{"id":795,"date":"2024-09-09T16:34:12","date_gmt":"2024-09-09T14:34:12","guid":{"rendered":"https:\/\/dev.ukotek.com\/?p=795"},"modified":"2024-11-13T09:40:51","modified_gmt":"2024-11-13T08:40:51","slug":"los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory","status":"publish","type":"post","link":"https:\/\/ukotek.com\/it\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","title":{"rendered":"I 5 pilastri della conformit\u00e0 DORA in Active Directory"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"795\" class=\"elementor elementor-795\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a7456c e-flex e-con-boxed e-con e-parent\" data-id=\"5a7456c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b59e2bc e-con-full e-flex e-con e-child\" data-id=\"b59e2bc\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9eb8898 elementor-widget elementor-widget-text-editor\" data-id=\"9eb8898\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Il regolamento sulla resilienza operativa digitale (DORA) \u00e8 un nuovo regolamento dell'UE progettato per migliorare la resilienza operativa nel settore finanziario. A partire dal 2025, tutte le istituzioni finanziarie che operano nell'UE e i loro fornitori di ICT dovranno conformarsi a questo regolamento. Il DORA si basa su cinque pilastri fondamentali, che sono la chiave per garantire la continuit\u00e0 operativa e la sicurezza di sistemi critici come Active Directory.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0efd235 e-con-full e-flex e-con e-child\" data-id=\"0efd235\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91f367c elementor-widget elementor-widget-image\" data-id=\"91f367c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"782\" height=\"529\" src=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS.jpg\" class=\"attachment-large size-large wp-image-279\" alt=\"\" srcset=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS.jpg 782w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS-300x203.jpg 300w, https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/SEMPERIS-768x520.jpg 768w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a96b78 e-flex e-con-boxed e-con e-parent\" data-id=\"5a96b78\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c33f67c elementor-widget elementor-widget-text-editor\" data-id=\"c33f67c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>I 5 pilastri della conformit\u00e0 DORA<\/h2><h4><span style=\"color: #0db02b;\"><strong>Gestione del rischio ICT:<\/strong><\/span><\/h4><p>Le aziende devono disporre di un quadro documentato per la gestione dei rischi per le loro risorse critiche. Nel caso di Active Directory, ci\u00f2 richiede la piena visibilit\u00e0 della sua configurazione, del controllo delle modifiche e dei piani di ripristino in caso di incidenti.<\/p><h4><span style=\"color: #0db02b;\"><strong>2. Gestione degli incidenti:<\/strong><\/span><\/h4><p>Il DORA richiede una classificazione e una segnalazione standardizzata degli incidenti legati alle TIC. Le organizzazioni devono disporre di procedure chiare per identificare, classificare e rispondere agli incidenti in sistemi chiave come Active Directory, una componente essenziale della continuit\u00e0 operativa.<\/p><h4><span style=\"color: #0db02b;\"><strong>3. Test di stress operativo digitale:<\/strong><\/span><\/h4><p>\u00c8 necessario effettuare test regolari per valutare la reattivit\u00e0 a guasti o attacchi informatici. Per Active Directory, \u00e8 fondamentale disporre di un ambiente di test che consenta di simulare gli scenari senza mettere a rischio l'infrastruttura operativa.<\/p><h4><span style=\"color: #0db02b;\"><strong>4. Gestione del rischio di terzi:<\/strong><\/span><\/h4><p>Le organizzazioni devono garantire che i fornitori esterni rispettino gli standard di sicurezza e forniscano assistenza in caso di incidenti. Il DORA pone particolare enfasi sull'accesso che i fornitori o i partner esterni hanno attraverso Active Directory, il che introduce ulteriori complessit\u00e0 nella loro gestione.<\/p><h4><span style=\"color: #0db02b;\"><strong>5. Scambio di informazioni:<\/strong><\/span><\/h4><p>La condivisione sicura delle informazioni sulle minacce informatiche \u00e8 fondamentale. Il DORA incoraggia le istituzioni finanziarie a collaborare e a condividere le informazioni sugli incidenti e sulle minacce per migliorare la resilienza dell'intero settore. Garantire la conformit\u00e0 a questi pilastri per sistemi come Active Directory \u00e8 fondamentale per la sicurezza e la continuit\u00e0 operativa delle organizzazioni finanziarie.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff70887 elementor-invisible elementor-widget elementor-widget-premium-addon-button\" data-id=\"ff70887\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;zoomIn&quot;,&quot;_animation_delay&quot;:600}\" data-widget_type=\"premium-addon-button.default\">\n\t\t\t\t\t\r\n\r\n\t\t<a class=\"premium-button premium-button-style2 premium-btn-sm premium-button-style2-shutouthor\" href=\"https:\/\/www.semperis.com\/es\/blog\/importance-auditing-active-directory-services-2\/\" target=\"_blank\">\r\n\t\t\t<div class=\"premium-button-text-icon-wrapper\">\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span >\r\n\t\t\t\t\t\tPer saperne di pi\u00f9\t\t\t\t\t<\/span>\r\n\t\t\t\t\r\n\t\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\r\n\t\t<\/a>\r\n\r\n\r\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Il regolamento sulla resilienza operativa digitale (DORA) \u00e8 un nuovo regolamento dell'UE progettato per migliorare la resilienza operativa nel settore finanziario. A partire dal 2025, tutte le istituzioni finanziarie che operano nell'UE e i loro fornitori di TIC dovranno conformarsi a questo regolamento. Il DORA si basa su cinque pilastri fondamentali, che sono [...]<\/p>","protected":false},"author":1,"featured_media":756,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-795","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soluciones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek<\/title>\n<meta name=\"description\" content=\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ukotek.com\/it\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek\" \/>\n<meta property=\"og:description\" content=\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ukotek.com\/it\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\" \/>\n<meta property=\"og:site_name\" content=\"Ukotek\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T14:34:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T08:40:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1669\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"arquitecto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"arquitecto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"},\"author\":{\"name\":\"arquitecto\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\"},\"headline\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory\",\"datePublished\":\"2024-09-09T14:34:12+00:00\",\"dateModified\":\"2024-11-13T08:40:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"},\"wordCount\":347,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"articleSection\":[\"SOLUCIONES\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\",\"url\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\",\"name\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek\",\"isPartOf\":{\"@id\":\"https:\/\/ukotek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"datePublished\":\"2024-09-09T14:34:12+00:00\",\"dateModified\":\"2024-11-13T08:40:51+00:00\",\"description\":\"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.\",\"breadcrumb\":{\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg\",\"width\":2500,\"height\":1669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/ukotek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los 5 pilares para el cumplimiento de la DORA en Active Directory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ukotek.com\/#website\",\"url\":\"https:\/\/ukotek.com\/\",\"name\":\"Ukotek\",\"description\":\"Ciber Security\",\"publisher\":{\"@id\":\"https:\/\/ukotek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ukotek.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ukotek.com\/#organization\",\"name\":\"Ukotek\",\"url\":\"https:\/\/ukotek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"contentUrl\":\"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png\",\"width\":783,\"height\":224,\"caption\":\"Ukotek\"},\"image\":{\"@id\":\"https:\/\/ukotek.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46\",\"name\":\"arquitecto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/ukotek.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g\",\"caption\":\"arquitecto\"},\"sameAs\":[\"http:\/\/10.0.1.6\"],\"url\":\"https:\/\/ukotek.com\/it\/author\/arquitecto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ukotek.com\/it\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","og_locale":"it_IT","og_type":"article","og_title":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","og_description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","og_url":"https:\/\/ukotek.com\/it\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","og_site_name":"Ukotek","article_published_time":"2024-09-09T14:34:12+00:00","article_modified_time":"2024-11-13T08:40:51+00:00","og_image":[{"width":2500,"height":1669,"url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","type":"image\/jpeg"}],"author":"arquitecto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"arquitecto","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#article","isPartOf":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"},"author":{"name":"arquitecto","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46"},"headline":"Los 5 pilares para el cumplimiento de la DORA en Active Directory","datePublished":"2024-09-09T14:34:12+00:00","dateModified":"2024-11-13T08:40:51+00:00","mainEntityOfPage":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"},"wordCount":347,"commentCount":0,"publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"image":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","articleSection":["SOLUCIONES"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","url":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/","name":"Los 5 pilares para el cumplimiento de la DORA en Active Directory - Ukotek","isPartOf":{"@id":"https:\/\/ukotek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"image":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage"},"thumbnailUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","datePublished":"2024-09-09T14:34:12+00:00","dateModified":"2024-11-13T08:40:51+00:00","description":"Descubre los 5 pilares esenciales para asegurar el cumplimiento de la normativa DORA en Active Directory. Garantiza la resiliencia operativa y seguridad de tu infraestructura digital.","breadcrumb":{"@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#primaryimage","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/09\/soluciones-ukotek-ciberseguridad.jpg","width":2500,"height":1669},{"@type":"BreadcrumbList","@id":"https:\/\/ukotek.com\/los-5-pilares-para-el-cumplimiento-de-la-dora-en-active-directory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ukotek.com\/"},{"@type":"ListItem","position":2,"name":"Los 5 pilares para el cumplimiento de la DORA en Active Directory"}]},{"@type":"WebSite","@id":"https:\/\/ukotek.com\/#website","url":"https:\/\/ukotek.com\/","name":"Ukotek","description":"Ciber Security","publisher":{"@id":"https:\/\/ukotek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ukotek.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/ukotek.com\/#organization","name":"Ukotek","url":"https:\/\/ukotek.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/","url":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","contentUrl":"https:\/\/ukotek.com\/wp-content\/uploads\/2024\/06\/cropped-logo-ukotek.png","width":783,"height":224,"caption":"Ukotek"},"image":{"@id":"https:\/\/ukotek.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ukotek.com\/#\/schema\/person\/177fd6e76e98b176d0673081ed3eff46","name":"arquitecto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/ukotek.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69a4ef20cbbb8c8f69609c016ada76beed3417abea04975c0b7adc44c919b0e0?s=96&d=mm&r=g","caption":"arquitecto"},"sameAs":["http:\/\/10.0.1.6"],"url":"https:\/\/ukotek.com\/it\/author\/arquitecto\/"}]}},"_links":{"self":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/comments?post=795"}],"version-history":[{"count":19,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/795\/revisions"}],"predecessor-version":[{"id":2101,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/posts\/795\/revisions\/2101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media\/756"}],"wp:attachment":[{"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/media?parent=795"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/categories?post=795"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ukotek.com\/it\/wp-json\/wp\/v2\/tags?post=795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}