{"id":8805,"date":"2025-12-11T11:18:33","date_gmt":"2025-12-11T10:18:33","guid":{"rendered":"https:\/\/lorit-consultancy.com\/en\/?p=8805"},"modified":"2025-12-11T11:18:33","modified_gmt":"2025-12-11T10:18:33","slug":"medical-device-safety-and-cybersecurity-overlap-challenge","status":"publish","type":"post","link":"https:\/\/lorit-consultancy.com\/de\/2025\/12\/medical-device-safety-and-cybersecurity-overlap-challenge\/","title":{"rendered":"The Medical Device Safety and Cybersecurity Overlap Challenge"},"content":{"rendered":"<p>Many people are familiar with the safety and cybersecurity Venn diagram<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> indicating the section in the middle where the two risk areas overlap.<\/p>\n<p data-renderer-start-pos=\"7394\">There will always be potential areas where a cybersecurity breach could impact safety related functionality<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. F<\/span>or example, access to registers or RAM in a microcontroller through a cybersecurity vulnerability could disable a safety mechanism<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">.<\/span> <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">L<\/span>ikewise<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>safety-related functionality could impact cybersecurity<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>e.g.<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> by adding a new attack surface through the additional hardware for the safety mechanism. This is easy to show in a Venn diagram, but how do we analyze the potential risks in these two diverse technical areas?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8806 aligncenter\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/1-e1765366911196.jpg\" alt=\"Venn Diagram\" width=\"442\" height=\"230\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/1-e1765366911196.jpg 915w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/1-e1765366911196-768x400.jpg 768w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\" \/><\/p>\n<p data-renderer-start-pos=\"6366\">In the medical device world<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> where risk analysis is generally carried out in a simpler fashion than<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> in sectors such as <\/span>aviation or automotive, there is often less focus on the types and interfaces between analysis techniques. Using island solutions can result in vulnerabilities or malfunctions at the interfaces between the analyses being missed.<\/p>\n<p data-start=\"439\" data-end=\"1039\">A key part of ensuring comprehensive risk management is considering both safety and cybersecurity in tandem. One important approach is integrating cybersecurity into the design from the start. As outlined in our partner blog by <a href=\"https:\/\/firefinch.io\/\">Firefinch<\/a>, <a href=\"https:\/\/firefinch.io\/blog\/cybersecurity-secure-by-design\/?utm_campaign=Scientific%20Knowledge&amp;utm_content=361201949&amp;utm_medium=social&amp;utm_source=linkedin&amp;hss_channel=lcp-11266094\">Cybersecurity &#8211; Secure by Design<\/a>, building software with security in mind at every step can significantly reduce risks before they occur.<\/p>\n<p data-renderer-start-pos=\"6715\">In this blog we look at how a common strategy for the analysis can be realized.<\/p>\n<h2 id=\"Marrying-up-analysis\" data-renderer-start-pos=\"6796\"><em data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Marrying up analysis<\/strong><\/em><button class=\"css-x4slh0\" type=\"button\" data-testid=\"anchor-button\" aria-hidden=\"true\" aria-describedby=\"_r21f_-tooltip\"><\/button><\/h2>\n<p data-renderer-start-pos=\"6818\">One of the general problems in the medical device sector is the expectation in risk analysis that there will be a severity<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">&#8211;<\/span>versus<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">&#8211;<\/span>occurrence<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">&#8211;<\/span>probability figure for every risk. Documents such as ISO TIR24971<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> among other sources<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> are good at highlighting that risk acceptability criteria should be defined, including the case where the probability of harm cannot be estimated.<\/p>\n<p data-renderer-start-pos=\"7195\">This concept aligns well with software analysis where<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>e.g.<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> a Hazard and Operability Study (HAZOP) may be utilized, removing any attempt to add a probability score. In the hardware world<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> Failure Mode and Effects Analyses (FMEAs) are very widely used<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>which include<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> an estimate of <\/span>probability of occurrence. This is then often the crux of the problem<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">:<\/span> how do you represent both safety and cybersecurity in the same analysis<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> and more importantly<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> how do you bring the individuals responsible for cybersecurity and safety analysis together?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8808 aligncenter\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/2-e1765363670392.jpg\" alt=\"Marrying up analysis\" width=\"352\" height=\"191\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/2-e1765363670392.jpg 940w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/2-e1765363670392-768x416.jpg 768w\" sizes=\"auto, (max-width: 352px) 100vw, 352px\" \/><\/p>\n<p data-renderer-start-pos=\"7195\">Industries generally suffer from island solutions<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. S<\/span>oftware engineers, hardware engineers, usability teams<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>etc. all work on their own individual analysis<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> and this is often where the cracks appear. Many great sources<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, <\/span>such as Alessandro Birolini<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">\u2019s \u2018<\/span>Reliability Engineering\u2019<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> highlight the importance of analyzing interfaces<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. W<\/span>e are not just referring to interfaces between software classes or hardware components, but wherever technologies or disciplines meet.<\/p>\n<h2 id=\"Knowing-the-threat\" data-renderer-start-pos=\"8205\"><em data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Knowing the threat<\/strong><\/em><button class=\"css-x4slh0\" type=\"button\" data-testid=\"anchor-button\" aria-hidden=\"true\"><\/button><\/h2>\n<p>One important aspect that is identical in both safety and cybersecurity is the activity of identifying threats (cybersecurity) and hazards (safety)<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. U<\/span>ltimately<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> this yields product requirements<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">, based on which<\/span> the architecture can then be defined.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8810 alignleft\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/3-e1765364034864.jpg\" alt=\"\" width=\"467\" height=\"218\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/3-e1765364034864.jpg 940w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/3-e1765364034864-768x359.jpg 768w\" sizes=\"auto, (max-width: 467px) 100vw, 467px\" \/><\/p>\n<p>Once the requirements definition has started (this will generally be an iterative process), the risk analysis should commence<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. T<\/span>his is the activity of defining the mitigations for any identified threats and hazards. One of the best approaches to analyzing risks in different technical areas is the HAZOP. The severity of the threat or hazard is passed down from the hazard or threat analysis, hence this<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> establishes <\/span>the priority of the threat or hazard we are trying to protect against. The principle of the HAZOP is using a set of guide words to ask the same questions of each block in the architecture. In this manner, the architecture is analyzed systematically using these guide words.<\/p>\n<\/div><\/div><\/div><div class=\"content_section blue_bg blog_trenner_section\"><div class=\"row align-center medium-align-spaced\"><div class=\"columns border_solid_square post_thumbnail small-10 medium-5 large-3\"><div  data-ratio=\"1.5\" class=\"\"><picture><source media=\"(min-width:1024px)\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-1280x1920.webp\" width=\"1280\" height=\"1920\" type=\"image\/webp\" ><source media=\"(min-width:640px)\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-683x1024.webp\" width=\"683\" height=\"1024\" type=\"image\/webp\" ><img decoding=\"async\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2023\/10\/AC1A8532-640x640.webp\" alt=\"Lead Consultant and owner, Alastair Walker\" loading=\"lazy\" width=\"640\" height=\"640\" type=\"image\/webp\" ><\/picture><svg version=\"1.1\" id=\"svg_border_solid_square\" class=\"svg_border_solid_square\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" x=\"0px\" y=\"0px\"\n\t viewBox=\"0 0 337 411.2\" style=\"enable-background:new 0 0 337 411.2;\" xml:space=\"preserve\">\n<polygon id=\"bg\" class=\"bg\" points=\"65,332.6 337,332.6 336.9,411.2 3.6,411.2 \"\/>\n<path id=\"border\" class=\"border\" d=\"M334,329.6V5.9c0-1.6-1.3-2.9-2.9-2.9l0,0L5.9,3.1C4.3,3.1,3,4.3,3,6v400.8c0,1.6,0.8,1.9,1.8,0.6\n\tl59.6-74.7l266.6-0.1C332.7,332.5,333.9,331.2,334,329.6z\"\/>\n<\/svg><\/div><div class=\"image_bottom_content\"><p>Alastair Walker, Owner\/Consultant<\/p>\n<\/div><\/div><div class=\"columns post_content small-12 medium-6 large-7\"><p>Want to ensure your medical device development addresses both <strong>safety and cybersecurity risks<\/strong> effectively? Get in touch with our experts at<strong> <a class=\"_mizu1p6i _1ah31bk5 _ra3xnqa1 _128m1bk5 _1cvmnqa1 _4davt94y _4bfu18uv _1hms8stv _ajmmnqa1 _vchhusvi _syaz14q2 _ect41gqc _1a3b18uv _4fpr8stv _5goinqa1 _f8pj14q2 _9oik18uv _1bnxglyw _jf4cnqa1 _30l314q2 _1nrm18uv _c2waglyw _1iohnqa1 _9h8h16c2 _1053w7te _1ienw7te _n0fxw7te _1vhvg3x0\" title=\"mailto:info@lorit-consultancy.com\" href=\"mailto:info@lorit-consultancy.com\" data-renderer-mark=\"true\" data-is-router-link=\"false\" data-testid=\"link-with-safety\">info@lorit-consultancy.com<\/a><\/strong><\/p>\n<a class=\"add_logo_border\" target=\"_blank\" href=\"https:\/\/lorit-consultancy.com\/en\/contact-us\/\"><span>Erfahre mehr<\/span><\/a><\/div><\/div><\/div><\/div><div class=\"single_content_section single_post_section content_section\"><div class=\"row\"><div class=\"post_content columns\">\n<p>As the analysis of a hardware current amplifier failure will be quite different to the vulnerability of a password, a more generic analysis technique <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">is b<\/span><span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">eneficial.<\/span> <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">This means that<\/span> each block of the architecture can be analysed<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> using <\/span>the same design<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">&#8211;<\/span>level risk technique.<\/p>\n<p data-renderer-start-pos=\"9438\">One addition to the analysis landscape is that some threat analysis tools, e.g., IriusRisk and OWASP Threat Dragon, may recommend mitigations for cybersecurity threats<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. <\/span>This additional input<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> is<\/span> useful <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">and <\/span>should be included in the requirements and the HAZOP.<\/p>\n<h2 id=\"ARP4754B-and-ARP4761A:-The-Cornerstones-of-Modern-Aviation-Safety\" data-renderer-start-pos=\"8307\"><em data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Guide Words<\/strong><\/em><button class=\"css-x4slh0\" type=\"button\" data-testid=\"anchor-button\" aria-hidden=\"true\" aria-describedby=\"_r24b_-tooltip\"><\/button><\/h2>\n<p data-renderer-start-pos=\"8374\"><span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> As<\/span> with many other processes<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> HAZOPs are supported by international standards, in this case IEC 61882. The list of guide words is indicated in the table below<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">. B<\/span>ut this does not stop you adding guide words that may be more relevant<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> to <\/span>the analysis.<\/p>\n<p data-renderer-start-pos=\"8374\">A HAZOP is not the only systematic approach using questions and answers for acceptability. System Theoretic Accident Model and Processes (STAMP) or <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> its <\/span>modified version are commonly used, and could be used for this activity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-8812 aligncenter\" src=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/4-e1765364294602.jpg\" alt=\"Guide Words\" width=\"603\" height=\"226\" srcset=\"https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/4-e1765364294602.jpg 940w, https:\/\/lorit-consultancy.com\/wp-content\/uploads\/2025\/12\/4-e1765364294602-768x288.jpg 768w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<h2 id=\"Residual-Risk\" data-renderer-start-pos=\"10197\"><em data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Residual Risk<\/strong><\/em><button class=\"css-x4slh0\" type=\"button\" data-testid=\"anchor-button\" aria-hidden=\"true\"><\/button><\/h2>\n<p data-renderer-start-pos=\"10212\">One area that some medical device manufacturers<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> traditionally <\/span>find challenging is<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\"> inability to<\/span> have a severity x probability figure as an outcome of the risk analysis.<\/p>\n<p data-renderer-start-pos=\"10382\"><span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">Although<\/span> HAZOPs enable a clear definition of whether the hazard or threat mitigation meets the acceptance criteria for the product, this does not need to be defined in terms of a score. <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">Instead, it <\/span>can be defined with an acceptance \u2018yes or no\u2019 and a rationale for the decision.<\/p>\n<h2 id=\"Summary\" data-renderer-start-pos=\"10661\"><em data-renderer-mark=\"true\"><strong data-renderer-mark=\"true\">Summary<\/strong><\/em><button class=\"css-x4slh0\" type=\"button\" data-testid=\"anchor-button\" aria-hidden=\"true\"><\/button><\/h2>\n<p>To be able to analyze the overlap of safety and cybersecurity risks<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> a common analysis technique is required. <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">This <\/span>technique systematically analyzes the potential vulnerabilities and malfunctions of the product. Hazard analysis and threat analysis are different processes, but together <span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">they<\/span> help generate the product requirements. Thereafter<span class=\"fabric-background-color-mark\" data-renderer-mark=\"true\" data-background-custom-color=\"#fedec8\">,<\/span> a common process such as a HAZOP can be used to analyze the product architecture and help identify the mechanisms to mitigate both the treats and hazards.<\/p>\n<p data-local-id=\"529a23b3-4ae4-4489-ab0f-153fa9cbe5f3\" data-prosemirror-content-type=\"node\" data-prosemirror-node-name=\"paragraph\" data-prosemirror-node-block=\"true\" data-pm-slice=\"1 1 [&quot;layoutSection&quot;,{&quot;columnRuleStyle&quot;:null,&quot;localId&quot;:&quot;af3ff1bf-b827-4076-b611-87a66af71520&quot;},&quot;layoutColumn&quot;,{&quot;width&quot;:50,&quot;localId&quot;:&quot;26ee75a5-6e1f-4d45-9289-fcd2854dbc4f&quot;}]\"><span class=\"fabric-background-color-mark\" data-background-custom-color=\"#fedec8\" data-prosemirror-content-type=\"mark\" data-prosemirror-mark-name=\"backgroundColor\">To develop your custom software with integrated security solutions from the ground up, contact our partner <\/span><a href=\"https:\/\/firefinch.io\/contact\/\" data-prosemirror-content-type=\"mark\" data-prosemirror-mark-name=\"link\"><strong data-prosemirror-content-type=\"mark\" data-prosemirror-mark-name=\"strong\"><span class=\"fabric-background-color-mark\" data-background-custom-color=\"#fedec8\" data-prosemirror-content-type=\"mark\" data-prosemirror-mark-name=\"backgroundColor\">Firefinch<\/span><\/strong><\/a><span class=\"fabric-background-color-mark\" data-background-custom-color=\"#fedec8\" data-prosemirror-content-type=\"mark\" data-prosemirror-mark-name=\"backgroundColor\">.<\/span><\/p>\n<p>By <a href=\"https:\/\/lorit-consultancy.com\/en\/about-us\/#alastair-walker\">Alastair Walker<\/a>, Owner\/Consultant<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many people are familiar with the safety and cybersecurity Venn diagram, indicating the section in the middle where the two risk areas overlap. There will always be potential areas where a cybersecurity breach could impact safety related functionality. For example, access to registers or RAM in a microcontroller through a cybersecurity vulnerability could disable a [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":8815,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[87,91],"tags":[],"class_list":["post-8805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-functional-safety","category-safety"],"acf":[],"_links":{"self":[{"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/posts\/8805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/comments?post=8805"}],"version-history":[{"count":8,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/posts\/8805\/revisions"}],"predecessor-version":[{"id":8839,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/posts\/8805\/revisions\/8839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/media\/8815"}],"wp:attachment":[{"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/media?parent=8805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/categories?post=8805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lorit-consultancy.com\/de\/wp-json\/wp\/v2\/tags?post=8805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}