{"id":9903,"date":"2020-01-18T01:42:49","date_gmt":"2020-01-18T01:42:49","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9903"},"modified":"2020-01-18T01:42:49","modified_gmt":"2020-01-18T01:42:49","slug":"ics-information-security-assurance-framework-4","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ics-information-security-assurance-framework-4\/","title":{"rendered":"ICS Information Security Assurance Framework 4"},"content":{"rendered":"<h2><strong>Technical Trend of ICS Information Security<\/strong><\/h2>\n<h3><strong>1.3.1 General Introduction<\/strong><\/h3>\n<p>As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs&#8217; original security protection systems which<br \/>\nfeature border separation and protection tend to be associated and integrated with business. With the emergence of new application forms such as industrial clouds and industrial big data, ICS security products need to surpass the existing products in terms of functions and application form, so as to better adapt to new applications.<!--more--><\/p>\n<h3><strong>1.3.2 Introduction to Major ICS Information Security Products<\/strong><\/h3>\n<p>Currently, ICSs adopt the following categories of information security technologies: protection, isolation, monitoring, detection, and O&amp;M management.<\/p>\n<p><strong>Protection<\/strong><\/p>\n<ul>\n<li>Network protection: Unlike traditional IT firewalls, industrial firewalls make an in-depth analysis (from the IP layer to the application layer) of packets reaching industrial networks, using the whitelist mechanism to restrict access to resources such as IP addresses and protocol\u00a0function code, as well as restrict operation behavior.<\/li>\n<li>Host protection: A host whitelist mechanism or a trusted system for host application software is built to check whether related software or applications can run in the current system and prevent the execution of the software\/applications outside of the whitelist and launch of the related processes.<\/li>\n<\/ul>\n<p><strong>Isolation<\/strong><\/p>\n<ul>\n<li>GAP: In a 2+1 or 3+1 manner, two hosts communicate with each other through a Network Security Separated Card. Alternatively, another host is used to dispatch policies to both hosts<br \/>\nto implement limited communication between them. Currently, GAPs are extensively used in the petroleum and petrochemical and metallurgy sectors.<\/li>\n<li>Forward and reverse isolation devices: Internal and external hosts communicate with each other via a single-byte response mechanism as no TCP\/IP connections are set up between<br \/>\nthe intranet and extranet. Such devices still need to perform verification based on digital certificates, and therefore limited communication needs to be established between the intranet and extranet. Currently, this kind of devices is widely used in the electric power sector.<\/li>\n<li>Industrial isolation gateway: Currently, this kind of product adopts the 2+1 isolation method or alternatively two firewalls are directly interconnected to effectively filter and handle packets<br \/>\nusing OPC (OLE for Process Control), Modbus, and S9 protocols. This system is especially useful for fine-grained control of such operations as reading and modifying OPC&#8217;s point tables.<\/li>\n<\/ul>\n<p><strong>Monitoring<\/strong><\/p>\n<ul>\n<li>Industrial control audit: With a communication behavior baseline built through customization or automatic learning, this kind of product can identify abnormal communication behavior, alert for operations involving such behavior, and provide relevant handling suggestions.<\/li>\n<li>IDS for ICSs: Through in-depth packet parsing, such products can perform signature analysis and anomaly detection to identify attack behavior of malware that gets into or hides in ICSs, in a bid to effectively perceive and spot attack behavior.<\/li>\n<li>Industrial monitoring and alerting platform: Through management and correlative analysis of security logs, network logs, and host logs, this kind of platform identifies and reproduces<br \/>\npotential malicious behavior in industrial fields, by taking account of characteristics of industrial field operations.<\/li>\n<\/ul>\n<p><strong>Detection<\/strong><\/p>\n<ul>\n<li>Scanning for Industrial control vulnerabilities: This kind of product probes IT operating systems, databases, application software, and devices (such as industrial controllers like PLC and DCS) which are commonly seen on industrial fields, in order to identify security vulnerabilities in them.<\/li>\n<li>Discovery of industrial control vulnerabilities: This kind of product tests the protocol robustness via technical means like fuzz testing. By sending a malformed packet of a designated protocol<br \/>\nto a device under detection, such a product checks whether this device can properly handle such packet, as demonstrated by discovery of vulnerabilities in systems through a denial of service (DoS).<\/li>\n<\/ul>\n<p><strong>O&amp;M Management<\/strong><\/p>\n<ul>\n<li>Industrial jump server: implementing security audit and identity management of the O&amp;M process. Currently, if industrial software cannot be installed on the master device in industrial<br \/>\nfields, an interface for connection to software like SCADA is integrated and configured to implement communication with the master device and monitor the O&amp;M process.<\/li>\n<li>Mobile industrial O&amp;M auditing: This kind of product monitors operations of external onsite O&amp;M personnel to spot potential malicious behaviors mingled with O&amp;M operations, as well as record and block such behavior.<\/li>\n<\/ul>\n<h3><strong>1.3.3 Issues and Difficulties Facing ICS Information Security Technologies<\/strong><\/h3>\n<p>Currently, ICS information security enters a new epoch of converging information security and ICS security. ICS security products are still in the age of version 1.0 and lag far behind IT information security and IT systems in terms of adaptation, even though ICS security products are strongly associated with business application. Besides, due to inadequate integration with business and the lack\u00a0of innovative security detection ideas, ICS security products fail to perform adequate in-depth detection of attack behavior potentially existing in business, and thus cannot deliver security protection that truly works.<\/p>\n<p>On the other hand, with the popularization of new applications (including industrial clouds and industrial big data) in industrial sectors, there are bound to be changes to industrial control forms. Information security technologies, when adapted to these new forms, definitely need to be integrated with business. However, integration of ICS information security technologies does not fully unfold until a breakthrough is made in the technological direction and applications.<\/p>\n<p>&nbsp;<\/p>\n<p>To be continued.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth and depth, ICSs are facing an increasing number of security risks. ICSs&#8217; original security protection systems which feature border separation and protection tend to be associated and integrated with business. With the emergence [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[5,15],"tags":[452],"class_list":["post-9903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ddos-mitigation","category-research-reports","tag-ics-information-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ICS Information Security Assurance Framework 4 - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICS Information Security Assurance Framework 4 - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-18T01:42:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"ICS Information Security Assurance Framework 4 - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"ICS Information Security Assurance Framework 4\",\"datePublished\":\"2020-01-18T01:42:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/\"},\"wordCount\":870,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/ICS-INformation.jpg\",\"keywords\":[\"ICS Information Security\"],\"articleSection\":[\"DDoS Mitigation\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/\",\"name\":\"ICS Information Security Assurance Framework 4 - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/ICS-INformation.jpg\",\"datePublished\":\"2020-01-18T01:42:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/ICS-INformation.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/ICS-INformation.jpg\",\"width\":689,\"height\":592,\"caption\":\"Green infographic on security assurance framework.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ics-information-security-assurance-framework-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ICS Information Security Assurance Framework 4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICS Information Security Assurance Framework 4 - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"ICS Information Security Assurance Framework 4 - NSFOCUS","og_description":"Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth","og_url":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/","og_site_name":"NSFOCUS","article_published_time":"2020-01-18T01:42:49+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"ICS Information Security Assurance Framework 4 - NSFOCUS","twitter_description":"Technical Trend of ICS Information Security 1.3.1 General Introduction As the application of IT technologies in industrial fields is expanding in breadth","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"ICS Information Security Assurance Framework 4","datePublished":"2020-01-18T01:42:49+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/"},"wordCount":870,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","keywords":["ICS Information Security"],"articleSection":["DDoS Mitigation","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/","url":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/","name":"ICS Information Security Assurance Framework 4 - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","datePublished":"2020-01-18T01:42:49+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2020\/01\/ICS-INformation.jpg","width":689,"height":592,"caption":"Green infographic on security assurance framework."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ics-information-security-assurance-framework-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"ICS Information Security Assurance Framework 4"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9903"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9903\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9892"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}