{"id":2466,"date":"2024-10-04T21:50:42","date_gmt":"2024-10-04T19:50:42","guid":{"rendered":"https:\/\/consalta.ba\/?p=2466"},"modified":"2024-10-21T18:37:00","modified_gmt":"2024-10-21T16:37:00","slug":"first-steps-in-implementing-iso-27001-creating-an-information-security-policy","status":"publish","type":"post","link":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","title":{"rendered":"First Steps: Creating an Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2466\" class=\"elementor elementor-2466\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2676f33 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2676f33\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-99eaebd\" data-id=\"99eaebd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44cf756 elementor-widget elementor-widget-image\" data-id=\"44cf756\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"228\" height=\"300\" src=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg\" class=\"attachment-medium size-medium wp-image-1897\" alt=\"\" srcset=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg 228w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-778x1024.jpg 778w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-768x1010.jpg 768w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-1168x1536.jpg 1168w, https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg 1280w\" sizes=\"(max-width: 228px) 100vw, 228px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-264a26a\" data-id=\"264a26a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61d03f5 elementor-widget elementor-widget-text-editor\" data-id=\"61d03f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An essential early step in implementing ISO 27001 is creating a formal <strong>Information Security Policy<\/strong>. This high-level document outlines your organization\u2019s overall approach to information security and the framework that will guide the development of your ISMS. The policy sets the tone for how security will be managed and maintained, ensuring that it\u2019s recognized as a priority across all departments.<\/p><p>The policy should include key elements such as:<\/p><ul><li>The organization\u2019s commitment to protecting sensitive data.<\/li><li>A clear definition of roles and responsibilities related to security.<\/li><li>General principles on how security objectives will be achieved.<\/li><li>Commitment to continual improvement of information security and ISMS<\/li><\/ul><p>This document acts as the backbone of your ISMS, aligning security practices with your business goals and legal requirements. It also helps communicate to all employees that security is a shared responsibility.<\/p><p>In our next post, we\u2019ll discuss how to structure your information security policy to meet ISO 27001 requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1897,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"disabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[26],"tags":[21,22,20],"class_list":["post-2466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-first-steps-in-iso-27001-implementation","tag-first-steps-in-iso-27001-implementation","tag-how-to-implement-iso-27001","tag-iso-27001-implementation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First Steps: Creating an Information Security Policy - Consalta % %<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First Steps: Creating an Information Security Policy - Consalta % %\" \/>\n<meta property=\"og:description\" content=\"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Consalta\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T19:50:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T16:37:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"OJB\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OJB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"},\"author\":{\"name\":\"OJB\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\"},\"headline\":\"First Steps: Creating an Information Security Policy\",\"datePublished\":\"2024-10-04T19:50:42+00:00\",\"dateModified\":\"2024-10-21T16:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"},\"wordCount\":162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"keywords\":[\"First steps in ISO 27001 implementation\",\"How to implement ISO 27001\",\"ISO 27001 implementation\"],\"articleSection\":[\"The First Steps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\",\"name\":\"First Steps: Creating an Information Security Policy - Consalta % %\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"datePublished\":\"2024-10-04T19:50:42+00:00\",\"dateModified\":\"2024-10-21T16:37:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/pexels-lena-khrupina-2683365.jpg\",\"width\":1280,\"height\":1684},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The First Steps\",\"item\":\"https:\\\/\\\/consalta.ba\\\/en\\\/category\\\/first-steps-in-iso-27001-implementation\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"First Steps: Creating an Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"name\":\"Consalta\",\"description\":\"Get Certified!\",\"publisher\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/consalta.ba\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#organization\",\"name\":\"Consalta\",\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"contentUrl\":\"https:\\\/\\\/consalta.ba\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/Logo-getcert-2024_transpback_blue-black.png\",\"width\":\"617\",\"height\":\"90\",\"caption\":\"Consalta\"},\"image\":{\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/ba.linkedin.com\\\/company\\\/consalta-d.o.o.\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/consalta.ba\\\/en\\\/#\\\/schema\\\/person\\\/b8449ee47559258a18597f3b91629afc\",\"name\":\"OJB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g\",\"caption\":\"OJB\"},\"sameAs\":[\"https:\\\/\\\/consalta.ba\"],\"url\":\"https:\\\/\\\/consalta.ba\\\/en\\\/author\\\/admin_8k999oh2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First Steps: Creating an Information Security Policy - Consalta % %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"First Steps: Creating an Information Security Policy - Consalta % %","og_description":"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]","og_url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","og_site_name":"Consalta","article_published_time":"2024-10-04T19:50:42+00:00","article_modified_time":"2024-10-21T16:37:00+00:00","og_image":[{"width":1280,"height":1684,"url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","type":"image\/jpeg"}],"author":"OJB","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OJB","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#article","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"},"author":{"name":"OJB","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc"},"headline":"First Steps: Creating an Information Security Policy","datePublished":"2024-10-04T19:50:42+00:00","dateModified":"2024-10-21T16:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"},"wordCount":162,"commentCount":0,"publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","keywords":["First steps in ISO 27001 implementation","How to implement ISO 27001","ISO 27001 implementation"],"articleSection":["The First Steps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","url":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/","name":"First Steps: Creating an Information Security Policy - Consalta % %","isPartOf":{"@id":"https:\/\/consalta.ba\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","datePublished":"2024-10-04T19:50:42+00:00","dateModified":"2024-10-21T16:37:00+00:00","breadcrumb":{"@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#primaryimage","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg","width":1280,"height":1684},{"@type":"BreadcrumbList","@id":"https:\/\/consalta.ba\/en\/first-steps-in-implementing-iso-27001-creating-an-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/consalta.ba\/en\/"},{"@type":"ListItem","position":2,"name":"The First Steps","item":"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/"},{"@type":"ListItem","position":3,"name":"First Steps: Creating an Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/consalta.ba\/en\/#website","url":"https:\/\/consalta.ba\/en\/","name":"Consalta","description":"Get Certified!","publisher":{"@id":"https:\/\/consalta.ba\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/consalta.ba\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/consalta.ba\/en\/#organization","name":"Consalta","url":"https:\/\/consalta.ba\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/","url":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","contentUrl":"https:\/\/consalta.ba\/wp-content\/uploads\/2024\/11\/Logo-getcert-2024_transpback_blue-black.png","width":"617","height":"90","caption":"Consalta"},"image":{"@id":"https:\/\/consalta.ba\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/ba.linkedin.com\/company\/consalta-d.o.o."]},{"@type":"Person","@id":"https:\/\/consalta.ba\/en\/#\/schema\/person\/b8449ee47559258a18597f3b91629afc","name":"OJB","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69c0cb70266add0c68274346f544f85223697fb0959d7a797c6a99b8e6babcba?s=96&d=mm&r=g","caption":"OJB"},"sameAs":["https:\/\/consalta.ba"],"url":"https:\/\/consalta.ba\/en\/author\/admin_8k999oh2\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"landscape":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"portraits":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"thumbnail":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-150x150.jpg",150,150,true],"medium":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-228x300.jpg",228,300,true],"large":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-778x1024.jpg",778,1024,true],"1536x1536":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365-1168x1536.jpg",1168,1536,true],"2048x2048":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",1280,1684,false],"trp-custom-language-flag":["https:\/\/consalta.ba\/wp-content\/uploads\/2023\/04\/pexels-lena-khrupina-2683365.jpg",9,12,false]},"rttpg_author":{"display_name":"OJB","author_link":"https:\/\/consalta.ba\/en\/author\/admin_8k999oh2\/"},"rttpg_comment":3,"rttpg_category":"<a href=\"https:\/\/consalta.ba\/en\/category\/first-steps-in-iso-27001-implementation\/\" rel=\"category tag\">The First Steps<\/a>","rttpg_excerpt":"An essential early step in implementing ISO 27001 is creating a formal Information Security Policy. This high-level document outlines your organization\u2019s overall approach to information security and the framework that [&hellip;]","_links":{"self":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/comments?post=2466"}],"version-history":[{"count":12,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2466\/revisions"}],"predecessor-version":[{"id":2627,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/posts\/2466\/revisions\/2627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/media\/1897"}],"wp:attachment":[{"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/media?parent=2466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/categories?post=2466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/consalta.ba\/en\/wp-json\/wp\/v2\/tags?post=2466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}