{"id":1368,"date":"2022-01-05T12:56:33","date_gmt":"2022-01-05T11:56:33","guid":{"rendered":"https:\/\/www.thiim.com\/?p=1368"},"modified":"2025-12-11T09:42:32","modified_gmt":"2025-12-11T08:42:32","slug":"industrial-cybersecurity-2","status":"publish","type":"post","link":"https:\/\/thiim.com\/en\/industriel-cybersikkerhed\/","title":{"rendered":"Build security boundaries"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-1382\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed-300x132.jpg\" alt=\"industrial-cybersecurity\" width=\"718\" height=\"316\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed-300x132.jpg 300w, https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed-768x338.jpg 768w, https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg 910w\" sizes=\"(max-width: 718px) 100vw, 718px\" \/><\/p>\n<p>With the increasing number of cybersecurity breaches in OT systems, it's only natural that business owners and managers are now focusing more on finding solutions that improve industrial cybersecurity and allow businesses to continue operating normally.<\/p>\n<p>That's why in this article, we'll look at how businesses can leverage their existing network infrastructure and investments to build the first line of defence in their network.<\/p>\n<p>Later in the article, we will discuss the benefits of industrial systems protecting and preventing hostile intrusions into OT systems.<\/p>\n<p>Business models are increasingly focused on improving operational efficiency. For example, SCADA networks installed along oil pipelines now collect oil output data, which is crucial for billing and pricing systems. This increasing data collection allows oil companies to more accurately predict both oil production and expected revenues.<\/p>\n<p>But these interconnections of systems don't only bring benefits. One disadvantage is that the likelihood of cybersecurity threats in OT systems increases significantly. That's why newspaper headlines and articles often describe how compromising IT systems can have a huge negative impact on OT systems. What further exacerbates the problem is that the severity of ransomware attacks is increasing.<\/p>\n<p><strong>Safety limits<\/strong><\/p>\n<p>What is the safety limit concept?<\/p>\n<p>To improve cybersecurity, it's important to understand how your industrial systems exchange data with different systems and how they interact with IT-level systems.<\/p>\n<p>When data crosses different systems, boundaries should be in place between each system to ensure that traffic is not only authenticated and authorised, but also has good \u201dcyber hygiene\u201d. And building boundaries between each system can be both costly and challenging, and can compromise the efficiency of network communication. Therefore, it is recommended to divide OT systems into different digital cells and zones and find the right balance between cost and acceptable levels of risk in building the boundaries.<img decoding=\"async\" class=\"wp-image-1372 alignnone\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/Sikkerhedsgraenser-beskytter-produktionslinjer-300x245.png\" alt=\"safety-degrees-protector-production-lines\" width=\"458\" height=\"374\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/Sikkerhedsgraenser-beskytter-produktionslinjer-300x245.png 300w, https:\/\/thiim.com\/wp-content\/uploads\/Sikkerhedsgraenser-beskytter-produktionslinjer-768x626.png 768w, https:\/\/thiim.com\/wp-content\/uploads\/Sikkerhedsgraenser-beskytter-produktionslinjer.png 780w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/><\/p>\n<p style=\"text-align: left;\">Diagram: Building security boundaries to protect production lines from affecting each other in the event of a cyber security breach.<\/p>\n<p>The cybersecurity approach recommended in IEC 62443 is widely used across industries and has proven successful in helping to build multiple layers of protection that can simultaneously fulfil operational requirements. In the image below, the critical assets and operations are considered the most important. As they fulfil vital roles in the business, it is wise to further secure them by adding multiple layers of protection. To learn more about different layers of cybersecurity, you can <a href=\"https:\/\/www.moxa.com\/en\/literature-library\/industrial-cybersecurity-101-infographic\">Download the infographic<\/a>.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-1370 alignnone\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/Cybersikkerhed-i-flere-lag-300x206.png\" alt=\"cybersecurity-in-multi-layers\" width=\"460\" height=\"316\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/Cybersikkerhed-i-flere-lag-300x206.png 300w, https:\/\/thiim.com\/wp-content\/uploads\/Cybersikkerhed-i-flere-lag.png 741w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/p>\n<p style=\"text-align: left;\">Diagram: The cybersecurity approach is based on multiple layers of security mechanisms that increase security throughout the system.<\/p>\n<p><strong>How to build security boundaries<\/strong><\/p>\n<p>Network segmentation<\/p>\n<ul>\n<li>Physical layer segmentation<\/li>\n<\/ul>\n<p>It's called air gapping when two networks are physically isolated. When the operation and security of a system needs to be independent, an air gap is a potential solution. However, as mentioned earlier, it is becoming increasingly difficult to arrange networks in this way due to business and operational requirements.<\/p>\n<ul>\n<li>Data link\/network (Layer 2\/Layer 3) segmentation<\/li>\n<\/ul>\n<p>Industrial control systems may have been built long ago. Therefore, one of the key challenges and requirements for network administrators is to utilise the existing infrastructure while ensuring that industrial control systems remain secure. One approach that is often used is to separate traffic between different network segments using a VLAN (Virtual LAN), which is one of the features of managed Ethernet switches. Some Ethernet switches have port-level access control lists (ACLs), which can improve VLAN security when data enters the switch. An alternative is to implement firewalls to protect industrial applications and data - especially when you need it to handle traffic on Layer 2 and Layer 3 networks.<\/p>\n<ul>\n<li>Layer 4-7 network segmentation<\/li>\n<\/ul>\n<p>Further segmentation can be applied through Deep Packet Inspection (DPI). DPI offers granular authentication of network traffic and helps you filter industrial protocols based on the requirements of the application. When you have multiple devices on the same network, they - theoretically - all have the ability to communicate with each other. However, there are certain scenarios where DPI technology can help engineers define which controllers should perform read\/write commands or traffic direction. For example, if controller A should only communicate with robot arm A at a certain time.<\/p>\n<p>Microsegmentation<\/p>\n<p>When additional protection of critical assets is needed, it's a good idea to micro-segment the network. Micro-segmentation is particularly useful for industrial networks as it can separate the network into smaller subnets. This approach is beneficial because the IPS's virtual patching feature can reduce the risk of known vulnerabilities. For example, some systems run on Windows XP, which Microsoft no longer security updates. See in <a href=\"https:\/\/www.youtube.com\/watch?v=PR9AwvdEVWE\">this video<\/a>, how the IPS virtual patch works.<\/p>\n<p>Secure remote access<\/p>\n<p>According to cybersecurity experts, remote access is sometimes exploited to spread malware or carry out unauthorised activity. As remote access has become more prevalent due to demands for increased operational efficiency and the need to troubleshoot quickly, it's natural that there is an increasing focus on building security boundaries between locations (field sites). Rather than using software to build the remote connections, which can easily lead to vulnerabilities in the long run, it is highly recommended to build VPN tunnels and ensure that access control mechanisms are properly maintained.<\/p>\n<p><strong>Typical scenarios<\/strong><\/p>\n<ul>\n<li>Manufacturing<\/li>\n<\/ul>\n<p>Interconnected factory networks need proper network segmentation to strengthen industrial network security. Furthermore, network redundancy is also required to ensure the availability of the industrial control system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1371 alignnone\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/Netvaerkssegmentering-af-industrielle-netvaerk-300x194.png\" alt=\"network segmentation-by-industrial-network\" width=\"468\" height=\"303\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/Netvaerkssegmentering-af-industrielle-netvaerk-300x194.png 300w, https:\/\/thiim.com\/wp-content\/uploads\/Netvaerkssegmentering-af-industrielle-netvaerk-768x498.png 768w, https:\/\/thiim.com\/wp-content\/uploads\/Netvaerkssegmentering-af-industrielle-netvaerk.png 787w\" sizes=\"(max-width: 468px) 100vw, 468px\" \/><\/p>\n<ul>\n<li>Secure substation monitoring<\/li>\n<\/ul>\n<p>A power grid covering a large area needs IEC 61850-certified VPN solutions to monitor the intelligent electronic devices (IEDs) at each remote substation.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1373 alignnone\" src=\"https:\/\/thiim.com\/wp-content\/uploads\/Sikker-substationsovervaagning-300x196.png\" alt=\"secure substation monitoring\" width=\"459\" height=\"300\" srcset=\"https:\/\/thiim.com\/wp-content\/uploads\/Sikker-substationsovervaagning-300x196.png 300w, https:\/\/thiim.com\/wp-content\/uploads\/Sikker-substationsovervaagning.png 667w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/><\/p>\n<p>As business owners can no longer simply enjoy the benefits and security of completely wireless networks, it is necessary for business owners and engineers to improve security boundaries through various methods such as; network segmentation, micro-segmentation and secure remote access.<\/p>\n<p>Each of these methods fulfil different network requirements and help improve cybersecurity, not only by providing perimeter protection but also by closing backdoors for unwanted visits.<\/p>\n<p>Moxa's new EDR-G9010 series is an all-in-one firewall\/NAT\/VPN\/switch\/router that improves cybersecurity while allowing business owners to expand existing network infrastructure with some future-proof investments. You can read more about these secure routers <a href=\"https:\/\/www.moxa.com\/en\/products\/industrial-network-infrastructure\/secure-routers\/secure-routers\/edr-g9010-series\">on the product page<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Free translation of <a href=\"https:\/\/www.moxa.com\/en\/articles\/build-security-boundary-cybersecurity\">Moxa's article<\/a> to Danish.<\/p>","protected":false},"excerpt":{"rendered":"<p>It improves industrial cybersecurity<\/p>","protected":false},"author":1,"featured_media":1382,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-1368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nyheder"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Byg sikkerhedsgr\u00e6nser - Thiim A\/S<\/title>\n<meta name=\"description\" content=\"Industriel cybersikkerhed og netv\u00e6rkssikkerhed kan opn\u00e5s ved at bygge sikkerhedsgr\u00e6nser. L\u00e6s hvordan her.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thiim.com\/en\/industrial-cybersecurity-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Byg sikkerhedsgr\u00e6nser - Thiim A\/S\" \/>\n<meta property=\"og:description\" content=\"Industriel cybersikkerhed og netv\u00e6rkssikkerhed kan opn\u00e5s ved at bygge sikkerhedsgr\u00e6nser. L\u00e6s hvordan her.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thiim.com\/en\/industrial-cybersecurity-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Thiim\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-05T11:56:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-11T08:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"910\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aveo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aveo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/\"},\"author\":{\"name\":\"Aveo\",\"@id\":\"https:\/\/thiim.com\/#\/schema\/person\/f925481ba7383528f5cbed0ce2f9f74e\"},\"headline\":\"Byg sikkerhedsgr\u00e6nser\",\"datePublished\":\"2022-01-05T11:56:33+00:00\",\"dateModified\":\"2025-12-11T08:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/\"},\"wordCount\":1096,\"publisher\":{\"@id\":\"https:\/\/thiim.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg\",\"articleSection\":[\"Nyheder\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/\",\"url\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/\",\"name\":\"Byg sikkerhedsgr\u00e6nser - Thiim A\/S\",\"isPartOf\":{\"@id\":\"https:\/\/thiim.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg\",\"datePublished\":\"2022-01-05T11:56:33+00:00\",\"dateModified\":\"2025-12-11T08:42:32+00:00\",\"description\":\"Industriel cybersikkerhed og netv\u00e6rkssikkerhed kan opn\u00e5s ved at bygge sikkerhedsgr\u00e6nser. L\u00e6s hvordan her.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/thiim.com\/industriel-cybersikkerhed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg\",\"width\":910,\"height\":400,\"caption\":\"byg-sikkerhedsgraenser-for-cybersikkerhed\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/thiim.com\/#website\",\"url\":\"https:\/\/thiim.com\/\",\"name\":\"Thiim\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/thiim.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/thiim.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/thiim.com\/#organization\",\"name\":\"Thiim\",\"url\":\"https:\/\/thiim.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"contentUrl\":\"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg\",\"width\":653.94,\"height\":121.95,\"caption\":\"Thiim\"},\"image\":{\"@id\":\"https:\/\/thiim.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/thiim.com\/#\/schema\/person\/f925481ba7383528f5cbed0ce2f9f74e\",\"name\":\"Aveo\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Build safety boundaries - Thiim A\/S","description":"Industrial cybersecurity and network security can be achieved by building security boundaries. Read how here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thiim.com\/en\/industrial-cybersecurity-2\/","og_locale":"en_GB","og_type":"article","og_title":"Byg sikkerhedsgr\u00e6nser - Thiim A\/S","og_description":"Industriel cybersikkerhed og netv\u00e6rkssikkerhed kan opn\u00e5s ved at bygge sikkerhedsgr\u00e6nser. L\u00e6s hvordan her.","og_url":"https:\/\/thiim.com\/en\/industrial-cybersecurity-2\/","og_site_name":"Thiim","article_published_time":"2022-01-05T11:56:33+00:00","article_modified_time":"2025-12-11T08:42:32+00:00","og_image":[{"width":910,"height":400,"url":"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg","type":"image\/jpeg"}],"author":"Aveo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aveo","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/#article","isPartOf":{"@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/"},"author":{"name":"Aveo","@id":"https:\/\/thiim.com\/#\/schema\/person\/f925481ba7383528f5cbed0ce2f9f74e"},"headline":"Byg sikkerhedsgr\u00e6nser","datePublished":"2022-01-05T11:56:33+00:00","dateModified":"2025-12-11T08:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/"},"wordCount":1096,"publisher":{"@id":"https:\/\/thiim.com\/#organization"},"image":{"@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage"},"thumbnailUrl":"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg","articleSection":["Nyheder"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/","url":"https:\/\/thiim.com\/industriel-cybersikkerhed\/","name":"Build safety boundaries - Thiim A\/S","isPartOf":{"@id":"https:\/\/thiim.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage"},"image":{"@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage"},"thumbnailUrl":"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg","datePublished":"2022-01-05T11:56:33+00:00","dateModified":"2025-12-11T08:42:32+00:00","description":"Industrial cybersecurity and network security can be achieved by building security boundaries. Read how here.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thiim.com\/industriel-cybersikkerhed\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thiim.com\/industriel-cybersikkerhed\/#primaryimage","url":"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/byg-sikkerhedsgraenser-for-cybersikkerhed.jpg","width":910,"height":400,"caption":"byg-sikkerhedsgraenser-for-cybersikkerhed"},{"@type":"WebSite","@id":"https:\/\/thiim.com\/#website","url":"https:\/\/thiim.com\/","name":"Thiim","description":"","publisher":{"@id":"https:\/\/thiim.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thiim.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/thiim.com\/#organization","name":"Thiim","url":"https:\/\/thiim.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/","url":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","contentUrl":"https:\/\/thiim.com\/wp-content\/uploads\/Thiim_rgb_uramme.svg","width":653.94,"height":121.95,"caption":"Thiim"},"image":{"@id":"https:\/\/thiim.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/thiim.com\/#\/schema\/person\/f925481ba7383528f5cbed0ce2f9f74e","name":"Aveo"}]}},"_links":{"self":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/posts\/1368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/comments?post=1368"}],"version-history":[{"count":1,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/posts\/1368\/revisions"}],"predecessor-version":[{"id":8430,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/posts\/1368\/revisions\/8430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/media\/1382"}],"wp:attachment":[{"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/media?parent=1368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/categories?post=1368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thiim.com\/en\/wp-json\/wp\/v2\/tags?post=1368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}