{"id":39757,"date":"2025-01-14T07:21:46","date_gmt":"2025-01-14T06:21:46","guid":{"rendered":"https:\/\/www.firstattribute.com\/?p=39757"},"modified":"2025-01-14T13:43:11","modified_gmt":"2025-01-14T12:43:11","slug":"nis2-requirements-and-iam-system","status":"publish","type":"post","link":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/","title":{"rendered":"Meet NIS2 requirements with the right IAM system"},"content":{"rendered":"<p>The <strong>NIS2 requirements of the EU<\/strong> represent a significant step toward establishing a <strong>uniform and high security standard for critical infrastructures<\/strong>. The goal is to better prepare companies and organizations for cyber threats and strengthen their resilience against attacks.<\/p>\n<p>An essential part of these requirements is the effective management and <strong>protection of user accounts<\/strong>, as they are often one of the primary attack vectors in cyber incidents.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Index<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#User-Accounts-the-Key-to-IT-Security\" >User Accounts, the Key to IT Security<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Security-Concepts-for-Sensitive-Data\" >Security Concepts for Sensitive Data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Identity-and-Access-Management-IAM-as-a-Central-Solution\" >Identity and Access Management (IAM) as a Central Solution<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Whats-Behind-NIS2\" >What\u2019s Behind NIS2<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Transparency-and-Logging-A-Must-for-NIS2-Implementation\" >Transparency and Logging: A Must for NIS2 Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Organizational-Measures-Training-and-Emergency-Planning\" >Organizational Measures: Training and Emergency Planning<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Supply-Chains-and-External-Access-Security-Beyond-Company-Borders\" >Supply Chains and External Access: Security Beyond Company Borders<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Resilience-Through-Technological-and-Organizational-Security\" >Resilience Through Technological and Organizational Security<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#How-IAM-Systems-Can-Help\" >How IAM Systems Can Help<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#IAM-Systems-The-Foundation-for-NIS2-Compliance\" >IAM Systems: The Foundation for NIS2 Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Efficient-User-Management-with-Delegation\" >Efficient User Management with Delegation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Improved-Visibility-in-Hybrid-IT-Environments\" >Improved Visibility in Hybrid IT Environments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Transparency-and-Security-Through-Logging\" >Transparency and Security Through Logging<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Challenges-of-the-NIS2-Directive\" >Challenges of the NIS2 Directive<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#FirstWare-IDM-Portal-Optimal-Support-for-NIS2-Compliant-Processes\" >FirstWare IDM-Portal: Optimal Support for NIS2-Compliant Processes<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Quick-Onboarding-and-User-Management\" >Quick Onboarding and User Management:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Efficient-Permission-Management\" >Efficient Permission Management:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Delegation-and-Self-Service\" >Delegation and Self-Service:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Automated-Logging-and-Audit-Capability\" >Automated Logging and Audit Capability:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Integration-of-Hybrid-IT-Environments\" >Integration of Hybrid IT Environments:<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Conclusion-NIS2-as-an-Opportunity-for-Stable-IT-Infrastructures\" >Conclusion: NIS2 as an Opportunity for Stable IT Infrastructures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#Learn-More-About-the-FirstWare-IDM-Portal\" >Learn More About the FirstWare IDM-Portal<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"User-Accounts-the-Key-to-IT-Security\"><\/span>User Accounts, the Key to IT Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Security-Concepts-for-Sensitive-Data\"><\/span>Security Concepts for Sensitive Data<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Companies are required to implement clear policies for accessing IT systems and sensitive data. This includes, among other things, the <strong>regular review and restriction of permissions<\/strong>, especially for users with administrative rights.<\/p>\n<p><strong>Administrative rights are considered particularly critical<\/strong>, as their misuse can cause significant damage. Security concepts must, therefore, be based on the principle of least privilege to minimize risks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Identity-and-Access-Management-IAM-as-a-Central-Solution\"><\/span>Identity and Access Management (IAM) as a Central Solution<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The <strong>integration of modern Identity and Access Management (IAM) systems is indispensable for compliance with the NIS2 directive<\/strong>. IAM solutions, such as the <a href=\"https:\/\/www.firstware.com\/en\/\" target=\"_blank\" rel=\"noopener\">IDM-Portal<\/a> by FirstAttribute, enable the <strong>centralized management of all identities<\/strong>\u2014be it employees, guests, external partners, or other user groups. They ensure the <strong>enforcement of security policies<\/strong> and the <strong>automated control of access rights<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-39758 aligncenter\" title=\"Identity and Access Management (IAM) as a central solution\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\" alt=\"\" width=\"782\" height=\"365\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png 1898w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2-300x140.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2-1024x478.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2-768x359.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2-1536x717.png 1536w\" sizes=\"(max-width: 782px) 100vw, 782px\" \/><\/p>\n<p>This allows companies to ensure that only authorized identity have access to systems and data, regardless of whether they are internal or external users. At the same time, this access is always traceable. In addition to access control, IAM systems provide detailed logging of all access events. These logs serve as the basis for investigating and reporting security incidents.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Whats-Behind-NIS2\"><\/span>What\u2019s Behind NIS2<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Transparency-and-Logging-A-Must-for-NIS2-Implementation\"><\/span>Transparency and Logging: A Must for NIS2 Implementation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The NIS2 directive includes strict requirements for reporting and documenting security incidents. <strong>IAM systems support<\/strong> this process through the <strong>collection and analysis of data<\/strong>, enabling companies to report accurately and promptly. At the same time, they help identify and address potential security gaps early on.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Organizational-Measures-Training-and-Emergency-Planning\"><\/span>Organizational Measures: Training and Emergency Planning<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>In addition to technical measures, companies must establish organizational processes to ensure the security of user accounts and IT infrastructures. This includes regularly training employees on security policies and handling sensitive data. Emergency plans ensure a quick response in the event of a cyberattack, allowing operations to continue.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Supply-Chains-and-External-Access-Security-Beyond-Company-Borders\"><\/span>Supply Chains and External Access: Security Beyond Company Borders<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The importance of managing user accounts goes beyond direct protection, as companies under NIS2 must also consider the security of their supply chains. IAM systems contribute by securing external access from partners and service providers through temporary access rights and monitoring. This ensures security even beyond a company\u2019s own boundaries.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Resilience-Through-Technological-and-Organizational-Security\"><\/span>Resilience Through Technological and Organizational Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>By combining IAM systems with the requirements of the NIS2 directive, companies can significantly improve both the prevention of cyberattacks and the ability to respond to incidents. Simultaneously, resilience is strengthened, allowing critical operations to continue through <strong>controlled access<\/strong>, even if parts of the infrastructure are compromised.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How-IAM-Systems-Can-Help\"><\/span>How IAM Systems Can Help<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"IAM-Systems-The-Foundation-for-NIS2-Compliance\"><\/span>IAM Systems: The Foundation for NIS2 Compliance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The NIS2 directive requires companies to implement the highest security standards in their IT infrastructure. Identity and Access Management (IAM) systems are a key component in this process, as they efficiently fulfill both technical and organizational requirements. They provide a structured foundation for managing identities and permissions, making them essential for NIS2 compliance.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Efficient-User-Management-with-Delegation\"><\/span>Efficient User Management with Delegation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>IAM systems reduce the complexity of user management by <strong>standardizing and automating processes<\/strong>. Especially in large organizations managing numerous user accounts, an IAM system ensures that permissions are clearly defined, updated, and revoked as needed. Without such a system, there is a risk that old or unused accounts remain active. Additionally, decentralized management increases the likelihood of errors and unauthorized access.<\/p>\n<p>A modern IAM system not only optimizes user account management but also supports the <strong>involvement of key departments<\/strong>. Employees outside the IT department can participate through self-service features or delegated authorization tasks. This reduces the IT team\u2019s workload and speeds up security-critical processes. Under NIS2, where timely responses to security incidents are critical, this provides companies with an advantage.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Improved-Visibility-in-Hybrid-IT-Environments\"><\/span>Improved Visibility in Hybrid IT Environments<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A key aspect is the <a href=\"https:\/\/www.firstattribute.com\/en\/iam-hybrid\/\"><strong>support for hybrid IT environments<\/strong><\/a>, including on-premises directories like Active Directory (AD) and cloud-based solutions like Entra ID.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-39788 size-large\" title=\"NIS2: Support for hybrid IT environments through IAM systems\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments-1024x925.png\" alt=\"NIS2: Support for hybrid IT environments through IAM systems\" width=\"1024\" height=\"925\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments-1024x925.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments-300x271.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments-768x694.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments-1536x1388.png 1536w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IAM-systems-in-hybrid-it-environments.png 1743w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>IAM systems enable a <strong>seamless integration of these environments<\/strong>. They ensure consistent policy management for users, regardless of where their identities reside. Features like automated synchronization and granular access control ensure that security standards are maintained across the infrastructure.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Learn more about hybrid IT management<\/button><\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Transparency-and-Security-Through-Logging\"><\/span>Transparency and Security Through Logging<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>IAM systems also meet the <strong>documentation and traceability requirements<\/strong> essential for NIS2. They provide detailed reports on access rights and user activities, which are critical for internal audits and reporting to authorities. In the event of a security incident, logging allows for a comprehensive analysis of causes and impacts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Challenges-of-the-NIS2-Directive\"><\/span>Challenges of the NIS2 Directive<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table style=\"border-collapse: collapse; width: 100%; height: 144px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\"><strong>Challenge<\/strong><\/td>\n<td style=\"width: 33.4783%; height: 24px;\"><strong>Required Actions<\/strong><\/td>\n<td style=\"width: 33.1883%; height: 24px;\"><strong>IAM Support<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">User Management &amp; Security<\/td>\n<td style=\"width: 33.4783%; height: 24px;\">Compliance with Security Policies<\/td>\n<td style=\"width: 33.1883%; height: 24px;\">Automated Account Creation and Management<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Access Control<\/td>\n<td style=\"width: 33.4783%; height: 24px;\">Ensure Least Privilege Access<\/td>\n<td style=\"width: 33.1883%; height: 24px;\">Role-Based Access Control (RBAC)<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Logging &amp; Transparency<\/td>\n<td style=\"width: 33.4783%; height: 24px;\">Comprehensive Documentation and Traceability<\/td>\n<td style=\"width: 33.1883%; height: 24px;\">Real-Time Logging &amp; Reporting<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Hybrid IT Environments<\/td>\n<td style=\"width: 33.4783%; height: 24px;\">Unified Standards in Cloud &amp; On-Premises<\/td>\n<td style=\"width: 33.1883%; height: 24px;\">Integration of AD and Entra ID<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">External Access<\/td>\n<td style=\"width: 33.4783%; height: 24px;\">Secure Partner and Service Provider Access<\/td>\n<td style=\"width: 33.1883%; height: 24px;\">Temporary Access Rights and Monitoring<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FirstWare-IDM-Portal-Optimal-Support-for-NIS2-Compliant-Processes\"><\/span>FirstWare IDM-Portal: Optimal Support for NIS2-Compliant Processes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The <a href=\"https:\/\/www.firstware.com\/\" target=\"_blank\" rel=\"noopener\">FirstWare IDM-Portal<\/a> by FirstAttribute is a powerful solution that helps companies optimize user and permission management.<\/p>\n<p>Its functionalities include dynamic user management, automated workflows, and role-based access control (RBAC). This makes the IDM-Portal an efficient and secure approach to managing user identities.<\/p>\n<p><img decoding=\"async\" class=\"imgshadow wp-image-39764 size-large aligncenter\" title=\"FirstWare IDM Portal - IAM Solution from FirstAttribute\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute-1024x552.png\" alt=\"\" width=\"1024\" height=\"552\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute-1024x552.png 1024w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute-300x162.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute-768x414.png 768w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute-1536x827.png 1536w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/FirstWare-IDM-Portal-IAM-Solution-from-FirstAttribute.png 1905w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><strong>Advantages of Using the IDM-Portal as an IAM System<\/strong><\/p>\n<ul>\n<li><strong>Time savings<\/strong>: Automated processes relieve IT teams.<\/li>\n<li><strong>Improved security<\/strong>: Minimized human errors through standardized workflows.<\/li>\n<li><strong>Compliance support<\/strong>: Fulfillment of legal requirements, including documentation obligations.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Quick-Onboarding-and-User-Management\"><\/span>Quick Onboarding and User Management:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A central aspect of implementing NIS2 is ensuring that user accounts are managed correctly and securely. The IDM-Portal allows new user accounts to be created quickly and error-free by automatically generating dynamic attributes such as samAccountName or UserPrincipalName.<\/p>\n<p><img decoding=\"async\" class=\"imgshadow wp-image-39766 size-full aligncenter\" title=\"NIS2 - Generating Dynamic Attributes to Prevent Errors\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/NIS2-Generating-Dynamic-Attributes-to-Prevent-Errors.png\" alt=\"\" width=\"985\" height=\"750\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/NIS2-Generating-Dynamic-Attributes-to-Prevent-Errors.png 985w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/NIS2-Generating-Dynamic-Attributes-to-Prevent-Errors-300x228.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/NIS2-Generating-Dynamic-Attributes-to-Prevent-Errors-768x585.png 768w\" sizes=\"(max-width: 985px) 100vw, 985px\" \/><\/p>\n<p>This automation reduces human errors and ensures a uniform data structure. HR staff can make changes to user accounts without needing extensive IT knowledge, relieving the IT department and accelerating processes.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Efficient-Permission-Management\"><\/span>Efficient Permission Management:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>According to the NIS2 directive, precise and documented control of access rights is required. The IDM-Portal enables the automated assignment of permissions via department groups, ensuring that users only have access to resources relevant to them.<\/p>\n<p><img decoding=\"async\" class=\"imgshadow aligncenter wp-image-39771 size-full\" title=\"NIS2 - Assigning Permissions in the User Profile in the IDM Portal\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IDM-Portal-Organisation.png\" alt=\"\" width=\"820\" height=\"168\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IDM-Portal-Organisation.png 820w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IDM-Portal-Organisation-300x61.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/IDM-Portal-Organisation-768x157.png 768w\" sizes=\"(max-width: 820px) 100vw, 820px\" \/><\/p>\n<p>The integration of role-based access control (RBAC) allows for detailed control of permissions and management of access to sensitive data in line with compliance requirements.<\/p>\n<p><button class=\"ButtonBeratung aligncenter\"><a href=\"https:\/\/www.firstattribute.com\/en\/contact\/\">Book a demo<\/a><\/button><\/p>\n<h3><span class=\"ez-toc-section\" id=\"Delegation-and-Self-Service\"><\/span>Delegation and Self-Service:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Another unique feature of the IDM-Portal is its ability to delegate routine tasks such as managing group memberships or resetting passwords to non-IT staff. This relieves the IT department without compromising security. At the same time, employees can independently make basic changes via an intuitive web interface, increasing data accuracy and eliminating waiting times.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Automated-Logging-and-Audit-Capability\"><\/span>Automated Logging and Audit Capability:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img decoding=\"async\" class=\"alignleft wp-image-39717\" title=\"NIS2 Requirements: Transparency and Security Through Logging\" src=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IDM-Portal-Audit-und-Reporting2-1-300x204.png\" alt=\"NIS2 Requirements: Transparency and Security Through Logging\" width=\"350\" height=\"238\" srcset=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IDM-Portal-Audit-und-Reporting2-1-300x204.png 300w, https:\/\/www.firstattribute.com\/wp-content\/uploads\/2024\/12\/IDM-Portal-Audit-und-Reporting2-1.png 500w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/>Compliance with NIS2 requirements necessitates a thorough traceability of all security-relevant actions. The IDM-Portal offers comprehensive logging functions that document changes to user accounts and permissions in real time. These logs not only support internal audits but also the required reporting to authorities in case of a security incident.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Integration-of-Hybrid-IT-Environments\"><\/span>Integration of Hybrid IT Environments:<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For companies operating both on-premises and in cloud environments, theIDM-Portal\u2019s ability to seamlessly integrate Active Directory (AD) and Entra ID is particularly important. This feature ensures that security standards are consistently adhered to in both environments, and users can be managed centrally.<\/p>\n<p>With these features, the FirstWare IDM-Portal offers a comprehensive solution that not only helps companies meet the requirements of the NIS2 directive but also optimizes processes and enhances security standards in the long term.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion-NIS2-as-an-Opportunity-for-Stable-IT-Infrastructures\"><\/span>Conclusion: NIS2 as an Opportunity for Stable IT Infrastructures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Without an IAM system, companies expose their IT infrastructure to significant risks. Manual identity management is not only time-consuming but also error-prone, potentially resulting in non-compliance with legal requirements. IAM systems, on the other hand, provide a centralized platform that combines efficiency, security, and transparency. For companies affected by NIS2, using such a system is not an optional luxury but a strategic necessity to defend against growing cyber threats while meeting legal requirements.<\/p>\n<p>Integrating IAM systems and implementing NIS2 requirements not only improves IT security but also creates a robust security architecture in the long term. The resulting transparency, control, and responsiveness form the foundation for sustainable cyber resilience, ensuring the protection of sensitive data and the stability of critical systems. Thus, NIS2 is far more than a bureaucratic mandate; it is an opportunity to take IT security to the next level.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Learn-More-About-the-FirstWare-IDM-Portal\"><\/span>Learn More About the FirstWare IDM-Portal<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"alignleft wp-image-36704\" title=\"IDM Portal Hybrid IAM Solution\" src=\"https:\/\/www.firstware.com\/wp-content\/uploads\/2021\/08\/IDM-Portal-Hybrid-IAM-Loesung-1.png\" alt=\"IDM Portal Hybrid IAM Solution\" width=\"270\" height=\"225\" \/>The <a href=\"https:\/\/www.firstware.com\/\">FirstWare IDM-Portal<\/a> is a tailor-made solution for Identity and Access Management (IAM).<\/p>\n<p>It enables automated management of users and their permissions, whether on-premises or in the cloud.<\/p>\n<p>The solution integrates all key requirements of the IAM process and allows for quick, centralized access to identity and directory services.<\/p>\n<p><a href=\"https:\/\/www.firstattribute.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\"><button class=\"ButtonBeratung aligncenter\">Contact Us Now<\/button><\/a><\/p>\n<p style=\"text-align: center;\">You can also reach our team by phone at<br \/>\n<a href=\"tel:+4981969984330\"><strong>+49 81 969 984 330<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NIS2 requirements of the EU represent a significant step toward establishing a uniform and high security standard for critical [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3234,3229,3233],"tags":[3418,3419],"class_list":["post-39757","post","type-post","status-publish","format-standard","hentry","category-concepts","category-idm-portal-en","category-news","tag-iam-systeme","tag-nis2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Meet NIS2 requirements with the right IAM system - FirstAttribute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet NIS2 requirements with the right IAM system - FirstAttribute\" \/>\n<meta property=\"og:description\" content=\"The NIS2 requirements of the EU represent a significant step toward establishing a uniform and high security standard for critical [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/\" \/>\n<meta property=\"og:site_name\" content=\"FirstAttribute\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-14T06:21:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-14T12:43:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1898\" \/>\n\t<meta property=\"og:image:height\" content=\"886\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Elysabeth Yven\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elysabeth Yven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/\"},\"author\":{\"name\":\"Elysabeth Yven\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/person\\\/1b5e92b4f7766f4a48516d774a104ba1\"},\"headline\":\"Meet NIS2 requirements with the right IAM system\",\"datePublished\":\"2025-01-14T06:21:46+00:00\",\"dateModified\":\"2025-01-14T12:43:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/\"},\"wordCount\":1525,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\",\"keywords\":[\"IAM-Systeme\",\"NIS2\"],\"articleSection\":[\"Concepts\",\"IDM-Portal\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/\",\"name\":\"Meet NIS2 requirements with the right IAM system - FirstAttribute\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\",\"datePublished\":\"2025-01-14T06:21:46+00:00\",\"dateModified\":\"2025-01-14T12:43:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/news\\\/nis2-requirements-and-iam-system\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Meet NIS2 requirements with the right IAM system\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"name\":\"FirstAttribute AG\",\"description\":\"Identity Access Management, Active Directory Spezialisten\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#organization\",\"name\":\"FirstAttribute AG\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"contentUrl\":\"https:\\\/\\\/www.firstattribute.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png\",\"width\":700,\"height\":145,\"caption\":\"FirstAttribute AG\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firstattribute.com\\\/en\\\/#\\\/schema\\\/person\\\/1b5e92b4f7766f4a48516d774a104ba1\",\"name\":\"Elysabeth Yven\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet NIS2 requirements with the right IAM system - FirstAttribute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/","og_locale":"en_US","og_type":"article","og_title":"Meet NIS2 requirements with the right IAM system - FirstAttribute","og_description":"The NIS2 requirements of the EU represent a significant step toward establishing a uniform and high security standard for critical [&hellip;]","og_url":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/","og_site_name":"FirstAttribute","article_published_time":"2025-01-14T06:21:46+00:00","article_modified_time":"2025-01-14T12:43:11+00:00","og_image":[{"width":1898,"height":886,"url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png","type":"image\/png"}],"author":"Elysabeth Yven","twitter_misc":{"Written by":"Elysabeth Yven","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#article","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/"},"author":{"name":"Elysabeth Yven","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1"},"headline":"Meet NIS2 requirements with the right IAM system","datePublished":"2025-01-14T06:21:46+00:00","dateModified":"2025-01-14T12:43:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/"},"wordCount":1525,"publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png","keywords":["IAM-Systeme","NIS2"],"articleSection":["Concepts","IDM-Portal","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/","url":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/","name":"Meet NIS2 requirements with the right IAM system - FirstAttribute","isPartOf":{"@id":"https:\/\/www.firstattribute.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#primaryimage"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png","datePublished":"2025-01-14T06:21:46+00:00","dateModified":"2025-01-14T12:43:11+00:00","breadcrumb":{"@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#primaryimage","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2025\/01\/Identity-and-Access-Management-IAM-as-central-solution-NIS2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firstattribute.com\/en\/news\/nis2-requirements-and-iam-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.firstattribute.com\/en\/"},{"@type":"ListItem","position":2,"name":"Meet NIS2 requirements with the right IAM system"}]},{"@type":"WebSite","@id":"https:\/\/www.firstattribute.com\/en\/#website","url":"https:\/\/www.firstattribute.com\/en\/","name":"FirstAttribute AG","description":"Identity Access Management, Active Directory Spezialisten","publisher":{"@id":"https:\/\/www.firstattribute.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firstattribute.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firstattribute.com\/en\/#organization","name":"FirstAttribute AG","url":"https:\/\/www.firstattribute.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","contentUrl":"https:\/\/www.firstattribute.com\/wp-content\/uploads\/2021\/01\/FIRSTATTRIBUTE-Logo2013-final-700x145px.png","width":700,"height":145,"caption":"FirstAttribute AG"},"image":{"@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.firstattribute.com\/en\/#\/schema\/person\/1b5e92b4f7766f4a48516d774a104ba1","name":"Elysabeth Yven"}]}},"_links":{"self":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/39757","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/comments?post=39757"}],"version-history":[{"count":8,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/39757\/revisions"}],"predecessor-version":[{"id":39790,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/posts\/39757\/revisions\/39790"}],"wp:attachment":[{"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/media?parent=39757"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/categories?post=39757"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firstattribute.com\/en\/wp-json\/wp\/v2\/tags?post=39757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}