{"id":997,"date":"2021-03-20T04:33:48","date_gmt":"2021-03-20T07:33:48","guid":{"rendered":"http:\/\/dev.netrisk.com.tr\/dv\/?page_id=997"},"modified":"2021-03-22T06:34:06","modified_gmt":"2021-03-22T09:34:06","slug":"iso-27001","status":"publish","type":"page","link":"https:\/\/www.netrisk.com.tr\/en\/?page_id=997","title":{"rendered":"ISO 27001"},"content":{"rendered":"\n<p><strong>With its risk-based approach, the Information Security standard provides the targeted security level with the right human resources and information technology infrastructures for the basics of information and knowledge in these processes of organizations.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"725\" height=\"1024\" src=\"http:\/\/www.netrisk.com.tr\/en\/wp-content\/uploads\/2021\/03\/img-iso27001-en-725x1024.png\" alt=\"\" class=\"wp-image-879\" srcset=\"https:\/\/www.netrisk.com.tr\/en\/wp-content\/uploads\/2021\/03\/img-iso27001-en-725x1024.png 725w, https:\/\/www.netrisk.com.tr\/en\/wp-content\/uploads\/2021\/03\/img-iso27001-en-212x300.png 212w, https:\/\/www.netrisk.com.tr\/en\/wp-content\/uploads\/2021\/03\/img-iso27001-en-768x1085.png 768w, https:\/\/www.netrisk.com.tr\/en\/wp-content\/uploads\/2021\/03\/img-iso27001-en.png 784w\" sizes=\"(max-width: 725px) 100vw, 725px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n","protected":false},"excerpt":{"rendered":"<p>With its risk-based approach, the Information Security standard provides the targeted security level with the right human resources and information technology infrastructures for the basics of information and knowledge in these processes of organizations.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/full-width-container.php","meta":{"footnotes":""},"class_list":["post-997","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/pages\/997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=997"}],"version-history":[{"count":2,"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/pages\/997\/revisions"}],"predecessor-version":[{"id":1215,"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=\/wp\/v2\/pages\/997\/revisions\/1215"}],"wp:attachment":[{"href":"https:\/\/www.netrisk.com.tr\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}