{"id":244868,"date":"2024-10-19T16:05:47","date_gmt":"2024-10-19T16:05:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62443-4-22019\/"},"modified":"2024-10-25T11:05:23","modified_gmt":"2024-10-25T11:05:23","slug":"bs-en-iec-62443-4-22019","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62443-4-22019\/","title":{"rendered":"BS EN IEC 62443-4-2:2019"},"content":{"rendered":"
This part of IEC 62443<\/span> <\/span> provides detailed technical control system component requirements (CRs) associated with the seven foundational requirements (FRs) described in IEC TS 62443\u20111\u20111<\/span> <\/span> including defining the requirements for control system capability security levels and their components, SL-C(component).<\/p>\n As defined in IEC TS 62443\u20111\u20111<\/span> <\/span> there are a total of seven foundational requirements (FRs):<\/p>\n identification and authentication control (IAC),<\/p>\n<\/li>\n use control (UC),<\/p>\n<\/li>\n system integrity (SI),<\/p>\n<\/li>\n data confidentiality (DC),<\/p>\n<\/li>\n restricted data flow (RDF),<\/p>\n<\/li>\n timely response to events (TRE), and<\/p>\n<\/li>\n resource availability (RA).<\/p>\n<\/li>\n<\/ol>\n These seven FRs are the foundation for defining control system security capability levels. Defining security capability levels for the control system component is the goal and objective of this document as opposed to SL-T or achieved SLs (SL-A), which are out of scope.<\/p>\n Refer to IEC 62443\u20112\u20111<\/span> <\/span> [1]<\/span> for an equivalent set of non-technical, program-related, capability requirements necessary for fully achieving a SL-T(control system).<\/p>\n<\/div>\n The trademarks and trade names mentioned in this document are given for the convenience of users of this document. This information does not constitute an endorsement by IEC of the products named.<\/p>\n<\/div>\n Security for industrial automation and control systems – Technical security requirements for IACS components<\/b><\/p>\n\n
PDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 2<\/td>\n undefined <\/td>\n<\/tr>\n \n 5<\/td>\n Annex ZA(normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n \n 7<\/td>\n English
CONTENTS <\/td>\n<\/tr>\n\n 17<\/td>\n FOREWORD <\/td>\n<\/tr>\n \n 19<\/td>\n INTRODUCTION <\/td>\n<\/tr>\n \n 21<\/td>\n Figure 1 \u2013 Parts of the IEC 62443 series <\/td>\n<\/tr>\n \n 22<\/td>\n 1 Scope
2 Normative references <\/td>\n<\/tr>\n\n 23<\/td>\n 3 Terms, definitions, abbreviated terms, acronyms, and conventions
3.1 Terms and definitions <\/td>\n<\/tr>\n\n 29<\/td>\n 3.2 Abbreviated terms and acronyms <\/td>\n<\/tr>\n \n 31<\/td>\n 3.3 Conventions <\/td>\n<\/tr>\n \n 32<\/td>\n 4 Common component security constraints
4.1 Overview
4.2 CCSC 1: Support of essential functions
4.3 CCSC 2: Compensating countermeasures
4.4 CCSC 3: Least privilege
4.5 CCSC 4: Software development process
5 FR 1 \u2013 Identification and authentication control
5.1 Purpose and SLC(IAC) descriptions <\/td>\n<\/tr>\n\n 33<\/td>\n 5.2 Rationale
5.3 CR 1.1 \u2013 Human user identification and authentication
5.3.1 Requirement
5.3.2 Rationale and supplemental guidance
5.3.3 Requirement enhancements <\/td>\n<\/tr>\n\n 34<\/td>\n 5.3.4 Security levels
5.4 CR 1.2 \u2013 Software process and device identification and authentication
5.4.1 Requirement
5.4.2 Rationale and supplemental guidance
5.4.3 Requirement enhancements <\/td>\n<\/tr>\n\n 35<\/td>\n 5.4.4 Security levels
5.5 CR 1.3 \u2013 Account management
5.5.1 Requirement
5.5.2 Rationale and supplemental guidance
5.5.3 Requirement enhancements
5.5.4 Security levels
5.6 CR 1.4 \u2013 Identifier management
5.6.1 Requirement
5.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 36<\/td>\n 5.6.3 Requirement enhancements
5.6.4 Security levels
5.7 CR 1.5 \u2013 Authenticator management
5.7.1 Requirement
5.7.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 37<\/td>\n 5.7.3 Requirement enhancements
5.7.4 Security levels
5.8 CR 1.6 \u2013 Wireless access management
5.9 CR 1.7 \u2013 Strength of password-based authentication
5.9.1 Requirement
5.9.2 Rationale and supplemental guidance
5.9.3 Requirement enhancements <\/td>\n<\/tr>\n\n 38<\/td>\n 5.9.4 Security levels
5.10 CR 1.8 \u2013 Public key infrastructure certificates
5.10.1 Requirement
5.10.2 Rationale and supplemental guidance
5.10.3 Requirement enhancements
5.10.4 Security levels <\/td>\n<\/tr>\n\n 39<\/td>\n 5.11 CR 1.9 \u2013 Strength of public key-based authentication
5.11.1 Requirement
5.11.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 40<\/td>\n 5.11.3 Requirement enhancements
5.11.4 Security levels
5.12 CR 1.10 \u2013 Authenticator feedback
5.12.1 Requirement
5.12.2 Rationale and supplemental guidance
5.12.3 Requirement enhancements
5.12.4 Security levels
5.13 CR 1.11 \u2013 Unsuccessful login attempts
5.13.1 Requirement <\/td>\n<\/tr>\n\n 41<\/td>\n 5.13.2 Rationale and supplemental guidance
5.13.3 Requirement enhancements
5.13.4 Security levels
5.14 CR 1.12 \u2013 System use notification
5.14.1 Requirement
5.14.2 Rationale and supplemental guidance
5.14.3 Requirement enhancements <\/td>\n<\/tr>\n\n 42<\/td>\n 5.14.4 Security levels
5.15 CR 1.13 \u2013 Access via untrusted networks
5.16 CR 1.14 \u2013 Strength of symmetric key-based authentication
5.16.1 Requirement
5.16.2 Rationale and supplemental guidance
5.16.3 Requirement enhancements <\/td>\n<\/tr>\n\n 43<\/td>\n 5.16.4 Security levels
6 FR 2 \u2013 Use control
6.1 Purpose and SLC(UC) descriptions
6.2 Rationale
6.3 CR 2.1 \u2013 Authorization enforcement
6.3.1 Requirement
6.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 44<\/td>\n 6.3.3 Requirement enhancements
6.3.4 Security levels <\/td>\n<\/tr>\n\n 45<\/td>\n 6.4 CR 2.2 \u2013 Wireless use control
6.4.1 Requirement
6.4.2 Rationale and supplemental guidance
6.4.3 Requirement enhancements
6.4.4 Security levels
6.5 CR 2.3 \u2013 Use control for portable and mobile devices
6.6 CR 2.4 \u2013 Mobile code
6.7 CR 2.5 \u2013 Session lock
6.7.1 Requirement <\/td>\n<\/tr>\n\n 46<\/td>\n 6.7.2 Rationale and supplemental guidance
6.7.3 Requirement enhancements
6.7.4 Security levels
6.8 CR 2.6 \u2013 Remote session termination
6.8.1 Requirement
6.8.2 Rationale and supplemental guidance
6.8.3 Requirement enhancements
6.8.4 Security levels
6.9 CR 2.7 \u2013 Concurrent session control
6.9.1 Requirement <\/td>\n<\/tr>\n\n 47<\/td>\n 6.9.2 Rationale and supplemental guidance
6.9.3 Requirement enhancements
6.9.4 Security levels
6.10 CR 2.8 \u2013 Auditable events
6.10.1 Requirement
6.10.2 Rationale and supplemental guidance
6.10.3 Requirement enhancements <\/td>\n<\/tr>\n\n 48<\/td>\n 6.10.4 Security levels
6.11 CR 2.9 \u2013 Audit storage capacity
6.11.1 Requirement
6.11.2 Rationale and supplemental guidance
6.11.3 Requirement enhancements
6.11.4 Security levels
6.12 CR 2.10 \u2013 Response to audit processing failures
6.12.1 Requirement <\/td>\n<\/tr>\n\n 49<\/td>\n 6.12.2 Rationale and supplemental guidance
6.12.3 Requirement enhancements
6.12.4 Security levels
6.13 CR 2.11 \u2013 Timestamps
6.13.1 Requirement
6.13.2 Rationale and supplemental guidance
6.13.3 Requirement enhancements
6.13.4 Security levels <\/td>\n<\/tr>\n\n 50<\/td>\n 6.14 CR 2.12 \u2013 Non-repudiation
6.14.1 Requirement
6.14.2 Rationale and supplemental guidance
6.14.3 Requirement enhancements
6.14.4 Security levels
6.15 CR 2.13 \u2013 Use of physical diagnostic and test interfaces
7 FR 3 \u2013 System integrity
7.1 Purpose and SLC(SI) descriptions <\/td>\n<\/tr>\n\n 51<\/td>\n 7.2 Rationale
7.3 CR 3.1 \u2013 Communication integrity
7.3.1 Requirement
7.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 52<\/td>\n 7.3.3 Requirement enhancements
7.3.4 Security levels
7.4 CR 3.2 \u2013 Protection from malicious code
7.5 CR 3.3 \u2013 Security functionality verification
7.5.1 Requirement
7.5.2 Rationale and supplemental guidance
7.5.3 Requirement enhancements <\/td>\n<\/tr>\n\n 53<\/td>\n 7.5.4 Security levels
7.6 CR 3.4 \u2013 Software and information integrity
7.6.1 Requirement
7.6.2 Rationale and supplemental guidance
7.6.3 Requirement enhancements
7.6.4 Security levels
7.7 CR 3.5 \u2013 Input validation
7.7.1 Requirement <\/td>\n<\/tr>\n\n 54<\/td>\n 7.7.2 Rationale and supplemental guidance
7.7.3 Requirement enhancements
7.7.4 Security levels
7.8 CR 3.6 \u2013 Deterministic output
7.8.1 Requirement
7.8.2 Rationale and supplemental guidance
7.8.3 Requirement enhancements <\/td>\n<\/tr>\n\n 55<\/td>\n 7.8.4 Security levels
7.9 CR 3.7 \u2013 Error handling
7.9.1 Requirement
7.9.2 Rationale and supplemental guidance
7.9.3 Requirement enhancements
7.9.4 Security levels
7.10 CR 3.8 \u2013 Session integrity
7.10.1 Requirement <\/td>\n<\/tr>\n\n 56<\/td>\n 7.10.2 Rationale and supplemental guidance
7.10.3 Requirement enhancements
7.10.4 Security levels
7.11 CR 3.9 \u2013 Protection of audit information
7.11.1 Requirement
7.11.2 Rationale and supplemental guidance
7.11.3 Requirement enhancements
7.11.4 Security levels <\/td>\n<\/tr>\n\n 57<\/td>\n 7.12 CR 3.10 \u2013 Support for updates
7.13 CR 3.11 \u2013 Physical tamper resistance and detection
7.14 CR 3.12 \u2013 Provisioning product supplier roots of trust
7.15 CR 3.13 \u2013 Provisioning asset owner roots of trust
7.16 CR 3.14 \u2013 Integrity of the boot process
8 FR 4 \u2013 Data confidentiality
8.1 Purpose and SLC(DC) descriptions
8.2 Rationale
8.3 CR 4.1 \u2013 Information confidentiality
8.3.1 Requirement <\/td>\n<\/tr>\n\n 58<\/td>\n 8.3.2 Rationale and supplemental guidance
8.3.3 Requirement enhancements
8.3.4 Security levels
8.4 CR 4.2 \u2013 Information persistence
8.4.1 Requirement
8.4.2 Rationale and supplemental guidance
8.4.3 Requirement enhancements <\/td>\n<\/tr>\n\n 59<\/td>\n 8.4.4 Security levels
8.5 CR 4.3 \u2013 Use of cryptography
8.5.1 Requirement
8.5.2 Rationale and supplemental guidance
8.5.3 Requirement enhancements
8.5.4 Security levels <\/td>\n<\/tr>\n\n 60<\/td>\n 9 FR 5 \u2013 Restricted data flow
9.1 Purpose and SLC(RDF) descriptions
9.2 Rationale
9.3 CR 5.1 \u2013 Network segmentation
9.3.1 Requirement
9.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 61<\/td>\n 9.3.3 Requirement enhancements
9.3.4 Security levels
9.4 CR 5.2 \u2013 Zone boundary protection
9.5 CR 5.3 \u2013 General-purpose person-to-person communication restrictions
9.6 CR 5.4 \u2013 Application partitioning
10 FR 6 \u2013 Timely response to events
10.1 Purpose and SLC(TRE) descriptions <\/td>\n<\/tr>\n\n 62<\/td>\n 10.2 Rationale
10.3 CR 6.1 \u2013 Audit log accessibility
10.3.1 Requirement
10.3.2 Rationale and supplemental guidance
10.3.3 Requirement enhancements
10.3.4 Security levels
10.4 CR 6.2 \u2013 Continuous monitoring
10.4.1 Requirement
10.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 63<\/td>\n 10.4.3 Requirement enhancements
10.4.4 Security levels
11 FR 7 \u2013 Resource availability
11.1 Purpose and SLC(RA) descriptions
11.2 Rationale <\/td>\n<\/tr>\n\n 64<\/td>\n 11.3 CR 7.1 \u2013 Denial of service protection
11.3.1 Requirement
11.3.2 Rationale and supplemental guidance
11.3.3 Requirement enhancements
11.3.4 Security levels
11.4 CR 7.2 \u2013 Resource management
11.4.1 Requirement
11.4.2 Rationale and supplemental guidance
11.4.3 Requirement enhancements
11.4.4 Security levels <\/td>\n<\/tr>\n\n 65<\/td>\n 11.5 CR 7.3 \u2013 Control system backup
11.5.1 Requirement
11.5.2 Rationale and supplemental guidance
11.5.3 Requirement enhancements
11.5.4 Security levels
11.6 CR 7.4 \u2013 Control system recovery and reconstitution
11.6.1 Requirement
11.6.2 Rationale and supplemental guidance
11.6.3 Requirement enhancements <\/td>\n<\/tr>\n\n 66<\/td>\n 11.6.4 Security levels
11.7 CR 7.5 \u2013 Emergency power
11.8 CR 7.6 \u2013 Network and security configuration settings
11.8.1 Requirement
11.8.2 Rationale and supplemental guidance
11.8.3 Requirement enhancements
11.8.4 Security levels
11.9 CR 7.7 \u2013 Least functionality
11.9.1 Requirement
11.9.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 67<\/td>\n 11.9.3 Requirement enhancements
11.9.4 Security levels
11.10 CR 7.8 \u2013 Control system component inventory
11.10.1 Requirement
11.10.2 Rationale and supplemental guidance
11.10.3 Requirement enhancements
11.10.4 Security levels
12 Software application requirements
12.1 Purpose
12.2 SAR 2.4 \u2013 Mobile code
12.2.1 Requirement <\/td>\n<\/tr>\n\n 68<\/td>\n 12.2.2 Rationale and supplemental guidance
12.2.3 Requirement enhancements
12.2.4 Security levels
12.3 SAR 3.2 \u2013 Protection from malicious code
12.3.1 Requirement
12.3.2 Rationale and supplemental guidance
12.3.3 Requirement enhancements
12.3.4 Security levels <\/td>\n<\/tr>\n\n 69<\/td>\n 13 Embedded device requirements
13.1 Purpose
13.2 EDR 2.4 \u2013 Mobile code
13.2.1 Requirement
13.2.2 Rationale and supplemental guidance
13.2.3 Requirement enhancements
13.2.4 Security levels
13.3 EDR 2.13 \u2013 Use of physical diagnostic and test interfaces
13.3.1 Requirement <\/td>\n<\/tr>\n\n 70<\/td>\n 13.3.2 Rationale and supplemental guidance
13.3.3 Requirement enhancements
13.3.4 Security levels
13.4 EDR 3.2 \u2013 Protection from malicious code
13.4.1 Requirement
13.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 71<\/td>\n 13.4.3 Requirement enhancements
13.4.4 Security levels
13.5 EDR 3.10 \u2013 Support for updates
13.5.1 Requirement
13.5.2 Rationale and supplemental guidance
13.5.3 Requirement enhancements
13.5.4 Security levels
13.6 EDR 3.11 \u2013 Physical tamper resistance and detection
13.6.1 Requirement
13.6.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 72<\/td>\n 13.6.3 Requirement enhancements
13.6.4 Security levels
13.7 EDR 3.12 \u2013 Provisioning product supplier roots of trust
13.7.1 Requirement
13.7.2 Rationale and supplemental guidance
13.7.3 Requirement enhancements <\/td>\n<\/tr>\n\n 73<\/td>\n 13.7.4 Security levels
13.8 EDR 3.13 \u2013 Provisioning asset owner roots of trust
13.8.1 Requirement
13.8.2 Rationale and supplemental guidance
13.8.3 Requirement enhancements
13.8.4 Security levels <\/td>\n<\/tr>\n\n 74<\/td>\n 13.9 EDR 3.14 \u2013 Integrity of the boot process
13.9.1 Requirement
13.9.2 Rationale and supplemental guidance
13.9.3 Requirement enhancements
13.9.4 Security levels
14 Host device requirements
14.1 Purpose
14.2 HDR 2.4 \u2013 Mobile code
14.2.1 Requirement <\/td>\n<\/tr>\n\n 75<\/td>\n 14.2.2 Rationale and supplemental guidance
14.2.3 Requirement enhancements
14.2.4 Security levels
14.3 HDR 2.13 \u2013 Use of physical diagnostic and test interfaces
14.3.1 Requirement
14.3.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 76<\/td>\n 14.3.3 Requirement enhancements
14.3.4 Security levels
14.4 HDR 3.2 \u2013 Protection from malicious code
14.4.1 Requirement
14.4.2 Rationale and supplemental guidance
14.4.3 Requirement enhancements
14.4.4 Security levels
14.5 HDR 3.10 \u2013 Support for updates
14.5.1 Requirement
14.5.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 77<\/td>\n 14.5.3 Requirement enhancements
14.5.4 Security levels
14.6 HDR 3.11 \u2013 Physical tamper resistance and detection
14.6.1 Requirement
14.6.2 Rationale and supplemental guidance
14.6.3 Requirement enhancements
14.6.4 Security levels <\/td>\n<\/tr>\n\n 78<\/td>\n 14.7 HDR 3.12 \u2013 Provisioning product supplier roots of trust
14.7.1 Requirement
14.7.2 Rationale and supplemental guidance
14.7.3 Requirement enhancements
14.7.4 Security levels
14.8 HDR 3.13 \u2013 Provisioning asset owner roots of trust
14.8.1 Requirement
14.8.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 79<\/td>\n 14.8.3 Requirement enhancements
14.8.4 Security levels
14.9 HDR 3.14 \u2013 Integrity of the boot process
14.9.1 Requirement
14.9.2 Rationale and supplemental guidance
14.9.3 Requirement enhancements <\/td>\n<\/tr>\n\n 80<\/td>\n 14.9.4 Security levels
15 Network device requirements
15.1 Purpose
15.2 NDR 1.6 \u2013 Wireless access management
15.2.1 Requirement
15.2.2 Rationale and supplemental guidance
15.2.3 Requirement enhancements
15.2.4 Security levels
15.3 NDR 1.13 \u2013 Access via untrusted networks
15.3.1 Requirement <\/td>\n<\/tr>\n\n 81<\/td>\n 15.3.2 Rationale and supplemental guidance
15.3.3 Requirement enhancements
15.3.4 Security levels
15.4 NDR 2.4 \u2013 Mobile code
15.4.1 Requirement
15.4.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 82<\/td>\n 15.4.3 Requirement enhancements
15.4.4 Security levels
15.5 NDR 2.13 \u2013 Use of physical diagnostic and test interfaces
15.5.1 Requirement
15.5.2 Rationale and supplemental guidance
15.5.3 Requirement enhancements <\/td>\n<\/tr>\n\n 83<\/td>\n 15.5.4 Security levels
15.6 NDR 3.2 \u2013 Protection from malicious code
15.6.1 Requirement
15.6.2 Rationale and supplemental guidance
15.6.3 Requirement enhancements
15.6.4 Security levels
15.7 NDR 3.10 \u2013 Support for updates
15.7.1 Requirement
15.7.2 Rationale and supplemental guidance
15.7.3 Requirement enhancements <\/td>\n<\/tr>\n\n 84<\/td>\n 15.7.4 Security levels
15.8 NDR 3.11 \u2013 Physical tamper resistance and detection
15.8.1 Requirement
15.8.2 Rationale and supplemental guidance
15.8.3 Requirement enhancements
15.8.4 Security levels
15.9 NDR 3.12 \u2013 Provisioning product supplier roots of trust
15.9.1 Requirement <\/td>\n<\/tr>\n\n 85<\/td>\n 15.9.2 Rationale and supplemental guidance
15.9.3 Requirement enhancements
15.9.4 Security levels
15.10 NDR 3.13 \u2013 Provisioning asset owner roots of trust
15.10.1 Requirement
15.10.2 Rationale and supplemental guidance <\/td>\n<\/tr>\n\n 86<\/td>\n 15.10.3 Requirement enhancements
15.10.4 Security levels
15.11 NDR 3.14 \u2013 Integrity of the boot process
15.11.1 Requirement
15.11.2 Rationale and supplemental guidance
15.11.3 Requirement enhancements <\/td>\n<\/tr>\n\n 87<\/td>\n 15.11.4 Security levels
15.12 NDR 5.2 \u2013 Zone boundary protection
15.12.1 Requirement
15.12.2 Rationale and supplemental guidance
15.12.3 Requirement enhancements
15.12.4 Security levels <\/td>\n<\/tr>\n\n 88<\/td>\n 15.13 NDR 5.3 \u2013 General purpose, person-to-person communication restrictions
15.13.1 Requirement
15.13.2 Rationale and supplemental guidance
15.13.3 Requirement enhancements
15.13.4 Security levels <\/td>\n<\/tr>\n\n 89<\/td>\n Annex A (informative)Device categories
A.1 General
A.2 Device category: embedded device
A.2.1 Programmable logic controller (PLC)
A.2.2 Intelligent electronic device (IED) <\/td>\n<\/tr>\n\n 90<\/td>\n A.3 Device category: network device
A.3.1 Switch
A.3.2 Virtual private network (VPN) terminator
A.4 Device category: host device\/application
A.4.1 Operator workstation <\/td>\n<\/tr>\n\n 91<\/td>\n A.4.2 Data historian <\/td>\n<\/tr>\n \n 92<\/td>\n Annex B (informative)Mapping of CRs and REs to FR SLs 1-4
B.1 Overview
B.2 SL mapping table <\/td>\n<\/tr>\n\n 93<\/td>\n Table B.1 \u2013 Mapping of CRs and REs to FR SL levels 1-4 <\/td>\n<\/tr>\n \n 98<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2019<\/td>\n 100<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244875,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-244868","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244875"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244868"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244868"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}