{"id":3073,"date":"2017-03-07T08:45:57","date_gmt":"2017-03-07T07:45:57","guid":{"rendered":"https:\/\/www.intesys.it\/journal\/?p=3073"},"modified":"2022-06-28T12:45:50","modified_gmt":"2022-06-28T10:45:50","slug":"security-is-not-an-afterthought","status":"publish","type":"post","link":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/","title":{"rendered":"Security Is Not an Afterthought"},"content":{"rendered":"<p><div id='wpig-contents' class='wpig-contents wpig-number-list wpig-no-hierarachy wpig-sidebar-widget wpig-style-1'><span class='wpig-headline'>Indice dei contenuti<\/span><!-- Table of Contents --><div id='wpig-table-of-content' class='wpig-table-of-content' ><ol><li class='stoc-security-needs-to-be-a-part-of-development'><a href='#stoc-security-needs-to-be-a-part-of-development'>Security Needs to Be a Part of Development<\/a><\/li><li class='stoc-security-benefits-of-open-source'><a href='#stoc-security-benefits-of-open-source'>Security Benefits of Open Source<\/a><\/li><li class='stoc-test-driven-development'><a href='#stoc-test-driven-development'>Test Driven Development<\/a><\/li><li class='stoc-summary'><a href='#stoc-summary'>Summary<\/a><\/li><\/ol><\/div><!-- END OF Table of Contents --><\/div><\/p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_spacing=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]<span style=\"font-weight: 400;\">Anyone that has opened a newspaper in the last few years will be well aware of the <strong>security breaches<\/strong> that happen on a regular basis. Google, Yahoo, Facebook, Dropbox and LinkedIn are just a few of the big names that have suffered attacks where hundreds of millions (yes, hundreds of MILLIONS!) of passwords and, sometimes, personal information have ended up in the wrong hands.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For many years,<\/span><span style=\"font-weight: 400;\">\u00a0security in application design and development has often been left up to either <strong>vigilant developers<\/strong> taking it upon themselves to produce quality code or to <strong>security reviews<\/strong> at the end of the development process (often with difficult and\/or costly refactorings as a result).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This approach could work well in theory, but in practice rarely does. It is unlikely that every\u00a0developer involved in a project know about every security concern. This is only natural and particularly so in computer security where new attack methods pop up on a regular basis. <strong>Even the most seasoned <\/strong><\/span><strong>security analyst will never tell you that an application is 100% secure<\/strong><span style=\"font-weight: 400;\"> &#8211; we cannot know what we do not know.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With these considerations in mind we can easily see that any help we can get from the tools we use during development is extremely helpful. This is one of many reasons why we like to work with the <a href=\"https:\/\/www.intesys.it\/journal\/information-technology\/ruby-rails-gemme\/\" rel=\"noopener\">Ruby on Rails<\/a> framework. Any framework or any programming language can produce software with or without security flaws. <\/span><b>What really sets Rails apart though is that good design, intelligent defaults, best practices, and an emphasis on security \u201cout of the box\u201d make it easier to do the \u201cright thing\u201d<\/b><span style=\"font-weight: 400;\">. In this article we will go over a few of the things that we think make Rails a good alternative for developing secure applications.<\/span><\/p>\n<h2 id=\"stoc-security-needs-to-be-a-part-of-development\" class=\"wpig-heading\"><span style=\"font-weight: 400;\">Security Needs to Be a Part of Development<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Developing <\/span><b>using Rails we get a lot of security features for free<\/b><span style=\"font-weight: 400;\"> using the generators provided and the <a href=\"http:\/\/guides.rubyonrails.org\/security.html\" target=\"_blank\" rel=\"noopener\">defaults established by the framework itself<\/a>. Unless we actively do something to deactivate it we have CSRF (Cross-Site Request Forgery) protection, encrypted cookies, session fixation protection, strong parameters, automatic filtering of sensitive data from logs, etc. Rails also makes it easy to avoid other types of attacks such as XSS (Cross-Site Scripting) and SQL injection by providing simple, standard ways of doing what needs to be done.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to the security features of the framework itself we have a whole host of options when it comes to<\/span><b> libraries adding security features<\/b><span style=\"font-weight: 400;\"> to our applications or helping us test for weaknesses. Typically these libraries focus on doing one thing and doing it well. By using them in our development we can benefit from the expertise of others that may be much more knowledgeable about a particular problem than we are. <\/span><b>Realizing your limitations and delegating when beneficial is also a part of a security strategy.<\/b><span style=\"font-weight: 400;\"> Long gone are the days when well meaning developers patched together their own authentication system with unencrypted emails in a database in order to be able to send out password reminders (in plain text emails). It is simply easier to use a library that does all this for you and, as an added bonus, does it well with encryption, email verification, password reset procedures etc. We do not mean to imply that a knowledgeable and skilled developer is no longer needed. Quite the opposite, but with Rails, using standard development methods and libraries, even a junior developer can avoid dangerous pitfalls.<\/span><\/p>\n<h2 id=\"stoc-security-benefits-of-open-source\" class=\"wpig-heading\"><span style=\"font-weight: 400;\">Security Benefits of Open Source<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The fact that Rails is Open Source, although it might sound counter intuitive, in our opinion adds security to the framework. Anyone, for good or bad, can study the internals of the framework and discuss alternative solutions, improvements or potential problems. Since the \u201cgood guys\u201d tend to outnumber the bad and since, whenever a new security breach is found, <\/span><b>the framework is constantly patched with security fixes<\/b><span style=\"font-weight: 400;\"> we believe that the end product is more secure than a proprietary solution into which we have no insight. Just recently\u00a0another <a href=\"http:\/\/arstechnica.com\/security\/2016\/12\/yahoo-reveals-1-billion-more-accounts-exposed-and-some-code-may-have-been-stolen\/\" target=\"_blank\" rel=\"noopener\">huge security breach was exposed<\/a>\u00a0<\/span><span style=\"font-weight: 400;\">when Yahoo admitted to having more that one <\/span><i><span style=\"font-weight: 400;\">billion<\/span><\/i><span style=\"font-weight: 400;\"> (yes &#8211; with a B) accounts exposed since 2013.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although security breaches can happen to anyone, it seems unlikely that something that serious would go unnoticed for 3 years in a widely used open source framework. To us <\/span><b>Open Source means security by transparency and faster fixes to any discovered issues.<\/b><\/p>\n<h2 id=\"stoc-test-driven-development\" class=\"wpig-heading\"><span style=\"font-weight: 400;\">Test Driven Development<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Test Driven Development, or TDD for short, is another thing that is not specific to Rails but is made simpler since the framework prepares a structure for you in order to easily get started with your tests right away.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Basically, TDD is an approach to development where you start by defining tests that ensure your application does what it should and then proceed to implementing it. It provides a concrete way to prove that your application does exactly what it is supposed to do and brings many advantages to development, a couple of which concern security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whenever a malfunction occurs, such as a security problem of some sort, a new test is added highlighting the error and then a patch is applied. In the future, whenever modifications are made to our application we are <\/span><b>guaranteed to have no regressions and that the problem will never occur again<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The presence of tests have another important impact on the security to our applications. They <\/span><b>allow us to keep our framework and external libraries updated<\/b><span style=\"font-weight: 400;\"> with the latest security fixes while maintaining the integrity of our application. As long as our tests pass after an update we can be sure that everything still works as before.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These benefits may seem small but anyone who has tried to keep an application of some complexity constantly updated with the latest patches knows that without TDD the experience is somewhat similar to playing Russian roulette (or so we can imagine).<\/span><\/p>\n<h2 id=\"stoc-summary\" class=\"wpig-heading\"><span style=\"font-weight: 400;\">Summary<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle. <strong>A solid framework is not a substitution<\/strong> for skilled and experienced developers but helps establish a good baseline of security. We have found that, for us, Rails is a good choice that helps us develop solid security conscious applications that are scalable and easy to maintain over time. If this sounds interesting to you, please don\u2019t hesitate to <a href=\"https:\/\/www.intesys.it\/contattaci\/\" target=\"_blank\" rel=\"noopener\">contact us<\/a>. We would like to work together with you and help you reach your goals!<\/span>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.<\/p>\n","protected":false},"author":66,"featured_media":3343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[27],"tags":[206,498,577],"class_list":{"0":"post-3073","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology","8":"tag-cybersecurity","9":"tag-open-source","10":"tag-ruby-on-rails"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Is Not an Afterthought<\/title>\n<meta name=\"description\" content=\"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Is Not an Afterthought\" \/>\n<meta property=\"og:description\" content=\"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/\" \/>\n<meta property=\"og:site_name\" content=\"Intesys Journal\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-07T07:45:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-28T10:45:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel Jonasson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Jonasson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/\",\"url\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/\",\"name\":\"Security Is Not an Afterthought\",\"isPartOf\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg\",\"datePublished\":\"2017-03-07T07:45:57+00:00\",\"dateModified\":\"2022-06-28T10:45:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e4731c70046eeb90796a6a37ead71a27\"},\"description\":\"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage\",\"url\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg\",\"contentUrl\":\"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg\",\"width\":1280,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intesys.it\/journal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Is Not an Afterthought\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#website\",\"url\":\"https:\/\/www.intesys.it\/journal\/\",\"name\":\"Intesys\",\"description\":\"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intesys.it\/journal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e4731c70046eeb90796a6a37ead71a27\",\"name\":\"Daniel Jonasson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d80d1c042a73ef9c9405dc1c5cdb89a4c05ea116e9dd82d49a4bd568abf31e7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d80d1c042a73ef9c9405dc1c5cdb89a4c05ea116e9dd82d49a4bd568abf31e7?s=96&d=mm&r=g\",\"caption\":\"Daniel Jonasson\"},\"url\":\"https:\/\/www.intesys.it\/journal\/autore\/daniel-jonasson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Is Not an Afterthought","description":"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/","og_locale":"it_IT","og_type":"article","og_title":"Security Is Not an Afterthought","og_description":"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.","og_url":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/","og_site_name":"Intesys Journal","article_published_time":"2017-03-07T07:45:57+00:00","article_modified_time":"2022-06-28T10:45:50+00:00","og_image":[{"width":1280,"height":960,"url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg","type":"image\/jpeg"}],"author":"Daniel Jonasson","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Daniel Jonasson","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/","url":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/","name":"Security Is Not an Afterthought","isPartOf":{"@id":"https:\/\/www.intesys.it\/journal\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage"},"image":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg","datePublished":"2017-03-07T07:45:57+00:00","dateModified":"2022-06-28T10:45:50+00:00","author":{"@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e4731c70046eeb90796a6a37ead71a27"},"description":"Security needs to be an integral part of software development and not an afterthought that is hastily run through at the end of the development cycle.","breadcrumb":{"@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#primaryimage","url":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg","contentUrl":"https:\/\/www.intesys.it\/journal\/wp-content\/uploads\/sites\/13\/2017\/02\/security-is-not-an-afterthought.jpg","width":1280,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/www.intesys.it\/journal\/information-technology\/security-is-not-an-afterthought\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intesys.it\/journal\/"},{"@type":"ListItem","position":2,"name":"Security Is Not an Afterthought"}]},{"@type":"WebSite","@id":"https:\/\/www.intesys.it\/journal\/#website","url":"https:\/\/www.intesys.it\/journal\/","name":"Intesys","description":"Ogni settimana nuovi articoli dedicati al mondo della trasformazione digitale!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intesys.it\/journal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/e4731c70046eeb90796a6a37ead71a27","name":"Daniel Jonasson","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.intesys.it\/journal\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d80d1c042a73ef9c9405dc1c5cdb89a4c05ea116e9dd82d49a4bd568abf31e7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d80d1c042a73ef9c9405dc1c5cdb89a4c05ea116e9dd82d49a4bd568abf31e7?s=96&d=mm&r=g","caption":"Daniel Jonasson"},"url":"https:\/\/www.intesys.it\/journal\/autore\/daniel-jonasson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/3073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/comments?post=3073"}],"version-history":[{"count":2,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/3073\/revisions"}],"predecessor-version":[{"id":11102,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/posts\/3073\/revisions\/11102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media\/3343"}],"wp:attachment":[{"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/media?parent=3073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/categories?post=3073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intesys.it\/journal\/wp-json\/wp\/v2\/tags?post=3073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}