{"id":7692,"date":"2019-02-27T10:31:11","date_gmt":"2019-02-27T09:31:11","guid":{"rendered":"https:\/\/news.save.ch\/?p=7692"},"modified":"2023-03-14T08:56:49","modified_gmt":"2023-03-14T07:56:49","slug":"leitfaden-zur-technischen-umsetzung-von-iot-security","status":null,"type":"post","link":"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","title":{"rendered":"Guida all'implementazione tecnica della sicurezza IoT"},"content":{"rendered":"<figure id=\"attachment_7693\" aria-describedby=\"caption-attachment-7693\" style=\"width: 680px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7693 size-medium\" src=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg\" alt=\"Sicurezza IoT\" width=\"680\" height=\"454\" srcset=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg 1000w, https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos-375x250.jpg 375w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><figcaption id=\"caption-attachment-7693\" class=\"wp-caption-text\">\u00a9 depositphotos, Jirsak<\/figcaption><\/figure>\n<p>La nuova guida \"<a href=\"https:\/\/www.iiconsortium.org\/pdf\/IoT_SMM_Practitioner_Guide_2019-02-25.pdf\">Guida pratica al Modello di Maturit\u00e0 della Sicurezza (SMM)<\/a>\", che gli esperti di Kaspersky Lab hanno sviluppato insieme ad altri membri dell'Industrial Internet Consortium (IIC), si basa sui concetti sviluppati nel 2016 come il <a href=\"https:\/\/www.iiconsortium.org\/pdf\/IIC_PUB_G4_V1.00_PB-3.pdf\">Quadro di sicurezza per l'Internet industriale IIC<\/a>\u00a0sono stati definiti. Il modello \u00e8 il primo del suo genere ad affrontare l'approccio alla maturit\u00e0 della sicurezza per l'Internet of Things, recentemente stabilito, sottolinea Kaspersky. Identifica un quadro di sicurezza per gli stakeholder IoT in base al loro livello di sicurezza e valuta la maturit\u00e0 della sicurezza dei sistemi IoT di un'azienda in base a governance, tecnologia e gestione del sistema. La guida SMM copre tutti questi aspetti ed evidenzia gli elementi rilevanti dei modelli esistenti per riconoscere il lavoro esistente su di essi ed evitare duplicazioni, afferma l'azienda di cybersicurezza.<\/p>\n<p>Le linee guida sono state redatte tenendo conto di diversi gruppi di interesse dell'IoT. Il motivo: la sicurezza delle infrastrutture che collegano i sistemi informativi con gli oggetti fisici \u00e8 essenziale in tempi di digitalizzazione per i gestori di impianti industriali, gli sviluppatori di software speciali, i proprietari delle aziende interessate e le autorit\u00e0 di vigilanza. L'IoT SMM prende in considerazione<\/p>\n<p>pertanto, a differenza dei consueti standard e requisiti normativi, gli interessi e i requisiti di sicurezza di tutte le organizzazioni e gli individui coinvolti e che gestiscono operazioni IoT.<\/p>\n<p><strong>La guida contiene tre casi di studio<\/strong><\/p>\n<p>Inoltre, la guida include tre casi di studio che aiutano ad applicare il Modello di maturit\u00e0 della sicurezza. Questi includono:<\/p>\n<ul>\n<li>un sistema di riempimento intelligente e controllato dai dati<\/li>\n<li>un gateway automobilistico che supporta gli aggiornamenti OTA<\/li>\n<li>Telecamere di sicurezza utilizzate nelle aree residenziali<\/li>\n<\/ul>\n<p>\"Definire le priorit\u00e0 delle misure di sicurezza, stabilire gli obiettivi e sviluppare una strategia per rendere un sistema 'sufficientemente sicuro' influisce sulla pianificazione economica a lungo termine delle organizzazioni\", afferma Ekaterina Rudina di Kaspersky. \"Un approccio appropriato e tempestivo a questo problema prevede l'utilizzo di un cosiddetto 'nudge', ovvero la creazione di un'architettura selezionata che supporti un processo decisionale efficiente nel dominio IoT. L'IoT SMM fornisce un quadro per tale architettura di scelta. Consente agli stakeholder dell'IoT di fare il primo passo - e poi il secondo, il terzo e cos\u00ec via - verso un sistema sicuro, che si tratti di un grande impianto di produzione industriale o del produttore di un braccialetto per il fitness\".<\/p>\n<p><em>La SMM Practitioner's Guide \u00e8 un documento che accompagna la ,<a href=\"https:\/\/www.iiconsortium.org\/pdf\/SMM_Description_and_Intended_Use_FINAL_Updated_V1.1.pdf\">IoT SMM: descrizione e uso previsto Libro Bianco<\/a>', pubblicato nel 2018.\u00a0<\/em><\/p>\n<p><em>Fonte: Kaspersky Lab<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":7693,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[3313],"tags":[461,63,100],"class_list":["post-7692","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digitalisierung","tag-iot","tag-it-security","tag-leitfaden"],"acf":[],"hkrextid":null,"publication":null,"issue":null,"workflow":null,"startPage":null,"spitzmarke":null,"_posts_by_tag_page_fields":{"widget_title":"","widget_tags":""},"_at_widget":"1","_yoast_wpseo_primary_category":"","_yoast_wpseo_focuskw_text_input":"IoT-Security","_yoast_wpseo_opengraph-image":null,"_yoast_wpseo_opengraph-description":null,"_yoast_wpseo_opengraph-title":null,"enclosure":null,"_yoast_wpseo_twitter-title":null,"_yoast_wpseo_twitter-description":null,"_yoast_wpseo_twitter-image":null,"_wp_old_slug":null,"_yoast_wpseo_title":null,"_yoast_wpseo_canonical":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leitfaden zur technischen Umsetzung von IoT-Security - Save<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leitfaden zur technischen Umsetzung von IoT-Security - Save\" \/>\n<meta property=\"og:description\" content=\"Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Save\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-27T09:31:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-14T07:56:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\"},\"headline\":\"Leitfaden zur technischen Umsetzung von IoT-Security\",\"datePublished\":\"2019-02-27T09:31:11+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"keywords\":[\"IoT\",\"IT-SECURITY\",\"Leitfaden\"],\"articleSection\":[\"DIGITALISIERUNG\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\",\"name\":\"Leitfaden zur technischen Umsetzung von IoT-Security - Save\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"datePublished\":\"2019-02-27T09:31:11+00:00\",\"dateModified\":\"2023-03-14T07:56:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/IoT_Depositphotos.jpg\",\"width\":1000,\"height\":667,\"caption\":\"\u00a9 depositphotos, Jirsak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/leitfaden-zur-technischen-umsetzung-von-iot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Leitfaden zur technischen Umsetzung von IoT-Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"name\":\"Save\",\"description\":\"Schweizer Fachzeitschrift f\u00fcr Sicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/news.save.ch\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#organization\",\"name\":\"Sicherheitsforum\",\"url\":\"https:\\\/\\\/news.save.ch\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"contentUrl\":\"https:\\\/\\\/news.save.ch\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Logo_SF_2012.png\",\"width\":1100,\"height\":91,\"caption\":\"Sicherheitsforum\"},\"image\":{\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/news.save.ch\\\/de\\\/#\\\/schema\\\/person\\\/d5022db048e0e2b9785c50e5b24da5aa\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\\\/\\\/news.save.ch\\\/it\\\/author\\\/roger-straessle\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Guida all'implementazione tecnica della sicurezza IoT - Save","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","og_locale":"it_IT","og_type":"article","og_title":"Leitfaden zur technischen Umsetzung von IoT-Security - Save","og_description":"Der neue Leitfaden \u201eSecurity Maturity Model (SMM) Practioner\u2019s Guide\u201c, den Experten von Kaspersky Lab gemeinsam mit weiteren Mitgliedern des Industrial Internet Consortium (IIC) entwickelt haben, baut auf Konzepten auf, die im Jahr 2016 als IIC Industrial Internet Security Framework\u00a0definiert wurden. Das Modell besch\u00e4ftige sich als erstes seiner Art mit dem neu etablierten Security-Maturity-Ansatz (Security-Reifegrad) f\u00fcr [&hellip;]","og_url":"https:\/\/news.save.ch\/it\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","og_site_name":"Save","article_published_time":"2019-02-27T09:31:11+00:00","article_modified_time":"2023-03-14T07:56:49+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Roger Str\u00e4ssle","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#article","isPartOf":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa"},"headline":"Leitfaden zur technischen Umsetzung von IoT-Security","datePublished":"2019-02-27T09:31:11+00:00","dateModified":"2023-03-14T07:56:49+00:00","mainEntityOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","keywords":["IoT","IT-SECURITY","Leitfaden"],"articleSection":["DIGITALISIERUNG"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","url":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/","name":"Guida all'implementazione tecnica della sicurezza IoT - Save","isPartOf":{"@id":"https:\/\/news.save.ch\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"image":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","datePublished":"2019-02-27T09:31:11+00:00","dateModified":"2023-03-14T07:56:49+00:00","breadcrumb":{"@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#primaryimage","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2019\/02\/IoT_Depositphotos.jpg","width":1000,"height":667,"caption":"\u00a9 depositphotos, Jirsak"},{"@type":"BreadcrumbList","@id":"https:\/\/news.save.ch\/leitfaden-zur-technischen-umsetzung-von-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/news.save.ch\/de\/"},{"@type":"ListItem","position":2,"name":"Leitfaden zur technischen Umsetzung von IoT-Security"}]},{"@type":"WebSite","@id":"https:\/\/news.save.ch\/de\/#website","url":"https:\/\/news.save.ch\/de\/","name":"Risparmiare","description":"Rivista svizzera specializzata in sicurezza","publisher":{"@id":"https:\/\/news.save.ch\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/news.save.ch\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/news.save.ch\/de\/#organization","name":"Forum sulla sicurezza","url":"https:\/\/news.save.ch\/de\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/","url":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","contentUrl":"https:\/\/news.save.ch\/wp-content\/uploads\/2022\/06\/Logo_SF_2012.png","width":1100,"height":91,"caption":"Sicherheitsforum"},"image":{"@id":"https:\/\/news.save.ch\/de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/news.save.ch\/de\/#\/schema\/person\/d5022db048e0e2b9785c50e5b24da5aa","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/862a5569d087de48e5856e32f45d719a03804c891d6deb8d4f71a660e79e4a47?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/news.save.ch\/it\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/7692","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/comments?post=7692"}],"version-history":[{"count":1,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/7692\/revisions"}],"predecessor-version":[{"id":17408,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/posts\/7692\/revisions\/17408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media\/7693"}],"wp:attachment":[{"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/media?parent=7692"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/categories?post=7692"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.save.ch\/it\/wp-json\/wp\/v2\/tags?post=7692"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}