{"id":19524,"date":"2023-06-06T06:14:19","date_gmt":"2023-06-06T04:14:19","guid":{"rendered":"https:\/\/news.save.ch\/?p=19524"},"modified":"2023-06-05T11:21:09","modified_gmt":"2023-06-05T09:21:09","slug":"leitfaden-cloud-supply-chain-security-veroeffentlicht","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/","title":{"rendered":"Pubblicata la guida \"Cloud Supply Chain Security"},"content":{"rendered":"<figure id=\"attachment_19525\" aria-describedby=\"caption-attachment-19525\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-19525\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-680x486.jpg\" alt=\"Sicurezza della catena di approvvigionamento nel cloud\" width=\"680\" height=\"486\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-680x486.jpg 680w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-768x548.jpg 768w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-18x12.jpg 18w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-375x268.jpg 375w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S-490x350.jpg 490w, https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg 1000w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-19525\" class=\"wp-caption-text\">Depositphotos, Momius<\/figcaption><\/figure>\n<p>Nel settore IT, la supply chain \u00e8 la catena di fornitura di tutti i sottoprodotti e le consegne che compongono un servizio o un'applicazione IT. Per qualsiasi tipo di software, ma soprattutto per i servizi cloud, tale catena di fornitura \u00e8 costituita da innumerevoli fornitori e prodotti che sono direttamente o indirettamente utilizzati o contribuiscono alla creazione o all'esecuzione delle parti. Questo \u00e8 quanto scrive l'Associazione tedesca per la sicurezza informatica (TeleTrust). Nel migliore dei casi, il produttore o il fornitore delle parti controller\u00e0 le propriet\u00e0 di sicurezza dei componenti direttamente utilizzati. Tuttavia, l'utente di solito non ha la possibilit\u00e0 di determinare l'uso di un componente interessato, n\u00e9 di lavorare per l'eliminazione delle vulnerabilit\u00e0: uno stato di cose inaccettabile, secondo TeleTrust.<\/p>\n<h3><strong>Fornitura di SBOM come standard di mercato<\/strong><\/h3>\n<p>Per risolvere il problema della mancanza di trasparenza, la strada da percorrere \u00e8 quella della distinta base del software (SBOM). Un SBOM \u00e8 un elenco di tutti i componenti contenuti in un'applicazione software. \"Man mano che emergono nuove scoperte su falle e vulnerabilit\u00e0 in questi componenti, gli utenti possono determinare rapidamente se possono essere colpiti e se le applicazioni che utilizzano sono a rischio\", sottolinea TeleTrust. Si prevede che la fornitura di SBOM da parte di fornitori e operatori di software e servizi diventer\u00e0 uno standard di mercato.<\/p>\n<p>Oliver Dehning, responsabile di TeleTrust \"Cloud Security\" AG: \"Le distinte base aggiornate dei software (SBOM) sono la base per una maggiore trasparenza nella catena di fornitura del cloud e quindi per una maggiore sicurezza nell'utilizzo dei servizi cloud. Gli utenti possono contribuire in modo significativo al miglioramento della sicurezza nella loro catena di fornitura del cloud se includono la fornitura di SBOM da parte dei fornitori nel loro catalogo di requisiti. I fornitori, a loro volta, dovrebbero mettere queste informazioni a disposizione dei loro utenti, consentendo cos\u00ec una gestione attiva della sicurezza informatica anche nel cloud\".<\/p>\n<p><a href=\"https:\/\/www.teletrust.de\/fileadmin\/user_upload\/2023-TeleTrusT-Leitfaden_Cloud_Supply_Chain_Security.pdf\" target=\"_blank\" rel=\"noopener\"><em>Scarica la guida qui<\/em><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>In der IT ist die Supply Chain die Lieferkette aller Teilprodukte und Lieferungen, aus denen sich ein IT-Service oder eine Anwendung zusammensetzt. F\u00fcr jede Art von Software, aber insbesondere f\u00fcr Cloud-Dienste, besteht eine solche Lieferkette aus unz\u00e4hligen Lieferanten und Produkten, die entweder direkt oder indirekt genutzt werden oder zur Erstellung oder Ausf\u00fchrung der Teile beitragen. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":19525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[3393],"class_list":["post-19524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-leitfaden-cloud-supply-chain-security"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":null,"_at_widget":null,"_yoast_wpseo_primary_category":"3313","_yoast_wpseo_focuskw_text_input":null,"_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht - Save<\/title>\n<meta name=\"description\" content=\"Der TeleTrust-Leitfaden beschreibt neben SBOM weitere Schutzmassnahmen, die von Anwenderfirmen zur Verbesserung der Cloud Supply Chain Security getroffen werden k\u00f6nnen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht - Save\" \/>\n<meta property=\"og:description\" content=\"Der TeleTrust-Leitfaden beschreibt neben SBOM weitere Schutzmassnahmen, die von Anwenderfirmen zur Verbesserung der Cloud Supply Chain Security getroffen werden k\u00f6nnen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T04:14:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht\",\"datePublished\":\"2023-06-06T04:14:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/\"},\"wordCount\":312,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Depositphotos_520911200_S.jpg\",\"keywords\":[\"Leitfaden \u00abCloud Supply Chain Security\u00bb\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/\",\"name\":\"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Depositphotos_520911200_S.jpg\",\"datePublished\":\"2023-06-06T04:14:19+00:00\",\"description\":\"Der TeleTrust-Leitfaden beschreibt neben SBOM weitere Schutzmassnahmen, die von Anwenderfirmen zur Verbesserung der Cloud Supply Chain Security getroffen werden k\u00f6nnen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Depositphotos_520911200_S.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Depositphotos_520911200_S.jpg\",\"width\":1000,\"height\":714,\"caption\":\"Depositphotos, Momius\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-cloud-supply-chain-security-veroeffentlicht\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pubblicata la guida \"Cloud Supply Chain Security\" - Save","description":"Oltre alla SBOM, la guida TeleTrust descrive ulteriori misure di protezione che possono essere adottate dalle aziende utenti per migliorare la sicurezza della catena di fornitura del cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/","og_locale":"it_IT","og_type":"article","og_title":"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht - Save","og_description":"Der TeleTrust-Leitfaden beschreibt neben SBOM weitere Schutzmassnahmen, die von Anwenderfirmen zur Verbesserung der Cloud Supply Chain Security getroffen werden k\u00f6nnen.","og_url":"https:\/\/news.save.ch\/it\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/","og_site_name":"Save","article_published_time":"2023-06-06T04:14:19+00:00","og_image":[{"width":1000,"height":714,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Roger Str\u00e4ssle","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht","datePublished":"2023-06-06T04:14:19+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/"},"wordCount":312,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg","keywords":["Leitfaden \u00abCloud Supply Chain Security\u00bb"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/","url":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/","name":"Pubblicata la guida \"Cloud Supply Chain Security\" - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg","datePublished":"2023-06-06T04:14:19+00:00","description":"Oltre alla SBOM, la guida TeleTrust descrive ulteriori misure di protezione che possono essere adottate dalle aziende utenti per migliorare la sicurezza della catena di fornitura del cloud.","breadcrumb":{"@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2023\/06\/Depositphotos_520911200_S.jpg","width":1000,"height":714,"caption":"Depositphotos, Momius"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/leitfaden-cloud-supply-chain-security-veroeffentlicht\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Leitfaden \u00abCloud Supply Chain Security\u00bb ver\u00f6ffentlicht"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/it\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/19524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=19524"}],"version-history":[{"count":2,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/19524\/revisions"}],"predecessor-version":[{"id":19527,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/19524\/revisions\/19527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/19525"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=19524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=19524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=19524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}