{"id":795,"date":"2024-09-09T16:34:12","date_gmt":"2024-09-09T14:34:12","guid":{"rendered":"https:\/\/dev.ukotek.com\/?p=795"},"modified":"2024-11-13T09:40:51","modified_gmt":"2024-11-13T08:40:51","slug":"los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory","status":"publish","type":"post","link":"https:\/\/ukotek.com\/en\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","title":{"rendered":"The 5 pillars of DORA compliance in Active Directory"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"795\" class=\"elementor elementor-795\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7456c e-flex e-con-boxed e-con e-parent\" data-id=\"5a7456c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b59e2bc e-con-full e-flex e-con e-child\" data-id=\"b59e2bc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9eb8898 elementor-widget elementor-widget-text-editor\" data-id=\"9eb8898\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Digital Operational Resilience Regulation (DORA) is a new EU regulation designed to improve operational resilience in the financial sector. From 2025, all financial institutions operating in the EU and their ICT providers will have to comply with this regulation. DORA is based on five fundamental pillars, which are key to ensuring the business continuity and security of critical systems such as Active Directory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0efd235 e-con-full e-flex e-con e-child\" data-id=\"0efd235\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91f367c elementor-widget elementor-widget-image\" data-id=\"91f367c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"782\" height=\"529\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS.jpg\" class=\"attachment-large size-large wp-image-279\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS.jpg 782w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS-300x203.jpg 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS-768x520.jpg 768w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a96b78 e-flex e-con-boxed e-con e-parent\" data-id=\"5a96b78\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c33f67c elementor-widget elementor-widget-text-editor\" data-id=\"c33f67c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>The 5 pillars of DORA compliance<\/h2><h4><span style=\"color: #0db02b;\"><strong>ICT risk management:<\/strong><\/span><\/h4><p>Enterprises must have a documented framework for managing the risks to their critical assets. In the case of Active Directory, this requires full visibility of its configuration, change control and incident recovery plans.<\/p><h4><span style=\"color: #0db02b;\"><strong>2. Incident management:<\/strong><\/span><\/h4><p>DORA requires standardised classification and reporting of ICT-related incidents. Organisations must have clear procedures for identifying, classifying and responding to incidents in key systems such as Active Directory, an essential component of business continuity.<\/p><h4><span style=\"color: #0db02b;\"><strong>3. Digital operational stress tests:<\/strong><\/span><\/h4><p>Regular testing should be carried out to assess responsiveness to failures or cyber-attacks. For Active Directory, it is vital to have a test environment that allows scenarios to be simulated without putting the operational infrastructure at risk.<\/p><h4><span style=\"color: #0db02b;\"><strong>4. Third party risk management:<\/strong><\/span><\/h4><p>Organisations must ensure that external providers comply with security standards and provide support in case of incidents. DORA places particular emphasis on access that external providers or partners have through Active Directory, which introduces additional complexities in their management.<\/p><h4><span style=\"color: #0db02b;\"><strong>5. Exchange of information:<\/strong><\/span><\/h4><p>The secure sharing of cyber threat information is crucial. DORA encourages financial institutions to collaborate and share incident and threat information to improve the resilience of the industry as a whole. Ensuring compliance with these pillars for systems such as Active Directory is key to security and business continuity in financial organisations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff70887 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"ff70887\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/www.semperis.com\/es\/blog\/importance-auditing-active-directory-services-2\/\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tRead more\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The Digital Operational Resilience Regulation (DORA) is a new EU regulation designed to improve operational resilience in the financial sector. From 2025, all financial institutions operating in the EU and their ICT providers will have to comply with this regulation. DORA is based on five key pillars, which are [...]<\/p>","protected":false},"author":1,"featured_media":756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soluciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek<\/title>\n<meta name=\"description\" content=\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/en\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/en\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T14:34:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T08:40:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"arquitecto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"arquitecto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"},\"author\":{\"name\":\"arquitecto\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\"},\"headline\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory\",\"datePublished\":\"2024-09-09T14:34:12+00:00\",\"dateModified\":\"2024-11-13T08:40:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"articleSection\":[\"SOLUCIONES\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\",\"url\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\",\"name\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"datePublished\":\"2024-09-09T14:34:12+00:00\",\"dateModified\":\"2024-11-13T08:40:51+00:00\",\"description\":\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"width\":2500,\"height\":1669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\",\"name\":\"arquitecto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"caption\":\"arquitecto\"},\"sameAs\":[\"http:\/\/10.0.1.6\"],\"url\":\"https:\/\/ukotek.com\/en\/author\/arquitecto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/en\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","og_locale":"en_GB","og_type":"article","og_title":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","og_description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","og_url":"https:\/\/ukotek.com\/en\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","og_site_name":"Ukotek","article_published_time":"2024-09-09T14:34:12+00:00","article_modified_time":"2024-11-13T08:40:51+00:00","og_image":[{"width":2500,"height":1669,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","type":"image\/jpeg"}],"author":"arquitecto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"arquitecto","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#article","isPartOf":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"},"author":{"name":"arquitecto","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46"},"headline":"Los 5 pilares para el cumplimiento de la DORA en Active Directory","datePublished":"2024-09-09T14:34:12+00:00","dateModified":"2024-11-13T08:40:51+00:00","mainEntityOfPage":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"image":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","articleSection":["SOLUCIONES"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","url":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","name":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","datePublished":"2024-09-09T14:34:12+00:00","dateModified":"2024-11-13T08:40:51+00:00","description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","breadcrumb":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","width":2500,"height":1669},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Los 5 pilares para el cumplimiento de la DORA en Active Directory"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46","name":"arquitecto","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/ukotek.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","caption":"arquitecto"},"sameAs":["http:\/\/10.0.1.6"],"url":"https:\/\/ukotek.com\/en\/author\/arquitecto\/"}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/posts\/795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/comments?post=795"}],"version-history":[{"count":19,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/posts\/795\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/posts\/795\/revisions\/2101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/media\/756"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/media?parent=795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/categories?post=795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ukotek.com\/en\/wp-json\/wp\/v2\/tags?post=795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}