{"id":2452,"date":"2024-10-05T21:45:56","date_gmt":"2024-10-05T19:45:56","guid":{"rendered":"https:\/\/consalta.ba\/?p=2452"},"modified":"2024-10-17T23:34:05","modified_gmt":"2024-10-17T21:34:05","slug":"first-steps-in-implementing-iso-27001-identifying-information-assets","status":"publish","type":"post","link":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","title":{"rendered":"First Steps: Identifying Information Assets"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2452\" class=\"elementor elementor-2452\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d5d261 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d5d261\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-182e101\" data-id=\"182e101\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-936b9c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"936b9c0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6be204e\" data-id=\"6be204e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d51579 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"5d51579\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg\" class=\"attachment-medium size-medium wp-image-2046\" alt=\"\" srcset=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg 300w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1024x683.jpg 1024w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-768x512.jpg 768w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1536x1024.jpg 1536w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5f46457\" data-id=\"5f46457\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7d76d2 elementor-widget elementor-widget-text-editor\" data-id=\"b7d76d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial records, intellectual property, and IT systems like servers, databases, and network equipment.<\/p><p>Why is this important? Without a clear understanding of what needs protection, you cannot effectively manage or secure your data. By pinpointing the most critical assets, you can direct security efforts toward areas that pose the highest risk to your business. This also ensures that you don\u2019t waste time and resources on non-essential components.<\/p><p>In the next step, we\u2019ll dive into assessing the risks to these identified assets and how to prioritize their protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2046,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"disabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[26],"tags":[21,23,20,24],"class_list":["post-2452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-first-steps-in-iso-27001-implementation","tag-first-steps-in-iso-27001-implementation","tag-information-security-risk-assessment","tag-iso-27001-implementation","tag-iso-27001-risk-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First Steps: Identifying Information Assets - Consalta % %<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First Steps: Identifying Information Assets - Consalta % %\" \/>\n<meta property=\"og:description\" content=\"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/\" \/>\n<meta property=\"og:site_name\" content=\"Consalta\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-05T19:45:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-17T21:34:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OJB\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OJB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"},\"author\":{\"name\":\"OJB\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\"},\"headline\":\"First Steps: Identifying Information Assets\",\"datePublished\":\"2024-10-05T19:45:56+00:00\",\"dateModified\":\"2024-10-17T21:34:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"},\"wordCount\":122,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"keywords\":[\"First steps in ISO 27001 implementation\",\"information security risk assessment\",\"ISO 27001 implementation\",\"ISO 27001 risk assessment\"],\"articleSection\":[\"The First Steps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\",\"name\":\"First Steps: Identifying Information Assets - Consalta % %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"datePublished\":\"2024-10-05T19:45:56+00:00\",\"dateModified\":\"2024-10-17T21:34:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/CTA-bg.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-identifying-information-assets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The First Steps\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/category\\\/first-steps-in-iso-27001-implementation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"First Steps: Identifying Information Assets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"name\":\"Consalta\",\"description\":\"Get Certified!\",\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/consalta.ba\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\",\"name\":\"Consalta\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"width\":\"617\",\"height\":\"90\",\"caption\":\"Consalta\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/ba.linkedin.com\\\/company\\\/consalta-d.o.o.\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\",\"name\":\"OJB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"caption\":\"OJB\"},\"sameAs\":[\"https:\\\/\\\/consalta.ba\"],\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/author\\\/admin_8k999oh2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First Steps: Identifying Information Assets - Consalta % %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","og_locale":"en_US","og_type":"article","og_title":"First Steps: Identifying Information Assets - Consalta % %","og_description":"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]","og_url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","og_site_name":"Consalta","article_published_time":"2024-10-05T19:45:56+00:00","article_modified_time":"2024-10-17T21:34:05+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","type":"image\/jpeg"}],"author":"OJB","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OJB","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#article","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"},"author":{"name":"OJB","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc"},"headline":"First Steps: Identifying Information Assets","datePublished":"2024-10-05T19:45:56+00:00","dateModified":"2024-10-17T21:34:05+00:00","mainEntityOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"},"wordCount":122,"commentCount":0,"publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","keywords":["First steps in ISO 27001 implementation","information security risk assessment","ISO 27001 implementation","ISO 27001 risk assessment"],"articleSection":["The First Steps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/","name":"First Steps: Identifying Information Assets - Consalta % %","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","datePublished":"2024-10-05T19:45:56+00:00","dateModified":"2024-10-17T21:34:05+00:00","breadcrumb":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#primaryimage","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-identifying-information-assets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/consalta.ba\/en\/"},{"@type":"ListItem","position":2,"name":"The First Steps","item":"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/"},{"@type":"ListItem","position":3,"name":"First Steps: Identifying Information Assets"}]},{"@type":"WebSite","@id":"https:\/\/consalta.ba\/en\/#website","url":"https:\/\/consalta.ba\/en\/","name":"Consalta","description":"Get Certified!","publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/consalta.ba\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/consalta.ba\/en\/#organization","name":"Consalta","url":"https:\/\/consalta.ba\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","width":"617","height":"90","caption":"Consalta"},"image":{"@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/ba.linkedin.com\/company\/consalta-d.o.o."]},{"@type":"Person","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc","name":"OJB","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","caption":"OJB"},"sameAs":["https:\/\/consalta.ba"],"url":"https:\/\/consalta.ba\/en\/author\/admin_8k999oh2\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"landscape":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"portraits":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"thumbnail":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-150x150.jpg",150,150,true],"medium":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-300x200.jpg",300,200,true],"large":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",1920,1280,false],"trp-custom-language-flag":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/CTA-bg.jpg",18,12,false]},"rttpg_author":{"display_name":"OJB","author_link":"https:\/\/consalta.ba\/en\/author\/admin_8k999oh2\/"},"rttpg_comment":2,"rttpg_category":"<a href=\"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/\" rel=\"category tag\">The First Steps<\/a>","rttpg_excerpt":"The first crucial step in ISO 27001 implementation is identifying your information assets. This process involves cataloging all assets that handle or store sensitive information, such as customer data, financial [&hellip;]","_links":{"self":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/comments?post=2452"}],"version-history":[{"count":9,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2452\/revisions"}],"predecessor-version":[{"id":2578,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2452\/revisions\/2578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/media\/2046"}],"wp:attachment":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/media?parent=2452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/categories?post=2452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/tags?post=2452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}