{"id":26699,"date":"2024-06-27T10:51:09","date_gmt":"2024-06-27T08:51:09","guid":{"rendered":"https:\/\/devity.eu\/the-invisible-threat-why-industrial-iot-security-needs-a-pki\/"},"modified":"2025-11-19T12:58:11","modified_gmt":"2025-11-19T11:58:11","slug":"the-invisible-threat-why-industrial-iot-security-needs-a-pki","status":"publish","type":"post","link":"https:\/\/devity.eu\/en\/the-invisible-threat-why-industrial-iot-security-needs-a-pki\/","title":{"rendered":"The Invisible Threat: Why Industrial IoT Security Needs a PKI"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26699\" class=\"elementor elementor-26699 elementor-22902\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4038eee e-flex e-con-boxed e-con e-parent\" data-id=\"4038eee\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-bd51595 e-flex e-con-boxed e-con e-child\" data-id=\"bd51595\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b19912b elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b19912b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb90634\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > The Invisible Threat: Why Industrial IoT Security Needs a PKI<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47a4bda7 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47a4bda7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4229f977\" data-id=\"4229f977\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7562d58 elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"7562d58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb913fa\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h1 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h1\"  > The Invisible Threat: Why Industrial IoT Security Needs a PKI<\/h1>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7d52b4 elementor-widget elementor-widget-ld_fancy_image\" data-id=\"e7d52b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \" data-shadow-style=\"1\">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/devity.eu\/wp-content\/uploads\/2024\/06\/PKI_IoT-Sicherheit.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fbe6a6 elementor-widget elementor-widget-menu-anchor\" data-id=\"0fbe6a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"challenges\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29170b4a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"29170b4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb93fc6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > In industrial applications such as factories and production facilities, IoT devices play a central role in monitoring, controlling, and optimizing processes. However, inadequate IoT security poses significant risks, especially in critical infrastructures. Cyberattacks on IoT devices can lead to severe consequences, including data loss, financial damage, and even threats to employee safety.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54db2527 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"54db2527\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb94dc2\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What Risks arise from Inadequate IoT Security?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-618be8c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"618be8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb95aef\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > In a typical attack scenario, hackers gain access to operational technology (OT) systems via IT networks. Malware infiltrates and paralyzes production processes, often encrypting databases to demand a ransom. Such incidents result in costly production downtimes and require forensic experts to examine and restore the systems. Beyond financial losses, these attacks erode trust and cause substantial reputational damage.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc2d5d elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"3bc2d5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb96733\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > To address these vulnerabilities, the industry standard IEC 62443 mandates the use of digital certificates. A Public Key Infrastructure (PKI) offers a secure solution for creating and managing these certificates, ensuring the security and trustworthiness of IoT devices.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9273fcc elementor-widget elementor-widget-menu-anchor\" data-id=\"9273fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"pki\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ff2183 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"8ff2183\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb97593\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What is a Public Key Infrastructure (PKI)?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b48adc4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6b48adc4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb98049\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > A PKI is a system comprising both software and hardware that generates, distributes, and verifies digital certificates. It establishes the technical and organizational infrastructure required to manage digital certificates throughout their lifecycle, ensuring their reliability and security. PKI is essential in a modern information society, supporting centralized trust services and advanced key management.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fba82a elementor-widget elementor-widget-menu-anchor\" data-id=\"9fba82a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"components\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc7941a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"fc7941a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb98e2d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What are the Key Components of a PKI?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de783d8 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"de783d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb99bda\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > A robust PKI relies on several critical components:<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc889a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2fc889a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9a98a\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > Digital Certificates<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d65671e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"d65671e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9b79a\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > These electronic files confirm the identity of a person, device, or organization, linking their public key to their identity. Certificates serve as digital attestations or electronic IDs.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a94328a elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"a94328a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9c575\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > Certificate Authority (CA)<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9ff49c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"c9ff49c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9d3b1\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > A CA is a trusted entity responsible for issuing and managing digital certificates. It verifies the certificate holder's identity and binds it to the public key.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e454db9 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"e454db9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9e222\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h4 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h4\"  > Supporting Elements<\/h4>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-adc5824 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"adc5824\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eb9f09a\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<p class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left p\"  > These include subordinate registration authorities, directory services for certificates, certificate revocation lists, and validation services.<\/p>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54055eb elementor-widget elementor-widget-ld_fancy_image\" data-id=\"54055eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_fancy_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"lqd-imggrp-single d-block pos-rel \">\n\t\t\t<div class=\"lqd-imggrp-img-container d-inline-flex pos-rel align-items-center justify-content-center \">\n\t\t\t\t\t\t\t\t<figure class=\"w-100 pos-rel\">\n\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"710\" height=\"398\" src=\"https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/Serverraum_Features-1.jpg\" class=\"attachment-full size-full wp-image-30130\" alt=\"\" srcset=\"https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/Serverraum_Features-1.jpg 710w, https:\/\/devity.eu\/wp-content\/uploads\/2025\/11\/Serverraum_Features-1-300x168.jpg 300w\" sizes=\"(max-width: 710px) 100vw, 710px\" itemprop=\"image\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22ac5fb elementor-widget elementor-widget-menu-anchor\" data-id=\"22ac5fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"Functionality\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96a41de elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"96a41de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba0ffd\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > How does a PKI work?  <\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-788fb8f elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"788fb8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba184d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 1. Key Generation<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41d2a8e elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"41d2a8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba22ac\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Each IoT device generates a key pair: a private key (kept secret) and a public key (shared).<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-abfcce4 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"abfcce4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba29cf\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 2. Certificate Application<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82152d5 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"82152d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba33cd\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The subscriber applies for a digital certificate from a certification authority, providing identity information and the public key.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b66dc38 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"b66dc38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba3dcd\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 3. Verification<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd8bd4c elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"cd8bd4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba44d8\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > The CA authenticates the subscriber\u2019s identity using secure methods.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c56ee0 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2c56ee0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba4be6\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 4. Certificate Issuance<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67eb373 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"67eb373\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba533c\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > After successful verification, the CA signs the certificate with its private key, confirming its authenticity. The signed certificate is then sent to the subscriber.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6441301 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"6441301\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba5aa8\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h5 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h5\"  > 5. Secure Communication<\/h5>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b16851 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"2b16851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba628d\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > Subscribers use certificates to verify each other\u2019s identities. Once verified, encrypted messages are exchanged using public keys to ensure confidentiality. Digital signatures ensure data integrity and confirm the sender\u2019s authenticity.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68262b4 elementor-widget elementor-widget-menu-anchor\" data-id=\"68262b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"use\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0026777 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"0026777\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba6b92\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h3 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title lqd-highlight-classic lqd-highlight-grow-left h3\"  > What Advantages and Value does a PKI offer?<\/h3>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60c9f68 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"60c9f68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555eba7277\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > A PKI is indispensable in industrial automation, offering a range of benefits:<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b231029 e-flex e-con-boxed e-con e-parent\" data-id=\"b231029\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-76a1dea e-con-full e-flex e-con e-child\" data-id=\"76a1dea\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a66dfe8 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"a66dfe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_a66dfe8\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Authentication <\/h3>\t\t\t\t<p>Verifies the identities of users, devices, and organizations, ensuring trustworthiness through digital certificates.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-06e5e1d e-con-full e-flex e-con e-child\" data-id=\"06e5e1d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8041b76 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"8041b76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_8041b76\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Confidentiality <\/h3>\t\t\t\t<p>Protects data through encryption, ensuring only authorized parties can access sensitive information.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28af480 e-con-full e-flex e-con e-child\" data-id=\"28af480\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6374f1c elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"6374f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_6374f1c\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Integrity   <\/h3>\t\t\t\t<p>Uses digital signatures to prevent unnoticed alterations to data during transmission or storage.<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f128279 e-con-full e-flex e-con e-child\" data-id=\"f128279\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bb9fa6 elementor-widget__width-initial elementor-align-left elementor-widget elementor-widget-ld_icon_box\" data-id=\"9bb9fa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div id=\"ld_icon_box_9bb9fa6\" class=\"iconbox d-flex flex-grow-1 pos-rel iconbox-side\"   >\n\n\t\t\t\t\n\t\t\t\t<div class=\"iconbox-icon-wrap  \"><div class=\"iconbox-icon-container d-inline-flex   \"><\/div><\/div>\n\t\t\t\t\n\t\t\t\t<div class=\"contents \">\n\t\t\t\t\n\t\t\t\t<h3 class=\"lqd-iconbox-heading \" >Scalability <\/h3>\t\t\t\t<p>Efficiently manages a vast number of users, devices, and organizations, making it suitable for complex networks and environments.\n\n<\/p>\n\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9a32de2 elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"9a32de2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69f555ebaf158\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<div class=\"ld-fh-element d-inline-block pos-rel  lqd-highlight-classic lqd-highlight-grow-left div\"  > In the age of Industry 4.0, where IoT devices are integral to industrial processes, security cannot be an afterthought. A PKI provides the foundation for robust IoT security, ensuring authentication, confidentiality, and integrity while enabling scalable management. By adopting PKI-based solutions, industries can mitigate risks, safeguard operations, and build trust in an increasingly connected world.<\/div>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"lqd-css-sticky-column elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-14c56c80 elementor-hidden-tablet elementor-hidden-mobile\" style=\"--lqd-sticky-offset:30px\" data-id=\"14c56c80\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5bf12455 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5bf12455\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0e0c05f\" data-id=\"0e0c05f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3db9ff elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b3db9ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-708becbe elementor-widget elementor-widget-ld_custom_menu\" data-id=\"708becbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ld_custom_menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t<div\t\t\t\tclass=\"lqd-fancy-menu lqd-custom-menu pos-rel menu-items-has-fill lqd-menu-td-none\"\n\t\t\t\t\t\t\t>\n\t\t\t\n\t\t\t\t\t\t\t<ul class=\"reset-ul\" id=\"lqd-custom-menu-708becbe\" >\n\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#challenges\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat Risks arise from Inadequate IoT Security?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#pki\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat is a Public Key Infrastructure (PKI)?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#components\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat are the Key Components and of a PKI?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#Functionality\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tHow does a PKI work?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\n\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t<a  href=\"#use\" target=\"_self\" >\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"link-icon d-inline-flex hide-if-empty right-icon icon-next-to-label\"><i aria-hidden=\"true\" class=\"lqd-icn-ess icon-ion-ios-arrow-forward\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat Advantages and Value does a PKI offer?\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\n\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Invisible Threat: Why Industrial IoT Security Needs a PKI The Invisible Threat: Why Industrial IoT Security Needs a PKI In industrial applications such as factories and production facilities, IoT devices play a central role in monitoring, controlling, and optimizing processes. However, inadequate IoT security poses significant risks, especially in critical infrastructures. Cyberattacks on IoT [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":30252,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61,1],"tags":[],"class_list":["post-26699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-unkategorisiert"],"_links":{"self":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/comments?post=26699"}],"version-history":[{"count":4,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26699\/revisions"}],"predecessor-version":[{"id":30256,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/posts\/26699\/revisions\/30256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/media\/30252"}],"wp:attachment":[{"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/media?parent=26699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/categories?post=26699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devity.eu\/en\/wp-json\/wp\/v2\/tags?post=26699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}