{"id":3213,"date":"2025-10-28T14:53:07","date_gmt":"2025-10-28T14:53:07","guid":{"rendered":"https:\/\/phishia.fr\/?p=3213"},"modified":"2025-10-31T08:08:40","modified_gmt":"2025-10-31T08:08:40","slug":"iso-27001","status":"publish","type":"post","link":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/iso-27001\/","title":{"rendered":"Tutto quello che c'\u00e8 da sapere sulla ISO 27001"},"content":{"rendered":"<h2>Perch\u00e9 la ISO 27001 \u00e8 (ancora) di interesse per tutti<\/h2>\n<p>I vostri clienti vogliono prove, non promesse. La ISO 27001 fornisce un quadro di riferimento <strong data-start=\"279\" data-end=\"309\">riconosciuto a livello internazionale<\/strong> per organizzare la sicurezza delle informazioni, dare priorit\u00e0 ai rischi e dimostrare, con l'aiuto di un audit, che il sistema funziona quotidianamente. Bonus: se fatto correttamente, questo fondamento <strong data-start=\"480\" data-end=\"498\">allineamenti 80-90 %<\/strong> cosa vi chieder\u00e0 il NIS2\/DORA in termini di governance, gestione del rischio e prove.<\/p>\n<h2>In breve: cos'\u00e8 la ISO27001?<\/h2>\n<p>ISO 27001 \u00e8 l'implementazione di un sistema di\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"750\" data-end=\"814\">Sistema di gestione della sicurezza delle informazioni (ISMS)<\/strong>\u00a0ruoli chiari, analisi dei rischi, regole essenziali (accesso, backup, incidenti, ecc.), e\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"907\" data-end=\"932\">miglioramento continuo<\/strong>\u00a0misurata da indicatori. Non \u201cmettiamo gi\u00f9 la carta\u201d: dimostriamo una\u00a0<strong style=\"caret-color: #000000; color: #000000;\" data-start=\"1007\" data-end=\"1034\">controllo operativo<\/strong>\u00a0e sapete come spiegarlo a chi vi ascolta.<\/p>\n<h2>Gli elementi costitutivi del WSIS<\/h2>\n<ul>\n<li data-start=\"1119\" data-end=\"1236\">\n<p data-start=\"1121\" data-end=\"1236\"><strong data-start=\"1121\" data-end=\"1137\">Governance.<\/strong> Chi decide, su cosa e con quali prove (riesami della direzione, verbali, arbitrati).<\/p>\n<\/li>\n<li data-start=\"1237\" data-end=\"1333\">\n<p data-start=\"1239\" data-end=\"1333\"><strong data-start=\"1239\" data-end=\"1262\">Analisi del rischio.<\/strong> Minacce, impatti sul business, decisioni di accettazione\/trattamento, follow-up.<\/p>\n<\/li>\n<li data-start=\"1334\" data-end=\"1518\">\n<p data-start=\"1336\" data-end=\"1518\"><strong data-start=\"1336\" data-end=\"1356\">SoA e controlli.<\/strong> Dichiarazione di applicabilit\u00e0 e controlli dell'Allegato A (edizione 2022: 93 controlli, raggruppati in 4 temi: organizzativo, umano, fisico, tecnologico).<\/p>\n<\/li>\n<li data-start=\"1519\" data-end=\"1632\">\n<p data-start=\"1521\" data-end=\"1632\"><strong data-start=\"1521\" data-end=\"1540\">Processi chiave.<\/strong> Accesso\/JML, backup e ripristino, gestione delle vulnerabilit\u00e0, incidenti, continuit\u00e0.<\/p>\n<\/li>\n<li data-start=\"1633\" data-end=\"1730\">\n<p data-start=\"1635\" data-end=\"1730\"><strong data-start=\"1635\" data-end=\"1661\">Misurazione e miglioramento.<\/strong> KPI, audit interni, piani d'azione, lezioni apprese dagli incidenti.<\/p>\n<\/li>\n<\/ul>\n<h2>Perch\u00e9 ora?<\/h2>\n<ol>\n<li data-start=\"1850\" data-end=\"1958\">\n<p data-start=\"1853\" data-end=\"1958\"><strong data-start=\"1853\" data-end=\"1885\">Vendite B2B e due diligence.<\/strong> I vostri clienti chiedono prove; la ISO 27001 accelera il ciclo.<\/p>\n<\/li>\n<li data-start=\"1959\" data-end=\"2089\">\n<p data-start=\"1962\" data-end=\"2089\"><strong data-start=\"1962\" data-end=\"1992\">Convergenza normativa.<\/strong> NIS2\/DORA richiedono governance, rischi, notifiche e prove: il WSIS sta preparando il terreno.<\/p>\n<\/li>\n<li data-start=\"2090\" data-end=\"2188\">\n<p data-start=\"2093\" data-end=\"2188\"><strong data-start=\"2093\" data-end=\"2116\">Efficienza interna.<\/strong> Fermiamo i documenti dimenticati e manteniamo <strong data-start=\"2165\" data-end=\"2187\">prove rigiocabili<\/strong>.<\/p>\n<\/li>\n<\/ol>\n<h2>Come si presenta un \u201cbuon\u201d deliverable ISO 27001<\/h2>\n<ul>\n<li data-start=\"3937\" data-end=\"3986\">\n<p data-start=\"3939\" data-end=\"3986\"><strong data-start=\"3939\" data-end=\"3952\">Politica<\/strong> breve e comprensibile per i team.<\/p>\n<\/li>\n<li data-start=\"3987\" data-end=\"4049\">\n<p data-start=\"3989\" data-end=\"4049\"><strong data-start=\"3989\" data-end=\"4013\">Registro dei rischi<\/strong> collegati a piani d'azione.<\/p>\n<\/li>\n<li data-start=\"4050\" data-end=\"4103\">\n<p data-start=\"4052\" data-end=\"4103\"><strong data-start=\"4052\" data-end=\"4059\">SoA<\/strong> e collegati a misure reali.<\/p>\n<\/li>\n<li data-start=\"4104\" data-end=\"4174\">\n<p data-start=\"4106\" data-end=\"4174\"><strong data-start=\"4106\" data-end=\"4120\">Procedure<\/strong> che sono di 1-3 pagine e sono gi\u00e0 stati testati.<\/p>\n<\/li>\n<li data-start=\"4175\" data-end=\"4285\">\n<p data-start=\"4177\" data-end=\"4285\"><strong data-start=\"4177\" data-end=\"4199\">Fascicolo delle prove<\/strong> esportazioni, agende, rapporti, biglietti, acquisizioni - ordinati, datati, rintracciabili.<\/p>\n<\/li>\n<\/ul>\n<h2>Conclusione<\/h2>\n<p>La ISO 27001 non \u00e8 una raccolta di documenti: \u00e8 un modo per <strong data-start=\"4829\" data-end=\"4852\">gestione della sicurezza<\/strong> e di fornire <strong data-start=\"4873\" data-end=\"4883\">prova<\/strong>. Se adottato correttamente, l'approccio semplifica le vendite, prepara agli obblighi NIS2\/DORA e rende l'organizzazione pi\u00f9 resiliente. Il tutto senza appesantire gli oneri quotidiani, a patto di rimanere pragmatici.<\/p>\n<p>Volete un <strong data-start=\"5105\" data-end=\"5129\">Diagnosi ISO 27001<\/strong> in 2-3 settimane per inquadrare l'ISMS e pianificare la certificazione? Parliamone.<\/p>","protected":false},"excerpt":{"rendered":"<p>Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]<\/p>","protected":false},"author":3,"featured_media":3218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pilotage-conformite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tout savoir sur l&#039;ISO 27001 - Phishia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tout savoir sur l&#039;ISO 27001 - Phishia\" \/>\n<meta property=\"og:description\" content=\"Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Phishia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T14:53:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-31T08:08:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"},\"author\":{\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\"},\"headline\":\"Tout savoir sur l&rsquo;ISO 27001\",\"datePublished\":\"2025-10-28T14:53:07+00:00\",\"dateModified\":\"2025-10-31T08:08:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"articleSection\":[\"Pilotage et conformit\u00e9\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\",\"name\":\"Tout savoir sur l'ISO 27001 - Phishia\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"datePublished\":\"2025-10-28T14:53:07+00:00\",\"dateModified\":\"2025-10-31T08:08:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#primaryimage\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/iso27001.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/pilotage-conformite\\\/iso-27001\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/phishia.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pilotage et conformit\u00e9\",\"item\":\"https:\\\/\\\/phishia.fr\\\/blog\\\/category\\\/pilotage-conformite\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tout savoir sur l&rsquo;ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#website\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"name\":\"Phishia\",\"description\":\"Cabinet de Conseil IT, Cybers\u00e9curit\u00e9, Durabilit\u00e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/phishia.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#organization\",\"name\":\"Phishia\",\"url\":\"https:\\\/\\\/phishia.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"contentUrl\":\"https:\\\/\\\/phishia.fr\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Logotype.png\",\"width\":512,\"height\":128,\"caption\":\"Phishia\"},\"image\":{\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/phishia\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/phishia.fr\\\/#\\\/schema\\\/person\\\/ab1f38ad06f750da69863e8f06e86528\",\"name\":\"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tutto quello che c'\u00e8 da sapere sulla ISO 27001 - Phishia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/iso-27001\/","og_locale":"it_IT","og_type":"article","og_title":"Tout savoir sur l'ISO 27001 - Phishia","og_description":"Pourquoi l\u2019ISO 27001 int\u00e9resse (encore) tout le monde Vos clients veulent des preuves, pas des promesses. L\u2019ISO 27001 fournit un cadre reconnu internationalement pour organiser la s\u00e9curit\u00e9 de l\u2019information, prioriser les risques, et montrer \u2014 audit \u00e0 l\u2019appui \u2014 que le dispositif fonctionne au quotidien. Bonus : bien men\u00e9, ce socle aligne 80\u201390 % de [&hellip;]","og_url":"https:\/\/phishia.fr\/it\/blog\/gestione-della-conformita\/iso-27001\/","og_site_name":"Phishia","article_published_time":"2025-10-28T14:53:07+00:00","article_modified_time":"2025-10-31T08:08:40+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","type":"image\/png"}],"author":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","Tempo di lettura stimato":"3 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#article","isPartOf":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"},"author":{"name":"Enzo Debosque, consultant junior en CyberS\u00e9curit\u00e9","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528"},"headline":"Tout savoir sur l&rsquo;ISO 27001","datePublished":"2025-10-28T14:53:07+00:00","dateModified":"2025-10-31T08:08:40+00:00","mainEntityOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"},"wordCount":422,"publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","articleSection":["Pilotage et conformit\u00e9"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/","url":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/","name":"Tutto quello che c'\u00e8 da sapere sulla ISO 27001 - Phishia","isPartOf":{"@id":"https:\/\/phishia.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","datePublished":"2025-10-28T14:53:07+00:00","dateModified":"2025-10-31T08:08:40+00:00","breadcrumb":{"@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#primaryimage","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/10\/iso27001.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/phishia.fr\/blog\/pilotage-conformite\/iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/phishia.fr\/"},{"@type":"ListItem","position":2,"name":"Pilotage et conformit\u00e9","item":"https:\/\/phishia.fr\/blog\/category\/pilotage-conformite\/"},{"@type":"ListItem","position":3,"name":"Tout savoir sur l&rsquo;ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/phishia.fr\/#website","url":"https:\/\/phishia.fr\/","name":"Phishia","description":"Consulenza informatica, sicurezza informatica, sostenibilit\u00e0","publisher":{"@id":"https:\/\/phishia.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/phishia.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/phishia.fr\/#organization","name":"Phishia","url":"https:\/\/phishia.fr\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/","url":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","contentUrl":"https:\/\/phishia.fr\/wp-content\/uploads\/2025\/01\/Logotype.png","width":512,"height":128,"caption":"Phishia"},"image":{"@id":"https:\/\/phishia.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/phishia\/"]},{"@type":"Person","@id":"https:\/\/phishia.fr\/#\/schema\/person\/ab1f38ad06f750da69863e8f06e86528","name":"Enzo Debosque, consulente junior di CyberSecurity"}]}},"_links":{"self":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/comments?post=3213"}],"version-history":[{"count":5,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3213\/revisions"}],"predecessor-version":[{"id":3343,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/posts\/3213\/revisions\/3343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media\/3218"}],"wp:attachment":[{"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/media?parent=3213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/categories?post=3213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phishia.fr\/it\/wp-json\/wp\/v2\/tags?post=3213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}