{"id":48938,"date":"2025-10-14T13:32:08","date_gmt":"2025-10-14T11:32:08","guid":{"rendered":"https:\/\/www.convotis.com\/es\/?p=48938"},"modified":"2025-10-10T13:32:33","modified_gmt":"2025-10-10T11:32:33","slug":"sovereign-by-design-cloud-architecture","status":"publish","type":"post","link":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/","title":{"rendered":"Sovereign-by-Design: Key Management and Data Location in European Clouds"},"content":{"rendered":"<p>In Europe, handling sensitive data is subject to strict legal regulations. Companies are required to implement technical measures that ensure ongoing compliance\u2014especially when using cloud services. They must ensure that control, access, and processing remain traceable and legally compliant at all times\u2014regardless of the provider.<\/p>\n<p>Two technical pillars are central to this:<\/p>\n<ul>\n<li><strong>Key Management<\/strong> \u2013 managing cryptographic keys outside of the provider\u2019s infrastructure, and<\/li>\n<li><strong>Data Location<\/strong> \u2013 specifying exactly where data is physically stored and processed.<\/li>\n<\/ul>\n<p>Together, these elements form the foundation for an architectural approach that embeds digital sovereignty from the outset rather than retrofitting it: <strong>Sovereign-by-Design<\/strong>.<\/p>\n<h2><strong>What Does Sovereign-by-Design Mean?<\/strong><\/h2>\n<p>Sovereign-by-Design refers to a cloud model that gives companies full control from day one over two critical domains: encryption and data location.<\/p>\n<p>Unlike traditional cloud architectures\u2014where keys, identities, and data reside within the provider\u2019s infrastructure\u2014Sovereign-by-Design deliberately separates these responsibilities.<\/p>\n<p>Companies manage their own keys\u2014via hardware security modules (HSMs) or API-driven key management systems (KMS)\u2014and define precisely in which countries or regions data may be stored and processed.<\/p>\n<p>This architecture separates the provider\u2019s control plane\u2014used to manage infrastructure and operations\u2014from the customer\u2019s data plane, which handles actual data traffic. The result: clearly defined trust boundaries and full technical and legal control over access and processing\u2014an essential requirement for meeting European sovereignty and data protection standards.<\/p>\n<h2><strong>Technical Foundations: Control over Storage and Keys<\/strong><\/h2>\n<p>Sovereign-by-Design requires two essential conditions:<\/p>\n<ol>\n<li><strong> Data Location \u2013 Regional Data Processing<\/strong><\/li>\n<\/ol>\n<p>Companies specify which data center regions are permitted for data storage and processing. This prevents unwanted transfers to third countries and mitigates the risk of extraterritorial access. Key frameworks include the EU Cloud Code of Conduct, GAIA-X, and CISPE-certified providers.<\/p>\n<ol start=\"2\">\n<li><strong> Key Management \u2013 Customer-Controlled Encryption<\/strong><\/li>\n<\/ol>\n<p>Cryptographic keys are managed entirely outside the provider\u2019s cloud infrastructure. This ensures that neither internal services nor support teams can access data content\u2014not even during maintenance or emergencies. Common models include Bring-Your-Own-Key (BYOK), External Key Management (EKM), or self-managed HSMs.<\/p>\n<p>Together, these components establish an isolated control environment in which data remains legally defensible and technically auditable\u2014even when using global cloud providers.<\/p>\n<h2><strong>Relevance in the European Context<\/strong><\/h2>\n<p>The strategic importance of Sovereign-by-Design continues to grow\u2014driven by evolving regulatory requirements across Europe:<\/p>\n<ul>\n<li><strong>GDPR<\/strong> mandates that personal data be processed within clearly defined regions and remain fully controllable.<\/li>\n<li><strong>NIS2<\/strong> obliges operators of critical infrastructure to manage cloud risks structurally\u2014with a focus on technical safeguards and access controls.<\/li>\n<li><strong>DORA<\/strong> imposes EU-wide IT governance requirements on financial service providers.<\/li>\n<li>Countries like <strong>Spain<\/strong> enforce additional rules for outsourcing sensitive public or healthcare data\u2014Sovereign-by-Design is a prerequisite for lawful cloud use in these sectors.<\/li>\n<\/ul>\n<p>Outside the EU, such as in <strong>Switzerland<\/strong>, specific data protection laws (e.g., the revised FADP) also address control over data processing explicitly. Companies must ensure clearly traceable storage locations and full encryption control\u2014independent of their cloud provider. These requirements are not abstract\u2014they directly influence industry-specific cloud strategies.<\/p>\n<h2><strong>Industry Perspective: Use Cases and Compliance Requirements<\/strong><\/h2>\n<p>The principles of Sovereign-by-Design have a direct impact on sector-specific cloud strategies:<\/p>\n<ul>\n<li><strong>Finance &amp; Tax<\/strong>: Regulatory requirements include audit-proof encryption, GDPR-compliant data handling, and demonstrable third-party controls. Sovereign-by-Design provides the technical foundation.<\/li>\n<li><strong>Healthcare &amp; Life Sciences<\/strong>: Patient data and research information are subject to strict privacy standards. Data localization and external key management make cloud usage legally compliant.<\/li>\n<li><strong>Public Sector &amp; Government<\/strong>: Sovereign architectures allow public institutions to meet federal requirements while leveraging modern cloud functionality.<\/li>\n<li><strong>Manufacturing &amp; Industry<\/strong>: Production data, control systems, and design documents contain critical intellectual property. Controlled access reduces the risk of industrial espionage and regulatory conflict.<\/li>\n<\/ul>\n<h2><strong>How CONVOTIS Implements Sovereign-by-Design<\/strong><\/h2>\n<p>CONVOTIS builds sovereign cloud architectures with full control over data and access\u2014operated in certified EU data centers and aligned with European regulations. Key management always remains on the customer\u2019s side, and all data flows and access activities are transparently documented.<\/p>\n<p>The architecture includes tenant-isolated resources, federated identity management, encryption-based access control, and automated governance via Policy-as-Code. Hybrid integration scenarios and GAIA-X compatibility are built into the design.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In Europe, handling sensitive data is subject to strict legal regulations. Companies are required to implement technical measures that ensure ongoing compliance\u2014especially when using cloud services. They must ensure that control, access, and processing remain traceable and legally compliant at all times\u2014regardless of the provider. Two technical pillars are central to this: Key Management \u2013 [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":48936,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[211],"tags":[],"class_list":["post-48938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cloud Sovereignty: Full Control with Sovereign-by-Design<\/title>\n<meta name=\"description\" content=\"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Sovereignty: Full Control with Sovereign-by-Design\" \/>\n<meta property=\"og:description\" content=\"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"CONVOTIS Iberia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-14T11:32:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1090\" \/>\n\t<meta property=\"og:image:height\" content=\"670\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"elianamoldovanska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"elianamoldovanska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/\"},\"author\":{\"name\":\"elianamoldovanska\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\"},\"headline\":\"Sovereign-by-Design: Key Management and Data Location in European Clouds\",\"datePublished\":\"2025-10-14T11:32:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/\"},\"wordCount\":682,\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/10\\\/Sovereign-by-Design-EU.png\",\"articleSection\":[\"Cloud Solutions\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/\",\"name\":\"Cloud Sovereignty: Full Control with Sovereign-by-Design\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/10\\\/Sovereign-by-Design-EU.png\",\"datePublished\":\"2025-10-14T11:32:08+00:00\",\"description\":\"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/en\\\/news\\\/sovereign-by-design-cloud-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/10\\\/Sovereign-by-Design-EU.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/10\\\/Sovereign-by-Design-EU.png\",\"width\":1090,\"height\":670,\"caption\":\"Person holding a tablet with a glowing digital network symbolizing data sovereignty, encryption, and secure cloud architecture in Europe.\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"name\":\"CONVOTIS\",\"description\":\"For Europe&#039;s digital future.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#organization\",\"name\":\"CONVOTIS\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"contentUrl\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2025\\\/08\\\/Convotis_blue_cmyk300dpi-scaled.png\",\"width\":2560,\"height\":411,\"caption\":\"CONVOTIS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/convotis-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.convotis.com\\\/es\\\/#\\\/schema\\\/person\\\/43069367f8f43b4689f544f0d1e798af\",\"name\":\"elianamoldovanska\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g\",\"caption\":\"elianamoldovanska\"},\"sameAs\":[\"https:\\\/\\\/www.convotis.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cloud Sovereignty: Full Control with Sovereign-by-Design","description":"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Sovereignty: Full Control with Sovereign-by-Design","og_description":"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.","og_url":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/","og_site_name":"CONVOTIS Iberia","article_published_time":"2025-10-14T11:32:08+00:00","og_image":[{"width":1090,"height":670,"url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png","type":"image\/png"}],"author":"elianamoldovanska","twitter_card":"summary_large_image","twitter_misc":{"Written by":"elianamoldovanska","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/#article","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/"},"author":{"name":"elianamoldovanska","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af"},"headline":"Sovereign-by-Design: Key Management and Data Location in European Clouds","datePublished":"2025-10-14T11:32:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/"},"wordCount":682,"publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png","articleSection":["Cloud Solutions"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/","url":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/","name":"Cloud Sovereignty: Full Control with Sovereign-by-Design","isPartOf":{"@id":"https:\/\/www.convotis.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/#primaryimage"},"image":{"@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png","datePublished":"2025-10-14T11:32:08+00:00","description":"Learn how Sovereign-by-Design ensures data control and encryption in line with EU cloud compliance. Learn more.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/en\/news\/sovereign-by-design-cloud-architecture\/#primaryimage","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/10\/Sovereign-by-Design-EU.png","width":1090,"height":670,"caption":"Person holding a tablet with a glowing digital network symbolizing data sovereignty, encryption, and secure cloud architecture in Europe."},{"@type":"WebSite","@id":"https:\/\/www.convotis.com\/es\/#website","url":"https:\/\/www.convotis.com\/es\/","name":"CONVOTIS","description":"For Europe&#039;s digital future.","publisher":{"@id":"https:\/\/www.convotis.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convotis.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.convotis.com\/es\/#organization","name":"CONVOTIS","url":"https:\/\/www.convotis.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","contentUrl":"https:\/\/www.convotis.com\/es\/wp-content\/uploads\/sites\/3\/2025\/08\/Convotis_blue_cmyk300dpi-scaled.png","width":2560,"height":411,"caption":"CONVOTIS"},"image":{"@id":"https:\/\/www.convotis.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/convotis-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.convotis.com\/es\/#\/schema\/person\/43069367f8f43b4689f544f0d1e798af","name":"elianamoldovanska","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dcc0c0bd213565a66bfb488266616c3e473f54a3fdd5c34226d23758988c7924?s=96&d=mm&r=g","caption":"elianamoldovanska"},"sameAs":["https:\/\/www.convotis.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/48938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/comments?post=48938"}],"version-history":[{"count":1,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/48938\/revisions"}],"predecessor-version":[{"id":48939,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/posts\/48938\/revisions\/48939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media\/48936"}],"wp:attachment":[{"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/media?parent=48938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/categories?post=48938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convotis.com\/es\/wp-json\/wp\/v2\/tags?post=48938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}