{"id":307,"date":"2026-02-15T20:34:06","date_gmt":"2026-02-15T19:34:06","guid":{"rendered":"https:\/\/www.gaes.hu\/cybersecurity\/"},"modified":"2026-02-15T20:35:14","modified_gmt":"2026-02-15T19:35:14","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.gaes.hu\/en\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n<div id=\"wp-block-themeisle-blocks-advanced-columns-c8ca2551\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-center\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-3437aeae\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h1 class=\"wp-block-heading has-text-color\" style=\"color:#ffffff;font-size:clamp(37.821px, 2.364rem + ((1vw - 3.2px) * 2.514), 70px);\">Cybersecurity<\/h1>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-8fbb683b\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-2-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-collapsedRows-layout has-vertical-unset\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-620e3016\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<p>Modern vehicles are no longer composed solely of mechanical systems, but are equipped with complex electronic and software components. This transformation has made cybersecurity a critical area in the automotive industry. <\/p>\n\n\n\n<p>As an expert at GAES, we offer cybersecurity solutions compliant with <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong> standards, supporting the security of your vehicles throughout their entire lifecycle.<\/p>\n\n\n\n<p>Our service portfolio includes, among others, the establishment of a Cybersecurity Management System (<strong>CSMS<\/strong>), Threat Analysis and Risk Assessment (<strong>TARA<\/strong>), security architecture design, penetration and fuzz testing, as well as security validation of <strong>V2X<\/strong>, <strong>CAN<\/strong>, <strong>OTA<\/strong> systems and corporate training.<\/p>\n\n\n\n<p>Protecting in-vehicle and external connections, data protection, and the robustness of update mechanisms are our key focus areas; we conduct in-depth testing in this field. Our consulting and technical testing services provide strategic value not only for OEMs but also for suppliers within the framework of type approval processes (<strong>CoC\/COP<\/strong>) and <strong>R155<\/strong> conformity assessments. <\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-9c975bb18ebbc55d132b36ef8bf2321d\" style=\"color:#070731\">Our expert teams in Turkey and Germany develop tailored solutions for your projects, strengthening you in terms of both technical and regulatory compliance.<\/p>\n<\/div>\n\n\n\n<div id=\"wp-block-themeisle-blocks-advanced-column-df784873\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<figure class=\"wp-block-image size-large has-custom-border\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity-1024x576.webp\" alt=\"\" class=\"wp-image-300\" style=\"border-style:none;border-width:0px;border-radius:0px\" srcset=\"https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity-1024x576.webp 1024w, https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity-300x169.webp 300w, https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity-768x432.webp 768w, https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity-1536x864.webp 1536w, https:\/\/www.gaes.hu\/wp-content\/uploads\/2026\/02\/cybersecurity.webp 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-95c28c19\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-unset\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-5d4a582c\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<p class=\"has-text-color\" style=\"color:#ffffff;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);px\"><br\/>Below you can view the details of our services provided within the framework of <strong>automotive cybersecurity<\/strong>:<\/p>\n\n\n\n<ul style=\"color:#ffffff;font-size:clamp(15.747px, 0.984rem + ((1vw - 3.2px) * 0.645), 24px);px\" class=\"wp-block-list has-text-color\">\n<li><strong>GAP Analysis and Establishment of a Cybersecurity Management System (CSMS)<\/strong><\/li>\n\n\n\n<li><strong>Application of Threat Analysis and Risk Assessment (TARA) and development of the cybersecurity concept<\/strong><\/li>\n\n\n\n<li><strong>Definition and execution of testing and validation strategy<\/strong><\/li>\n\n\n\n<li><strong>Supplier Management<\/strong><\/li>\n\n\n\n<li><strong>Auditing, Certification, and Type Approval<\/strong><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-6060ad37\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-e9443913\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-60863476949a745a20ee1aeb728c24eb\" style=\"color:#070731\"><strong>GAP Analysis and Establishment of a Cybersecurity Management System (CSMS)<\/strong><\/h2>\n\n\n\n<p>The <strong>GAP analysis<\/strong> service provided by GAES compares your organization&#8217;s existing cybersecurity practices with the requirements of <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong>, systematically identifying shortcomings and areas for improvement.<\/p>\n\n\n\n<p>As a result of the analysis:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>It can be determined to what extent the current organizational structure complies with the relevant regulations,<\/li>\n\n\n\n<li>Weaknesses in processes, documentation, and technical solutions become clear,<\/li>\n\n\n\n<li>A strategic roadmap is created to achieve the targeted level of compliance.<\/li>\n<\/ul>\n\n\n\n<p>Following the GAP analysis, building on the findings, we establish a <strong>tailored CSMS infrastructure<\/strong>. During this process, we: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Develop management guidelines and a responsibility matrix,<\/li>\n\n\n\n<li>Integrate the <strong>TARA (Threat Analysis and Risk Assessment)<\/strong> process,<\/li>\n\n\n\n<li>Ensure the traceability of cybersecurity work products,<\/li>\n\n\n\n<li>Ensure consistent documentation of processes according to <strong>ISO\/SAE 21434<\/strong>,<\/li>\n\n\n\n<li>Establish mechanisms for internal audit, corrective actions, and continuous improvement.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why is it important?<\/strong><\/h3>\n\n\n\n<p>CSMS is not merely a collection of documents, but a <strong>security culture<\/strong> that ensures the organization is systematically prepared to handle cyber threats throughout the vehicle&#8217;s entire lifecycle. Successful implementation of CSMS is a prerequisite for <strong>R155 type approval<\/strong> and provides a significant competitive advantage in collaborations with OEMs. <\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-1ebac9de84b89bd3b2c9dbcf429a2cb8\" style=\"color:#070731\">Freegan chia ullamco reprehenderit chicharrones, echo park esse tilde. 90\u2019s hammock do <br\/>cupidatat, edison bulb mumblecore vape cloud bread put a bird on it dreamcatcher artisan <br\/>lomo raw denim. <\/p>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-6060ad37\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-e359b036\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-056f88e11917480bf3864abbef74e4f3\" style=\"color:#070731\"><strong><br\/><strong>Application of Threat Analysis and Risk Assessment (TARA) and development of the cybersecurity concept<\/strong><\/strong><\/h2>\n\n\n\n<p>The electronic control units (ECUs), wireless communication protocols, and software systems used in modern vehicles are exposed to increasingly complex threats. Therefore, identifying cyber threats and controlling risks in the early stages of the vehicle development process is a fundamental prerequisite for safety and regulatory compliance. <\/p>\n\n\n\n<p>At GAES, through <strong>TARA<\/strong> applications conducted in accordance with <strong>ISO\/SAE 21434<\/strong>, we determine the extent to which system components are vulnerable to potential threats. During this process, we: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define system assets and valuable resources,<\/li>\n\n\n\n<li>Model potential attack paths,<\/li>\n\n\n\n<li>Calculate risk scores based on damage event scenarios and probability analyses,<\/li>\n\n\n\n<li>Define and prioritize cybersecurity goals based on the results.<\/li>\n<\/ul>\n\n\n\n<p>The TARA outputs serve as the basis for creating work products fundamental to cybersecurity engineering and are structured in accordance with the requirements of <strong>UNECE R155 Annex 5<\/strong>.<\/p>\n\n\n\n<p>Solutions developed to reduce identified security risks are integrated into the system architecture as a <strong>cybersecurity concept<\/strong>. Within this framework, we: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define technical controls and countermeasures related to security goals,<\/li>\n\n\n\n<li>Develop solution proposals for communication security, data integrity, access control, and software update mechanisms, among others,<\/li>\n\n\n\n<li>Ensure the traceability of security requirements throughout the design process.<\/li>\n<\/ul>\n\n\n\n<p>This approach lays the foundation for <strong>sustainable cybersecurity<\/strong> throughout the product&#8217;s lifecycle.<\/p>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-0534e62d\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-93320c18\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-d8f186268187a31b8385df203236fe71\" style=\"color:#070731\"><strong><strong><strong>Definition and execution of testing and validation strategy<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>The effectiveness of cybersecurity measures depends not only on theoretically defined guidelines but also on how effective these measures are in practice. GAES, in accordance with the requirements of <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong>, ensures not only the development of the testing strategy but also its professional execution, thereby making vehicle cybersecurity measurable. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Defining the Strategy<\/strong><\/h3>\n\n\n\n<p>The first step in the testing process is to develop validation plans that align with security requirements and system architecture. Within this framework, we: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assign appropriate testing methods to each security goal,<\/li>\n\n\n\n<li>Identify attack surfaces of critical system components (CAN, TCU, OTA, Bluetooth, Wi-Fi, etc.),<\/li>\n\n\n\n<li>Define the scope, methodology, and success criteria of testing,<\/li>\n\n\n\n<li>Optimize repetitive testing with automation infrastructures where necessary.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Execution<\/strong><\/h3>\n\n\n\n<p>Building on the defined strategy, GAES experts conduct comprehensive testing activities in on-site or laboratory environments:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Functional tests:<\/strong> Examining whether the defined security requirements function correctly within the system.<\/li>\n\n\n\n<li><strong>Fuzz testing:<\/strong> Measuring software fault tolerance at interfaces and protocols by applying unexpected data inputs.<\/li>\n\n\n\n<li><strong>Penetration tests:<\/strong> Uncovering system vulnerabilities by simulating real attack techniques.<\/li>\n\n\n\n<li><strong>OTA and wireless security tests:<\/strong> Examining software updates, as well as Bluetooth and LTE connections, from the perspective of encryption, authentication, and access control.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Verification of Security Performance<\/strong><\/h3>\n\n\n\n<p>Documenting test results is crucial for strengthening customer confidence and demonstrating technical compliance during <strong>R155 type approval<\/strong> processes. GAES&#8217;s testing expertise extends not only to identifying problems but also to providing development and improvement recommendations that support <strong>sustainable cybersecurity<\/strong>. <\/p>\n<\/div>\n<\/div><\/div>\n\n<div id=\"wp-block-themeisle-blocks-advanced-columns-5d75704e\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-unset has-light-bg\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-6715da19\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-ebd359abc291e9e3e568715ef29a5619\" style=\"color:#070731\"><strong><strong><strong><strong>Supplier Management<\/strong><\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p>In the automotive industry, vehicle manufacturers&#8217; cybersecurity obligations are not limited solely to their own systems. <strong>UNECE R155<\/strong> mandates a security approach that extends to the entire supply chain and expects manufacturers to establish structures that enable them to oversee the processes of their suppliers. In this context, supplier management becomes a <strong>strategic responsibility<\/strong> for cybersecurity compliance.  <\/p>\n\n\n\n<p>The supplier management service provided by GAES supports OEMs and Tier 1 suppliers in aligning their technical and process collaborations with subcontractors with the requirements of <strong>ISO\/SAE 21434<\/strong> and <strong>UNECE R155<\/strong>. Within this framework, we: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define compliance expectations and minimum security criteria for suppliers,<\/li>\n\n\n\n<li>Verify the accuracy and consistency of work products (cybersecurity goals, TARA outputs, V&amp;V documentation),<\/li>\n\n\n\n<li>Analyze and prioritize supplier risk levels,<\/li>\n\n\n\n<li>Develop auditing plans and evaluation criteria,<\/li>\n\n\n\n<li>Conduct the <strong>CIA (Cybersecurity Interface Agreement)<\/strong> process.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Supplier Audit and Training Support<\/strong><\/h3>\n\n\n\n<p>GAES does not merely evaluate technical documentation but also organizes internal audits, training, and awareness programs for suppliers. As a result: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Suppliers&#8217; cybersecurity maturity increases,<\/li>\n\n\n\n<li>Contribution to OEMs&#8217; security goals is strengthened,<\/li>\n\n\n\n<li>Unexpected compliance discrepancies arising during type approval processes can be prevented.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Benefits and Impact<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimization of security vulnerabilities originating from suppliers,<\/li>\n\n\n\n<li>Regulatory compliance is ensured throughout the entire supply chain,<\/li>\n\n\n\n<li>Suppliers&#8217; technical preparedness and sense of responsibility are strengthened.<\/li>\n<\/ul>\n\n\n\n<p>GAES treats supplier management not merely as a control mechanism but as an integral part of a <strong>long-term cybersecurity culture<\/strong>.<\/p>\n<\/div>\n<\/div><\/div>\n\n<section id=\"wp-block-themeisle-blocks-advanced-columns-dab9e0bf\" class=\"wp-block-themeisle-blocks-advanced-columns alignfull has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-flex-start\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-9df22226\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<section id=\"wp-block-themeisle-blocks-advanced-columns-25c95699\" class=\"wp-block-themeisle-blocks-advanced-columns has-1-columns has-desktop-equal-layout has-tablet-equal-layout has-mobile-equal-layout has-vertical-flex-start\"><div class=\"wp-block-themeisle-blocks-advanced-columns-overlay\"><\/div><div class=\"innerblocks-wrap\">\n<div id=\"wp-block-themeisle-blocks-advanced-column-d4d9a4f8\" class=\"wp-block-themeisle-blocks-advanced-column\">\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#ffffff;font-size:clamp(28.836px, 1.802rem + ((1vw - 3.2px) * 1.653), 50px);\"><strong>Audit, Certification, and Type Approval<\/strong><\/h2>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-align-center has-text-color\" style=\"color:#ffffff;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\">The <strong>UNECE R155<\/strong> regulation and the <strong>ISO\/SAE 21434<\/strong> standard require not only that automotive products be technically secure, but also that this security be managed in a <strong>documented, auditable, and sustainable manner<\/strong>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-text-color\" style=\"color:#ffffff;font-size:clamp(14px, 0.875rem + ((1vw - 3.2px) * 0.313), 18px);\">In line with these expectations, GAES provides <strong>comprehensive audit, certification, and type approval consulting services<\/strong> for vehicle manufacturers and suppliers, supporting them in ensuring full and consistent regulatory compliance.<\/p>\n<\/div>\n<\/div><\/section>\n<\/div>\n<\/div><\/section>\n\n<p><\/p>\n\n<h3 class=\"wp-block-heading\"><strong>Internal and External Audit Support<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li>Conducting internal preparatory audits (pre-assessment) to assess the level of regulatory compliance<\/li>\n\n\n\n<li>Auditing CSMS processes according to the requirements of <strong>UNECE R155<\/strong> and <strong>ISO\/SAE 21434<\/strong><\/li>\n\n\n\n<li>Establishing internal audit procedures that extend to the supply chain<\/li>\n\n\n\n<li>Developing corrective and preventive action plans in case of non-conformities and deficiencies<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\"><strong>Certification Process Consulting<\/strong><\/h3>\n\n<ul class=\"wp-block-list\">\n<li>Supporting the preparation of CSMS conformity reports (audit reports) falling under the scope of <strong>ISO\/SAE 21434<\/strong><\/li>\n\n\n\n<li>Technical review of work products based on ISO\/SAE 21434 before submission to independent evaluators<\/li>\n\n\n\n<li>Providing technical expert support during third-party certification audits<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading\"><strong>Type Approval Process Management<\/strong><\/h3>\n\n<p>GAES provides vehicle-level type approval services as a designated technical service under <strong>UNECE R155<\/strong>. Within this framework, we:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Conduct CSMS audits (cybersecurity audit) and support the issuance of CSMS Certificates of Compliance (CoC)<\/li>\n\n\n\n<li>Perform vehicle-level cybersecurity assessments as part of type approval procedures<\/li>\n\n\n\n<li>Fully manage mandatory triennial CSMS audits<\/li>\n\n\n\n<li>Analyze the impact on type approval in case of design modifications and implement necessary update steps<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Internal and External Audit Support Certification Process Consulting Type Approval Process Management GAES provides vehicle-level type approval services as a designated technical service under UNECE R155. Within this framework, we:<\/p>\n","protected":false},"author":1,"featured_media":308,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-307","page","type-page","status-publish","has-post-thumbnail","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/pages\/307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/pages\/307\/revisions\/309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/media\/308"}],"wp:attachment":[{"href":"https:\/\/www.gaes.hu\/en\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}