{"id":1135,"date":"2024-10-10T21:04:07","date_gmt":"2024-10-10T21:04:07","guid":{"rendered":"https:\/\/grupoverytel.com\/index.php\/2024\/10\/10\/seguridad-de-instalaciones-militares-y-policiales-a-traves-de-decisiones-basadas-en-datos-copy\/"},"modified":"2024-10-10T21:14:04","modified_gmt":"2024-10-10T21:14:04","slug":"hardening-de-dispositivos-xtam-fortaleciendo-la-seguridad-de-infraestructuras-criticas","status":"publish","type":"post","link":"https:\/\/grupoverytel.com\/index.php\/2024\/10\/10\/hardening-de-dispositivos-xtam-fortaleciendo-la-seguridad-de-infraestructuras-criticas\/","title":{"rendered":"Hardening de Dispositivos XTAM: Fortaleciendo la Seguridad de Infraestructuras Cr\u00edticas"},"content":{"rendered":"[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb right_padding_desktop=\u00bb5%\u00bb left_padding_phone=\u00bb2%\u00bb constrain_group_6=\u00bbyes\u00bb right_padding_phone=\u00bb2%\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text text_direction=\u00bbdefault\u00bb]<strong><span class=\"TextRun SCXW146452309 BCX4\" lang=\"ES-CO\" xml:lang=\"ES-CO\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146452309 BCX4\">Bogot\u00e1, 10 de octubre 24<\/span><\/span><\/strong><span class=\"TextRun SCXW146452309 BCX4\" lang=\"ES-CO\" xml:lang=\"ES-CO\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146452309 BCX4\"> &#8211; <\/span><span class=\"NormalTextRun SCXW146452309 BCX4\">En un entorno donde las amenazas a la seguridad inform\u00e1tica crecen en complejidad y sofisticaci\u00f3n, XTAM ha adoptado un enfoque proactivo para proteger sus dispositivos y sistemas. La necesidad de garantizar operaciones seguras y fiables, as\u00ed como de cumplir con normativas y est\u00e1ndares de seguridad, motiv\u00f3 la implementaci\u00f3n de medidas avanzadas de <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW146452309 BCX4\">hardening<\/span><span class=\"NormalTextRun SCXW146452309 BCX4\"> en su infraestructura tecnol\u00f3gica.<\/span><\/span><span class=\"EOP SCXW146452309 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><b><span data-contrast=\"auto\">Frente a las Amenazas Crecientes<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">La creciente ola de ciberataques y las exigencias regulatorias subrayan la importancia de robustecer la seguridad de los sistemas. XTAM, consciente de estos desaf\u00edos, ha priorizado la protecci\u00f3n integral de su infraestructura, asegurando que cada dispositivo conectado funcione de manera segura. Para ello, XTAM adopt\u00f3 las recomendaciones del Center for Internet Security (CIS), aplicando las mejores pr\u00e1cticas de hardening en servidores Ubuntu.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h4><span class=\"TextRun SCXW134363577 BCX4\" lang=\"ES-CO\" xml:lang=\"ES-CO\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW134363577 BCX4\">Medidas de Seguridad Implementadas<\/span><\/span><span class=\"EOP SCXW134363577 BCX4\" data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][image_with_animation image_url=\u00bb1138&#8243; image_size=\u00bbfull\u00bb animation_type=\u00bbentrance\u00bb animation=\u00bbNone\u00bb animation_movement_type=\u00bbtransform_y\u00bb hover_animation=\u00bbnone\u00bb alignment=\u00bb\u00bb border_radius=\u00bbnone\u00bb box_shadow=\u00bbnone\u00bb image_loading=\u00bbdefault\u00bb max_width=\u00bb100%\u00bb max_width_mobile=\u00bbdefault\u00bb][\/vc_column][\/vc_row][vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb right_padding_desktop=\u00bb5%\u00bb left_padding_phone=\u00bb2%\u00bb constrain_group_6=\u00bbyes\u00bb right_padding_phone=\u00bb2%\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb gradient_type=\u00bbdefault\u00bb shape_type=\u00bb\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb][vc_column_text text_direction=\u00bbdefault\u00bb]<span data-contrast=\"auto\">Las principales acciones llevadas a cabo por XTAM, basadas en las gu\u00edas del CIS para Ubuntu Server, incluyeron:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Configuraci\u00f3n Inicial<\/span><\/b><span data-contrast=\"auto\">: Se instal\u00f3 Ubuntu Server bajo los lineamientos del CIS Benchmark, asegurando una configuraci\u00f3n m\u00ednima y esencial para operar de manera segura.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Actualizaci\u00f3n del Sistema<\/span><\/b><span data-contrast=\"auto\">: Se implement\u00f3 un procedimiento regular de actualizaci\u00f3n tanto para el sistema operativo como para los paquetes instalados, garantizando la correcci\u00f3n constante de vulnerabilidades.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Control de Acceso<\/span><\/b><span data-contrast=\"auto\">: Se reforz\u00f3 la gesti\u00f3n de usuarios y permisos, limitando el acceso a personal autorizado y configurando contrase\u00f1as robustas.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Firewall y Seguridad de Red<\/span><\/b><span data-contrast=\"auto\">: La configuraci\u00f3n de un firewall (UFW) restringi\u00f3 el tr\u00e1fico no autorizado, permitiendo solo las conexiones esenciales.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Auditor\u00eda y Monitoreo<\/span><\/b><span data-contrast=\"auto\">: Se integraron herramientas de auditor\u00eda para monitorear las actividades del sistema, facilitando la detecci\u00f3n r\u00e1pida de comportamientos an\u00f3malos.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Desactivaci\u00f3n de Servicios Innecesarios<\/span><\/b><span data-contrast=\"auto\">: Se identificaron y desactivaron servicios no esenciales que podr\u00edan representar vulnerabilidades.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Protecci\u00f3n de Datos<\/span><\/b><span data-contrast=\"auto\">: Se implementaron pol\u00edticas de cifrado para proteger la transmisi\u00f3n de datos sensibles y se establecieron medidas de respaldo para recuperaci\u00f3n ante desastres.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n[\/vc_column_text][vc_column_text text_direction=\u00bbdefault\u00bb]\n<h4><b><span data-contrast=\"auto\">Logros en Seguridad y Confiabilidad<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Gracias a estas acciones, XTAM ha logrado avances significativos en materia de seguridad, incluyendo:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Fortalecimiento de la Seguridad<\/span><\/b><span data-contrast=\"auto\">: El servidor Ubuntu alcanz\u00f3 un nivel adecuado de protecci\u00f3n al cumplir con los est\u00e1ndares del CIS Benchmark.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Cumplimiento de Normativas<\/span><\/b><span data-contrast=\"auto\">: La infraestructura cumple con las pol\u00edticas de seguridad necesarias, permitiendo una integraci\u00f3n segura con la sala SIES M.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Minimizaci\u00f3n de Riesgos<\/span><\/b><span data-contrast=\"auto\">: La desactivaci\u00f3n de servicios innecesarios y la aplicaci\u00f3n de controles de acceso redujeron significativamente los riesgos de seguridad.<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Monitoreo en Tiempo Real<\/span><\/b><span data-contrast=\"auto\">: Las herramientas de auditor\u00eda permiten la detecci\u00f3n temprana y respuesta r\u00e1pida ante posibles incidentes de seguridad.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Con estas medidas, XTAM ha asegurado la integridad y confidencialidad de su infraestructura, estableciendo una base s\u00f3lida para enfrentar los desaf\u00edos de ciberseguridad en un entorno digital cada vez m\u00e1s exigente.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span>[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb right_padding_desktop=\u00bb5%\u00bb left_padding_phone=\u00bb2%\u00bb constrain_group_6=\u00bbyes\u00bb right_padding_phone=\u00bb2%\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-1135","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/posts\/1135"}],"collection":[{"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/comments?post=1135"}],"version-history":[{"count":2,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/posts\/1135\/revisions"}],"predecessor-version":[{"id":1139,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/posts\/1135\/revisions\/1139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/media\/1137"}],"wp:attachment":[{"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/media?parent=1135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/categories?post=1135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoverytel.com\/index.php\/wp-json\/wp\/v2\/tags?post=1135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}