{"id":7373,"date":"2020-02-14T04:17:00","date_gmt":"2020-02-14T04:17:00","guid":{"rendered":"https:\/\/certsign.ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/"},"modified":"2021-03-01T14:20:04","modified_gmt":"2021-03-01T14:20:04","slug":"procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3","status":"publish","type":"post","link":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/","title":{"rendered":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &#038; Log Management. Digital Trust (ep.3)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p>Atunci c&acirc;nd vorbim despre <a href=\"https:\/\/www.certsign.ro\/ro\/securitate-cibernetica-pentru-companii-de-ce-cum-si-cu-ce-digital-trust-ep-2\" name=\"securitate%20cibernetic%C4%83\" title=\"securitate cibernetic&#259;\">securitate cibernetic&#259;<\/a>, vorbim despre o serie de procese specifice &#351;i clar delimitate, acestea adres&acirc;nd principalele probleme ce pot s&#259; apar&#259; la nivelul unui sistem informatic &ndash; plec&acirc;nd de la structura lui &#351;i modul de func&#355;ionare. V&#259; prezent&#259;m &icirc;n continuare o descriere punctual&#259; a ce presupune implementarea proceselor de baz&#259; de securitate cibernetic&#259; &ndash; managementul asset-urilor, managementul vulnerabilit&#259;&#539;ilor &#537;i cel al log-urilor.<\/p> <p><span><strong>Asset Management<\/strong><\/span><\/p> <p>Managementul asset-urilor constituie un proces de inventariere, plec&acirc;nd de la ideea c&#259; nu po&#355;i proteja ceva ce nu &#351;tii c&#259; ai &ndash; concret, pentru a &icirc;ncepe efectiv securizarea re&#355;elei informatice, este obligatoriu ca &icirc;n prim&#259; instan&#355;&#259; s&#259; &#351;tim ce elemente cuprinde aceasta. Atunci c&acirc;nd vorbim despe asset-uri ne referim atat la elementele hardware, c&acirc;t &#351;i la cele software care compun structura informatic&#259; &icirc;n ansambul ei, dar &#351;i la conturile de acces.<\/p> <p><strong>Inventarierea pe zona de hardware<\/strong> &ndash; eviden&#355;a fiec&#259;rui device, parte component&#259; a ansamblui informatic, cu aspectele relevante specifice precum ce reprezint&#259;, adresa virtual&#259; (IP-ul), adresa fizic&#259;, date logistice (cui &icirc;i apar&#355;ine), data achizi&#355;ion&#259;rii, data expir&#259;rii garan&#355;iei etc.<\/p> <p><strong>Inventarierea pe zona de software<\/strong> &ndash; configura&#355;ia firmware-urilor care ruleaz&#259; pe fiecare device, versiunea existent&#259; (un element foarte important &icirc;ntruc&acirc;t fiecare versiune vine cu o serie de vulnerabilit&#259;&#355;i specifice), cine are acces la respectivul device &#351;i de ce are acces (referindu-ne aici la rolul oferit &ndash; utilizator, administrator &ndash; care implic&#259; capacitatea de a interveni cu schimb&#259;ri sau nu asupra sistemului).<\/p> <p><strong>Inventarierea conturilor<\/strong> &ndash; r&#259;spunde practic la <em>&bdquo;Cine la ce are acces &#351;i de ce?&rdquo;<\/em>, constituind o eviden&#355;&#259; a tuturor conturilor din respectiva companie. Importan&#355;a acestei inventarieri este evident&#259; mai ales &icirc;n cazul fluxului de personal la nivelul firmei, cu referire aici la conturile create &#351;i drepturile de acces oferite (provizionare) pentru noii angaja&#355;i &#351;i ce se &icirc;nt&acirc;mpl&#259; cu acestea atunci c&acirc;nd intervin modific&#259;ri de ordin profesional precum:<\/p> <p>&bull; schimbarea func&#355;iei &icirc;n cadrul companiei &ndash; unde vorbim despre apari&#355;ia unor posibile modific&#259;ri la nivel de acces oferit la diverse resurse, diferit &icirc;n func&#355;ie de func&#355;ie\/specificul activit&#259;&#355;ii etc. <\/p> <p>&bull; &icirc;ncheierea activit&#259;&#355;ii &icirc;n companie. <\/p> <p>&Icirc;n practic&#259;, exist&#259; foarte multe situa&#355;ii &icirc;n care conturilor fo&#351;tilor angaja&#355;i r&#259;m&acirc;n active dup&#259; &icirc;ncetarea activit&#259;&#355;ii acestora &icirc;n cadrul companiei, la nivelul re&#355;elei ajung&acirc;ndu-se uneori s&#259; se str&acirc;ng&#259; chiar mii de conturi. Aceast&#259; lips&#259; a deprovizion&#259;rii (retragerea drepturilor de acces pentru utilizatori) duce la &icirc;nc&#259;rcarea serverelor cu impact direct asupra func&#355;ionalit&#259;&#355;ii sistemului precum &#537;i la riscuri de accesare neautorizat&#259;.<\/p> <p><span><strong>Vulnerability Management<\/strong><\/span><\/p> <p>Managementul vulnerabilit&#259;&#355;ilor vizeaz&#259; &icirc;n special zona software, &icirc;n contextul &icirc;n care presiunea de a aduce &icirc;n pia&#355;&#259; un software scap&#259; din vedere anumite elemente de securitate ale respectivului soft. Vulnerability Management presupune realizarea unei <strong>scan&#259;ri din interior<\/strong> a fiec&#259;rui asset pe care ruleaz&#259; un soft, pentru determinarea datelor expuse &#351;i a nivelului de vulnerabilitate la atacuri cibernetice.<\/p> <p>Exist&#259; &#537;i <strong>scanarea din exterior <\/strong>a asset-urilor, &icirc;n scopul determin&#259;rii gradului de vizibilitate al vulnerabilit&#259;&#539;ilor &#537;i poten&#539;ialul de a fi exploatate. De principiu se alege o &#539;int&#259; (sau mai multe) &#537;i cu un soft special se scaneaz&#259; respectiva &#539;int&#259;.<\/p> <p>Fiecare dintre cele dou&#259; opera&#539;iuni se finalizeaz&#259; cu un raport tehnic ce trebuie &icirc;n&#539;eles &#537;i analizat &icirc;n vederea aplic&#259;rii de m&#259;suri de remediere.<\/p> <p><span><strong>Log Management<\/strong><\/span><\/p> <p>Deoarece orice device &#351;i aplica&#355;ie las&#259; urme privind activitatea desf&#259;&#351;urat&#259;, verificarea periodic&#259; a log-urilor este esen&#355;ial&#259; pentru companii, &icirc;n vederea identific&#259;rii poten&#355;ialelor atacuri cibernetice. &Icirc;n acest proces de c&#259;utare a erorilor, anomaliilor sau activit&#259;&#355;ilor suspecte la nivelul sistemului, logurile devin semnale de alarm&#259;. &Icirc;ns&#259; lu&acirc;nd &icirc;n calcul cantitatea mare de date generate de sisteme, o monitorizare zilnic&#259; fectuat&#259; manual este total contraproductiv&#259; &#351;i imposibil de realizat. <\/p> <p>Tocmai din acest motive utilizarea unui soft de colectare &#351;i management al log-urilor devine fundamental&#259;. Software-ul de monitorizare a log-urilor utilizeaz&#259; reguli specifice pentru a automatiza revizuirea lor &#537;i eviden&#539;iaz&#259; doar acele evenimente care ar putea reprezenta probleme sau amenin&#539;&#259;ri. Adesea, acest lucru se face folosind sisteme de raportare &icirc;n timp real care v&#259; avertizeaz&#259; atunci c&acirc;nd este detectat ceva suspect.<\/p> <p>Astfel, solu&#355;iile de log management se refer&#259; la centralizarea log-urilor, oferind posibilitatea:<\/p> <p>&bull; efectu&#259;rii unor c&#259;ut&#259;ri ulterioare pe anumite activit&#259;&#355;i, &icirc;n cazul apari&#355;iei unor incidente de securitate;<\/p> <p>&bull; realiz&#259;rii unei monitoriz&#259;ri &icirc;n timp real.<\/p> <p>Solu&#355;ia Cyber-In-a-Box, dezvoltat&#259; de certSIGN ca o completare a m&#259;surilor de igien&#259; cibernetic&#259; pentru companiilor mici (re&#355;ele de p&acirc;n&#259; &icirc;n 100 de device-uri) , include solu&#355;iile care adreseaz&#259; aceste trei procese esen&#355;iale de securitate cibernetic&#259; &ndash; Asset Management, Vulnerability Management &#351;i Log Management.<\/p> <p><strong>Afl&#259; mai multe pe acest subiect de la speciali&#351;tii certSIGN, la Radio Guerrilla!<\/strong><\/p> <p><a href=\"https:\/\/www.linkedin.com\/posts\/certsign_certsign-cybersecurity-digitaltrust-activity-6634088876602339328-7mNv\" name=\"Podcast%20certSIGN%20@%20Guerrilla%20Hub\" title=\"Podcast certSIGN @ Guerrilla Hub\"><strong>Podcast &ldquo;De la Transformare digital&#259; la DIGITAL TRUST&rdquo; @ Guerrilla Hub.<\/strong><\/a><\/p> <p><strong><a href=\"https:\/\/www.linkedin.com\/posts\/certsign_certsign-cybersecurity-digitaltrust-activity-6634088876602339328-7mNv\" name=\"Podcast%20certSIGN%20@%20Guerrilla%20Hub\" title=\"Podcast certSIGN @ Guerrilla Hub\">Ep.3. Asset, Vulnerability &amp; Log Management<\/a><\/strong><\/p> <p><strong>(invitat Dan Ionu&#355; Grigore, Cyber Security Director certSIGN)<\/strong><\/p> <style> .blog-single-header-image > .elementor-element-populated { background: url(\"https:\/\/www.certsign.ro\/media\/image\/yp6wh27t0x_Guerrilla3.png\") no-repeat center center; } <\/style> <\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Atunci c&acirc;nd vorbim despre securitate cibernetic&#259;, vorbim despre o serie de procese specifice &#351;i clar delimitate, acestea adres&acirc;nd principalele probleme ce pot s&#259; apar&#259; la nivelul unui sistem informatic &ndash; plec&acirc;nd de la structura lui &#351;i modul de func&#355;ionare. V&#259; prezent&#259;m &icirc;n continuare o descriere punctual&#259; a ce presupune implementarea proceselor de baz&#259; de securitate [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2276],"tags":[152,61,250],"categorie_produs":[11],"class_list":["post-7373","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-transformare-digitala","tag-cibernetica","tag-securitate","tag-vulnerabilitati"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &amp; Log Management. Digital Trust (ep.3) - certSIGN<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &amp; Log Management. Digital Trust (ep.3) - certSIGN\" \/>\n<meta property=\"og:description\" content=\"Atunci c&acirc;nd vorbim despre securitate cibernetic&#259;, vorbim despre o serie de procese specifice &#351;i clar delimitate, acestea adres&acirc;nd principalele probleme ce pot s&#259; apar&#259; la nivelul unui sistem informatic &ndash; plec&acirc;nd de la structura lui &#351;i modul de func&#355;ionare. V&#259; prezent&#259;m &icirc;n continuare o descriere punctual&#259; a ce presupune implementarea proceselor de baz&#259; de securitate [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\" \/>\n<meta property=\"og:site_name\" content=\"certSIGN\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-14T04:17:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-01T14:20:04+00:00\" \/>\n<meta name=\"author\" content=\"certsign\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"certsign\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\"},\"author\":{\"name\":\"certsign\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18\"},\"headline\":\"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &#038; Log Management. Digital Trust (ep.3)\",\"datePublished\":\"2020-02-14T04:17:00+00:00\",\"dateModified\":\"2021-03-01T14:20:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\"},\"wordCount\":911,\"publisher\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\"},\"keywords\":[\"cibernetica\",\"securitate\",\"vulnerabilitati\"],\"articleSection\":[\"Transformare digital\u0103\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\",\"url\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\",\"name\":\"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability & Log Management. Digital Trust (ep.3) - certSIGN\",\"isPartOf\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#website\"},\"datePublished\":\"2020-02-14T04:17:00+00:00\",\"dateModified\":\"2021-03-01T14:20:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Acas\u0103\",\"item\":\"https:\/\/www.certsign.ro\/ro\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &#038; Log Management. Digital Trust (ep.3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#website\",\"url\":\"https:\/\/www.certsign.ro\/ro\/\",\"name\":\"certSIGN\",\"description\":\"Prestator de servicii de \u00eencredere calificat\",\"publisher\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certsign.ro\/ro\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#organization\",\"name\":\"certSIGN\",\"url\":\"https:\/\/www.certsign.ro\/ro\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png\",\"contentUrl\":\"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png\",\"width\":317,\"height\":66,\"caption\":\"certSIGN\"},\"image\":{\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18\",\"name\":\"certsign\",\"sameAs\":[\"https:\/\/certsign.ro\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability & Log Management. Digital Trust (ep.3) - certSIGN","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/","og_locale":"ro_RO","og_type":"article","og_title":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability & Log Management. Digital Trust (ep.3) - certSIGN","og_description":"Atunci c&acirc;nd vorbim despre securitate cibernetic&#259;, vorbim despre o serie de procese specifice &#351;i clar delimitate, acestea adres&acirc;nd principalele probleme ce pot s&#259; apar&#259; la nivelul unui sistem informatic &ndash; plec&acirc;nd de la structura lui &#351;i modul de func&#355;ionare. V&#259; prezent&#259;m &icirc;n continuare o descriere punctual&#259; a ce presupune implementarea proceselor de baz&#259; de securitate [&hellip;]","og_url":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/","og_site_name":"certSIGN","article_published_time":"2020-02-14T04:17:00+00:00","article_modified_time":"2021-03-01T14:20:04+00:00","author":"certsign","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"certsign","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#article","isPartOf":{"@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/"},"author":{"name":"certsign","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18"},"headline":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &#038; Log Management. Digital Trust (ep.3)","datePublished":"2020-02-14T04:17:00+00:00","dateModified":"2021-03-01T14:20:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/"},"wordCount":911,"publisher":{"@id":"https:\/\/www.certsign.ro\/ro\/#organization"},"keywords":["cibernetica","securitate","vulnerabilitati"],"articleSection":["Transformare digital\u0103"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/","url":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/","name":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability & Log Management. Digital Trust (ep.3) - certSIGN","isPartOf":{"@id":"https:\/\/www.certsign.ro\/ro\/#website"},"datePublished":"2020-02-14T04:17:00+00:00","dateModified":"2021-03-01T14:20:04+00:00","breadcrumb":{"@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certsign.ro\/ro\/procesele-esentiale-de-securitate-cibernetica-asset-vulnerability-log-management-digital-trust-ep-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Acas\u0103","item":"https:\/\/www.certsign.ro\/ro\/"},{"@type":"ListItem","position":2,"name":"Procesele esen\u0163iale de securitate cibernetic\u0103: Asset, Vulnerability &#038; Log Management. Digital Trust (ep.3)"}]},{"@type":"WebSite","@id":"https:\/\/www.certsign.ro\/ro\/#website","url":"https:\/\/www.certsign.ro\/ro\/","name":"certSIGN","description":"Prestator de servicii de \u00eencredere calificat","publisher":{"@id":"https:\/\/www.certsign.ro\/ro\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certsign.ro\/ro\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.certsign.ro\/ro\/#organization","name":"certSIGN","url":"https:\/\/www.certsign.ro\/ro\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/","url":"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png","contentUrl":"https:\/\/www.certsign.ro\/wp-content\/uploads\/2024\/02\/certsign-email-template-logo.png","width":317,"height":66,"caption":"certSIGN"},"image":{"@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.certsign.ro\/ro\/#\/schema\/person\/473872fcd4e4f99a30b4a8db15ea5a18","name":"certsign","sameAs":["https:\/\/certsign.ro"]}]}},"_links":{"self":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts\/7373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/comments?post=7373"}],"version-history":[{"count":0,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/posts\/7373\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/media?parent=7373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/categories?post=7373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/tags?post=7373"},{"taxonomy":"categorie_produs","embeddable":true,"href":"https:\/\/www.certsign.ro\/ro\/wp-json\/wp\/v2\/categorie_produs?post=7373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}