{"id":2022,"date":"2025-12-31T00:33:24","date_gmt":"2025-12-30T23:33:24","guid":{"rendered":"https:\/\/regulated-devsecops.com\/uncategorized\/auditoria-de-seguridad-ci-cd-mapeo-de-cumplimiento-nis2-pci-dss\/"},"modified":"2026-03-26T09:32:42","modified_gmt":"2026-03-26T08:32:42","slug":"ci-cd-security-audit-compliance-mapping-nis2-pci-dss","status":"publish","type":"post","link":"https:\/\/regulated-devsecops.com\/es\/ci-cd-governance-es\/ci-cd-security-audit-compliance-mapping-nis2-pci-dss\/","title":{"rendered":"Auditor\u00eda de Seguridad CI\/CD \u2014 Mapeo de Cumplimiento (NIS2 \/ PCI DSS)"},"content":{"rendered":"\n<p>Esta tabla de auditor\u00eda mapea los controles de <a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">seguridad CI\/CD<\/a> con los requisitos de la Directiva NIS2 y los controles de PCI DSS.<br>Apoya la gesti\u00f3n de riesgos, la seguridad de la cadena de suministro y la preparaci\u00f3n para auditor\u00edas en sistemas cr\u00edticos y relacionados con pagos.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Gesti\u00f3n de Identidad y Acceso (IAM)<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>M\u00ednimo privilegio aplicado a cuentas de servicio CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Separaci\u00f3n entre identidades humanas y del pipeline<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>RBAC aplicado a los sistemas CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>MFA aplicado a los administradores de CI\/CD<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 8.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Las acciones privilegiadas requieren aprobaci\u00f3n<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd11 Gesti\u00f3n de Secretos y Credenciales<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Secretos no almacenados en el c\u00f3digo fuente<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Inyecci\u00f3n de secretos en tiempo de ejecuci\u00f3n<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.6<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Credenciales con \u00e1mbito por entorno<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Rotaci\u00f3n peri\u00f3dica de secretos<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 3.6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Secretos excluidos de los registros<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udce6 Cadena de Suministro de Software e Integridad de Artefactos<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Entornos de compilaci\u00f3n CI\/CD reforzados<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Firma de artefactos aplicada<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Procedencia y trazabilidad de artefactos<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Los repositorios de artefactos son inmutables<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(a)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Solo se promueven artefactos de confianza<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Integraciones de Terceros y CI\/CD<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Herramientas CI\/CD de terceros aprobadas formalmente<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.8<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Acciones de terceros fijadas a versiones<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Integridad de los componentes CI\/CD externos verificada<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(e)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Plugins de la comunidad restringidos<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Actividad de las integraciones monitorizada<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udcca Registro, Monitoreo y Preparaci\u00f3n para Incidentes<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>Actividad del pipeline CI\/CD completamente registrada<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Los registros incluyen aprobaciones y eventos de seguridad<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Registro centralizado habilitado<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.5<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Retenci\u00f3n de registros alineada con la pol\u00edtica<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(c)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 10.7<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Los registros CI\/CD apoyan la investigaci\u00f3n de incidentes<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 23<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.10<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Gobernanza, Riesgos y Gesti\u00f3n de Cambios<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th><strong>Control<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>NIS2<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>PCI DSS<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>S\u00ed<\/strong><\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>No<\/strong><\/th><\/tr><\/thead><tbody><tr><td>CI\/CD incluido en la gesti\u00f3n de riesgos de ciberseguridad<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.2<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Segregaci\u00f3n de funciones aplicada<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 7.1<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Aprobaciones de cambios aplicadas a trav\u00e9s de pipelines<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(d)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 6.4<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Excepciones aprobadas y documentadas formalmente<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(b)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.3<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><tr><td>Postura de seguridad CI\/CD revisada peri\u00f3dicamente<\/td><td class=\"has-text-align-center\" data-align=\"center\">Art. 21(2)(f)<\/td><td class=\"has-text-align-center\" data-align=\"center\">Req. 12.11<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><td class=\"has-text-align-center\" data-align=\"center\">\u2b1c<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">C\u00f3mo Utilizar Esta Tabla de Auditor\u00eda NIS2 \/ PCI DSS<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usar para <strong>evaluaciones de riesgos de ciberseguridad NIS2<\/strong><\/li>\n\n\n\n<li>Apoyar <strong>auditor\u00edas de los Requisitos 6 y 10 de PCI DSS<\/strong><\/li>\n\n\n\n<li>Demostrar la inclusi\u00f3n de CI\/CD en la <strong>gobernanza de seguridad organizacional<\/strong><\/li>\n\n\n\n<li>Adjuntar referencias de evidencia en la columna de Notas<\/li>\n\n\n\n<li>Reevaluar despu\u00e9s de cambios en el pipeline o las herramientas<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Recursos Relacionados<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-security\/\" data-type=\"page\" data-id=\"11\">CI\/CD Security<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/devsecops\/\" data-type=\"page\" data-id=\"13\">DevSecOps<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/compliance\/\" data-type=\"page\" data-id=\"17\">Compliance<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/regulated-devsecops.com\/es\/ci-cd-governance-es\/ci-cd-security-checklist-for-enterprises\/\" data-type=\"post\" data-id=\"32\">CI\/CD Security Checklist for Enterprises<\/a><\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n    <section class=\"rds-author-box rds-author-box--audit\"\r\n             dir=\"ltr\" lang=\"es\"\r\n             style=\"border:1px solid rgba(100,116,139,.35);border-radius:14px;padding:16px 18px;margin:26px 0 18px;background:rgba(148,163,184,.08);\">\r\n      <strong style=\"margin:0 0 8px; font-size:14px; font-weight:700; letter-spacing:.02em;\">Contexto \u201caudit-ready\u201d<\/strong>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Contenido pensado para entornos regulados: controles antes que herramientas, enforcement en CI\/CD y evidencia por dise\u00f1o para auditor\u00edas.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">Enfoque en trazabilidad, aprobaciones, gobernanza de excepciones y retenci\u00f3n de evidencia de extremo a extremo.<\/p>\r\n      <p style=\"margin:0; font-size:14px; line-height:1.55;\">\r\n        <a href=\"https:\/\/regulated-devsecops.com\/es\/es\/about\/\">Ver la metodolog\u00eda en la p\u00e1gina About.<\/a>\r\n      <\/p>\r\n    <\/section>\r\n    \n","protected":false},"excerpt":{"rendered":"<p>Tabla de auditor\u00eda que mapea los controles de seguridad CI\/CD con los requisitos de la Directiva NIS2 y PCI DSS para la gesti\u00f3n de riesgos, seguridad de la cadena de suministro y preparaci\u00f3n para auditor\u00edas.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[132,133,135],"tags":[],"post_folder":[],"class_list":["post-2022","post","type-post","status-publish","format-standard","hentry","category-ci-cd-governance-es","category-cross-regulation-comparisons-es","category-regulatory-frameworks-es"],"_links":{"self":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts\/2022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/comments?post=2022"}],"version-history":[{"count":0,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/posts\/2022\/revisions"}],"wp:attachment":[{"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/media?parent=2022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/categories?post=2022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/tags?post=2022"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/regulated-devsecops.com\/es\/wp-json\/wp\/v2\/post_folder?post=2022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}