{"id":28,"date":"2019-09-18T21:58:24","date_gmt":"2019-09-18T21:58:24","guid":{"rendered":"http:\/\/prosaweb.duckdns.org\/?page_id=28"},"modified":"2021-11-30T08:46:42","modified_gmt":"2021-11-30T08:46:42","slug":"psd2-compliance","status":"publish","type":"page","link":"https:\/\/prosasecurity.com\/index.php\/psd2-compliance\/","title":{"rendered":"PSD2 compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"28\" class=\"elementor elementor-28\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5162b11 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5162b11\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5b193a\" data-id=\"f5b193a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-04fd987 elementor-widget elementor-widget-heading\" data-id=\"04fd987\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">We can help you with regulatory compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27825d8 elementor-widget elementor-widget-text-editor\" data-id=\"27825d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><style type=\"text\/css\">\n\t\tp { margin-bottom: 0.1in; line-height: 115% }<\/style><\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">There is a lot of uncertainty around new solutions for Strong Customer Authentication and with new requirements for security and privacy.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">We can help you prove that you conform to any kind of regulatory framework, including giving a formal proof that your solution is secure on a fundamental design level.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">For frameworks such as the \u201cRegulatory Technical Standards on strong customer authentication and secure communication under PSD2\u201d we already have templates that can help you speed up the process of documenting compliance, but our process can be adapted to any kind of regulation.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">We can help you with compliance and evaluation processes together with one of our partners or as a consultancy-supported project where we can help write and document your solution, together with your experts.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">We normally follow an iterative process, where we go through the following steps as many times as required:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dc1a9c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dc1a9c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f57cd05\" data-id=\"f57cd05\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ca0891d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ca0891d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-340dc77\" data-id=\"340dc77\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2eb079 elementor-widget elementor-widget-heading\" data-id=\"f2eb079\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Scope analysis<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-786c847 elementor-widget elementor-widget-text-editor\" data-id=\"786c847\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0in; line-height: 100%;\">Here we filter out the systems and protocols that are within the scope of the analysis. We identify key stakeholders, such as developers and security architects, and identify the relevant regulatory frameworks.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">Tasks:<\/p><ul><li style=\"line-height: 100%;\">Review documentation<\/li><li style=\"line-height: 100%;\">Perform interviews<\/li><li style=\"line-height: 100%;\">Identify critical sections<\/li><li style=\"line-height: 100%;\">Review requirements<\/li><li style=\"line-height: 100%;\">Map documentation and resources to key system<\/li><\/ul><p>Deliverables:<\/p><ul><li style=\"line-height: 100%;\">System overview<\/li><li style=\"line-height: 100%;\">Critical sections<\/li><li style=\"line-height: 100%;\">Scope recommendation<\/li><li style=\"line-height: 100%;\">Estimate of total work that is required<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f7119c7\" data-id=\"f7119c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-846649a elementor-widget elementor-widget-image\" data-id=\"846649a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1090\" height=\"350\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2020\/01\/requirement.png\" class=\"attachment-full size-full wp-image-256\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ccbf66e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ccbf66e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5db7844\" data-id=\"5db7844\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a9935bc elementor-widget elementor-widget-heading\" data-id=\"a9935bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Description of the model<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e646724 elementor-widget elementor-widget-text-editor\" data-id=\"e646724\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0in; line-height: 100%;\">We use a tool-assisted method for generating a model of the protocols and systems that are to be analysed.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">Tasks:<\/p><ul><li style=\"line-height: 100%;\">Detailed documentation review<\/li><li style=\"line-height: 100%;\">System model created<\/li><li style=\"line-height: 100%;\">Identification of fundamental patterns (e.g. SSL)<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">Review with key personnel:<\/p><p>1. Model updates<br \/>2. Documentation error<br \/>3. Design errors<\/p><p>Deliverables:<\/p><ul><li style=\"line-height: 100%;\">A precise PROSA model providing:<\/li><li style=\"line-height: 100%;\">System overview<\/li><li style=\"line-height: 100%;\">Detailed system behavior<\/li><li style=\"line-height: 100%;\">Complete, uniform documentation<\/li><li style=\"line-height: 100%;\">Design errors are identified<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2194912\" data-id=\"2194912\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52f481c elementor-widget elementor-widget-image\" data-id=\"52f481c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1600\" height=\"1014\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/prosa-security-architect.png\" class=\"attachment-full size-full wp-image-64\" alt=\"\" srcset=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/prosa-security-architect.png 1600w, https:\/\/prosasecurity.com\/wp-content\/uploads\/2019\/09\/prosa-security-architect-1536x973.png 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cacf11c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cacf11c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9d13b38\" data-id=\"9d13b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d131f0 elementor-widget elementor-widget-heading\" data-id=\"7d131f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Security requirements<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5ea84c elementor-widget elementor-widget-text-editor\" data-id=\"d5ea84c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0in; line-height: 100%;\">Here we can generate protection graphs of the system, allowing you to view how critical assets are protected during transmission and on systems. We can identify anomalies such as the circular use of keys. At this stage, we can help identify the sensitivity, integrity, and confidentiality requirements for each asset identified.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">Tasks:<\/p><ul><li style=\"line-height: 100%;\">Identify and validate information assets (critical information elements)<\/li><li style=\"line-height: 100%;\">Model requirements<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">Deliverables:<\/p><ul><li style=\"line-height: 100%;\">A model with complete requirements including:<ul><li style=\"line-height: 100%;\">Confidentiality goals<\/li><li style=\"line-height: 100%;\">Integrity goals<\/li><\/ul><\/li><li style=\"line-height: 100%;\">Mapping of requirements to the relevant requirements<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b5b7c5c\" data-id=\"b5b7c5c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e7c64f elementor-widget elementor-widget-image\" data-id=\"8e7c64f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1090\" height=\"682\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2020\/01\/requirement-workflow.png\" class=\"attachment-full size-full wp-image-257\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5366c44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5366c44\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4263ae6\" data-id=\"4263ae6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f13781d elementor-widget elementor-widget-heading\" data-id=\"f13781d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Threats<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-459ab38 elementor-widget elementor-widget-text-editor\" data-id=\"459ab38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0in; line-height: 100%;\">Here we formulate the main attacker goals and analyse how the system protects against attackers. An example here is that sensitive information should be protected at all points. The threats are mapped to the requirements so that you can show that possible threats have been examined.<\/p><p style=\"margin-bottom: 0in; line-height: 100%;\">Tasks:<\/p><ul><li style=\"line-height: 100%;\">Perform eavesdropper simulations<\/li><li style=\"line-height: 100%;\">Attack landscaping<\/li><li style=\"line-height: 100%;\">Impersonation patterns<\/li><\/ul><p style=\"margin-bottom: 0in; line-height: 100%;\">Deliverables:<\/p><ul><li style=\"line-height: 100%;\">Documentation of possible threats (potential attacks with the description of attack behavior)<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-531047a\" data-id=\"531047a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7e3014 elementor-widget elementor-widget-image\" data-id=\"a7e3014\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1036\" height=\"356\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2020\/01\/threats.png\" class=\"attachment-full size-full wp-image-258\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-202d3e0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"202d3e0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5689265\" data-id=\"5689265\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fce0c36 elementor-widget elementor-widget-heading\" data-id=\"fce0c36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Risk analysis<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c2f819 elementor-widget elementor-widget-text-editor\" data-id=\"7c2f819\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The final phase is to analyse the results of the threats and to identify any residual risks. Typically in an evaluation process, it is the residual risks that are of interest, as this shows what you can&#8217;t control for.<\/p>\n<p style=\"margin-bottom: 0in; line-height: 100%;\">Tasks:<\/p>\n<ul>\n<li style=\"line-height: 100%;\">Threats overview<\/li>\n<li style=\"line-height: 100%;\">Decision making priorities<\/li>\n<\/ul>\n<p style=\"margin-bottom: 0in; line-height: 100%;\">Deliverables:<\/p>\n<ul>\n<li style=\"line-height: 100%;\">Risk documentation for each potential threat<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fed886c\" data-id=\"fed886c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2222dc9 elementor-widget elementor-widget-image\" data-id=\"2222dc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1127\" height=\"223\" src=\"https:\/\/prosasecurity.com\/wp-content\/uploads\/2020\/01\/risk.png\" class=\"attachment-full size-full wp-image-260\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We can help you with regulatory compliance There is a lot of uncertainty around new solutions for Strong Customer Authentication and with new requirements for security and privacy. \u00a0 We can help you prove that you conform to any kind of regulatory framework, including giving a formal proof that your solution is secure on a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-28","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/28","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/comments?post=28"}],"version-history":[{"count":14,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions"}],"predecessor-version":[{"id":459,"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/pages\/28\/revisions\/459"}],"wp:attachment":[{"href":"https:\/\/prosasecurity.com\/index.php\/wp-json\/wp\/v2\/media?parent=28"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}