{"id":7327,"date":"2025-10-29T12:56:01","date_gmt":"2025-10-29T11:56:01","guid":{"rendered":"https:\/\/www.data-talk.eu\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/"},"modified":"2025-11-04T13:32:03","modified_gmt":"2025-11-04T12:32:03","slug":"modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti","status":"publish","type":"post","link":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/","title":{"rendered":"Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-xx-large-font-size\"><strong>Modbus a IEC 62443 \u2013 Jak p\u0159ev\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti<\/strong><\/h2>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"betterdocs-reading-time-byx8tlb\"><div class=\"reading-time betterdocs\">\n\t<p>\n\t\t<svg width=\"14\" viewBox=\"0 0 14 15\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t<mask id=\"mask0_6195_23752\" style=\"mask-type:alpha\" maskUnits=\"userSpaceOnUse\" x=\"0\" y=\"0\">\n\t\t\t<rect y=\"0.5\" width=\"14\" height=\"14\" fill=\"#D9D9D9\"\/>\n\t\t\t<\/mask>\n\t\t\t<g mask=\"url(#mask0_6195_23752)\">\n\t\t\t<path d=\"M8.92508 10.241L9.74175 9.42435L7.58341 7.26602V4.58268H6.41675V7.73268L8.92508 10.241ZM7.00008 13.3327C6.19314 13.3327 5.4348 13.1796 4.72508 12.8733C4.01536 12.5671 3.398 12.1514 2.873 11.6264C2.348 11.1014 1.93237 10.4841 1.62612 9.77435C1.31987 9.06463 1.16675 8.30629 1.16675 7.49935C1.16675 6.6924 1.31987 5.93407 1.62612 5.22435C1.93237 4.51463 2.348 3.89727 2.873 3.37227C3.398 2.84727 4.01536 2.43164 4.72508 2.12539C5.4348 1.81914 6.19314 1.66602 7.00008 1.66602C7.80703 1.66602 8.56536 1.81914 9.27508 2.12539C9.9848 2.43164 10.6022 2.84727 11.1272 3.37227C11.6522 3.89727 12.0678 4.51463 12.374 5.22435C12.6803 5.93407 12.8334 6.6924 12.8334 7.49935C12.8334 8.30629 12.6803 9.06463 12.374 9.77435C12.0678 10.4841 11.6522 11.1014 11.1272 11.6264C10.6022 12.1514 9.9848 12.5671 9.27508 12.8733C8.56536 13.1796 7.80703 13.3327 7.00008 13.3327ZM7.00008 12.166C8.29314 12.166 9.39418 11.7115 10.3032 10.8025C11.2122 9.89345 11.6667 8.7924 11.6667 7.49935C11.6667 6.20629 11.2122 5.10525 10.3032 4.19622C9.39418 3.2872 8.29314 2.83268 7.00008 2.83268C5.70703 2.83268 4.60598 3.2872 3.69696 4.19622C2.78793 5.10525 2.33341 6.20629 2.33341 7.49935C2.33341 8.7924 2.78793 9.89345 3.69696 10.8025C4.60598 11.7115 5.70703 12.166 7.00008 12.166Z\" fill=\"#667085\"\/>\n\t\t\t<\/g>\n\t\t<\/svg>\n\t\t3 min read\t<\/p>\n<\/div>\n<\/div>\t\t\t\t<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1 uagb-toc__collapse uagb-block-20188031      \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t>\n\t\t\t\t<div class=\"uagb-toc__wrap\">\n\t\t\t\t\t\t<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\t<strong>Table Of Contents<\/strong>\t\t\t\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 448 512\"><path d=\"M384 32C419.3 32 448 60.65 448 96V416C448 451.3 419.3 480 384 480H64C28.65 480 0 451.3 0 416V96C0 60.65 28.65 32 64 32H384zM224 368C237.3 368 248 357.3 248 344V280H312C325.3 280 336 269.3 336 256C336 242.7 325.3 232 312 232H248V168C248 154.7 237.3 144 224 144C210.7 144 200 154.7 200 168V232H136C122.7 232 112 242.7 112 256C112 269.3 122.7 280 136 280H200V344C200 357.3 210.7 368 224 368z\"><\/path><\/svg>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"uagb-toc__list-wrap \">\n\t\t\t\t\t\t<ol class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#modbus-a-iec-62443-jak-p\u0159ev\u00e9st-star\u0161\u00ed-pr\u016fmyslov\u00e9-protokoly-do-\u00e9ry-kybernetick\u00e9-bezpe\u010dnosti\" class=\"uagb-toc-link__trigger\">Modbus a IEC 62443 \u2013 Jak p\u0159ev\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti<\/a><ul class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#\u00favod\" class=\"uagb-toc-link__trigger\">\u00davod<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#probl\u00e9m-modbus-je-z-podstaty-nezabezpe\u010den\u00fd\" class=\"uagb-toc-link__trigger\">Probl\u00e9m: Modbus je z podstaty nezabezpe\u010den\u00fd<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#\u0159e\u0161en\u00ed-p\u0159evod-modbusu-na-zabezpe\u010den\u00fd-protokol\" class=\"uagb-toc-link__trigger\">\u0158e\u0161en\u00ed: p\u0159evod Modbusu na zabezpe\u010den\u00fd protokol<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#jak-to-funguje\" class=\"uagb-toc-link__trigger\">Jak to funguje<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#bezpe\u010dn\u00e9-alternativy\" class=\"uagb-toc-link__trigger\">Bezpe\u010dn\u00e9 alternativy<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#v\u00fdhody-pou\u017eit\u00ed-otit-gateway\" class=\"uagb-toc-link__trigger\">V\u00fdhody pou\u017eit\u00ed OT\/IT Gateway<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#v-souladu-s-bezpe\u010dnostn\u00edmi-standardy\" class=\"uagb-toc-link__trigger\">V souladu s bezpe\u010dnostn\u00edmi standardy<\/a><li class=\"uagb-toc__list\"><li class=\"uagb-toc__list\"><a href=\"#pro\u010d-je-to-d\u016fle\u017eit\u00e9\" class=\"uagb-toc-link__trigger\">Pro\u010d je to d\u016fle\u017eit\u00e9<\/a><\/ul><\/ol>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">\u00davod<\/h3>\n\n<p>Modbus st\u00e1le pat\u0159\u00ed mezi nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00ed pr\u016fmyslov\u00e9 komunika\u010dn\u00ed protokoly na sv\u011bt\u011b. Jeho jednoduchost, robustnost a dlouhodob\u00e9 pou\u017e\u00edv\u00e1n\u00ed z n\u011bj d\u011blaj\u00ed z\u00e1kladn\u00ed k\u00e1men mnoha automatiza\u010dn\u00edch syst\u00e9m\u016f \u2013 od v\u00fdroby p\u0159es energetiku a\u017e po \u0159\u00edzen\u00ed proces\u016f. <\/p>\n\n<p>Tato dlouh\u00e1 historie m\u00e1 ale i svou stinnou str\u00e1nku: Modbus nikdy nebyl navr\u017een s ohledem na bezpe\u010dnost. Neobsahuje \u017e\u00e1dn\u00e9 mechanismy ov\u011b\u0159ov\u00e1n\u00ed, \u0161ifrov\u00e1n\u00ed ani kontroly integrity. V dob\u011b Pr\u016fmyslu 4.0, kdy se OT prost\u0159ed\u00ed st\u00e1le v\u00edce propojuje s IT sv\u011btem, jde o z\u00e1sadn\u00ed riziko. <\/p>\n\n<p>Jak tedy zabezpe\u010dit st\u00e1vaj\u00edc\u00ed syst\u00e9my zalo\u017een\u00e9 na Modbusu, ani\u017e bychom museli m\u011bnit celou infrastrukturu?<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">Probl\u00e9m: Modbus je z podstaty nezabezpe\u010den\u00fd<\/h3>\n\n<p>Modbus (RTU, ASCII i TCP) komunikuje v otev\u0159en\u00e9m, ne\u0161ifrovan\u00e9m form\u00e1tu. Ka\u017ed\u00fd, kdo z\u00edsk\u00e1 p\u0159\u00edstup k s\u00edti, m\u016f\u017ee komunikaci zachytit, upravit nebo podvrhnout. Mezi typick\u00e9 nedostatky pat\u0159\u00ed:  <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>bez \u0161ifrov\u00e1n\u00ed<\/strong> \u2013 data jsou p\u0159en\u00e1\u0161ena v prost\u00e9m textu<\/li>\n\n\n\n<li><strong>chyb\u00ed autentizace<\/strong> \u2013 Modbus p\u0159\u00edkaz m\u016f\u017ee poslat jak\u00e9koli za\u0159\u00edzen\u00ed<\/li>\n\n\n\n<li><strong>chyb\u00ed kontrola integrity<\/strong> \u2013 zpr\u00e1vy lze po cest\u011b m\u011bnit<\/li>\n\n\n\n<li>Broadcastov\u00e1 zranitelnost \u2013 n\u011bkter\u00e9 implementace umo\u017e\u0148uj\u00ed glob\u00e1ln\u00ed z\u00e1pisy<\/li>\n<\/ul>\n\n<p>Tyto slabiny zp\u016fsobuj\u00ed, \u017ee syst\u00e9my zalo\u017een\u00e9 na Modbusu nejsou v souladu s modern\u00edmi standardy kybernetick\u00e9 bezpe\u010dnosti, jako jsou:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>IEC 62443<\/strong> \u2013 bezpe\u010dnost pr\u016fmyslov\u00e9 automatizace<\/li>\n\n\n\n<li><strong>ISO\/IEC 27001<\/strong> \u2013 syst\u00e9m \u0159\u00edzen\u00ed bezpe\u010dnosti informac\u00ed<\/li>\n\n\n\n<li><strong>NIST SP 800-82<\/strong> \u2013 bezpe\u010dnost ICS\/SCADA syst\u00e9m\u016f<\/li>\n<\/ul>\n\n<p>A pr\u00e1v\u011b po\u017eadavky z\u00e1kazn\u00edk\u016f, poji\u0161\u0165oven i regul\u00e1tor\u016f st\u00e1le \u010dast\u011bji vy\u017eaduj\u00ed spln\u011bn\u00ed t\u011bchto norem.<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">\u0158e\u0161en\u00ed: p\u0159evod Modbusu na zabezpe\u010den\u00fd protokol<\/h3>\n\n<p>Jedn\u00edm z nejefektivn\u011bj\u0161\u00edch a finan\u010dn\u011b nejv\u00fdhodn\u011bj\u0161\u00edch p\u0159\u00edstup\u016f je <strong>p\u0159evod protokolu<\/strong> pomoc\u00ed <strong>OT\/IT<\/strong> br\u00e1ny\/gateway.<\/p>\n\n<p>M\u00edsto komplikovan\u00fdch z\u00e1sah\u016f do samotn\u00e9ho Modbusu se komunikace ukon\u010d\u00ed hned u nezabezpe\u010den\u00e9ho za\u0159\u00edzen\u00ed a d\u00e1le se publikuj\u00ed data pomoc\u00ed <strong>modern\u00edch<\/strong>, <strong>bezpe\u010dn\u00fdch protokol\u016f<\/strong> jako <strong>OPC UA<\/strong> nebo<strong> MQTT<\/strong>.<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">Jak to funguje<\/h3>\n\n<p>OT\/IT br\u00e1na \u2013 nap\u0159\u00edklad DataTalk <strong><a href=\"https:\/\/www.data-talk.eu\/cs\/ot-it-gateway\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT\/IT Gateway<\/a><\/strong> \u2013 se instaluje p\u0159\u00edmo vedle PLC nebo jin\u00e9ho Modbus za\u0159\u00edzen\u00ed. P\u0159ipojuje se p\u0159es: <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Ethernet (Modbus TCP)<\/strong>, nebo<\/li>\n\n\n\n<li><strong>Serial line (Modbus RTU nebo ASCII)<\/strong><\/li>\n<\/ul>\n\n<p>Sm\u011brem do IT sv\u011bta br\u00e1na komunikuje pomoc\u00ed <strong>zabezpe\u010den\u00e9ho protokolu <\/strong>p\u0159es TLS \u0161ifrovan\u00e9 kan\u00e1ly. <\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">Bezpe\u010dn\u00e9 alternativy<\/h3>\n\n<p><strong>1. OPC UA (Open Platform Communications Unified Architecture)<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>definov\u00e1no normou <strong>IEC 62541<\/strong><\/li>\n\n\n\n<li>podpora <strong>TLS<\/strong>, <strong>certifik\u00e1t\u016f<\/strong> a detailn\u00edho<strong> \u0159\u00edzen\u00ed p\u0159\u00edstup\u016f<\/strong><\/li>\n\n\n\n<li>umo\u017e\u0148uje pr\u00e1ci s<strong> metadaty<\/strong>, prohl\u00ed\u017een\u00edm dat i ud\u00e1lostmi<\/li>\n\n\n\n<li>pln\u00e1 kompatibilita s po\u017eadavky <strong>IEC 62443<\/strong><\/li>\n\n\n\n<li>ide\u00e1ln\u00ed pro propojen\u00ed syst\u00e9m\u016f od r\u016fzn\u00fdch v\u00fdrobc\u016f<\/li>\n<\/ul>\n\n<p><strong>2. MQTT (Message Queuing Telemetry Transport)<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>b\u011b\u017en\u00fd protokol v<strong> IIOT<\/strong><\/li>\n\n\n\n<li>lehk\u00fd, efektivn\u00ed, snadno zabezpe\u010diteln\u00fd p\u0159es <strong>TLS<\/strong><\/li>\n\n\n\n<li>brokerov\u00e1 architektura zmen\u0161uje \u00fato\u010dnou plochu<\/li>\n\n\n\n<li>vhodn\u00fd pro cloud, edge i analytick\u00e9 platformy<\/li>\n<\/ul>\n\n<p>P\u0159eveden\u00edm Modbusu do MQTT nebo OPC UA br\u00e1na efektivn\u011b \u201ezabaluje\u201c nezabezpe\u010den\u00e1 data do modern\u00edho bezpe\u010dnostn\u00edho r\u00e1mce a bezpe\u010dn\u011b propojuje OT a IT sv\u011bt.<\/p>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">V\u00fdhody pou\u017eit\u00ed OT\/IT Gateway<\/h3>\n\n<p>Nasazen\u00ed p\u0159evodu Modbus \u2192 MQTT\/OPC UA p\u0159in\u00e1\u0161\u00ed:<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>\u0161ifrov\u00e1n\u00ed da<\/strong>t (TLS\/SSL) \u2013 ochrana proti odposlechu a manipulaci<\/li>\n\n\n\n<li><strong>autentizaci a autorizaci<\/strong> \u2013 p\u0159ipoj\u00ed se jen d\u016fv\u011bryhodn\u00e9 syst\u00e9my<\/li>\n\n\n\n<li><strong>segmentaci s\u00edt\u011b<\/strong> \u2013 zmen\u0161en\u00ed \u00fato\u010dn\u00e9 plochy odd\u011blen\u00edm OT a IT<\/li>\n\n\n\n<li><strong>logov\u00e1n\u00ed a audit <\/strong>\u2013 mo\u017enost bezpe\u010dn\u00e9ho sledov\u00e1n\u00ed komunikace<\/li>\n\n\n\n<li>soulad s <strong>IEC 62443-3-3<\/strong> \u2013 spln\u011bn\u00ed po\u017eadavk\u016f na integritu a d\u016fv\u011brnost komunikace<\/li>\n<\/ul>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">V souladu s bezpe\u010dnostn\u00edmi standardy<\/h3>\n\n<p>Pou\u017eit\u00ed br\u00e1ny jako bezpe\u010dnostn\u00edho a komunika\u010dn\u00edho rozhran\u00ed pom\u00e1h\u00e1 splnit kl\u00ed\u010dov\u00e9 \u010d\u00e1sti norem:<\/p>\n\n<figure class=\"wp-block-table\"><table class=\"has-secondary-color has-tertiary-background-color has-text-color has-background has-link-color has-border-color has-background-border-color has-fixed-layout\" style=\"border-width:6px\"><thead><tr><th class=\"has-text-align-left\" data-align=\"left\">Standard<\/th><th class=\"has-text-align-left\" data-align=\"left\">Relevantn\u00ed sekce<\/th><th class=\"has-text-align-left\" data-align=\"left\">Jak to pom\u00e1h\u00e1<\/th><\/tr><\/thead><\/table><\/figure>\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table class=\"has-border-color has-background-border-color has-fixed-layout\" style=\"border-width:6px\"><tbody><tr><td><strong>IEC 62443-3-3<\/strong><\/td><td>SR 3.1\u20133.2 \u2013 Communication Integrity &amp; Confidentiality<\/td><td>TLS encryption<br \/>on MQTT\/OPC UA<\/td><\/tr><tr><td><strong>IEC 62443-4-2<\/strong><\/td><td>CR 1.1 \u2013 Identification &amp; Authentication Control<\/td><td>Certificate-based authentication<\/td><\/tr><tr><td><strong>ISO\/IEC 27001<\/strong><\/td><td>Annex A.13 \u2013 Network Security Management<\/td><td>Secure OT\u2013IT communication<\/td><\/tr><tr><td><strong>NIST SP 800-82<\/strong><\/td><td>Section 5.3 \u2013 ICS Network Architecture<\/td><td>Secure segmentation between OT and IT<\/td><\/tr><\/tbody><\/table><\/figure>\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n<h3 class=\"wp-block-heading has-x-large-font-size\">Pro\u010d je to d\u016fle\u017eit\u00e9<\/h3>\n\n<p>Pr\u016fmyslov\u00e9 s\u00edt\u011b u\u017e d\u00e1vno nejsou izolovan\u00e9. Propojen\u00ed s cloudem, MES, ERP \u010di AI platformami je dnes b\u011b\u017en\u00fdm po\u017eadavkem.<br \/>Ka\u017ed\u00e9 nezabezpe\u010den\u00e9 Modbus spojen\u00ed je potenci\u00e1ln\u00ed vstup pro kybernetick\u00fd \u00fatok \u2013 od naru\u0161en\u00ed v\u00fdroby a\u017e po bezpe\u010dnostn\u00ed incidenty. <\/p>\n\n<p><mark class=\"has-inline-color has-primary-color\">Zabezpe\u010den\u00ed Modbusu tedy nen\u00ed jen ot\u00e1zkou souladu s normami, ale p\u0159edev\u0161\u00edm spolehlivosti, bezpe\u010dnosti a kontinuity podnik\u00e1n\u00ed.<\/mark><\/p>\n\n<p>Nasazen\u00edm OT\/IT br\u00e1ny a p\u0159evodem komunikace z Modbusu na bezpe\u010dn\u00e9 protokoly jako OPC UA nebo MQTT lze nad\u00e1le vyu\u017e\u00edvat st\u00e1vaj\u00edc\u00ed infrastrukturu, a p\u0159itom<strong> dos\u00e1hnout modern\u00ed \u00farovn\u011b kybernetick\u00e9 odolnosti<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modbus st\u00e1le pat\u0159\u00ed mezi nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00ed pr\u016fmyslov\u00e9 komunika\u010dn\u00ed protokoly na sv\u011bt\u011b. Jeho jednoduchost, robustnost a dlouhodob\u00e9 pou\u017e\u00edv\u00e1n\u00ed z n\u011bj d\u011blaj\u00ed z\u00e1kladn\u00ed k\u00e1men mnoha automatiza\u010dn\u00edch syst\u00e9m\u016f \u2013 od v\u00fdroby p\u0159es energetiku a\u017e po \u0159\u00edzen\u00ed proces\u016f. <\/p>\n","protected":false},"author":5,"featured_media":7307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_swt_meta_header_display":false,"_swt_meta_footer_display":false,"_swt_meta_site_title_display":false,"_swt_meta_sticky_header":false,"_swt_meta_transparent_header":false,"footnotes":""},"categories":[116,75],"tags":[],"class_list":["post-7327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-cs","category-novinky"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed<\/title>\n<meta name=\"description\" content=\"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed\" \/>\n<meta property=\"og:description\" content=\"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/\" \/>\n<meta property=\"og:site_name\" content=\"data-talk.eu\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-29T11:56:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-04T12:32:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2134\" \/>\n\t<meta property=\"og:image:height\" content=\"2134\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"DataTalk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napsal(a)\" \/>\n\t<meta name=\"twitter:data1\" content=\"DataTalk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Odhadovan\u00e1 doba \u010dten\u00ed\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/\"},\"author\":{\"name\":\"DataTalk\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/#\\\/schema\\\/person\\\/0b92f5798b28821246d98b96a67161a8\"},\"headline\":\"Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti\",\"datePublished\":\"2025-10-29T11:56:01+00:00\",\"dateModified\":\"2025-11-04T12:32:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/\"},\"wordCount\":842,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.data-talk.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ModbusSecure.webp\",\"articleSection\":[\"Blog\",\"Novinky\"],\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/\",\"url\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/\",\"name\":\"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.data-talk.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ModbusSecure.webp\",\"datePublished\":\"2025-10-29T11:56:01+00:00\",\"dateModified\":\"2025-11-04T12:32:03+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/#\\\/schema\\\/person\\\/0b92f5798b28821246d98b96a67161a8\"},\"description\":\"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.data-talk.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ModbusSecure.webp\",\"contentUrl\":\"https:\\\/\\\/www.data-talk.eu\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/ModbusSecure.webp\",\"width\":2134,\"height\":2134,\"caption\":\"Modbus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Dom\u016f\",\"item\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/#website\",\"url\":\"https:\\\/\\\/www.data-talk.eu\\\/\",\"name\":\"data-talk.eu\",\"description\":\"DataTalk\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.data-talk.eu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.data-talk.eu\\\/#\\\/schema\\\/person\\\/0b92f5798b28821246d98b96a67161a8\",\"name\":\"DataTalk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g\",\"caption\":\"DataTalk\"},\"url\":\"https:\\\/\\\/www.data-talk.eu\\\/cs\\\/author\\\/bplaminkova\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed","description":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/","og_locale":"cs_CZ","og_type":"article","og_title":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed","og_description":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti","og_url":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/","og_site_name":"data-talk.eu","article_published_time":"2025-10-29T11:56:01+00:00","article_modified_time":"2025-11-04T12:32:03+00:00","og_image":[{"width":2134,"height":2134,"url":"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp","type":"image\/webp"}],"author":"DataTalk","twitter_card":"summary_large_image","twitter_misc":{"Napsal(a)":"DataTalk","Odhadovan\u00e1 doba \u010dten\u00ed":"4 minuty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#article","isPartOf":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/"},"author":{"name":"DataTalk","@id":"https:\/\/www.data-talk.eu\/#\/schema\/person\/0b92f5798b28821246d98b96a67161a8"},"headline":"Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti","datePublished":"2025-10-29T11:56:01+00:00","dateModified":"2025-11-04T12:32:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/"},"wordCount":842,"commentCount":0,"image":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp","articleSection":["Blog","Novinky"],"inLanguage":"cs","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/","url":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/","name":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed","isPartOf":{"@id":"https:\/\/www.data-talk.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#primaryimage"},"image":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#primaryimage"},"thumbnailUrl":"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp","datePublished":"2025-10-29T11:56:01+00:00","dateModified":"2025-11-04T12:32:03+00:00","author":{"@id":"https:\/\/www.data-talk.eu\/#\/schema\/person\/0b92f5798b28821246d98b96a67161a8"},"description":"Bezpe\u010dn\u00e1 Modbus komunikace jako z\u00e1klad pro ochranu pr\u016fmyslov\u00fdch aplikac\u00ed: Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti","breadcrumb":{"@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#primaryimage","url":"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp","contentUrl":"https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp","width":2134,"height":2134,"caption":"Modbus"},{"@type":"BreadcrumbList","@id":"https:\/\/www.data-talk.eu\/cs\/modbus-a-iec-62443-jak-privest-starsi-prumyslove-protokoly-do-ery-kyberneticke-bezpecnosti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Dom\u016f","item":"https:\/\/www.data-talk.eu\/cs\/"},{"@type":"ListItem","position":2,"name":"Modbus a IEC 62443 \u2013 Jak p\u0159iv\u00e9st star\u0161\u00ed pr\u016fmyslov\u00e9 protokoly do \u00e9ry kybernetick\u00e9 bezpe\u010dnosti"}]},{"@type":"WebSite","@id":"https:\/\/www.data-talk.eu\/#website","url":"https:\/\/www.data-talk.eu\/","name":"data-talk.eu","description":"DataTalk","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.data-talk.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Person","@id":"https:\/\/www.data-talk.eu\/#\/schema\/person\/0b92f5798b28821246d98b96a67161a8","name":"DataTalk","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/secure.gravatar.com\/avatar\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/426a23f3fdd7d29cdb11bb518fdfe3945aaf9b6e7906a462687ab0bc0d37501c?s=96&d=mm&r=g","caption":"DataTalk"},"url":"https:\/\/www.data-talk.eu\/cs\/author\/bplaminkova\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure.webp",2134,2134,false],"thumbnail":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-150x150.webp",150,150,true],"medium":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-300x300.webp",300,300,true],"medium_large":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-768x768.webp",768,768,true],"large":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-1024x1024.webp",1024,1024,true],"1536x1536":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-1536x1536.webp",1536,1536,true],"2048x2048":["https:\/\/www.data-talk.eu\/wp-content\/uploads\/2025\/10\/ModbusSecure-2048x2048.webp",2048,2048,true]},"uagb_author_info":{"display_name":"DataTalk","author_link":"https:\/\/www.data-talk.eu\/cs\/author\/bplaminkova\/"},"uagb_comment_info":0,"uagb_excerpt":"Modbus st\u00e1le pat\u0159\u00ed mezi nejroz\u0161\u00ed\u0159en\u011bj\u0161\u00ed pr\u016fmyslov\u00e9 komunika\u010dn\u00ed protokoly na sv\u011bt\u011b. Jeho jednoduchost, robustnost a dlouhodob\u00e9 pou\u017e\u00edv\u00e1n\u00ed z n\u011bj d\u011blaj\u00ed z\u00e1kladn\u00ed k\u00e1men mnoha automatiza\u010dn\u00edch syst\u00e9m\u016f \u2013 od v\u00fdroby p\u0159es energetiku a\u017e po \u0159\u00edzen\u00ed proces\u016f.","_links":{"self":[{"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/posts\/7327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/comments?post=7327"}],"version-history":[{"count":2,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/posts\/7327\/revisions"}],"predecessor-version":[{"id":7329,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/posts\/7327\/revisions\/7329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/media\/7307"}],"wp:attachment":[{"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/media?parent=7327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/categories?post=7327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.data-talk.eu\/cs\/wp-json\/wp\/v2\/tags?post=7327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}