{"id":2452,"date":"2024-10-05T21:45:56","date_gmt":"2024-10-05T19:45:56","guid":{"rendered":"https:\/\/consalta.ba\/?p=2452"},"modified":"2024-10-17T23:34:05","modified_gmt":"2024-10-17T21:34:05","slug":"prvi-koraci-u-implementaciji-iso-27001-identifikacija-informacijske-imovine","status":"publish","type":"post","link":"https:\/\/consalta.ba\/ba\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","title":{"rendered":"Prvi koraci: Identifikacija informacijske imovine"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2452\" class=\"elementor elementor-2452\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d5d261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d5d261\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-182e101\" data-id=\"182e101\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-936b9c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"936b9c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6be204e\" data-id=\"6be204e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d51579 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5d51579\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg\" class=\"attachment-medium size-medium wp-image-2046\" alt=\"\" srcset=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg 300w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1024x683.jpg 1024w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-768x512.jpg 768w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1536x1024.jpg 1536w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f46457\" data-id=\"5f46457\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7d76d2 elementor-widget elementor-widget-text-editor\" data-id=\"b7d76d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Prvi klju\u010dni korak u implementaciji ISO 27001 je identifikacija informacijske imovine. Ovaj proces podrazumijeva katalogizaciju svih informacijski resursa koji procesiraju ili pohranjuju osjetljive informacije, kao \u0161to su podaci o klijentima, financijski zapisi, intelektualno vlasni\u0161tvo te IT sistemi poput servera, baza podataka i mre\u017ene opreme.<\/p><p>Za\u0161to je ovo va\u017eno? Bez jasnog razumijevanja \u0161ta ta\u010dno treba za\u0161tititi, ne mo\u017eemo efikasno upravljati ili osigurati svoje podatke. Prepoznavanjem najkriti\u010dnijih informacijskih resursa, mo\u017eemo usmjeriti sigurnosne napore prema onim segmentima koji predstavljaju najve\u0107i rizik za poslovanje. Ovo tako\u0111er osigurava da ne tro\u0161imo vrijeme i resurse na nebitne komponente.<\/p><p>\u0160ta slijedi? U sljede\u0107em koraku, posvetit \u0107emo se procjeni rizika za ovu identificiranu imovinu i kako odrediti prioritete u njihovoj za\u0161titi.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2046,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"disabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[26],"tags":[21,23,20,24],"class_list":["post-2452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-first-steps-in-iso-27001-implementation","tag-first-steps-in-iso-27001-implementation","tag-information-security-risk-assessment","tag-iso-27001-implementation","tag-iso-27001-risk-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First Steps: Identifying Information Assets - Consalta % %<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-identifikacija-informacijske-imovine\/\" \/>\n<meta property=\"og:locale\" content=\"bs_BA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First Steps: Identifying Information Assets - Consalta % %\" \/>\n<meta property=\"og:description\" content=\"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-identifikacija-informacijske-imovine\/\" \/>\n<meta property=\"og:site_name\" content=\"Consalta\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-05T19:45:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T21:34:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OJB\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OJB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"},\"author\":{\"name\":\"OJB\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\"},\"headline\":\"First Steps: Identifying Information Assets\",\"datePublished\":\"2024-10-05T19:45:56+00:00\",\"dateModified\":\"2024-10-17T21:34:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"},\"wordCount\":122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"keywords\":[\"First steps in ISO 27001 implementation\",\"information security risk assessment\",\"ISO 27001 implementation\",\"ISO 27001 risk assessment\"],\"articleSection\":[\"The First Steps\"],\"inLanguage\":\"bs-BA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\",\"name\":\"First Steps: Identifying Information Assets - Consalta % %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"datePublished\":\"2024-10-05T19:45:56+00:00\",\"dateModified\":\"2024-10-17T21:34:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#breadcrumb\"},\"inLanguage\":\"bs-BA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The First Steps\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/category\\\/first-steps-in-iso-27001-implementation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"First Steps: Identifying Information Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"name\":\"Consalta\",\"description\":\"Get Certified!\",\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/consalta.ba\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"bs-BA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\",\"name\":\"Consalta\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"width\":\"617\",\"height\":\"90\",\"caption\":\"Consalta\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/ba.linkedin.com\\\/company\\\/consalta-d.o.o.\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\",\"name\":\"OJB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"caption\":\"OJB\"},\"sameAs\":[\"https:\\\/\\\/consalta.ba\"],\"url\":\"https:\\\/\\\/consalta.ba\\\/ba\\\/author\\\/admin_8k999oh2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First Steps: Identifying Information Assets - Consalta % %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-identifikacija-informacijske-imovine\/","og_locale":"bs_BA","og_type":"article","og_title":"First Steps: Identifying Information Assets - Consalta % %","og_description":"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]","og_url":"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-identifikacija-informacijske-imovine\/","og_site_name":"Consalta","article_published_time":"2024-10-05T19:45:56+00:00","article_modified_time":"2024-10-17T21:34:05+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","type":"image\/jpeg"}],"author":"OJB","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OJB","Est. reading time":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#article","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"},"author":{"name":"OJB","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc"},"headline":"First Steps: Identifying Information Assets","datePublished":"2024-10-05T19:45:56+00:00","dateModified":"2024-10-17T21:34:05+00:00","mainEntityOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"},"wordCount":122,"commentCount":0,"publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","keywords":["First steps in ISO 27001 implementation","information security risk assessment","ISO 27001 implementation","ISO 27001 risk assessment"],"articleSection":["The First Steps"],"inLanguage":"bs-BA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","name":"First Steps: Identifying Information Assets - Consalta % %","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","datePublished":"2024-10-05T19:45:56+00:00","dateModified":"2024-10-17T21:34:05+00:00","breadcrumb":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#breadcrumb"},"inLanguage":"bs-BA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"]}]},{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/consalta.ba\/en\/"},{"@type":"ListItem","position":2,"name":"The First Steps","item":"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/"},{"@type":"ListItem","position":3,"name":"First Steps: Identifying Information Assets"}]},{"@type":"WebSite","@id":"https:\/\/consalta.ba\/en\/#website","url":"https:\/\/consalta.ba\/en\/","name":"Consalta","description":"Obezbijedite certifikat!","publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/consalta.ba\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"bs-BA"},{"@type":"Organization","@id":"https:\/\/consalta.ba\/en\/#organization","name":"Consalta","url":"https:\/\/consalta.ba\/en\/","logo":{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","width":"617","height":"90","caption":"Consalta"},"image":{"@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/ba.linkedin.com\/company\/consalta-d.o.o."]},{"@type":"Person","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc","name":"OJB","image":{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","caption":"OJB"},"sameAs":["https:\/\/consalta.ba"],"url":"https:\/\/consalta.ba\/ba\/author\/admin_8k999oh2\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"landscape":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"portraits":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"thumbnail":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-150x150.jpg",150,150,true],"medium":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg",300,200,true],"large":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"trp-custom-language-flag":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",18,12,false]},"rttpg_author":{"display_name":"OJB","author_link":"https:\/\/consalta.ba\/ba\/author\/admin_8k999oh2\/"},"rttpg_comment":2,"rttpg_category":"<a href=\"https:\/\/consalta.ba\/ba\/category\/first-steps-in-iso-27001-implementation\/\" rel=\"category tag\">The First Steps<\/a>","rttpg_excerpt":"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]","_links":{"self":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/comments?post=2452"}],"version-history":[{"count":9,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2452\/revisions"}],"predecessor-version":[{"id":2578,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2452\/revisions\/2578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/media\/2046"}],"wp:attachment":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/media?parent=2452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/categories?post=2452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/tags?post=2452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}