{"id":17182,"date":"2022-05-17T19:46:26","date_gmt":"2022-05-17T19:46:26","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=17182"},"modified":"2022-06-07T16:49:26","modified_gmt":"2022-06-07T16:49:26","slug":"rpki-resiliency-and-trust","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/","title":{"rendered":"RPKI: Resiliency and Trust"},"content":{"rendered":"\n<p class=\"author\">By <a href=\"https:\/\/www.linkedin.com\/in\/nathalie-kunneke-trenaman-b0945b1\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nathalie Trenaman<\/a> &#8211; Routing Security Programme Manager at RIPE NCC<\/p>\n\n\n\n<p>Every user of the RPKI system &#8211; whether they\u2019re on the signing side, the validating side, or both &#8211; deserves to safely rely on our systems and must be able to trust that the data we publish is accurate and accessible.<\/p>\n\n\n\n<p>In the global RPKI system, the five Regional Internet Registries serve as a Trust Anchor. This means that each of the RIRs have a self-signed root certificate. Below the root certificate, there are multiple layers of child certificates, for example from our members. These certificates, and all other RPKI objects are visible in a repository. This comes with a big responsibility for the RIRs. Users must be able to trust that our systems are safe, resilient and accurate.<\/p>\n\n\n\n<p>At RIPE NCC, we are spending significant resources to ensure this trust and resiliency. After all, more and more operators rely on the RPKI system for their Internet routing.<\/p>\n\n\n\n<p>In 2019 we started our \u201cRPKI resiliency\u201d project that included a variety of security assessments, implementation of thorough internal and external monitoring and scaling up our repositories to improve the availability.<\/p>\n\n\n\n<p><strong>Transparency<\/strong><\/p>\n\n\n\n<p>In this process we learned that trust is built by being transparent and reliable. One of the things we started to do is to publish all our security and compliance reports on our website: <a href=\"https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/rpki\/security-and-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ripe.net\/manage-ips-and-asns\/resource-management\/rpki\/security-and-compliance<\/a> This allows us to show our users what kind of assessments we do, who performed our assessment and which actions we took to mitigate the issues that were found.<\/p>\n\n\n\n<p>One lesson that we learned is that we needed to improve our unit- and integration tests. This resulted in a dedicated QA engineer in the RPKI team.<\/p>\n\n\n\n<p>We also believe in Open Source. When users can look at your code base, and see how the system works, it allows for a better understanding and improves trust. Different elements of our RPKI system have been published as Open Source for many years, last year we added our RPKI core and Trust Anchor software to GitHub. <a href=\"https:\/\/github.com\/RIPE-NCC\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/RIPE-NCC<\/a><\/p>\n\n\n\n<p>We have received very positive comments from the community, and we will present on this process during the RIPE meeting in May.<\/p>\n\n\n\n<p>In order to keep the RPKI community informed of our priorities, we publish a quarterly roadmap. This roadmap is open for feedback and we take into account any feature requests that we receive. With this effort, we hope to provide more clarity on the time lines of our projects.<\/p>\n\n\n\n<p><strong>Taking Compliance to the next level<\/strong><\/p>\n\n\n\n<p>One of the things we have to constantly ask ourselves is: Is what we are doing the right way of doing it? And is our Trust Anchor and Certificate Authority secure? What needs to improve and to what extent?<\/p>\n\n\n\n<p>There are hundreds of audit frameworks out there, but none of them are an exact fit for RPKI. We needed a well-recognised audit framework that both encompasses all important IT security elements and can be tailored towards the design principals and RFCs of RPKI. For this purpose, we\u2019ve chosen to team up with The <a href=\"https:\/\/www.bsigroup.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">British Standards Institution<\/a> to develop an RPKI audit framework that can potentially also be used by other Trust Anchors.<\/p>\n\n\n\n<p>This is now an ISAE3000\/SOC 2 Type II audit framework. In 2021 we identified the controls and BSI performed a gap analysis.<\/p>\n\n\n\n<p>We are now in the process of gathering evidence for our audit. In 2022, we will first start with an assessment of the framework by a third party.<\/p>\n\n\n\n<p>Because ISAE3000\/SOC 2 Type II frameworks are free-form by nature, we want to assure that we have the right controls and evidence in place.<\/p>\n\n\n\n<p>Of course, we will keep the community informed of the process and outcome of this assessment.<\/p>\n\n\n\n<p><strong>Of Key Importance<\/strong><\/p>\n\n\n\n<p>The \u201cK\u201d in RPKI stands for \u201cKey\u201d. In our hosted RPKI system, we store the public and private keys for our members on our platform. Also, we must make sure that our own private key stays private. For the keys, we use multiple Hardware Security Modules. These HSMs must be of the highest quality and standards. Last year, we replaced our off-line HSMs, these HSMs store the private key of the Trust Anchor. We will soon publish a RIPE Labs article on how we handled this migration. Later this year, we will replace our on-line HSMs. This will be an even more challenging migration, as this involves all our member keys that use our hosted RPKI platform.<\/p>\n\n\n\n<p><strong>The RPKI Publication Service<\/strong><\/p>\n\n\n\n<p>When users prefer to host their own CA, they currently are automatically also responsible to publish their own RPKI objects. This is the current \u201cDelegated RPKI\u201d model. However, in practice, we see that these users often don\u2019t have the capacity to facilitate highly available publication points. In the last year, APNIC and ARIN already released their publication service for users who want to operate their own CA. This year, RIPE NCC will also make this service available through our RPKI Dashboard.<\/p>\n\n\n\n<p>And there is more\u2026.<\/p>\n\n\n\n<p>In 2022, our focus continues to be on the resiliency and security of the RPKI system. Of course, we will have another penetration test on our software and we have also signed an agreement with a third party to have a Red Team test performed. We keep improving our RRDP and rsync publication infrastructure and we will improve our monitoring and alerting. These things never stop. But we also want to improve our RPKI dashboard in the future, by adding other RPKI objects that become standardized in the IETF and route\/route6 functionality.<\/p>\n\n\n\n<p>Together with the other RIRs, we promise that we will maintain a secure and resilient RPKI Trust Anchor.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Nathalie Trenaman &#8211; Routing Security Programme Manager at RIPE NCC Every user of the RPKI system &#8211; whether they\u2019re on the signing side, the validating side, or both &#8211; deserves to safely rely on our systems and must be able to trust that the data we publish is accurate and accessible. In the global [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":17179,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1088],"taxonomy-authors":[1192],"tipo_autor":[],"class_list":["post-17182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-may-2022-edition","taxonomy-authors-nathalie-trenaman-en"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | RPKI: Resiliency and Trust<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | RPKI: Resiliency and Trust\" \/>\n<meta property=\"og:description\" content=\"By Nathalie Trenaman &#8211; Routing Security Programme Manager at RIPE NCC Every user of the RPKI system &#8211; whether they\u2019re on the signing side, the validating side, or both &#8211; deserves to safely rely on our systems and must be able to trust that the data we publish is accurate and accessible. In the global [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-17T19:46:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-07T16:49:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"RPKI: Resiliency and Trust\",\"datePublished\":\"2022-05-17T19:46:26+00:00\",\"dateModified\":\"2022-06-07T16:49:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\"},\"wordCount\":952,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\",\"name\":\"LACNIC Blog | RPKI: Resiliency and Trust\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png\",\"datePublished\":\"2022-05-17T19:46:26+00:00\",\"dateModified\":\"2022-06-07T16:49:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RPKI: Resiliency and Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | RPKI: Resiliency and Trust","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | RPKI: Resiliency and Trust","og_description":"By Nathalie Trenaman &#8211; Routing Security Programme Manager at RIPE NCC Every user of the RPKI system &#8211; whether they\u2019re on the signing side, the validating side, or both &#8211; deserves to safely rely on our systems and must be able to trust that the data we publish is accurate and accessible. In the global [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2022-05-17T19:46:26+00:00","article_modified_time":"2022-06-07T16:49:26+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"RPKI: Resiliency and Trust","datePublished":"2022-05-17T19:46:26+00:00","dateModified":"2022-06-07T16:49:26+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/"},"wordCount":952,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/","url":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/","name":"LACNIC Blog | RPKI: Resiliency and Trust","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","datePublished":"2022-05-17T19:46:26+00:00","dateModified":"2022-06-07T16:49:26+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/rpki-resiliency-and-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"RPKI: Resiliency and Trust"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/05\/rpki-mayo-2022.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":17177,"post_title":"RPKI: Resiliencia y confianza","slug":"rpki-resiliencia-y-confianza","href":"https:\/\/blog.lacnic.net\/rpki-resiliencia-y-confianza\/"},{"locale":"pt_BR","id":17184,"post_title":"RPKI: Resili\u00eancia e confian\u00e7a\u00a0 \u00a0","slug":"rpki-resiliencia-e-confianca","href":"https:\/\/blog.lacnic.net\/pt-br\/rpki-resiliencia-e-confianca\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/17182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=17182"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/17182\/revisions"}],"predecessor-version":[{"id":17355,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/17182\/revisions\/17355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/17179"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=17182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=17182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=17182"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=17182"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=17182"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=17182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}