{"id":2466,"date":"2024-10-04T21:50:42","date_gmt":"2024-10-04T19:50:42","guid":{"rendered":"https:\/\/consalta.ba\/?p=2466"},"modified":"2024-10-21T18:37:00","modified_gmt":"2024-10-21T16:37:00","slug":"prvi-koraci-u-implementaciji-iso-27001-izrada-politike-sigurnosti-informacija","status":"publish","type":"post","link":"https:\/\/consalta.ba\/ba\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","title":{"rendered":"Prvi koraci: Izrada Politike informacione sigurnosti"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2466\" class=\"elementor elementor-2466\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2676f33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2676f33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-99eaebd\" data-id=\"99eaebd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44cf756 elementor-widget elementor-widget-image\" data-id=\"44cf756\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"228\" height=\"300\" src=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg\" class=\"attachment-medium size-medium wp-image-1897\" alt=\"\" srcset=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg 228w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-778x1024.jpg 778w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-768x1010.jpg 768w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-1168x1536.jpg 1168w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg 1280w\" sizes=\"(max-width: 228px) 100vw, 228px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-264a26a\" data-id=\"264a26a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61d03f5 elementor-widget elementor-widget-text-editor\" data-id=\"61d03f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jedan od klju\u010dnih prvih koraka u implementaciji ISO 27001 je kreiranje formalne <strong>Politike informacijske sigurnosti<\/strong>: Ovaj strate\u0161ki dokument defini\u0161e op\u0107i pristup Va\u0161e organizacije prema sigurnosti informacija i okvir koji \u0107e usmjeravati razvoj Va\u0161eg ISMS-a. Politika postavlja smjernice za na\u010din na koji \u0107e sigurnost biti vo\u0111ena i odr\u017eavana, osiguravaju\u0107i da bude prepoznata kao prioritet u svim organizacijskim dijelovima.<\/p><p>Politika treba da uklju\u010duje klju\u010dne elemente kao \u0161to su:<\/p><ul><li>Opredijeljenost organizacije za za\u0161titu osjetljivih informacija.<\/li><li>Jasna definicija uloga i odgovornosti vezanih za sigurnost.<\/li><li>Op\u0107i principi kako \u0107e se posti\u0107i sigurnosni ciljevi.<\/li><li>Opredijeljenost rukovodstva za kontinuirano unapre\u0111enje sigurnosti informacija i ISMS-a.<\/li><\/ul><p>Ovaj dokument djeluje kao ki\u010dma Va\u0161eg ISMS-a, uskla\u0111uju\u0107i sigurnosne prakse s poslovnim ciljevima i pravnim zahtjevima. Tako\u0111er poma\u017ee u komunikaciji svim zaposlenima da je sigurnost zajedni\u010dka odgovornost.<\/p><p>\u0160ta slijedi? U sljede\u0107em \u010dlanku, razgovarat \u0107emo o tome kako strukturirati Va\u0161u politiku informacione sigurnosti da zadovolji zahtjeve ISO 27001.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1897,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"disabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[26],"tags":[21,22,20],"class_list":["post-2466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-first-steps-in-iso-27001-implementation","tag-first-steps-in-iso-27001-implementation","tag-how-to-implement-iso-27001","tag-iso-27001-implementation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First Steps: Creating an Information Security Policy - Consalta % %<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-izrada-politike-sigurnosti-informacija\/\" \/>\n<meta property=\"og:locale\" content=\"bs_BA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First Steps: Creating an Information Security Policy - Consalta % %\" \/>\n<meta property=\"og:description\" content=\"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-izrada-politike-sigurnosti-informacija\/\" \/>\n<meta property=\"og:site_name\" content=\"Consalta\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T19:50:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T16:37:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OJB\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OJB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"},\"author\":{\"name\":\"OJB\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\"},\"headline\":\"First Steps: Creating an Information Security Policy\",\"datePublished\":\"2024-10-04T19:50:42+00:00\",\"dateModified\":\"2024-10-21T16:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"},\"wordCount\":162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"keywords\":[\"First steps in ISO 27001 implementation\",\"How to implement ISO 27001\",\"ISO 27001 implementation\"],\"articleSection\":[\"The First Steps\"],\"inLanguage\":\"bs-BA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\",\"name\":\"First Steps: Creating an Information Security Policy - Consalta % %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"datePublished\":\"2024-10-04T19:50:42+00:00\",\"dateModified\":\"2024-10-21T16:37:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"bs-BA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"width\":1280,\"height\":1684},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The First Steps\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/category\\\/first-steps-in-iso-27001-implementation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"First Steps: Creating an Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"name\":\"Consalta\",\"description\":\"Get Certified!\",\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/consalta.ba\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"bs-BA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\",\"name\":\"Consalta\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"width\":\"617\",\"height\":\"90\",\"caption\":\"Consalta\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/ba.linkedin.com\\\/company\\\/consalta-d.o.o.\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\",\"name\":\"OJB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"bs-BA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"caption\":\"OJB\"},\"sameAs\":[\"https:\\\/\\\/consalta.ba\"],\"url\":\"https:\\\/\\\/consalta.ba\\\/ba\\\/author\\\/admin_8k999oh2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First Steps: Creating an Information Security Policy - Consalta % %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-izrada-politike-sigurnosti-informacija\/","og_locale":"bs_BA","og_type":"article","og_title":"First Steps: Creating an Information Security Policy - Consalta % %","og_description":"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]","og_url":"https:\/\/consalta.ba\/ba\/prvi-koraci-u-implementaciji-iso-27001-izrada-politike-sigurnosti-informacija\/","og_site_name":"Consalta","article_published_time":"2024-10-04T19:50:42+00:00","article_modified_time":"2024-10-21T16:37:00+00:00","og_image":[{"width":1280,"height":1684,"url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","type":"image\/jpeg"}],"author":"OJB","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OJB","Est. reading time":"1 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#article","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"},"author":{"name":"OJB","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc"},"headline":"First Steps: Creating an Information Security Policy","datePublished":"2024-10-04T19:50:42+00:00","dateModified":"2024-10-21T16:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"},"wordCount":162,"commentCount":0,"publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","keywords":["First steps in ISO 27001 implementation","How to implement ISO 27001","ISO 27001 implementation"],"articleSection":["The First Steps"],"inLanguage":"bs-BA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","name":"First Steps: Creating an Information Security Policy - Consalta % %","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","datePublished":"2024-10-04T19:50:42+00:00","dateModified":"2024-10-21T16:37:00+00:00","breadcrumb":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#breadcrumb"},"inLanguage":"bs-BA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","width":1280,"height":1684},{"@type":"BreadcrumbList","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/consalta.ba\/en\/"},{"@type":"ListItem","position":2,"name":"The First Steps","item":"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/"},{"@type":"ListItem","position":3,"name":"First Steps: Creating an Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/consalta.ba\/en\/#website","url":"https:\/\/consalta.ba\/en\/","name":"Consalta","description":"Obezbijedite certifikat!","publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/consalta.ba\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"bs-BA"},{"@type":"Organization","@id":"https:\/\/consalta.ba\/en\/#organization","name":"Consalta","url":"https:\/\/consalta.ba\/en\/","logo":{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","width":"617","height":"90","caption":"Consalta"},"image":{"@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/ba.linkedin.com\/company\/consalta-d.o.o."]},{"@type":"Person","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc","name":"OJB","image":{"@type":"ImageObject","inLanguage":"bs-BA","@id":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","caption":"OJB"},"sameAs":["https:\/\/consalta.ba"],"url":"https:\/\/consalta.ba\/ba\/author\/admin_8k999oh2\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"landscape":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"portraits":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"thumbnail":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-150x150.jpg",150,150,true],"medium":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg",228,300,true],"large":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-778x1024.jpg",778,1024,true],"1536x1536":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-1168x1536.jpg",1168,1536,true],"2048x2048":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"trp-custom-language-flag":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",9,12,false]},"rttpg_author":{"display_name":"OJB","author_link":"https:\/\/consalta.ba\/ba\/author\/admin_8k999oh2\/"},"rttpg_comment":3,"rttpg_category":"<a href=\"https:\/\/consalta.ba\/ba\/category\/first-steps-in-iso-27001-implementation\/\" rel=\"category tag\">The First Steps<\/a>","rttpg_excerpt":"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]","_links":{"self":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/comments?post=2466"}],"version-history":[{"count":12,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2466\/revisions"}],"predecessor-version":[{"id":2627,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/posts\/2466\/revisions\/2627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/media\/1897"}],"wp:attachment":[{"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/media?parent=2466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/categories?post=2466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/consalta.ba\/ba\/wp-json\/wp\/v2\/tags?post=2466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}