{"id":218575,"date":"2019-01-28T12:04:15","date_gmt":"2019-01-28T11:04:15","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=218575"},"modified":"2025-10-13T13:45:33","modified_gmt":"2025-10-13T13:45:33","slug":"ebios-risk-manager","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/ebios-risk-manager\/","title":{"rendered":"EBIOS Risk Manager"},"content":{"rendered":"<p>After 8 years of use of the <strong>EBIOS 2010 Risk Analysis Method<\/strong>, A new concept emerged at the end of 2018, based on<strong> agility, knowledge, and commitment<\/strong>\u00a0: <strong>EBIOS \u00ab RM \u00bb<\/strong>, For <strong>Risk Manager<\/strong>.<\/p>\n<p>It is worth recalling that the first version of the EBIOS method dates back to <strong>1995<\/strong>, then a first update of EBIOS was carried out in 2004, and a significant evolution in 2010. This latter version, by far the most widely used, introduced the<strong> concepts of essential goods and feared events<\/strong> to assess information security risks at the level of the organization&#039;s activities and not just at the technical level.<\/p>\n<p>According to the\u2019<a href=\"https:\/\/www.ssi.gouv.fr\/\"><strong>ANSSI<\/strong><\/a>, \u00ab\u00a0<em>The EBIOS RM method adopts a risk management approach that starts from the highest level (major missions of the object studied) to progressively focus on business and technical elements, studying possible attack paths. <\/em><em>It aims to achieve a synthesis between &quot;compliance&quot; and &quot;scenarios&quot; by repositioning these two complementary approaches where they bring the most added value. <\/em><em>Risk assessment by scenario therefore focuses on intentional and targeted threats.<\/em>.\u00a0\u00bb<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Figure 1 \u2013 <strong>Digital Risk Management Pyramid<\/strong>. <\/em><\/span><span style=\"color: #808080;\"><em>Source : <\/em><\/span><a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/10\/guide-methode-ebios-risk-manager.pdf\">https:\/\/www.ssi.gouv.fr\/uploads\/2018\/10\/guide-methode-ebios-risk-manager.pdf<\/a><\/p>\n<p>Like the 2010 version, RM is based on <strong>5 major workshops<\/strong> aiming to meet several objectives:<\/p>\n<ul>\n<li>Identify the security framework appropriate to the purpose of the study;<\/li>\n<li>To comply with digital security standards;<\/li>\n<li>Assess the level of threat to the ecosystem in relation to the object of the study;<\/li>\n<li>Identify and analyze high-level scenarios;<\/li>\n<li>Conduct a preliminary risk assessment to identify priority areas for improving safety;<\/li>\n<li>Conduct a complete and finished risk study.<\/li>\n<\/ul>\n<h2><a name=\"_Toc534279510\"><\/a>A possible comparison?<\/h2>\n<p>Below are a summary of the two methods.<\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Figure 2 \u2013 <strong>EBIOS Method 2010<\/strong>. <\/em><\/span><span style=\"color: #808080;\"><em>Source : <\/em><\/span><a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/10\/guide-methode-ebios-risk-manager.pdf\">https:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/<\/a><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #808080;\"><em>Figure 3 \u2013 <strong>EBIOS Risk Manager Method<\/strong>. <\/em><\/span><span style=\"color: #808080;\"><em>Source : <\/em><\/span><a href=\"https:\/\/www.ssi.gouv.fr\/uploads\/2018\/10\/guide-methode-ebios-risk-manager.pdf\">https:\/\/www.ssi.gouv.fr\/uploads\/2018\/10\/guide-methode-ebios-risk-manager.pdf<\/a><\/p>\n<p>As can be seen, the course of the analysis is different in both form and substance.<\/p>\n<p>The RM strategy will allow for a more in-depth study. But while EBIOS 2010 is based on a concrete, safety-criterion-driven approach with a logical and pragmatic guiding principle, EBIOS RM is situated within a <strong>analysis and reflection on scenarios of intentional threats<\/strong> which may seem speculative at first glance.<\/p>\n<p><strong>In-depth analysis<\/strong> This involves determining the risks faced by a profession based on an attacker&#039;s capabilities and objectives, the path taken to achieve their goal, and their modus operandi.<strong> three major elements<\/strong> This will allow us to determine the measures to be implemented to reduce, or even eliminate, these risks through the various workshops. Each workshop will therefore establish certain measures, which will be further developed as the risk analysis progresses.<\/p>\n<p>The 2010 method, on the other hand, is based on security objectives and a vulnerability\/severity ratio on threat sources and feared events.<\/p>\n<p>It is therefore<strong> It is not recommended to compare the two versions in a strict sense.<\/strong> for a better understanding of the RM method, but rather to see it as a new method to follow:<\/p>\n<p><em>A source from the EBIOS Club states: &quot;RM&#039;s biggest difficulty is having done 2010 beforehand. The paradigm is so different from a standard AR. It&#039;s important to remember that hygiene isn&#039;t part of AR, which is supposed to save a lot of time.&quot;\u00ab <\/em><\/p>\n<h2>EBIOS RM and ISO27005<\/h2>\n<p>Besides the ongoing debate on the issue: &quot;\u00ab\u00a0<strong>Is ISO27005 a method?<\/strong>\u00a0\u00bb&quot;, we detected some fairly obvious similarities between ISO 27005:2013 and EBIOS 2010.<\/p>\n<p>However, with this new version, announced at<strong> Security Conference 2018<\/strong> In Monaco, there is a tendency to ask new questions about the veracity of the method with regard to ISO, especially since its last update in July 2018.<\/p>\n<p>These questions may seem pointless since we certainly don&#039;t ask them about the Mehari, Octave, and other methods. What is troubling, however, is ANSSI&#039;s publication of the EBIOS RM method to the detriment of others and its rejection of the 2010 version.<\/p>\n<p>ANSSI titles its presentation of the EBIOS method as follows:<\/p>\n<p><em>\u00ab&quot;The EBIOS method (Expression of Needs and Identification of Security Objectives) is a comprehensive information systems security risk management tool compliant with the RGS and the latest ISO 27001, 27005 and 31000 standards.&quot;\u00bb<\/em><\/p>\n<p>Have you heard of the<strong> Draft ISO\/DIS 34001 standard &#039;Safety Management System&#039;\u2018<\/strong>, focused on fraudulent acts?<\/p>\n<p>Discussions on some social media platforms debate the theory that EBIOS RM does not specifically aim to comply with the ISO27005 standard\/method, but rather to focus on...<strong> new interpretations of risk analysis<\/strong> very close to this draft standard.<\/p>\n<p>In any case, even though the V2010 tools and methodology are no longer available on the ANSSI website (but are still accessible via a web search), having been replaced by the 2018 RM kit, many organizations still recommend the older version of EBIOS as a reference methodology to be familiar with in preparation for the <strong>\u00abRisk Manager\u00bb certification\u00bb<\/strong>.<\/p>\n<p>Finally, it&#039;s worth adding that EBIOS RM allows<strong> the extraction of security measures<\/strong> Throughout the various workshops, a significant advantage arises, coupled with the complementary nature of these workshops. Each element can add value to previous workshops and provide new security measures to be implemented within the organization, which is absolutely not the case in EBIOS 2010, where the study of security measures is the subject of an entire final module. EBIOS RM may therefore seem flawed, but the agility of its use can reveal elements that a traditional risk analysis might overlook.<\/p>\n<h2>Conclusion<\/h2>\n<p>EBIOS RM is therefore intended to <strong>simpler and quicker to implement<\/strong> than the 2010 version.<\/p>\n<p>We did not mention the <strong>completion times for the various workshops<\/strong> This article provides guidance on estimating the time required for each step of the methodology, but the guide on the ANSSI website does offer some indications. However, estimating the time needed to complete each workshop is very difficult, considering the scope of the study and the number of services to be audited.<\/p>\n<p>It is also worth noting that while EBIOS RM is recommended by ANSSI, this method is not a mandatory and exclusive approach applicable to all risk analyses. Indeed, each organization must choose a method based on the ISO 27005 standard to conduct these studies.<\/p>\n<p>However, it is quite interesting to examine this EBIOS version for its <strong>a new approach to risk, more focused on the attacker and (external) scenarios<\/strong> rather than on the organization&#039;s (internal) defenses.<\/p>\n<p>The limited scope of the various productions from the 5 workshops allows for <strong>to focus on the most critical risks to the company and to define major security measures<\/strong> allowing coverage of a wider range of supporting assets and business values than the old method.<\/p>\n<p>On the other hand, the <strong>Continuous Safety Improvement Action Plan (CSI)<\/strong> This may lead companies to set up more elaborate security committees and become more involved in information security.<\/p>\n<p>However, this method is <strong>especially applicable to companies that are already at a high level of maturity<\/strong>, whose process and job mapping is already clearly defined. Very small businesses (TPEs) and small and medium-sized enterprises (SMEs) will therefore be less targeted by these scenario-based risk analyses and more suited to traditional risk analyses.<\/p>\n<p><strong>Ebios 2010 is by no means a method to be rejected, nor is it obsolete.<\/strong>. Ebios RM is just another way of reasoning and carrying out risk analyses, some would say &quot;a contemporary approach to assessing risks&quot;.<\/p>\n<p>It remains to be seen what the application of this method can bring in the long term to a company; there is not yet enough perspective to determine this.<\/p>","protected":false},"excerpt":{"rendered":"<p>After 8 years of using the EBIOS 2010 Risk Analysis method, a new concept [\u2026]<\/p>","protected":false},"author":26,"featured_media":218581,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-218575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EBIOS Risk Manager - INTRINSEC<\/title>\n<meta name=\"description\" content=\"Apr\u00e8s 8 ann\u00e9es d\u2019utilisation de la m\u00e9thode d\u2019Analyse de risques EBIOS 2010, un nouveau concept voit le jour en fin d\u2019ann\u00e9e 2018.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/ebios-risk-manager\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EBIOS Risk Manager\" \/>\n<meta property=\"og:description\" content=\"Apr\u00e8s 8 ann\u00e9es d\u2019utilisation de la m\u00e9thode d\u2019Analyse de risques EBIOS 2010, un nouveau concept voit le jour en fin d\u2019ann\u00e9e 2018.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/ebios-risk-manager\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-28T11:04:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-13T13:45:33+00:00\" \/>\n<meta name=\"author\" content=\"Elisee Pfender Delubac\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elisee Pfender Delubac\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/\"},\"author\":{\"name\":\"Elisee Pfender Delubac\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/08b07afdd0621c4c3ac75c3598932bb9\"},\"headline\":\"EBIOS Risk Manager\",\"datePublished\":\"2019-01-28T11:04:15+00:00\",\"dateModified\":\"2025-10-13T13:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/\"},\"wordCount\":1510,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Veille S\u00e9curit\u00e9\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/\",\"name\":\"EBIOS Risk Manager - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-01-28T11:04:15+00:00\",\"dateModified\":\"2025-10-13T13:45:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/08b07afdd0621c4c3ac75c3598932bb9\"},\"description\":\"Apr\u00e8s 8 ann\u00e9es d\u2019utilisation de la m\u00e9thode d\u2019Analyse de risques EBIOS 2010, un nouveau concept voit le jour en fin d\u2019ann\u00e9e 2018.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/ebios-risk-manager\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EBIOS Risk Manager\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/08b07afdd0621c4c3ac75c3598932bb9\",\"name\":\"Elisee Pfender Delubac\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/?s=96&d=retro&r=g\",\"caption\":\"Elisee Pfender Delubac\"},\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/elisee-pfender-delubac\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EBIOS Risk Manager - INTRINSEC","description":"After 8 years of using the EBIOS 2010 Risk Analysis method, a new concept emerged at the end of 2018.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/ebios-risk-manager\/","og_locale":"en_US","og_type":"article","og_title":"EBIOS Risk Manager","og_description":"Apr\u00e8s 8 ann\u00e9es d\u2019utilisation de la m\u00e9thode d\u2019Analyse de risques EBIOS 2010, un nouveau concept voit le jour en fin d\u2019ann\u00e9e 2018.","og_url":"https:\/\/www.intrinsec.com\/en\/ebios-risk-manager\/","og_site_name":"INTRINSEC","article_published_time":"2019-01-28T11:04:15+00:00","article_modified_time":"2025-10-13T13:45:33+00:00","author":"Elisee Pfender Delubac","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elisee Pfender Delubac","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/"},"author":{"name":"Elisee Pfender Delubac","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/08b07afdd0621c4c3ac75c3598932bb9"},"headline":"EBIOS Risk Manager","datePublished":"2019-01-28T11:04:15+00:00","dateModified":"2025-10-13T13:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/"},"wordCount":1510,"commentCount":0,"image":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#primaryimage"},"thumbnailUrl":"","articleSection":["Veille S\u00e9curit\u00e9"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intrinsec.com\/ebios-risk-manager\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/","url":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/","name":"EBIOS Risk Manager - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#primaryimage"},"image":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-01-28T11:04:15+00:00","dateModified":"2025-10-13T13:45:33+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/08b07afdd0621c4c3ac75c3598932bb9"},"description":"After 8 years of using the EBIOS 2010 Risk Analysis method, a new concept emerged at the end of 2018.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/ebios-risk-manager\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/ebios-risk-manager\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"EBIOS Risk Manager"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/08b07afdd0621c4c3ac75c3598932bb9","name":"Elisee Pfender Delubac","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=retro&r=g","caption":"Elisee Pfender Delubac"},"url":"https:\/\/www.intrinsec.com\/en\/author\/elisee-pfender-delubac\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=218575"}],"version-history":[{"count":1,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218575\/revisions"}],"predecessor-version":[{"id":230219,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/218575\/revisions\/230219"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=218575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=218575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=218575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}