{"id":28471,"date":"2025-01-07T17:19:46","date_gmt":"2025-01-07T17:19:46","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=28471"},"modified":"2025-01-07T17:22:44","modified_gmt":"2025-01-07T17:22:44","slug":"rpki-optimization-and-security-the-lacnic-checklist","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/","title":{"rendered":"RPKI Optimization and Security: The LACNIC Checklist"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/jorge-cano\/\">Jorge Cano<\/a>, Senior Software Architect at LACNIC<\/p>\n\n\n\n<p>Earlier this year, we implemented a new system to manage the cryptographic objects associated with <a href=\"https:\/\/www.lacnic.net\/640\/2\/lacnic\/resource-certification-rpki\" target=\"_blank\" rel=\"noreferrer noopener\">LACNIC&#8217;s Resource Public Key Infrastructure (RPKI) system<\/a>. This system adds significant improvements to the security of the process, including management of the master key, used as a point of trust for validating the information.<\/p>\n\n\n\n<p>This key is maintained offline and is only activated for short periods of time for the sole purpose of re-signing the master certificate on which all cryptographic objects in our section of the RPKI tree rely. This measure not only strengthens protection against potential unauthorized access, but also guarantees greater resilience and trust in the system.<\/p>\n\n\n\n<p>The periods during which the master key is activated are known as \u201c<strong>RPKI Signing Ceremonies<\/strong>.\u201d During these ceremonies, part of the LACNIC staff obtains temporary access to the master key to conduct critical operations, which must be <strong>auditable, repeatable, and free of errors<\/strong> due to omission or carelessness. To ensure these activities are executed properly, we use a checklist or script that ensures each step is carried out accurately, provides transparency, and allows the internal LACNIC team to audit the process.<\/p>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--28471\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/migration-of-the-lacnic-rpki-core\/\">Migration of the LACNIC RPKI Core<\/a><\/div><\/div><\/section>\n\n\n<p>To date, we have completed three signing ceremonies with the participation of members of different LACNIC departments. These ceremonies take place in a controlled environment like our offices at Casa de Internet in Uruguay, under strict security measures and with the presence of witnesses who certify the process.<\/p>\n\n\n\n<p>Seeking to optimize the creation and management of these checklists, we are developing an open-source application, <strong>CheckList<\/strong>, which is<strong> available to the community<\/strong>. This tool allows developers to define steps in a YAML text file, plain text, or using Markdown. It also allows including commands to be executed directly on the command line and display the expected results.<\/p>\n\n\n\n<p>Once created, the list can be published on any web server. The application <strong>allows monitoring progress, checking off steps as they are completed, and recording any incidents or exceptions that occur during execution<\/strong>.After the process is complete, an official document is generated that can be printed or stored digitally to facilitate auditing and ensure a transparent record<\/p>\n\n\n\n<p>We invite you to click <a href=\"https:\/\/github.com\/LACNIC\/checklist\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a> to visit the project webpage or take a look at an <a href=\"https:\/\/ghwww.labs.lacnic.net\/checklist-test\/\" target=\"_blank\" rel=\"noreferrer noopener\">example of a checklist<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Jorge Cano, Senior Software Architect at LACNIC Earlier this year, we implemented a new system to manage the cryptographic objects associated with LACNIC&#8217;s Resource Public Key Infrastructure (RPKI) system. This system adds significant improvements to the security of the process, including management of the master key, used as a point of trust for validating [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[919],"tags":[1280],"archivo":[1345,1451],"taxonomy-authors":[1403],"tipo_autor":[],"class_list":["post-28471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-routing","tag-routing","archivo-editions","archivo-highlights-2023","taxonomy-authors-jorge-cano-en"],"acf":{"author":"Jorge Cano","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist\" \/>\n<meta property=\"og:description\" content=\"By Jorge Cano, Senior Software Architect at LACNIC Earlier this year, we implemented a new system to manage the cryptographic objects associated with LACNIC&#8217;s Resource Public Key Infrastructure (RPKI) system. This system adds significant improvements to the security of the process, including management of the master key, used as a point of trust for validating [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-07T17:19:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T17:22:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"RPKI Optimization and Security: The LACNIC Checklist\",\"datePublished\":\"2025-01-07T17:19:46+00:00\",\"dateModified\":\"2025-01-07T17:22:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\"},\"wordCount\":391,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png\",\"keywords\":[\"Routing\"],\"articleSection\":[\"Routing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\",\"name\":\"LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png\",\"datePublished\":\"2025-01-07T17:19:46+00:00\",\"dateModified\":\"2025-01-07T17:22:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RPKI Optimization and Security: The LACNIC Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist","og_description":"By Jorge Cano, Senior Software Architect at LACNIC Earlier this year, we implemented a new system to manage the cryptographic objects associated with LACNIC&#8217;s Resource Public Key Infrastructure (RPKI) system. This system adds significant improvements to the security of the process, including management of the master key, used as a point of trust for validating [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2025-01-07T17:19:46+00:00","article_modified_time":"2025-01-07T17:22:44+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"RPKI Optimization and Security: The LACNIC Checklist","datePublished":"2025-01-07T17:19:46+00:00","dateModified":"2025-01-07T17:22:44+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/"},"wordCount":391,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","keywords":["Routing"],"articleSection":["Routing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/","url":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/","name":"LACNIC Blog | RPKI Optimization and Security: The LACNIC Checklist","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","datePublished":"2025-01-07T17:19:46+00:00","dateModified":"2025-01-07T17:22:44+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/rpki-optimization-and-security-the-lacnic-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"RPKI Optimization and Security: The LACNIC Checklist"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2025\/01\/optimizacion-seguridad-rpki-checklist.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":28464,"post_title":"Optimizaci\u00f3n y Seguridad en RPKI: Conoce Nuestra Herramienta CheckList","slug":"optimizacion-y-seguridad-en-rpki-conoce-nuestra-herramienta-checklist","href":"https:\/\/blog.lacnic.net\/optimizacion-y-seguridad-en-rpki-conoce-nuestra-herramienta-checklist\/"},{"locale":"pt_BR","id":28474,"post_title":"Otimiza\u00e7\u00e3o e seguran\u00e7a no RPKI: conhe\u00e7a a nossa ferramenta CheckList","slug":"otimizacao-e-seguranca-no-rpki-conheca-a-nossa-ferramenta-checklist","href":"https:\/\/blog.lacnic.net\/pt-br\/otimizacao-e-seguranca-no-rpki-conheca-a-nossa-ferramenta-checklist\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=28471"}],"version-history":[{"count":2,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28471\/revisions"}],"predecessor-version":[{"id":28477,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/28471\/revisions\/28477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/28467"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=28471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=28471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=28471"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=28471"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=28471"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=28471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}