{"id":38153,"date":"2023-06-13T06:59:24","date_gmt":"2023-06-13T05:59:24","guid":{"rendered":"https:\/\/www.gt-engineering.it\/?post_type=normativa_tecnica&#038;p=38153"},"modified":"2023-07-07T09:40:08","modified_gmt":"2023-07-07T08:40:08","slug":"comment-aborder-la-securite-informatique","status":"publish","type":"normativa_tecnica","link":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/","title":{"rendered":"Comment aborder la s\u00e9curit\u00e9 informatique"},"content":{"rendered":"\n\n    \n        <section\n            data-name=\"Contenuto testuale con immagine\"\n            class=\"bow-gte-testo-media u-spacer-base\"\n            id=\"\"\n        >\n            \n<div class=\"o-text-media px-side-spacer sm:px-side-spacer-sm lg:px-side-spacer-tablet 2xl:px-side-spacer-desktop flex flex-wrap items-start md:block\">\n\n    \n        \n                    <div\n                class=\"h-auto mb-6 md:mb-4 lg:mb-8 xl:mb-9 float-left mr-6 md:mr-4 lg:mr-8 xl:mr-9  overflow-hidden shadow-content-image w-full md:w-1\/3\"\n            >\n                \r\n\r\n    \r\n        \r\n            \r\n                \r\n                    <picture\r\n                        class=\"\"\r\n                                            >\r\n                                                                                                        <source\r\n                                media=\"(max-width: 150px)\"\r\n                                width=\"150\"\r\n                                height=\"150\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger-150x150.jpg.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 300px)\"\r\n                                width=\"300\"\r\n                                height=\"150\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger-300x150.jpg.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 474px)\"\r\n                                width=\"474\"\r\n                                height=\"237\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                                <source\r\n                                media=\"(max-width: 474px)\"\r\n                                width=\"474\"\r\n                                height=\"237\"\r\n                                srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg.webp\"\r\n                                type=\"image\/webp\"\r\n                            \/>\r\n                                                                            <img\r\n                            class=\"a-image transparent border-image h-auto  w-full\"\r\n                                                        srcset=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg.webp\"\r\n                                                        title=\"t\u00e9l\u00e9charger\"\r\n                                                        type=\"image\/webp\"\r\n                        \/>\r\n                    <\/picture>\r\n\r\n                \r\n\r\n                    \r\n    \r\n            <\/div>\n        \n                    <div class=\"relative w-full\">\n                \n<div class=\"a-text font-text text-base normal mt-8 first:mt-0 space-y-4\">\n    <p>On trouvera ci-apr\u00e8s des conseils sur l&rsquo;approche progressive \u00e0 adopter pour limiter ou restreindre les menaces et les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 informatique.<br \/>\n1) L&rsquo;appareil doit-il \u00eatre connect\u00e9 ?<br \/>\n2) Doit-il \u00eatre connect\u00e9 en permanence ?<br \/>\n3) La connexion est-elle surveill\u00e9e, par exemple \u00e0 l&rsquo;aide d&rsquo;un syst\u00e8me de r\u00e9seau priv\u00e9 virtuel (VPN) ?<br \/>\n4) La connexion est-elle configurable (par exemple, acc\u00e8s r\u00e9serv\u00e9 aux personnes autoris\u00e9es) ?<br \/>\n5) La connexion peut-elle \u00eatre limit\u00e9e au mode \u00ab\u00a0lecture seule\u00a0\u00bb (sans possibilit\u00e9 de modification) ?<br \/>\nLes \u00e9tapes suivantes sont essentielles pour assurer une s\u00e9curit\u00e9 informatique efficace des machines. En fonction de l&rsquo;application, plusieurs de ces \u00e9tapes ne doivent pas \u00eatre abord\u00e9es par le fabricant de la machine et l&rsquo;int\u00e9grateur du syst\u00e8me, mais en premier lieu par l&rsquo;utilisateur de la machine.<\/p>\n<p>a) Identifier<\/p>\n<ul>\n<li>Quelles sont les menaces et les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 informatique ?<\/li>\n<li>Comprendre pourquoi une entit\u00e9 attaquerait le syst\u00e8me de commande de la machine ?<\/li>\n<li>Qu&rsquo;est-ce que l&rsquo;utilisateur de la machine poss\u00e8de de pr\u00e9cieux ?<\/li>\n<li>Quelles sont les vuln\u00e9rabilit\u00e9s de la machine (par exemple, ports ouverts\/interfaces externes) ?<\/li>\n<li>Quelles sont les ressources qui soutiennent les fonctions critiques ?<\/li>\n<\/ul>\n<p>b) Prot\u00e9ger<\/p>\n<ul>\n<li>\u00c9laborer et mettre en \u0153uvre les contre-mesures appropri\u00e9es pour prot\u00e9ger la machine. Les contre-mesures permettent de pr\u00e9venir, de limiter ou de contenir l&rsquo;impact d&rsquo;une attaque potentielle de s\u00e9curit\u00e9 informatique. Parmi les exemples de contre-mesures figurent la conception du syst\u00e8me de contr\u00f4le de la machine, l&rsquo;acc\u00e8s \u00e0 Internet, le contr\u00f4le d&rsquo;acc\u00e8s, la sensibilisation et la formation, la s\u00e9curit\u00e9 des donn\u00e9es, les processus et proc\u00e9dures de protection de l&rsquo;information, la maintenance et la technologie de protection.<\/li>\n<\/ul>\n<p>c) D\u00e9tection<\/p>\n<ul>\n<li>\u00c9laborer et mettre en \u0153uvre les mesures appropri\u00e9es pour identifier l&rsquo;occurrence d&rsquo;une attaque de s\u00e9curit\u00e9 informatique. L&rsquo;\u00e9l\u00e9ment \u00ab\u00a0d\u00e9tection\u00a0\u00bb permet de d\u00e9couvrir \u00e0 temps les attaques de s\u00e9curit\u00e9 informatique. Les exemples incluent les anomalies et les incidents de s\u00e9curit\u00e9 informatique, la surveillance continue de la s\u00e9curit\u00e9 et les processus de d\u00e9tection.<\/li>\n<\/ul>\n<p>d) R\u00e9agir<\/p>\n<ul>\n<li>\u00c9laborer et mettre en \u0153uvre les activit\u00e9s appropri\u00e9es pour prendre des mesures \u00e0 la suite d&rsquo;une attaque de s\u00e9curit\u00e9 informatique d\u00e9tect\u00e9e. L&rsquo;\u00e9l\u00e9ment \u00ab\u00a0r\u00e9agir\u00a0\u00bb soutient la capacit\u00e9 \u00e0 arr\u00eater et\/ou \u00e0 contenir l&rsquo;impact d&rsquo;une attaque potentielle de la s\u00e9curit\u00e9 des TI. Les exemples incluent l&rsquo;att\u00e9nuation, la planification de la r\u00e9ponse, les communications, l&rsquo;analyse et les am\u00e9liorations.<\/li>\n<\/ul>\n<p>e) R\u00e9cup\u00e9rer<\/p>\n<ul>\n<li>\u00c9laborer et mettre en \u0153uvre les activit\u00e9s appropri\u00e9es pour maintenir les plans de r\u00e9silience et r\u00e9tablir toutes les capacit\u00e9s ou tous les services qui ont \u00e9t\u00e9 alt\u00e9r\u00e9s \u00e0 la suite d&rsquo;une attaque de s\u00e9curit\u00e9 informatique. L&rsquo;\u00e9l\u00e9ment \u00ab\u00a0r\u00e9tablissement\u00a0\u00bb soutient le r\u00e9tablissement rapide des op\u00e9rations normales afin de r\u00e9duire l&rsquo;impact d&rsquo;une attaque de s\u00e9curit\u00e9 informatique. Les exemples incluent la planification de la reprise, les am\u00e9liorations et les communications.<\/li>\n<\/ul>\n<\/div>            <\/div>\n        \n        \n                <div class=\"clear-both\"><\/div>\n        \n\n    <\/div>\n        <\/section>\n\n    \n","protected":false},"excerpt":{"rendered":"<p>On trouvera ci-apr\u00e8s des conseils sur l&rsquo;approche progressive \u00e0 adopter pour limiter ou restreindre les menaces et les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 informatique.<\/p>\n","protected":false},"author":182,"featured_media":38148,"parent":38144,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"normative-tecniche":[164],"class_list":["post-38153","normativa_tecnica","type-normativa_tecnica","status-publish","has-post-thumbnail","hentry","tipologia_normativa-normes-en-iso"],"acf":{"sottotitolo":"","allegati":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering\" \/>\n<meta property=\"og:description\" content=\"On trouvera ci-apr\u00e8s des conseils sur l&#039;approche progressive \u00e0 adopter pour limiter ou restreindre les menaces et les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 informatique.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/\" \/>\n<meta property=\"og:site_name\" content=\"Gt-Engineering\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-07T08:40:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"474\" \/>\n\t<meta property=\"og:image:height\" content=\"237\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/\",\"name\":\"Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering\",\"isPartOf\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg\",\"datePublished\":\"2023-06-13T05:59:24+00:00\",\"dateModified\":\"2023-07-07T08:40:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage\",\"url\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg\",\"contentUrl\":\"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg\",\"width\":474,\"height\":237},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Normes techniques\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Normes ISO\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"ISO TR 22100-4 : 2018 &#8211; Guide des aspects li\u00e9s \u00e0 la cybers\u00e9curit\u00e9\",\"item\":\"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Comment aborder la s\u00e9curit\u00e9 informatique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gt-engineering.it\/fr\/#website\",\"url\":\"https:\/\/www.gt-engineering.it\/fr\/\",\"name\":\"Gt-Engineering\",\"description\":\"bizonweb\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering","og_description":"On trouvera ci-apr\u00e8s des conseils sur l'approche progressive \u00e0 adopter pour limiter ou restreindre les menaces et les vuln\u00e9rabilit\u00e9s en mati\u00e8re de s\u00e9curit\u00e9 informatique.","og_url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/","og_site_name":"Gt-Engineering","article_modified_time":"2023-07-07T08:40:08+00:00","og_image":[{"width":474,"height":237,"url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/","url":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/","name":"Comment aborder la s\u00e9curit\u00e9 informatique - Gt-Engineering","isPartOf":{"@id":"https:\/\/www.gt-engineering.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage"},"image":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg","datePublished":"2023-06-13T05:59:24+00:00","dateModified":"2023-07-07T08:40:08+00:00","breadcrumb":{"@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#primaryimage","url":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg","contentUrl":"https:\/\/www.gt-engineering.it\/wp-content\/uploads\/2023\/06\/telecharger.jpg","width":474,"height":237},{"@type":"BreadcrumbList","@id":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/comment-aborder-la-securite-informatique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.gt-engineering.it\/fr\/"},{"@type":"ListItem","position":2,"name":"Normes techniques","item":"https:\/\/www.gt-engineering.it\/fr\/normative-tecniche\/"},{"@type":"ListItem","position":3,"name":"Normes ISO","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/"},{"@type":"ListItem","position":4,"name":"ISO TR 22100-4 : 2018 &#8211; Guide des aspects li\u00e9s \u00e0 la cybers\u00e9curit\u00e9","item":"https:\/\/www.gt-engineering.it\/fr\/reglements-techniques\/normes-en-iso\/iso-tr-22100-4-2018-guide-des-aspects-lies-a-la-cybersecurite\/"},{"@type":"ListItem","position":5,"name":"Comment aborder la s\u00e9curit\u00e9 informatique"}]},{"@type":"WebSite","@id":"https:\/\/www.gt-engineering.it\/fr\/#website","url":"https:\/\/www.gt-engineering.it\/fr\/","name":"Gt-Engineering","description":"bizonweb","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gt-engineering.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/38153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica"}],"about":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/types\/normativa_tecnica"}],"author":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/users\/182"}],"version-history":[{"count":2,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/38153\/revisions"}],"predecessor-version":[{"id":38155,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/38153\/revisions\/38155"}],"up":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normativa_tecnica\/38144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media\/38148"}],"wp:attachment":[{"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/media?parent=38153"}],"wp:term":[{"taxonomy":"tipologia_normativa","embeddable":true,"href":"https:\/\/www.gt-engineering.it\/fr\/wp-json\/wp\/v2\/normative-tecniche?post=38153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}