
{"id":2604,"date":"2020-05-19T15:10:53","date_gmt":"2020-05-19T13:10:53","guid":{"rendered":"http:\/\/blog.phoenixcontact.com\/marketing-pl\/?p=2604"},"modified":"2021-08-03T10:26:11","modified_gmt":"2021-08-03T08:26:11","slug":"security-by-design","status":"publish","type":"post","link":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/","title":{"rendered":"Security by design"},"content":{"rendered":"\n<p>M\u00f3wi\u0105c o cyberbezpiecze\u0144stwie w odniesieniu do produkt\u00f3w Phoenix Contact cz\u0119sto u\u017cywamy wyra\u017cenia \u201eSecurity by design\u201d. Oznacza to, \u017ce nasze produkty zosta\u0142y zaprojektowane z trosk\u0105 o zachowanie wszystkich aktualnych standard\u00f3w dotycz\u0105cych bezpiecze\u0144stwa. W przypadku sterownik\u00f3w PLCnext Technology jest to seria norm oznaczonych jako IEC 62443.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000\" alt=\"\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.isa.org\/intech\/201810standards\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Czytaj wi\u0119cej o ISA\/IEC 62443 standardach cyberbezpiecze\u0144stwa automatyki   ISA\/IEC 62443. (otwiera si\u0119 na nowej zak\u0142adce)\">Czytaj wi\u0119cej o ISA\/IEC 62443 standardach cyberbezpiecze\u0144stwa automatyki   ISA\/IEC 62443.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Kiedy to si\u0119 zacz\u0119\u0142o?<\/h3>\n\n\n\n<p>Cyberbezpiecze\u0144stwo w instalacjach przemys\u0142owych (w odr\u00f3\u017cnieniu od typowych system\u00f3w IT) jest zagadnieniem nowym. Ze wzgl\u0119du na sw\u00f3j strategiczny charakter systemy przemys\u0142owe by\u0142y zazwyczaj fizycznie odizolowane od zewn\u0119trznych sieci komputerowych, co oznacza\u0142o trudniejszy dost\u0119p os\u00f3b trzecich. Innymi s\u0142owy: odseparowanie stanowi\u0142o g\u0142\u00f3wny filar zabezpieczaj\u0105cy takich system\u00f3w.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stuxnet<\/h3>\n\n\n\n<p>Globalna zmiana podej\u015bcia do tematu nast\u0105pi\u0142a w roku 2010, kiedy odnotowano wzrost liczby pr\u00f3b przeprowadzenia cybernetycznych atak\u00f3w na instalacje przemys\u0142owe. Zidentyfikowano mi\u0119dzy innymi najs\u0142ynniejszego robaka \u2013 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet<\/a>, kt\u00f3ry zaatakowa\u0142 ira\u0144sk\u0105 plac\u00f3wk\u0119 nuklearn\u0105, staj\u0105c si\u0119 pierwszym w historii robakiem atakuj\u0105cym bezpo\u015brednio sterowniki PLC.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Standardy bezpiecze\u0144stwa system\u00f3w automatyki<\/h3>\n\n\n\n<p>Mniej wi\u0119cej w tym samym czasie stowarzyszenie International\nSociety for Automation (ISA) zacz\u0119\u0142o opracowywa\u0107 standardy bezpiecze\u0144stwa dla element\u00f3w\ninstalacji przemys\u0142owych. Na podstawie dokumentacji opracowanej przez ISA\nMi\u0119dzynarodowa Komisja Elektrotechniczna (IEC) opracowuje kolejne zeszyty\nwchodz\u0105ce w sk\u0142ad serii norm IEC 62334 \u2013 Security for Industrial Automation and\nControl Systems. Normy te kompleksowo definiuj\u0105 bezpiecze\u0144stwo w systemach\nsterowania i automatyki przemys\u0142owej, zawieraj\u0105 wytyczne dotycz\u0105ce produkcji\nurz\u0105dze\u0144 i funkcjonalno\u015bci, jakie te urz\u0105dzenia powinny posiada\u0107, aby mo\u017cna\nuzna\u0107 je za (cyber)bezpieczne.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Sterowniki PLCnext Technology<\/h2>\n\n\n\n<p>Phoenix Contact jako jedna z pierwszych firm w Niemczech\nzosta\u0142a certyfikowana przez T\u00dcV S\u00dcD jako wytwarzaj\u0105ca swoje sterowniki w\nzgodzie z zapisami norm IEC 62443. Mo\u017cemy zatem m\u00f3wi\u0107, \u017ce nasze sterowniki\nzapewniaj\u0105 \u201eSecurity by design\u201d. <\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/004546a488f258f77af8de08d2e23b21\/-C96.6838488%25x72.5128866%25%2C1.78694158%25%2C13.32474227%25-S1200x900\" alt=\"\" \/><\/figure>\n\n\n\n<p>Ju\u017c przy pierwszym kontakcie z naszymi sterownikami\nu\u017cytkownik zauwa\u017cy cechy zwi\u0105zane z cyberbezpiecze\u0144stwem:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Konieczno\u015b\u0107 logowania si\u0119 do PLC \u2013 aby wprowadzi\u0107\njakiekolwiek zmiany na sterowniku wymagane jest zalogowanie si\u0119 przy u\u017cyciu\nunikatowego loginu i has\u0142a.<\/li><li>Role przypisane do u\u017cytkownik\u00f3w \u2013 kontu\nu\u017cytkownika, na kt\u00f3re si\u0119 logujemy, przypisuje si\u0119 konkretne role. Oznacza to\nna przyk\u0142ad, \u017ce nie ka\u017cdy u\u017cytkownik mo\u017ce wgra\u0107 program na sterownik.<\/li><li>Bezpieczny dost\u0119p do webserwera \u2013 przegl\u0105darka\nnawi\u0105zuje po\u0142\u0105czenie szyfrowanym protoko\u0142em HTTPS.<\/li><li>Bezpieczny dost\u0119p do plik\u00f3w na sterowniku za pomoc\u0105\nszyfrowanego protoko\u0142u SFTP.<\/li><\/ul>\n\n\n\n<p>Powy\u017csze podstawowe mechanizmy to tylko wierzcho\u0142ek g\u00f3ry\nlodowej zabezpiecze\u0144 stosowanych przez Phoenix Contact. Nasze sterowniki kryj\u0105\nw sobie du\u017co wi\u0119cej zaawansowanych rozwi\u0105za\u0144, kt\u00f3rych celem jest zapewnienie\nnajwy\u017cszej jako\u015bci ochrony.<\/p>\n\n\n\n<p>Jednym nich jest sprz\u0119towy komponent <a href=\"https:\/\/pl.wikipedia.org\/wiki\/Trusted_Platform_Module\">Trusted Platform Module<\/a> (TPM) znajduj\u0105cy si\u0119 na p\u0142ycie g\u0142\u00f3wnej sterownik\u00f3w. Jest to wyspecjalizowany koprocesor wspomagaj\u0105cy wszystkie operacje obliczeniowe zwi\u0105zane z kryptografi\u0105. Zastosowanie w naszych PLC modu\u0142u TPM znacz\u0105co wp\u0142ywa na wzrost wydajno\u015bci i skuteczno\u015bci szyfrowania wszystkich danych przetwarzanych przez sterownik.<\/p>\n\n\n\n<p>Spo\u015br\u00f3d wielu mechanizm\u00f3w, kt\u00f3re korzystaj\u0105 z mo\u017cliwo\u015bci\ndawanych przez TPM, warto wymieni\u0107:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Szyfrowany dost\u0119p do konsoli poprzez SSH<\/li><li>Mo\u017cliwo\u015b\u0107 nawi\u0105zywania po\u0142\u0105cze\u0144 poprzez tunele\nVPN <\/li><li>Obs\u0142ug\u0119 certyfikat\u00f3w bezpiecze\u0144stwa i centr\u00f3w\ncertyfikacji<\/li><li>Wykorzystanie bezpiecznych protoko\u0142\u00f3w SSL i TLS<\/li><\/ul>\n\n\n\n<p>Korzystaj\u0105c ze sterownik\u00f3w PLCnext Technology u\u017cytkownik\nmo\u017ce tworzy\u0107 rozbudowane aplikacje i decydowa\u0107, jakiego rodzaju rozwi\u0105zania\ncyberbezpiecze\u0144stwa zastosuje \u2013 Phoenix Contact oferuje \u201eSecurity by design\u201d.<\/p>\n\n\n<table style=\"height: 42px\" width=\"576\">\n<tbody>\n<tr bgcolor=\"#edf0f3\">\n<td width=\"30\"><em>Autor:<\/em><\/td>\n<td width=\"350\"><em>Konrad Sobczyk\u2013 Specjalista ds. Szkole\u0144 i Wsparcia Technicznego<\/em><\/td>\n<td width=\"20\"><a href=\"https:\/\/pl.linkedin.com\/in\/konradsobczyk\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1637 size-full\" src=\"http:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-content\/uploads\/sites\/4\/2017\/08\/linkedin50.png\" alt=\"\" width=\"50\" height=\"50\"><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>","protected":false},"excerpt":{"rendered":"<p>M\u00f3wi\u0105c o cyberbezpiecze\u0144stwie w odniesieniu do produkt\u00f3w Phoenix Contact cz\u0119sto u\u017cywamy wyra\u017cenia \u201eSecurity by design\u201d. Oznacza to, \u017ce nasze produkty zosta\u0142y zaprojektowane z trosk\u0105 o zachowanie wszystkich aktualnych standard\u00f3w dotycz\u0105cych bezpiecze\u0144stwa. W przypadku sterownik\u00f3w PLCnext Technology jest to seria norm oznaczonych jako IEC 62443. Czytaj wi\u0119cej o ISA\/IEC 62443 standardach cyberbezpiecze\u0144stwa automatyki ISA\/IEC 62443. Kiedy [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[162,93,176],"tags":[148,42,36],"class_list":["post-2604","post","type-post","status-publish","format-standard","hentry","category-technical_blog","category-plc","category-plcnext-technology","tag-automatyka","tag-automatyka-przemyslowa","tag-sterownik-plc"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security by design | Poland<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security by design | Poland\" \/>\n<meta property=\"og:description\" content=\"M\u00f3wi\u0105c o cyberbezpiecze\u0144stwie w odniesieniu do produkt\u00f3w Phoenix Contact cz\u0119sto u\u017cywamy wyra\u017cenia \u201eSecurity by design\u201d. Oznacza to, \u017ce nasze produkty zosta\u0142y zaprojektowane z trosk\u0105 o zachowanie wszystkich aktualnych standard\u00f3w dotycz\u0105cych bezpiecze\u0144stwa. W przypadku sterownik\u00f3w PLCnext Technology jest to seria norm oznaczonych jako IEC 62443. Czytaj wi\u0119cej o ISA\/IEC 62443 standardach cyberbezpiecze\u0144stwa automatyki ISA\/IEC 62443. Kiedy [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/\" \/>\n<meta property=\"og:site_name\" content=\"Poland\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-19T13:10:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-03T08:26:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000\" \/>\n<meta name=\"author\" content=\"phoenixcontactpolska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"phoenixcontactpolska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/\",\"name\":\"Security by design | Poland\",\"isPartOf\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000\",\"datePublished\":\"2020-05-19T13:10:53+00:00\",\"dateModified\":\"2021-08-03T08:26:11+00:00\",\"author\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/c0d9678ec82bb9235a47a5ae359a41a5\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage\",\"url\":\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000\",\"contentUrl\":\"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security by design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#website\",\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/\",\"name\":\"Poland\",\"description\":\"PHOENIX CONTACT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/c0d9678ec82bb9235a47a5ae359a41a5\",\"name\":\"phoenixcontactpolska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8bca7e72a989c2b40d32eb2709d67dc7d1c6f0c98721ee9452586162da95e0c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8bca7e72a989c2b40d32eb2709d67dc7d1c6f0c98721ee9452586162da95e0c?s=96&d=mm&r=g\",\"caption\":\"phoenixcontactpolska\"},\"url\":\"https:\/\/blog.phoenixcontact.com\/marketing-pl\/author\/plka01\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security by design | Poland","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/","og_locale":"pl_PL","og_type":"article","og_title":"Security by design | Poland","og_description":"M\u00f3wi\u0105c o cyberbezpiecze\u0144stwie w odniesieniu do produkt\u00f3w Phoenix Contact cz\u0119sto u\u017cywamy wyra\u017cenia \u201eSecurity by design\u201d. Oznacza to, \u017ce nasze produkty zosta\u0142y zaprojektowane z trosk\u0105 o zachowanie wszystkich aktualnych standard\u00f3w dotycz\u0105cych bezpiecze\u0144stwa. W przypadku sterownik\u00f3w PLCnext Technology jest to seria norm oznaczonych jako IEC 62443. Czytaj wi\u0119cej o ISA\/IEC 62443 standardach cyberbezpiecze\u0144stwa automatyki ISA\/IEC 62443. Kiedy [&hellip;]","og_url":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/","og_site_name":"Poland","article_published_time":"2020-05-19T13:10:53+00:00","article_modified_time":"2021-08-03T08:26:11+00:00","og_image":[{"url":"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000","type":"","width":"","height":""}],"author":"phoenixcontactpolska","twitter_card":"summary_large_image","twitter_misc":{"Napisane przez":"phoenixcontactpolska","Szacowany czas czytania":"3 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/","url":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/","name":"Security by design | Poland","isPartOf":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage"},"image":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage"},"thumbnailUrl":"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000","datePublished":"2020-05-19T13:10:53+00:00","dateModified":"2021-08-03T08:26:11+00:00","author":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/c0d9678ec82bb9235a47a5ae359a41a5"},"breadcrumb":{"@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#primaryimage","url":"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000","contentUrl":"https:\/\/dam-mdc.phoenixcontact.com\/rendition\/156443151564\/f24ebde93d6406291055fdaa194ad355\/-C65.20298493%25x88.27102804%25%2C34.79701507%25%2C0.25700935%25-S670x10000"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/security-by-design\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/"},{"@type":"ListItem","position":2,"name":"Security by design"}]},{"@type":"WebSite","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#website","url":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/","name":"Poland","description":"PHOENIX CONTACT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Person","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/c0d9678ec82bb9235a47a5ae359a41a5","name":"phoenixcontactpolska","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8bca7e72a989c2b40d32eb2709d67dc7d1c6f0c98721ee9452586162da95e0c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8bca7e72a989c2b40d32eb2709d67dc7d1c6f0c98721ee9452586162da95e0c?s=96&d=mm&r=g","caption":"phoenixcontactpolska"},"url":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/author\/plka01\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/posts\/2604","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/comments?post=2604"}],"version-history":[{"count":4,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/posts\/2604\/revisions"}],"predecessor-version":[{"id":2971,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/posts\/2604\/revisions\/2971"}],"wp:attachment":[{"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/media?parent=2604"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/categories?post=2604"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.phoenixcontact.com\/marketing-pl\/wp-json\/wp\/v2\/tags?post=2604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}