{"id":148681,"date":"2023-12-18T16:01:03","date_gmt":"2023-12-18T19:01:03","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/?post_type=itsm&#038;p=148681"},"modified":"2025-12-09T13:12:49","modified_gmt":"2025-12-09T16:12:49","slug":"rugged-devops-y-devsecops-explicados","status":"publish","type":"post","link":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/","title":{"rendered":"Rugged DevOps y DevSecOps explicados"},"content":{"rendered":"<p data-start=\"3282\" data-end=\"3747\"><a href=\"https:\/\/sandbox2.institutopmg.com\/es\/articulos\/itil\/que-es-itil-4-guia-definitiva-de-itil-4\/\">En el acelerado mundo del desarrollo de software<\/a>, donde la velocidad y la agilidad son prioritarias, la seguridad suele quedar en un segundo plano. Sin embargo, con el aumento de las amenazas cibern\u00e9ticas y las brechas de datos, priorizar la seguridad a lo largo de todo el ciclo de vida del desarrollo se ha vuelto imprescindible. En este contexto surgen <strong data-start=\"3638\" data-end=\"3655\">Rugged DevOps<\/strong> y <strong data-start=\"3658\" data-end=\"3671\">DevSecOps<\/strong>, dos enfoques que sit\u00faan la seguridad en el centro de las pr\u00e1cticas DevOps.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Navegue por t\u00f3picos de interesse:<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#Rugged_DevOps\" >Rugged DevOps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#DevSecOps\" >DevSecOps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#Elegir_el_enfoque_adecuado\" >Elegir el enfoque adecuado<\/a><\/li><\/ul><\/nav><\/div>\n<h3 data-start=\"3749\" data-end=\"3770\"><span class=\"ez-toc-section\" id=\"Rugged_DevOps\"><\/span><strong data-start=\"3753\" data-end=\"3770\">Rugged DevOps<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p data-start=\"3772\" data-end=\"3885\"><strong data-start=\"3772\" data-end=\"3789\">Rugged DevOps<\/strong> se centra en reforzar la seguridad de los procesos de desarrollo de software. Hace hincapi\u00e9 en:<\/p>\n<p data-start=\"3887\" data-end=\"3984\"><strong data-start=\"3887\" data-end=\"3899\">Defensa:<\/strong> Fortalecimiento de las defensas frente a amenazas cibern\u00e9ticas y vulnerabilidades.<\/p>\n<p data-start=\"3986\" data-end=\"4087\"><strong data-start=\"3986\" data-end=\"4000\">Seguridad:<\/strong> Integraci\u00f3n de controles y pr\u00e1cticas de seguridad en todas las fases del desarrollo.<\/p>\n<p data-start=\"4089\" data-end=\"4181\"><strong data-start=\"4089\" data-end=\"4105\">Resiliencia:<\/strong> Construcci\u00f3n de sistemas resilientes, capaces de soportar ataques y fallos.<\/p>\n<p data-start=\"4183\" data-end=\"4436\">Este enfoque combina las preocupaciones de seguridad con la velocidad y la calidad propias de DevOps. Al integrar la seguridad desde las primeras etapas del ciclo de vida del desarrollo, Rugged DevOps busca crear productos de software s\u00f3lidos y seguros.<\/p>\n<h3 data-start=\"4438\" data-end=\"4455\"><span class=\"ez-toc-section\" id=\"DevSecOps\"><\/span><strong data-start=\"4442\" data-end=\"4455\">DevSecOps<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p data-start=\"4457\" data-end=\"4629\"><strong data-start=\"4457\" data-end=\"4470\">DevSecOps<\/strong> ampl\u00eda los principios de Rugged DevOps al extender las pr\u00e1cticas de seguridad m\u00e1s all\u00e1 del desarrollo, cubriendo todo el pipeline de entrega hasta producci\u00f3n.<\/p>\n<p data-start=\"4631\" data-end=\"4791\"><strong data-start=\"4631\" data-end=\"4662\">Responsabilidad compartida:<\/strong> DevSecOps subraya que la seguridad es responsabilidad de todos, asegurando que sea un aspecto clave en cada etapa del proceso.<\/p>\n<p data-start=\"4793\" data-end=\"5079\"><strong data-start=\"4793\" data-end=\"4808\">Shift Left:<\/strong> Un elemento fundamental de DevSecOps es el enfoque <strong data-start=\"4860\" data-end=\"4876\">\u201cShift Left\u201d<\/strong>, que consiste en identificar y abordar los problemas de seguridad lo antes posible dentro del proceso de entrega. Este enfoque proactivo ayuda a reducir los riesgos de seguridad antes de que se agraven.<\/p>\n<p data-start=\"5081\" data-end=\"5315\">Al integrar la seguridad en todo el ciclo de vida del desarrollo de software, DevSecOps aspira a crear una cultura en la que la seguridad no sea un a\u00f1adido posterior, sino una parte integral del proceso desde el inicio hasta el final.<\/p>\n<h3 data-start=\"5317\" data-end=\"5351\"><span class=\"ez-toc-section\" id=\"Elegir_el_enfoque_adecuado\"><\/span><strong data-start=\"5321\" data-end=\"5351\">Elegir el enfoque adecuado<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p data-start=\"5353\" data-end=\"5599\">Cuando se trata de Rugged DevOps y DevSecOps, no existe una soluci\u00f3n \u00fanica v\u00e1lida para todos los casos. La elecci\u00f3n entre ambos depende de factores como los objetivos de la organizaci\u00f3n, las pr\u00e1cticas existentes y el nivel de seguridad requerido.<\/p>\n<p data-start=\"5601\" data-end=\"5789\"><strong data-start=\"5601\" data-end=\"5618\">Rugged DevOps<\/strong> es ideal para organizaciones que buscan reforzar la seguridad principalmente en la fase de desarrollo, manteniendo la velocidad y la eficiencia de las pr\u00e1cticas DevOps.<\/p>\n<p data-start=\"5791\" data-end=\"6012\"><strong data-start=\"5791\" data-end=\"5804\">DevSecOps<\/strong>, por otro lado, es m\u00e1s adecuado para organizaciones que desean integrar la seguridad de forma continua y fluida a lo largo de todo el pipeline de entrega de software, desde el desarrollo hasta la producci\u00f3n.<\/p>\n<p data-start=\"6014\" data-end=\"6362\" data-is-last-node=\"\" data-is-only-node=\"\">En conclusi\u00f3n, tanto si se elige Rugged DevOps como DevSecOps, la ense\u00f1anza clave es la importancia de priorizar la seguridad en todo el ciclo de vida del desarrollo de software. Al adoptar estos enfoques, las organizaciones pueden construir software m\u00e1s resiliente, seguro y de alta calidad, alineado con las exigencias del entorno digital actual.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En el acelerado mundo del desarrollo de software, donde la velocidad y la agilidad son prioritarias, la seguridad suele quedar en un segundo plano. Sin embargo, con el aumento de las amenazas cibern\u00e9ticas y las brechas de datos, priorizar la seguridad a lo largo de todo el ciclo de vida del desarrollo se ha vuelto [&hellip;]<\/p>\n","protected":false},"author":85233,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-148681","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Rugged DevOps y DevSecOps explicados - PMG Academy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rugged DevOps y DevSecOps explicados\" \/>\n<meta property=\"og:description\" content=\"En el acelerado mundo del desarrollo de software, donde la velocidad y la agilidad son prioritarias, la seguridad suele quedar en un segundo plano. Sin embargo, con el aumento de las amenazas cibern\u00e9ticas y las brechas de datos, priorizar la seguridad a lo largo de todo el ciclo de vida del desarrollo se ha vuelto [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/adriano.martinsantonio\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-18T19:01:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T16:12:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2021\/02\/23190406\/cropped-Asset-1%40azul-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adriano Martins Antonio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adriano Martins Antonio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\"},\"author\":{\"name\":\"Adriano Martins Antonio\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\"},\"headline\":\"Rugged DevOps y DevSecOps explicados\",\"datePublished\":\"2023-12-18T19:01:03+00:00\",\"dateModified\":\"2025-12-09T16:12:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\"},\"wordCount\":498,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#organization\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\",\"name\":\"Rugged DevOps y DevSecOps explicados - PMG Academy\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#website\"},\"datePublished\":\"2023-12-18T19:01:03+00:00\",\"dateModified\":\"2025-12-09T16:12:49+00:00\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7\",\"name\":\"Adriano Martins Antonio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png\",\"caption\":\"Adriano Martins Antonio\"},\"sameAs\":[\"https:\/\/www.facebook.com\/adriano.martinsantonio\"],\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/author\/adrianopmgacademy-coms\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Rugged DevOps y DevSecOps explicados - PMG Academy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/","og_locale":"es_ES","og_type":"article","og_title":"Rugged DevOps y DevSecOps explicados","og_description":"En el acelerado mundo del desarrollo de software, donde la velocidad y la agilidad son prioritarias, la seguridad suele quedar en un segundo plano. Sin embargo, con el aumento de las amenazas cibern\u00e9ticas y las brechas de datos, priorizar la seguridad a lo largo de todo el ciclo de vida del desarrollo se ha vuelto [&hellip;]","og_url":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_author":"https:\/\/www.facebook.com\/adriano.martinsantonio","article_published_time":"2023-12-18T19:01:03+00:00","article_modified_time":"2025-12-09T16:12:49+00:00","og_image":[{"width":2560,"height":1080,"url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2021\/02\/23190406\/cropped-Asset-1%40azul-1.png","type":"image\/png"}],"author":"Adriano Martins Antonio","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Adriano Martins Antonio","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#article","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/"},"author":{"name":"Adriano Martins Antonio","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7"},"headline":"Rugged DevOps y DevSecOps explicados","datePublished":"2023-12-18T19:01:03+00:00","dateModified":"2025-12-09T16:12:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/"},"wordCount":498,"commentCount":0,"publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#organization"},"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/","url":"https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/","name":"Rugged DevOps y DevSecOps explicados - PMG Academy","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#website"},"datePublished":"2023-12-18T19:01:03+00:00","dateModified":"2025-12-09T16:12:49+00:00","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/es\/rugged-devops-y-devsecops-explicados\/"]}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#website","url":"https:\/\/sandbox2.institutopmg.com\/es\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]},{"@type":"Person","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/person\/4ff5bc0806b04dd72d25d14a443360e7","name":"Adriano Martins Antonio","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/07\/23180854\/Adriano-PNG-100x100.png","caption":"Adriano Martins Antonio"},"sameAs":["https:\/\/www.facebook.com\/adriano.martinsantonio"],"url":"https:\/\/sandbox2.institutopmg.com\/es\/author\/adrianopmgacademy-coms\/"}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/posts\/148681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/users\/85233"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/comments?post=148681"}],"version-history":[{"count":1,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/posts\/148681\/revisions"}],"predecessor-version":[{"id":148682,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/posts\/148681\/revisions\/148682"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/media?parent=148681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/categories?post=148681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/tags?post=148681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}