{"id":3484,"date":"2023-12-30T23:05:52","date_gmt":"2023-12-30T23:05:52","guid":{"rendered":"https:\/\/www.onvif.org\/blog\/?p=3484"},"modified":"2025-06-10T12:50:41","modified_gmt":"2025-06-10T12:50:41","slug":"8-essential-requirements-for-managing-physical-security-devices","status":"publish","type":"post","link":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/","title":{"rendered":"8 essential requirements for managing physical security devices"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><em><strong>By Guy Arazi,&nbsp;Director, Technical Partnerships, at SecuriThings<\/strong><\/em><\/p>\n\n\n\n<p>If you\u2019re familiar with ONVIF\u2019s pioneering work promoting standardization and interoperability among physical security devices, then chances are you already know how crucial it is to buy and install devices that conform with ONVIF\u2019s standards. Especially given how quickly the field of physical security continues to evolve and new device types continue to emerge, the flexibility and future-proof reliability of ONVIF conformant devices are critical advantages for physical security teams.<\/p>\n\n\n\n<p>Of course, even with the most advanced and versatile physical security devices, the process of device management is a major challenge. And given how high the stakes can be, the goal of managing those devices adequately is one that organizations can\u2019t afford to neglect. Simply put, to get the full benefit of your physical security devices, you need to manage them properly over time.<\/p>\n\n\n\n<p>That makes it particularly important to have consistent standards for managing physical security devices. Just like organizations can help themselves increase their physical security ROI by buying and installing physical security devices that conform to ONVIF\u2019s standards, after installation they can maximize their ROI by managing those devices in line with specific management standards. That understanding of the importance of standards throughout the device life cycle is one of the key reasons that we at SecuriThings are so excited about our new <a href=\"https:\/\/www.onvif.org\/blog\/2023\/08\/08\/member-profile-securithings\/\">partnership with ONVIF<\/a>.<\/p>\n\n\n\n<p>With all of that in mind, this post will shed light on the essential standards for managing physical security devices. In addition to explaining the key aspects of physical security device management, we will present eight key standards to improve the management of those devices.<\/p>\n\n\n\n<p><strong>What are the key aspects of physical security device management?<\/strong><\/p>\n\n\n\n<p>Perhaps the most obvious way in which managing and maintaining physical security devices can help organizations improve their security posture is by maximizing device availability (uptime). There are many reasons devices can have problems <a href=\"https:\/\/securithings.com\/blog\/how-automation-can-help-minimize-downtime-of-cameras-and-other-physical-security-devices\/\">resulting in downtime<\/a>, but there are specific and achievable steps that organizations can take to minimize both the frequency and the duration of that downtime. And given the risk that a serious security incident could take place during that downtime (as happened during 2022\u2019s <a href=\"https:\/\/abcnews.go.com\/US\/cameras-working-nyc-subway-shooting\/story?id=84475268\">shooting in a Brooklyn subway station<\/a>), maximizing device availability can make a powerful difference in helping organizations stay safe.<\/p>\n\n\n\n<p>In addition to boosting uptime, proper device management involves hardening and maintaining devices to prevent them from providing cybercriminals with easy targets. The importance of protecting physical security devices from online threat actors was underscored by an infamous <a href=\"https:\/\/www.cbsnews.com\/news\/verkada-hack-tesla-nissan-equinox-cloudflare\/\">2021 data breach<\/a>, in which hackers managed to compromise the feeds of roughly 150,000 security cameras. While the threat is very serious, properly managing physical security devices can go a long way towards helping organizations defend themselves.<\/p>\n\n\n\n<p>There are also other critical goals for organizations to focus on as they improve the management of their physical security devices. Given the trend toward increasing regulation of technology including physical security devices, it is vital to ensure compliance with relevant laws. Reliable legal compliance can help organizations avoid lawsuits, fines, and reputational damage.&nbsp; At the same time, organizations need to ensure that their physical security devices are managed in ways that comply with their own internal (IT) policies and standards, keeping them safe from cyber vulnerabilities, among other things.<\/p>\n\n\n\n<p>It\u2019s also essential to manage physical security devices efficiently and cost-effectively. After all, no matter how reliable an approach to managing physical security devices might be, typical organizations won\u2019t adopt it if it\u2019s unaffordable.<\/p>\n\n\n\n<p><strong>What are the 8 key standards for managing physical security devices?<\/strong><\/p>\n\n\n\n<p>To meet all of these goals \u2013 bolstering both physical security and cybersecurity, while ensuring legal compliance and keeping expenses down \u2013 it\u2019s important for organizations to achieve <a href=\"https:\/\/securithings.com\/blog\/5-reasons-why-enterprise-readiness-is-so-crucial-in-physical-security\/\">enterprise-ready physical security<\/a>.<\/p>\n\n\n\n<p>How can organizations make enterprise-ready physical security a reality? While working extensively with both IT and physical security professionals and with leading device manufacturers, <a href=\"https:\/\/securithings.com\/\">SecuriThings<\/a> has identified eight key requirements that physical security teams must meet in order to reach an enterprise-ready level.<\/p>\n\n\n\n<p>To achieve enterprise-ready physical security, organizations must perform the following eight steps properly and comprehensively:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\" start=\"1\">\n<li><strong>Operational asset mapping<\/strong>, creating (preferably automatically) a full breakdown of all of an organization\u2019s physical security devices \u2013 including key details such as each device\u2019s model, firmware version, serial number, end of life date, and warranty information.<\/li>\n\n\n\n<li><strong>Configuration hardening<\/strong>, identifying and addressing any vulnerabilities that are present in devices right out of the box.<\/li>\n\n\n\n<li><strong>Health and performance monitoring<\/strong>, both to detect downtime and other issues rapidly, and to gather useful information in order to help address any issues that do arise.<\/li>\n\n\n\n<li><strong>User and password management<\/strong>, addressing the risk that problems with passwords or user permissions could enable cybercriminals to hack into physical security devices.<\/li>\n\n\n\n<li><strong>Remote firmware upgrade<\/strong>, addressing the risk that unpatched vulnerabilities could be exploited by cybercriminals \u2013 while also preventing devices from receiving incompatible firmware updates, which can cause downtime.<\/li>\n\n\n\n<li><strong>Certificate management<\/strong>, particularly addressing the cybersecurity need for both SSL and 802.1x certificates, while proper management of certificates is often neglected.<\/li>\n\n\n\n<li><strong>Cybersecurity (detection and protection)<\/strong>, going beyond the initial hardening and routine maintenance of physical security devices to defend them against new and emerging cyber threats.<\/li>\n\n\n\n<li><strong>Detailed log collection<\/strong>, providing physical security teams with essential information on the performance of each device \u2013 information that they can both analyze on their own and share with other relevant stakeholders.<\/li>\n<\/ol>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>In recent years, fleets of physical security devices have continued to grow \u2013 both in scale and in the variety of devices they include. As a result, the challenge of managing those devices has become increasingly complex. At the same time, trends in physical security, cybersecurity, and legal regulation have made it increasingly important to manage those devices properly.<\/p>\n\n\n\n<p>One key to overcoming that challenge is bringing universal standards to the world of physical security device management. By meeting the eight essential requirements laid out by SecuriThings, organizations can help themselves to enjoy the full benefit of the physical security devices that they\u2019ve purchased and installed.<\/p>\n\n\n\n<p>This way, organizations can supplement the advantages of buying and installing ONVIF conformant physical security devices by managing and maintaining those devices reliably and efficiently over time \u2013 helping them maximize their physical security ROI.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Guy Arazi,&nbsp;Director, Technical Partnerships, at SecuriThings If you\u2019re familiar with ONVIF\u2019s pioneering work promoting standardization and interoperability among physical security devices, then chances are you already know how crucial it is to buy and install devices that conform with ONVIF\u2019s standards. Especially given how quickly the field of physical security continues to evolve and&#8230;<\/p>\n","protected":false},"author":10,"featured_media":3469,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209,245,201],"class_list":["post-3484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-members","tag-open-standards","tag-profiles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 Essential Requirements for Managing Physical Security Devices<\/title>\n<meta name=\"description\" content=\"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Essential Requirements for Managing Physical Security Devices\" \/>\n<meta property=\"og:description\" content=\"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"ONVIF Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-30T23:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T12:50:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ONVIF\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ONVIF\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\"},\"author\":{\"name\":\"ONVIF\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"headline\":\"8 essential requirements for managing physical security devices\",\"datePublished\":\"2023-12-30T23:05:52+00:00\",\"dateModified\":\"2025-06-10T12:50:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\"},\"wordCount\":1041,\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg\",\"keywords\":[\"members\",\"open standards\",\"profiles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\",\"url\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\",\"name\":\"8 Essential Requirements for Managing Physical Security Devices\",\"isPartOf\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg\",\"datePublished\":\"2023-12-30T23:05:52+00:00\",\"dateModified\":\"2025-06-10T12:50:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\"},\"description\":\"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices\",\"breadcrumb\":{\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage\",\"url\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg\",\"contentUrl\":\"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg\",\"width\":2560,\"height\":1434},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.onvif.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 essential requirements for managing physical security devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#website\",\"url\":\"https:\/\/www.onvif.org\/blog\/\",\"name\":\"ONVIF Blog\",\"description\":\"ONVIF Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.onvif.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d\",\"name\":\"ONVIF\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g\",\"caption\":\"ONVIF\"},\"url\":\"https:\/\/www.onvif.org\/blog\/author\/onvif\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Essential Requirements for Managing Physical Security Devices","description":"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/","og_locale":"en_US","og_type":"article","og_title":"8 Essential Requirements for Managing Physical Security Devices","og_description":"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices","og_url":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/","og_site_name":"ONVIF Blog","article_published_time":"2023-12-30T23:05:52+00:00","article_modified_time":"2025-06-10T12:50:41+00:00","og_image":[{"width":2560,"height":1434,"url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","type":"image\/jpeg"}],"author":"ONVIF","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ONVIF"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#article","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/"},"author":{"name":"ONVIF","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"headline":"8 essential requirements for managing physical security devices","datePublished":"2023-12-30T23:05:52+00:00","dateModified":"2025-06-10T12:50:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/"},"wordCount":1041,"image":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","keywords":["members","open standards","profiles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/","url":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/","name":"8 Essential Requirements for Managing Physical Security Devices","isPartOf":{"@id":"https:\/\/www.onvif.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","datePublished":"2023-12-30T23:05:52+00:00","dateModified":"2025-06-10T12:50:41+00:00","author":{"@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d"},"description":"ONVIF member SecuriThings details 8 essential requirements for managing physical security devices","breadcrumb":{"@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#primaryimage","url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","contentUrl":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","width":2560,"height":1434},{"@type":"BreadcrumbList","@id":"https:\/\/www.onvif.org\/blog\/2023\/12\/30\/8-essential-requirements-for-managing-physical-security-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.onvif.org\/blog\/"},{"@type":"ListItem","position":2,"name":"8 essential requirements for managing physical security devices"}]},{"@type":"WebSite","@id":"https:\/\/www.onvif.org\/blog\/#website","url":"https:\/\/www.onvif.org\/blog\/","name":"ONVIF Blog","description":"ONVIF Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.onvif.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/667465a3115ab3f51de5c8594c6f557d","name":"ONVIF","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.onvif.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/24008f1571e68e90d2d58c76063825d02dc84e6cf0d3f72d61d8506dd66fd275?s=96&d=mm&r=g","caption":"ONVIF"},"url":"https:\/\/www.onvif.org\/blog\/author\/onvif\/"}]}},"jetpack_featured_media_url":"https:\/\/www.onvif.org\/blog\/wp-content\/uploads\/2023\/12\/AdobeStock_649323193-fotor-2023122916557-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/comments?post=3484"}],"version-history":[{"count":4,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3484\/revisions"}],"predecessor-version":[{"id":3491,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/posts\/3484\/revisions\/3491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media\/3469"}],"wp:attachment":[{"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/media?parent=3484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/categories?post=3484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.onvif.org\/blog\/wp-json\/wp\/v2\/tags?post=3484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}