecuritat.eu\/?p=53"},"modified":"2023-08-01T20:02:27","modified_gmt":"2023-08-01T18:02:27","slug":"la-gouvernance","status":"publish","type":"post","link":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/","title":{"rendered":"La gouvernance"},"content":{"rendered":"\n<p>La gouvernance ? Kezako ?<\/p>\n\n\n\n<p>La gouvernance est la branche de la cybers\u00e9curit\u00e9 qui est port\u00e9e au plus niveau dans l\u2019entreprise (ou autre). En effet, elle est port\u00e9e par le Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RSSI en fran\u00e7ais, CISO en anglais).<\/p>\n\n\n\n<p>Durant l\u2019article, je parlerai d\u2019entreprise. Bien entendu, il s\u2019agit d\u2019un raccourci car il faut plut\u00f4t lire personne moral, que \u00e7a soit une entreprise, une association, une fondation, une collectivit\u00e9, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le RSSI<\/h2>\n\n\n\n<p>Ce dernier peut \u00eatre rattach\u00e9 \u00e0 la Direction des Syst\u00e8mes d\u2019Information (DSI), \u00e0 la Direction Administrative et Financi\u00e8re (DAF) ou directement au comit\u00e9 ex\u00e9cutif. Tr\u00e8s souvent, l\u2019organigramme et donc le rattachement du RSSI permet d\u2019avoir une id\u00e9e de la maturit\u00e9 cyber de l\u2019entreprise.<\/p>\n\n\n\n<p>Si une entreprise ne poss\u00e8de pas de RSSI, cela signifie qu\u2019elle ne s\u2019est pas encore int\u00e9ress\u00e9e \u00e0 la cyber. T\u00f4t ou tard, elle devrait changer son point de vue sur le cyber, souvent par le retour d\u2019exp\u00e9rience d\u2019une attaque.<\/p>\n\n\n\n<p>Lorsqu\u2019elle d\u00e9bute en cyber, et qu\u2019elle embauche un RSSI, elle consid\u00e8re que la cyber s\u00e9curit\u00e9 n\u2019est que de l\u2019informatique et rattache ce dernier \u00e0 la DSI. Ce rattachement qui peut paraitre logique et tr\u00e8s souvent g\u00eanant. En effet, le travail d\u2019un RSSI est d\u2019augmenter le niveau de s\u00e9curit\u00e9 afin d\u2019atteindre un niveau acceptable au vu des activit\u00e9s de l\u2019entreprise. Pour ce faire, il va souvent analyser le travail r\u00e9alis\u00e9e par la DSI et risque ainsi de remettre en cause le travail des \u00e9quipes de son chef direct.<\/p>\n\n\n\n<p>Une fois ce blocage remarqu\u00e9 et l\u2019organisation modifi\u00e9e, si besoin, le RSSI peut se retrouver rattach\u00e9 \u00e0 la DAF ou au comit\u00e9 ex\u00e9cutif. S\u2019il est rattach\u00e9 \u00e0 la DAF, la encore \u00e7a peut signifier que la cyber est vue d\u2019un point de vue uniquement financier. Cependant, le budget du RSSI et de son \u00e9quipe sera d\u00e9corr\u00e9l\u00e9 de celui de la DSI, ce qui sera d\u00e9j\u00e0 une grosse avanc\u00e9e.<\/p>\n\n\n\n<p>Si le RSSI d\u00e9pend directement du comit\u00e9 ex\u00e9cutif, l\u2019entreprise a compris que la cyber est une branche \u00e0 part dans la vie et la survie de son activit\u00e9 et qu\u2019\u00e0 ce titre, le RSSI remontra directement ses indicateurs s\u00e9curit\u00e9 aux personnes ayant le pouvoir d\u00e9cisionnel. De plus, le RSSI aura son budget d\u00e9di\u00e9 (pas forc\u00e9ment \u00e9norme).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Le travail du RSSI passe, entre autres, par la gouvernance<\/h2>\n\n\n\n<p>La norme ISO\/IEC&nbsp;38500 concerne la gouvernance des processus de gestion et les d\u00e9cisions relatives aux services d\u2019information et de communication d\u2019une organisation.<br>Il d\u00e9finit six principes<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00c9tablir les responsabilit\u00e9s<\/li>\n\n\n\n<li>Planifier pour soutenir au mieux l\u2019organisation<\/li>\n\n\n\n<li>Faire des acquisitions pour des raisons valables<\/li>\n\n\n\n<li>Assurer les niveaux de performance n\u00e9cessaires<\/li>\n\n\n\n<li>Assurer la conformit\u00e9 aux r\u00e8gles<\/li>\n\n\n\n<li>Assurer le respect des facteurs humains<\/li>\n<\/ul>\n\n\n\n<p>(source : <a href=\"https:\/\/www.itgovernance.eu\/fr-fr\/iso-38500-fr\">https:\/\/www.itgovernance.eu\/fr-fr\/iso-38500-fr<\/a> )<\/p>\n\n\n\n<p>Pour cela, le RSSI peut s\u2019appuyer sur des standards en la mati\u00e8re. Le plus connu est la famille d\u2019ISO 2700X, avec la 27001 version 2013 (la nouvelle version 2022 commence \u00e0 \u00eatre int\u00e9gr\u00e9e dans les entreprises).<br>Il existe d\u2019autres standards est suivant o\u00f9 nous nous situons dans le monde, ils auront une importance plus ou moins importante.<\/p>\n\n\n\n<p>Gr\u00e2ce \u00e0 ces standards, ou des cr\u00e9ations internes \u00e0 l\u2019entreprise, le RSSI va pouvoir d\u00e9finir une Politique de S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (PSSI), v\u00e9ritable pierre angulaire de la cyber s\u00e9curit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">La PSSI<\/h3>\n\n\n\n<p>La PSSI est le document le plus important d\u2019un point de vue de la cyber s\u00e9curit\u00e9 d\u2019une entreprise. Il sera ratifi\u00e9 par la Direction, ce qui permettra d\u2019appuyer son important et son caract\u00e8re obligatoire.<\/p>\n\n\n\n<p>Elle comportera des \u00e9l\u00e9ments diff\u00e9rents suivant les domaines d\u2019activit\u00e9, la maturit\u00e9 de l\u2019entreprise, etc, mais tr\u00e8s souvent elle comporte le sch\u00e9ma organisationnel de la cyber s\u00e9curit\u00e9, le d\u00e9cisionnel en cas d\u2019incident cyber, ou en fait r\u00e9f\u00e9rence, la strat\u00e9gie de classification de l\u2019information : personnelle, interne, confidentielle, etc.<br>Elle peut \u00e9galement traiter de l\u2019importance des sensibilisations et formations sur le sujet, la politique de mots de passe pour les utilisateurs, mais aussi pour les administrateurs, la mise en place d\u2019un Multi Facteur d\u2019Authentification (sera le sujet d\u2019un autre article), etc.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Les indicateurs de s\u00e9curit\u00e9<\/h3>\n\n\n\n<p>Maintenant que notre entreprise poss\u00e8de une PSSI avec des ambitions de s\u00e9curit\u00e9, il faut pouvoir suivre les \u00e9carts entre l\u2019attendu et le r\u00e9el. Pour cela, le RSSI utilise un autre pilier de la gouvernance : les indicateurs de s\u00e9curit\u00e9 (KPI).<\/p>\n\n\n\n<p>Ces indicateurs peuvent vari\u00e9s et suivrent le d\u00e9ploiement d\u2019un outil de s\u00e9curit\u00e9 sur les serveurs, la version des syst\u00e8mes d\u2019exploitations et leurs patchs de s\u00e9curit\u00e9 (les fameux KB sous windows), le renouvellement des mots de passe suite \u00e0 une modification de la politique d\u00e9di\u00e9e, le d\u00e9ploiement du MFA, le renouvellement des postes plus s\u00e9curis\u00e9s, le nombre de tentatives d\u2019intrusion, etc.<\/p>\n\n\n\n<p>Le RSSI a pour objectif de formaliser ces indicateurs et d\u2019en faire la synth\u00e8se \u00e0 la Direction. Ces indicateurs peuvent, indirectement, aider le RSSI a obtenir de nouveaux budgets pour continuer l\u2019am\u00e9lioration du niveau de s\u00e9curit\u00e9 de l\u2019entreprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La gouvernance ? Kezako ? La gouvernance est la branche de la cybers\u00e9curit\u00e9 qui est port\u00e9e au plus niveau dans l\u2019entreprise (ou autre). En effet, elle est port\u00e9e par le Responsable de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (RSSI en fran\u00e7ais, CISO en anglais). Durant l\u2019article, je parlerai d\u2019entreprise. Bien entendu, il s\u2019agit d\u2019un raccourci car [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[54],"tags":[58,60,56],"class_list":["post-53","post","type-post","status-publish","format-standard","hentry","category-gouvernance","tag-gouvernance","tag-pssi","tag-rssi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La gouvernance - Cybersecuritat<\/title>\n<meta name=\"description\" content=\"Article pr\u00e9sentant le r\u00f4le du RSSI, l&#039;importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La gouvernance - Cybersecuritat\" \/>\n<meta property=\"og:description\" content=\"Article pr\u00e9sentant le r\u00f4le du RSSI, l&#039;importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecuritat\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-01T18:02:27+00:00\" \/>\n<meta name=\"author\" content=\"stan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stan\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\"},\"author\":{\"name\":\"stan\",\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"headline\":\"La gouvernance\",\"datePublished\":\"2023-08-01T18:02:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\"},\"wordCount\":918,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"keywords\":[\"gouvernance\",\"PSSI\",\"RSSI\"],\"articleSection\":[\"gouvernance\"],\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\",\"url\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\",\"name\":\"La gouvernance - Cybersecuritat\",\"isPartOf\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#website\"},\"datePublished\":\"2023-08-01T18:02:27+00:00\",\"description\":\"Article pr\u00e9sentant le r\u00f4le du RSSI, l'importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.\",\"breadcrumb\":{\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#breadcrumb\"},\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/cybersecuritat.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La gouvernance\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/cybersecuritat.eu\/#website\",\"url\":\"http:\/\/cybersecuritat.eu\/\",\"name\":\"Cybersecuritat\",\"description\":\"Lo prum\u00e8r site de cybersecuritat en occitan\",\"publisher\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/cybersecuritat.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"oc\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\",\"name\":\"stan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"oc\",\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"contentUrl\":\"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"width\":512,\"height\":323,\"caption\":\"stan\"},\"logo\":{\"@id\":\"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/cybersecuritat.eu\"],\"url\":\"http:\/\/cybersecuritat.eu\/index.php\/author\/stan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La gouvernance - Cybersecuritat","description":"Article pr\u00e9sentant le r\u00f4le du RSSI, l'importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/","og_locale":"en_US","og_type":"article","og_title":"La gouvernance - Cybersecuritat","og_description":"Article pr\u00e9sentant le r\u00f4le du RSSI, l'importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.","og_url":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/","og_site_name":"Cybersecuritat","article_published_time":"2023-08-01T18:02:27+00:00","author":"stan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"stan"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#article","isPartOf":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/"},"author":{"name":"stan","@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"headline":"La gouvernance","datePublished":"2023-08-01T18:02:27+00:00","mainEntityOfPage":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/"},"wordCount":918,"commentCount":0,"publisher":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"keywords":["gouvernance","PSSI","RSSI"],"articleSection":["gouvernance"],"inLanguage":"oc","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/","url":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/","name":"La gouvernance - Cybersecuritat","isPartOf":{"@id":"http:\/\/cybersecuritat.eu\/#website"},"datePublished":"2023-08-01T18:02:27+00:00","description":"Article pr\u00e9sentant le r\u00f4le du RSSI, l'importance de la gouvernance, avec la PSSI et les indicateurs de s\u00e9curit\u00e9.","breadcrumb":{"@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#breadcrumb"},"inLanguage":"oc","potentialAction":[{"@type":"ReadAction","target":["http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/cybersecuritat.eu\/index.php\/fr\/2023\/08\/01\/la-gouvernance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/cybersecuritat.eu\/"},{"@type":"ListItem","position":2,"name":"La gouvernance"}]},{"@type":"WebSite","@id":"http:\/\/cybersecuritat.eu\/#website","url":"http:\/\/cybersecuritat.eu\/","name":"Cybersecuritat","description":"Lo prum\u00e8r site de cybersecuritat en occitan","publisher":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/cybersecuritat.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"oc"},{"@type":["Person","Organization"],"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf","name":"stan","image":{"@type":"ImageObject","inLanguage":"oc","@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/","url":"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","contentUrl":"http:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","width":512,"height":323,"caption":"stan"},"logo":{"@id":"http:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/cybersecuritat.eu"],"url":"http:\/\/cybersecuritat.eu\/index.php\/author\/stan\/"}]}},"_links":{"self":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":1,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"predecessor-version":[{"id":54,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/53\/revisions\/54"}],"wp:attachment":[{"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/tags?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}