{"id":89483,"date":"2026-05-15T11:52:26","date_gmt":"2026-05-15T10:52:26","guid":{"rendered":"https:\/\/www.wallix.com\/expert-interview-nis2-and-the-new-accountability-model-for-access-governance\/"},"modified":"2026-05-15T12:35:23","modified_gmt":"2026-05-15T11:35:23","slug":"entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/","title":{"rendered":"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos"},"content":{"rendered":"<div class='flex_column_table av-m4gycypq-fb9e468fe802133cd1178d4038e45437 sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gycypq-fb9e468fe802133cd1178d4038e45437\">\n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\npadding:0 0 0 0;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-m4gycypq-fb9e468fe802133cd1178d4038e45437{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-m4gycypq-fb9e468fe802133cd1178d4038e45437 av_two_third  avia-builder-el-0  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding  '     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd\">\n#top .av_textblock_section.av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd .avia_textblock{\nfont-size:34px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m9v5gqsg-ae5bd1b09de2ab8c1e439698e80b66bd '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h1>ENTREVISTA CON UN EXPERTO:<\/h1>\n<h1>NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos<\/h1>\n<h3>Por Guido Kraft<\/h3>\n<\/div><\/section><br \/>\n<div  class='av-post-metadata-container av-m9v5qd0r-27e2cf9a87be30e7bcab67594aaa1f78 av-metadata-container-align-left  avia-builder-el-2  el_after_av_textblock  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">Por<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/es\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-published\"><span class=\"av-metadata-before av-metadata-before-published\">el<\/span><span class=\"av-post-metadata-published-date\" >15 de mayo de 2026<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\"><\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-metadata-before av-metadata-before-modified\">- \u00daltima actualizaci\u00f3n el<\/span><span class=\"av-post-metadata-modified-date\" >15 de mayo de 2026<\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-p98hjw-c6c0f0438e7e475afac12af8cb336432 hr-default  avia-builder-el-3  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gydqi6-87119aa0fcb443d60d83631d39900441\">\n#top .av_textblock_section.av-m4gydqi6-87119aa0fcb443d60d83631d39900441 .avia_textblock{\nfont-size:15px;\ncolor:#172542;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gydqi6-87119aa0fcb443d60d83631d39900441 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><p><b>\u00bfC\u00f3mo cambia la NIS2 la relaci\u00f3n entre el CISO, la direcci\u00f3n y el consejo de administraci\u00f3n?<\/b><\/p>\n<p>Con la NIS2, la ciberseguridad deja de ser solo un asunto de IT y pasa a convertirse en un riesgo de negocio. La alta direcci\u00f3n y el consejo de administraci\u00f3n son directamente responsables de las medidas de ciberseguridad y de la resiliencia de la organizaci\u00f3n.<\/p>\n<p>Eso cambia el papel del CISO, que pasa a ser el puente entre las operaciones t\u00e9cnicas y la toma de decisiones ejecutivas. El consejo tambi\u00e9n tiene que asumir una supervisi\u00f3n activa, entender los riesgos cibern\u00e9ticos y hacer las preguntas adecuadas.<\/p>\n<p><b>\u00bfPor qu\u00e9 la gobernanza de accesos est\u00e1 ganando tanta importancia con la NIS2?<\/b><\/p>\n<p>Pr\u00e1cticamente todo en IT y OT depende del acceso. El riesgo aparece cuando los usuarios tienen m\u00e1s privilegios de los que necesitan o cuando los permisos no est\u00e1n alineados con sus responsabilidades reales.<\/p>\n<p>La gobernanza de accesos define qui\u00e9n puede acceder a qu\u00e9, en qu\u00e9 condiciones y con qu\u00e9 nivel de responsabilidad. Por eso las organizaciones deber\u00edan tratarla como una capa estrat\u00e9gica que refuerza la seguridad y el cumplimiento normativo.<\/p>\n<p><b>\u00bfQu\u00e9 barreras impiden a las organizaciones del sector p\u00fablico implantar una gobernanza de accesos m\u00e1s s\u00f3lida?<\/b><\/p>\n<p>Las principales barreras suelen ser los sistemas heredados, los entornos fragmentados y los presupuestos limitados.<\/p>\n<p>Muchas aplicaciones antiguas no soportan modelos modernos de acceso, lo que obliga a seguir usando cuentas compartidas o privilegios excesivos.<\/p>\n<p>Aun as\u00ed, es posible reforzar el control con gesti\u00f3n de accesos privilegiados, autenticaci\u00f3n avanzada y accesos auditables.<\/p>\n<p><b>\u00bfPor qu\u00e9 siguen siendo tan habituales las cuentas administrativas compartidas?<\/b><\/p>\n<p>Las cuentas compartidas siguen siendo habituales por los sistemas heredados y la comodidad operativa. Muchas aplicaciones antiguas no soportan modelos modernos de acceso basado en roles.<\/p>\n<p>Siempre que sea posible, conviene avanzar hacia cuentas individuales. Y cuando no lo sea, aplicar controles de acceso privilegiado para ganar trazabilidad y control.<\/p>\n<p><b>\u00bfEn qu\u00e9 podr\u00eda centrarse la pr\u00f3xima gran regulaci\u00f3n europea de ciberseguridad?<\/b><\/p>\n<p>Probablemente, el pr\u00f3ximo gran foco ser\u00e1 la gobernanza de la IA.A medida que la inteligencia artificial se integre m\u00e1s en las operaciones de negocio, las organizaciones necesitar\u00e1n pol\u00edticas m\u00e1s claras sobre el uso de datos, la responsabilidad, la gesti\u00f3n del riesgo y el cumplimiento normativo.<\/p>\n<p><b>\u00bfC\u00f3mo deber\u00edan equilibrar las organizaciones la prevenci\u00f3n y la investigaci\u00f3n posterior a un incidente bajo NIS2?<\/b><\/p>\n<p>La prevenci\u00f3n y la investigaci\u00f3n son igual de importantes.<\/p>\n<p>Las organizaciones necesitan controles que reduzcan el riesgo, pero tambi\u00e9n visibilidad y trazabilidad una vez ocurre un incidente.<\/p>\n<p>Los equipos de seguridad deben poder entender qui\u00e9n accedi\u00f3 a qu\u00e9 sistemas, cu\u00e1ndo se produjo el acceso y qu\u00e9 acciones se realizaron.<\/p>\n<p><b>\u00bfC\u00f3mo deber\u00eda ser una buena gesti\u00f3n del acceso de terceros bajo NIS2?<\/b><\/p>\n<p>El acceso de terceros debe gestionarse con el mismo nivel de exigencia que el acceso privilegiado interno.<\/p>\n<p>Una buena pr\u00e1ctica implica que el acceso est\u00e9 controlado, limitado en el tiempo, monitorizado y completamente trazable. Las organizaciones deber\u00edan evitar accesos externos sin supervisi\u00f3n, privilegios permanentes para proveedores y cuentas remotas gen\u00e9ricas.<\/p>\n<p><b>\u00bfLas organizaciones deber\u00edan abordar NIS2 desde el cumplimiento o la resiliencia?<\/b><\/p>\n<p>La mejor forma de abordar NIS2 es verla como una oportunidad para mejorar la resiliencia operativa y no solo como un requisito de compliance.<\/p>\n<p>Si una organizaci\u00f3n mejora la visibilidad, la gobernanza de accesos y la disciplina operativa, el cumplimiento normativo acaba siendo una consecuencia natural de tener mejores controles.<\/p>\n<\/div><\/section><\/p><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409\">\n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:0px;\nmargin-bottom:0;\n}\n.flex_column.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409{\nmargin-top:-200px;\nmargin-bottom:0;\n}\n}\n<\/style>\n<div  class='flex_column av-49ilmho-8e6eadb5cf7c2588cf00b0c680667409 av_one_third  avia-builder-el-5  el_after_av_two_third  el_before_av_two_third  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-eggfj0-383977d9df62a29846c0f78a0573799b av-social-sharing-box-default  avia-builder-el-6  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Compartir<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en X\" href='https:\/\/twitter.com\/share?text=ENTREVISTA%20CON%20UN%20EXPERTO%3A%20NIS2%20y%20el%20nuevo%20modelo%20de%20responsabilidad%20en%20la%20gobernanza%20de%20accesos&#038;url=https:\/\/www.wallix.com\/es\/?p=89483' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en X'><span class='avia_hidden_link_text'>Compartir en X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Compartir en LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=ENTREVISTA%20CON%20UN%20EXPERTO%3A%20NIS2%20y%20el%20nuevo%20modelo%20de%20responsabilidad%20en%20la%20gobernanza%20de%20accesos&#038;url=https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir en LinkedIn'><span class='avia_hidden_link_text'>Compartir en LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Compartir por correo\" href='mailto:?subject=ENTREVISTA%20CON%20UN%20EXPERTO%3A%20NIS2%20y%20el%20nuevo%20modelo%20de%20responsabilidad%20en%20la%20gobernanza%20de%20accesos&#038;body=https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Compartir por correo'><span class='avia_hidden_link_text'>Compartir por correo<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a\">\n#top .hr.hr-invisible.av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3i1x7bw-f5b45a0f4afe1cd9bf86afe24c52a18a hr-invisible  avia-builder-el-7  el_after_av_social_share  el_before_av_team_member '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mp6t0j85-eadb05ff57a3f59765e5b193afc9dac6\">\n.avia-team-member.av-mp6t0j85-eadb05ff57a3f59765e5b193afc9dac6 .team-img-container img{\nborder-style:solid;\n}\n<\/style>\n<section  class='avia-team-member av-mp6t0j85-eadb05ff57a3f59765e5b193afc9dac6  avia-builder-el-8  el_after_av_hr  el_before_av_textblock '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><div class=\"team-img-container\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-60909 avia-img-lazy-loading-not-60909 avia_image avia_image_team' src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-80x80.png\" alt='Guido Kraft '  itemprop=\"image\"   height=\"80\" width=\"80\" srcset=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-80x80.png 80w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-300x300.png 300w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-768x768.png 768w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-36x36.png 36w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-180x180.png 180w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT-705x705.png 705w, https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/07\/Guido-KRAFT.png 1024w\" sizes=\"(max-width: 80px) 100vw, 80px\" \/><\/div><h3 class='team-member-name '  itemprop=\"name\" >Guido Kraft <\/h3><div class='team-member-job-title '  itemprop=\"jobTitle\" >Field CISO en WALLIX<\/div><div class='team-member-description '  itemprop=\"description\" ><p>M\u00e1s de 20 a\u00f1os de experiencia en ciberseguridad, gobierno corporativo, ISO 27001, TISAX y programas de seguridad operativa en infraestructuras cr\u00edticas y entornos regulados.<\/p>\n<\/div><span class='hidden team-member-affiliation'  itemprop=\"affiliation\" >WALLIX<\/span><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-m4gywq38-500db124898f0973bd3150d22d62c5a2\">\n#top .av_textblock_section.av-m4gywq38-500db124898f0973bd3150d22d62c5a2 .avia_textblock{\nfont-size:19px;\ncolor:#ec6707;\n}\n<\/style>\n<section  class='av_textblock_section av-m4gywq38-500db124898f0973bd3150d22d62c5a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><h3><span style=\"color: #000000;\"><strong>Recursos relacionados<\/strong><\/span><\/h3>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2fklsyk-47345d08b4e405405f5336633191a3ed\">\n#top .hr.hr-invisible.av-2fklsyk-47345d08b4e405405f5336633191a3ed{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2fklsyk-47345d08b4e405405f5336633191a3ed hr-invisible  avia-builder-el-10  el_after_av_textblock  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-270hzek-853a99e369286e2cd90bbb4fcdd45e4d  avia-builder-el-11  el_after_av_hr  avia-builder-el-last   avia-builder-el-11  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-89538 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: C\u00f3mo los fallos en la gesti\u00f3n de accesos acabaron en una crisis nacional\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T12:54:58+01:00\" >15 de mayo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/como-los-fallos-en-la-gestion-de-accesos-acabaron-en-una-crisis-nacional\/' title='Enlace a: C\u00f3mo los fallos en la gesti\u00f3n de accesos acabaron en una crisis nacional'>C\u00f3mo los fallos en la gesti\u00f3n de accesos acabaron en una crisis nacional<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-89483 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2026-05-15T11:52:26+01:00\" >15 de mayo de 2026<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/' title='Enlace a: ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos'>ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68324 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: C\u00f3mo PAM facilita la implementaci\u00f3n de IEC 62443\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-13T11:53:03+01:00\" >13 de febrero de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/como-pam-facilita-la-implementacion-de-iec-62443\/' title='Enlace a: C\u00f3mo PAM facilita la implementaci\u00f3n de IEC 62443'>C\u00f3mo PAM facilita la implementaci\u00f3n de IEC 62443<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68317 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: The Vital Link: IEC-62443 Standards in Protecting Industrial Cyber Ecosystems\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:47+01:00\" >12 de febrero de 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/the-vital-link-iec-62443-standards-in-protecting-industrial-cyber-ecosystems\/' title='Enlace a: The Vital Link: IEC-62443 Standards in Protecting Industrial Cyber Ecosystems'>The Vital Link: IEC-62443 Standards in Protecting Industrial Cyber Ecosystems<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-66412 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-12-02T15:57:20+01:00\" >2 de diciembre de 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/es\/blogpost\/guia-del-ciso-para-cumplir-los-requisitos-de-seguridad-con-una-solucion-pam\/' title='Enlace a: Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)'>Gu\u00eda del CISO para cumplir los requisitos de seguridad (con una soluci\u00f3n PAM)<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  class='flex_column av-nok0rg-0413bcf117d44f341a48260f58b5064a av_two_third  avia-builder-el-12  el_after_av_one_third  el_before_av_two_third  first flex_column_div  column-top-margin'     ><div  class='avia-button-wrap av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1-wrap avia-button-center  avia-builder-el-13  avia-builder-el-no-sibling '>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1\">\n#top #wrap_all .avia-button.av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1{\nfont-size:16px;\nbackground-color:#ec6707;\nborder-color:#ea6e52;\ncolor:#ffffff;\nborder-style:solid;\nborder-width:1px 1px 1px 1px;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1:hover{\nbackground-color:#ec6707;\ncolor:#ffffff;\ntransition:all 0.4s ease-in-out;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1 .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n#top #wrap_all .avia-button.av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1:hover .avia-svg-icon svg:first-child{\nfill:#ffffff;\nstroke:#ffffff;\n}\n<\/style>\n<a href='https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/WALLIX_EXPERT-INTERVIEW_NIS2-and-the-New-Accountability-Model_ES.pdf'  class='avia-button av-mf6m6h2e-5731f87b077e75a0db54b58a407ceed1 av-link-btn avia-icon_select-no avia-size-large avia-position-center'   aria-label=\"Descarga la entrevista en PDF\"><span class='avia_iconbox_title' >Descarga la entrevista en PDF<\/span><\/a><\/div><\/div><\/p>\n<div  class='flex_column av-1cmx7rn-a058b0e44965034797fa52b1e3c28332 av_two_third  avia-builder-el-14  el_after_av_two_third  avia-builder-el-last  first flex_column_div  column-top-margin'     ><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":89484,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1647,2558,1643],"tags":[],"class_list":["post-89483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-es","category-blog-destacado","category-blogpost"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-15T10:52:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-15T11:35:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-1030x577.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos\",\"datePublished\":\"2026-05-15T10:52:26+00:00\",\"dateModified\":\"2026-05-15T11:35:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/\"},\"wordCount\":3158,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOG DESTACADO\",\"BLOGPOST\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/\",\"name\":\"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"datePublished\":\"2026-05-15T10:52:26+00:00\",\"dateModified\":\"2026-05-15T11:35:23+00:00\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/blogpost\\\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/AdobeStock_1912692097-scaled.jpeg\",\"width\":2560,\"height\":1434,\"caption\":\"Digital compliance concept with document icons, checklists, and shield symbol on waving European Union flag background, representing business regulation\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/es\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/","og_locale":"es_ES","og_type":"article","og_title":"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX","og_url":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/","og_site_name":"WALLIX","article_published_time":"2026-05-15T10:52:26+00:00","article_modified_time":"2026-05-15T11:35:23+00:00","og_image":[{"width":1030,"height":577,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-1030x577.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Escrito por":"WALLIX","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos","datePublished":"2026-05-15T10:52:26+00:00","dateModified":"2026-05-15T11:35:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/"},"wordCount":3158,"publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOG DESTACADO","BLOGPOST"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/","url":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/","name":"ENTREVISTA CON UN EXPERTO: NIS2 y el nuevo modelo de responsabilidad en la gobernanza de accesos - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","datePublished":"2026-05-15T10:52:26+00:00","dateModified":"2026-05-15T11:35:23+00:00","inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/blogpost\/entrevista-con-un-experto-nis2-y-el-nuevo-modelo-de-responsabilidad-en-la-gobernanza-de-accesos\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2026\/05\/AdobeStock_1912692097-scaled.jpeg","width":2560,"height":1434,"caption":"Digital compliance concept with document icons, checklists, and shield symbol on waving European Union flag background, representing business regulation"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/es\/#website","url":"https:\/\/www.wallix.com\/es\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/es\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/es\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/es\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/89483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/comments?post=89483"}],"version-history":[{"count":6,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/89483\/revisions"}],"predecessor-version":[{"id":89501,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/posts\/89483\/revisions\/89501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media\/89484"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/media?parent=89483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/categories?post=89483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/es\/wp-json\/wp\/v2\/tags?post=89483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}