{"id":6941,"date":"2023-11-15T14:29:11","date_gmt":"2023-11-15T14:29:11","guid":{"rendered":"https:\/\/amtivo.com\/us\/resources\/iso-27001-annex-a-controls-guide\/"},"modified":"2026-01-20T19:47:18","modified_gmt":"2026-01-20T19:47:18","slug":"iso-27001-annex-a-controls-guide","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/","title":{"rendered":"ISO 27001 Annex A Controls Explained"},"content":{"rendered":"<p><em>ISO 27001 is a globally recognized standard that provides a systematic approach to information security. Its framework contains a list of controls that can help you protect sensitive data and mitigate the risk of data breaches.<\/em><\/p>\r\n<p><em>These <\/em><strong><em>ISO 27001 controls<\/em><\/strong><em> are listed in full in Annex A of the standard.<\/em><\/p>\r\n<p>Read our guide on ISO 27001 Annex A controls to learn more about each domain and find out which ones apply to your organization.<\/p>\r\n<h2>What are the ISO 27001 Annex A controls?<\/h2>\r\n<p>ISO 27001\u2019s Annex A controls describe how an organization can protect sensitive data and systems. The 2022 version of the standard contains 93 controls, each providing a solution to a specific risk.<\/p>\r\n<p>In this way, Annex A plays a pivotal role in <a class=\"tm-link\" title=\"title\" href=\"\/us\/iso-certification\/iso-27001\/\" rel=\"noopener\">ISO 27001 compliance<\/a>. Whereas the rest of the standard sets out the specifications for building an ISMS (Information Security Management System), Annex A contains details on the security measures contained within that system.<\/p>\r\n<p>You can use any relevant control from Annex A to build the three components of an ISMS:<\/p>\r\n<ul>\r\n\t<li><strong class=\"bulletsGreen\">Policies<\/strong> are the principles or rules that outline the organization\u2019s expectations, objectives, and responsibilities.<\/li>\r\n\t<li class=\"bulletsGreen\"><strong>Processes<\/strong> are step-by-step methods that explain how policy goals will be achieved.<\/li>\r\n\t<li class=\"bulletsGreen\"><strong>Technologies<\/strong> include tools, systems, hardware, or software that can address information security risks.<\/li>\r\n<\/ul>\r\n<p>Although you aren\u2019t required to implement every control, you must explain your decision-making throughout the process. This means documenting your adopted controls and explaining why you\u2019ve omitted the others.<\/p>\r\n<p>By carefully selecting and implementing controls from Annex A, you can enhance your security posture and ensure your safeguards are relevant to your requirements.<\/p>\r\n<p><em>Please note that a new version of ISO 27001 was adopted in October 2022 and will take effect in 2025.<\/em><\/p>\r\n<p><em>ISO 27001:2022 restructures its controls from 14 domains into 4 categories, and it reduces the total number of controls from 114 to 93. You can learn more about the differences by reading our <\/em><a class=\"tm-link\" title=\"title\" href=\"\/us\/resources\/guides\/iso-270012022-transition-guide\/\" rel=\"noopener\"><em>ISO 27001:2022 Transition Guide<\/em><\/a><em>.<\/em><\/p>\r\n<p>This article looks at the updated version of <a class=\"editor-rtfLink\" href=\"https:\/\/amtivo.com\/us\/resources\/guides-downloads\/what-is-iso-27001\/\" rel=\"noopener\">ISO 27001<\/a>.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6485 size-full\" src=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1.jpg\" alt=\"ISO 27001 Annex A - network security servers with technicians\" width=\"1280\" height=\"717\" srcset=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1.jpg 1280w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1-300x168.jpg 300w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1-1024x574.jpg 1024w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1-768x430.jpg 768w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1-120x67.jpg 120w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-network-security-servers-with-technicians-1-600x336.jpg 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\r\n<h3>Organizational<\/h3>\r\n<p>This category contains 37 controls that cover:<\/p>\r\n<ul>\r\n\t<li class=\"bulletsGreen\">Information security policies<\/li>\r\n\t<li class=\"bulletsGreen\">Cloud service use<\/li>\r\n\t<li class=\"bulletsGreen\">Threat intelligence<\/li>\r\n<\/ul>\r\n<p>This section sets the tone for your ISMS. It provides guidance for high-level policies that demonstrate your organization\u2019s commitment to information security.<\/p>\r\n<p>These policies establish that your organization takes a security-first approach to projects and that all stakeholders know their responsibilities. Additionally, it can highlight the need for regular policy reviews to ensure that documentation remains aligned with your information security goals.<\/p>\r\n<h3>People<\/h3>\r\n<p>This category contains 8 controls that cover:<\/p>\r\n<ul>\r\n\t<li class=\"bulletsGreen\">Remote work<\/li>\r\n\t<li class=\"bulletsGreen\">Confidentiality<\/li>\r\n\t<li class=\"bulletsGreen\">Non-disclosures<\/li>\r\n\t<li class=\"bulletsGreen\">Screening<\/li>\r\n<\/ul>\r\n<p>At the heart of this category is the way you manage the people who use your ISMS. You are expected to assign responsibilities, define roles, and emphasize the importance of a workplace culture that prioritizes information security.<\/p>\r\n<p>It streamlines two sections from the previous version of ISO 27001, which look at remote work and personnel management separately. Accounting for the rise in remote work in recent years, the updated version of Annex A contains more detailed controls on these topics.<\/p>\r\n<p>This includes controls related to home working equipment and other mobile devices.<\/p>\r\n<p>Elsewhere, this category covers the requirements of personnel management. As with the previous version of the standard, its controls mainly address the risks you might face when handling employees\u2019 personal data.<\/p>\r\n<p><em>Learn more about how to prepare for ISMS success with our <\/em><a class=\"tm-link\" title=\"title\" href=\"\/us\/resources\/checklists\/iso-27001-checklist\/\" rel=\"noopener\"><em>ISO 27001 Checklist<\/em><\/a><em>.<\/em><\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6487 size-full\" src=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1.jpg\" alt=\"ISO 27001 Annex A Controls - infosys operators working in a data center\" width=\"1280\" height=\"720\" srcset=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1.jpg 1280w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1-300x169.jpg 300w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1-1024x576.jpg 1024w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1-768x432.jpg 768w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1-120x68.jpg 120w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-infosys-operators-working-in-a-data-center-1-600x338.jpg 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\r\n<h3>Physical<\/h3>\r\n<p>This category contains 14 controls that cover:<\/p>\r\n<ul>\r\n\t<li class=\"bulletsGreen\">Security monitoring<\/li>\r\n\t<li class=\"bulletsGreen\">Storage media<\/li>\r\n\t<li class=\"bulletsGreen\">Maintenance<\/li>\r\n\t<li class=\"bulletsGreen\">Facilities security<\/li>\r\n<\/ul>\r\n<p>Organizations often underestimate the importance of physical security when protecting their sensitive data. However, it plays a significant role in ISO 27001, and there are more than a dozen controls addressing a range of physical security risks.<\/p>\r\n<p>This includes measures to protect the physical perimeter and the locations where valuable data or systems are kept. It also addresses assets within those locations, such as computers, cupboards, and networking equipment.<\/p>\r\n<h3>Technological<\/h3>\r\n<p>This category contains 34 controls that cover:<\/p>\r\n<ul>\r\n\t<li class=\"bulletsGreen\">Network security<\/li>\r\n\t<li class=\"bulletsGreen\">Access controls<\/li>\r\n\t<li class=\"bulletsGreen\">Encryption<\/li>\r\n\t<li class=\"bulletsGreen\">Data leak prevention\u00a0<\/li>\r\n<\/ul>\r\n<p>Technological defenses are a crucial part of information security, and they&#8217;re often the controls that organizations lean on to protect their systems. But ISO 27001 recognizes that technologies should work alongside other controls, with organizations taking a holistic approach to information security.<\/p>\r\n<p>Two of the most significant measures outlined in this category are access controls and encryption. These systems are each designed to ensure that only authorized individuals can access valuable data.<\/p>\r\n<p>Access controls do so by authenticating individuals when they try to access sensitive data \u2013 whether that&#8217;s online or via a secure part of the facility.<\/p>\r\n<p>By contrast, encryption scrambles digital data to make it unreadable unless you are authorized to view it.<\/p>\r\n<p>For both technologies, you are expected to document management requirements and policies in addition to implementing the technology.<\/p>\r\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6486 size-full\" src=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1.jpg\" alt=\"ISO 27001 Annex A Controls - 2FA authentication with phone and computer password\" width=\"1280\" height=\"960\" srcset=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1.jpg 1280w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1-300x225.jpg 300w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1-1024x768.jpg 1024w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1-768x576.jpg 768w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1-120x90.jpg 120w, https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Annex-A-Controls-2FA-authentication-with-phone-and-computer-password-1-600x450.jpg 600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\r\n<h2>Annex A vs. ISO 27002<\/h2>\r\n<p>Although Annex A plays a crucial role in building your ISMS, it\u2019s not the only place where you\u2019ll encounter these controls. They\u2019re also listed in ISO 27002, a supplementary standard that explores each control in more depth.<\/p>\r\n<p>Whereas Annex A outlines each control in one or two sentences, ISO 27002 dedicates an average of one page per control. It explains how each one works, its objectives, and how you can implement it.<\/p>\r\n<p>They are separated in this way to help organizations manage their implementation project.<\/p>\r\n<ul>\r\n\t<li><strong class=\"bulletsGreen\">Annex A <\/strong>acts as a reference list of ISO 27001 Annex A controls and a reminder of where each one is and what it does.<\/li>\r\n\t<li class=\"bulletsGreen\"><strong>ISO 27002<\/strong> serves as a guide for implementing each control.<\/li>\r\n<\/ul>\r\n<h2>How To Implement Annex A Controls<\/h2>\r\n<p>Your organization\u2019s ISO 27001 implementation project culminates with selecting Annex A controls. The choices you make here shape your ISMS, outlining the actions you\u2019ll take to address information security risks. It\u2019s essential that you pick these controls carefully and don\u2019t either under- or overcommit to your implementation project.<\/p>\r\n<p>If you don\u2019t select enough controls, you\u2019ll still have risks that aren\u2019t properly addressed, which can undermine your security practices. But if you select too many, you might be unable to give enough resources to each one. This can result in poorly implemented controls and an unnecessarily complex ISMS that\u2019s impossible to manage.<\/p>\r\n<p>Given these complexities, it\u2019s often worth seeking expert advice when starting your ISO 27001 implementation project. This is where Amtivo can help. As an <a class=\"tm-link\" title=\"title\" href=\"https:\/\/anab.ansi.org\" target=\"_blank\" rel=\"noopener\">ANAB-accredited<\/a> assessment body, we can support your project and ensure you pick the right Annex A controls.<\/p>\r\n<p>Learn the difference between <span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;ISo 27001 Vs Soc 2&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:513,&quot;3&quot;:{&quot;1&quot;:0},&quot;12&quot;:0}\"><a href=\"https:\/\/amtivo.com\/us\/resources\/insights\/soc-2-vs-iso-27001-key-differences-explained\/\">ISO 27001 Vs Soc 2<\/a> in our essential guide and the <a href=\"\/us\/resources\/insights\/cyber-security-trends-to-watch-in-2024\/\">Cyber Security Trends To Watch In 2024.<\/a><\/span><\/p>\r\n<p><a class=\"tm-link\" title=\"title\" href=\"\/us\/iso-certification\/iso-27001\/\" rel=\"noopener\"><em>Contact Amtivo today to get started<\/em><\/a><em>.<\/em><\/p>","protected":false},"excerpt":{"rendered":"ISO 27001&#8217;s Annex A controls provide the building blocks for organizations to achieve information security success.","protected":false},"author":24,"featured_media":6488,"template":"","resource":[23],"resource-tag":[39],"class_list":["post-6941","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-insights","resource-tag-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ISO 27001 Annex A Controls Explained - Amtivo<\/title>\n<meta name=\"description\" content=\"ISO 27001&#039;s Annex A controls provide the building blocks for organizations to achieve information security success.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 Annex A Controls Explained\" \/>\n<meta property=\"og:description\" content=\"ISO 27001&#039;s Annex A controls provide the building blocks for organizations to achieve information security success.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo US\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T19:47:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Controls-Guide-Featured-Image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"887\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISO 27001 Annex A Controls Explained - Amtivo","description":"ISO 27001's Annex A controls provide the building blocks for organizations to achieve information security success.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001 Annex A Controls Explained","og_description":"ISO 27001's Annex A controls provide the building blocks for organizations to achieve information security success.","og_url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/","og_site_name":"Amtivo US","article_modified_time":"2026-01-20T19:47:18+00:00","og_image":[{"width":1280,"height":887,"url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Controls-Guide-Featured-Image-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/","url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/","name":"ISO 27001 Annex A Controls Explained - Amtivo","isPartOf":{"@id":"https:\/\/amtivo.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Controls-Guide-Featured-Image-1.jpg","datePublished":"2023-11-15T14:29:11+00:00","dateModified":"2026-01-20T19:47:18+00:00","description":"ISO 27001's Annex A controls provide the building blocks for organizations to achieve information security success.","breadcrumb":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/#primaryimage","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Controls-Guide-Featured-Image-1.jpg","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2023\/11\/ISO-27001-Controls-Guide-Featured-Image-1.jpg","width":1280,"height":887,"caption":"ISO 27001 Controls - Guide - Featured Image"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-annex-a-controls-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/us\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/us\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Insights","item":"https:\/\/amtivo.com\/us\/resources\/insights\/"},{"@type":"ListItem","position":4,"name":"ISO 27001 Annex A Controls Explained"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/us\/#website","url":"https:\/\/amtivo.com\/us\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/us\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","width":2557,"height":2121,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/6941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":2,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/6941\/revisions"}],"predecessor-version":[{"id":13262,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/6941\/revisions\/13262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media\/6488"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media?parent=6941"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource?post=6941"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource-tag?post=6941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}