{"id":9438,"date":"2024-11-26T17:27:47","date_gmt":"2024-11-26T17:27:47","guid":{"rendered":"https:\/\/amtivo.com\/us\/?post_type=resources-filter&#038;p=9438"},"modified":"2026-01-20T21:27:48","modified_gmt":"2026-01-20T21:27:48","slug":"iso-27001-checklist-10-steps-to-compliance","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/","title":{"rendered":"ISO 27001 Checklist &#8211; 10 steps to compliance"},"content":{"rendered":"<p>Information security should be a top priority for any organization, particularly those that handle and store sensitive information.<\/p>\r\n<p>An ISO 27001-certified <a href=\"https:\/\/amtivo.com\/us\/iso-certification\/iso-27001\/\">Information Security Management System (ISMS)<\/a> provides a robust framework for managing and protecting company and customer data.<\/p>\r\n<p>To successfully implement an ISO 27001 ISMS, you\u2019ll need thorough pre-planning, analysis and execution. We\u2019re here to guide you through the process with a 10-step breakdown of the ISMS implementation journey.<\/p>\r\n<h2 style=\"margin-top: 30px;\">Understanding the Core Principles of ISO 27001<\/h2>\r\n<p><a href=\"https:\/\/amtivo.com\/us\/iso-certification\/iso-27001\/\">ISO 27001<\/a> is a globally recognized Information Security Management Systems (ISMS) standard, officially known as the ISO\/IEC 27001 Information Security Management standard. The standard outlines best practices for establishing, implementing, maintaining and continually improving an ISMS.<\/p>\r\n<p>The standard supports three core principles:<\/p>\r\n<ul>\r\n\t<li><strong>Confidentiality<\/strong>\u2014Ensuring that data is accessible only by authorized personnel.<\/li>\r\n\t<li><strong>Integrity<\/strong>\u2014Ensuring the data is accurate, complete and trustworthy throughout its lifecycle.<\/li>\r\n\t<li><strong>Availability<\/strong>\u2014Ensuring authorized users have access to data when needed.<\/li>\r\n<\/ul>\r\n<p style=\"margin-top: 1em;\">Achieving ISO 27001 certification demonstrates that your organization has implemented a systematic approach to managing sensitive information. This may include customer and employee details, intellectual property, financial information and third-party data.<\/p>\r\n<p>Implementing an ISO 27001-compliant ISMS, however, can be a complex task. Our ISO 27001 requirement checklist aims to make the process more manageable.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/us\/resources\/checklists\/iso-27001-checklist\/\">Download our free ISO 27001 checklist<\/a><\/p>\r\n<p><span><a href=\"https:\/\/amtivo.com\/us\/resources\/guides-downloads\/iso-buyers-guide\/\" target=\"_blank\" data-banner-id=\"9461\"><img decoding=\"async\" src=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/ISO-27001-Checklist-Steps-to-Compliance-ISO-Buyers-Guide.jpg\" class=\"bannerTrackingImg\" alt=\"ISO 27001 Checklist Steps to Compliance - ISO Buyers Guide\" title=\"ISO 27001 Checklist Steps to Compliance - ISO Buyers Guide\" \/><\/a><\/span><\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>ISO 27001 Checklist\u201410 Steps to Compliance<\/h2>\r\n<p>Follow our ISO 27001 compliance checklist to help make achieving certification a smoother process.<\/p>\r\n<h3>1. Build Your Team and Assign Roles<\/h3>\r\n<p>Without the right team, it can be challenging to implement an effective ISMS.<\/p>\r\n<p>You will need an authorized project leader with specific skills and experience to lead the implementation. They must thoroughly understand the ISO 27001 standard and its requirements. They should have strong organizational, communication and planning skills and be adept at managing resources and risks. Knowledge of IT infrastructure and data security principles is essential.<\/p>\r\n<p>The team implementing the ISMS should include representatives from all areas of the organization affected by the system.<\/p>\r\n<p>Together, they should draft a project mandate. This will include the ISMS objectives, timeframes, budgets and how senior management will support the implementation.<\/p>\r\n<h3>2. Define the Scope of the ISMS<\/h3>\r\n<p>Before you can build and implement your ISO 27001 ISMS, you must determine its scope.<\/p>\r\n<p>This will outline the type of operations your ISMS will be applied to and those outside its scope. In most cases, your ISMS will be applied to your entire organization. However, it may vary depending on the nature of your organization, the types of data you handle, how it is handled and the industry you operate in.<\/p>\r\n<p>The scope of the ISMS must be documented.<\/p>\r\n<h3>3. Create Information Security Policies and Objectives<\/h3>\r\n<p>Establishing clear information security policies and objectives is fundamental to ISO 27001 certification. You must create a robust policy framework setting out your organization\u2019s commitment to information security.<\/p>\r\n<p>Your Information Security Policy serves as the backbone of your ISMS, detailing the key objectives and standards your business will follow.<\/p>\r\n<p>It should include relevant sub-policies that cover distinct areas of your operations, such as:<\/p>\r\n<ul>\r\n\t<li>Data protection and privacy legislation compliance.<\/li>\r\n\t<li>Incident management and reporting.<\/li>\r\n\t<li>Access control measures.<\/li>\r\n<\/ul>\r\n<p style=\"margin-top: 1em;\">Additionally, you should define information security objectives that align with your organization\u2019s broader business goals. These objectives should be measurable and regularly reviewed.<\/p>\r\n<p>Clearly articulating your policies and objectives helps you meet ISO 27001 requirements. It also demonstrates to clients and regulatory bodies that you take security seriously, building trust and competitive advantage.<\/p>\r\n<h3>4. Conduct an Information Asset Inventory<\/h3>\r\n<p>A key component of ISO 27001 compliance is knowing exactly what data your organization holds and where risks might lie. Conducting a thorough information asset inventory helps identify all data and resources that need protection under your ISMS.<\/p>\r\n<p>This means identifying:<\/p>\r\n<ul>\r\n\t<li>Information assets including customer data, intellectual property and sensitive business information.<\/li>\r\n\t<li>Supporting assets like IT systems, hardware and facilities that store or process data.<\/li>\r\n<\/ul>\r\n<p style=\"margin-top: 1em;\">Assets should be classified based on their sensitivity and criticality to business operations so the appropriate level of protection can be applied.<\/p>\r\n<p>You should assign ownership of the data to the appropriate person so you create accountability and manage risks related to those assets.<\/p>\r\n<p>A comprehensive and well-documented asset inventory not only meets ISO 27001 requirements but also provides a solid foundation for the next stages, particularly risk assessment and treatment.<\/p>\r\n<h3>5. Conduct a Risk Assessment and Implement a Risk Treatment Plan<\/h3>\r\n<p>ISO 27001 requires organizations to implement a robust risk assessment framework. This involves identifying, evaluating, and prioritising potential security risks to your data. The goal is to understand how likely these risks are to occur and their potential impact.<\/p>\r\n<p>Once risks are identified, your team should create a risk treatment plan, selecting appropriate controls from Annex A of the ISO 27001 standard to mitigate each one. It\u2019s essential to regularly review and proactively update your risk assessments and treatment plans to reflect evolving threats.<\/p>\r\n<h3>6. Document a Statement of Applicability<\/h3>\r\n<p>The <strong>Statement of Applicability (SoA)<\/strong> is a vital document in ISO 27001 certification.<\/p>\r\n<p>It lists all the security controls your organization has chosen from Annex A and justifies their inclusion or exclusion. This document serves as both a guide and evidence for auditors, showing how your organization addresses information security risks.<\/p>\r\n<p>To create the SoA, follow these steps:<\/p>\r\n<ul>\r\n\t<li>Review the <strong>Annex A controls<\/strong>, which cover everything from access control to incident management.<\/li>\r\n\t<li><strong>Map controls<\/strong> to the risks identified during your risk assessment.<\/li>\r\n\t<li><strong>Explain exclusions<\/strong>, providing clear reasons for any controls deemed unnecessary.<\/li>\r\n<\/ul>\r\n<p>The SoA should be updated regularly to align with current risks, business needs and compliance obligations. It acts as a living document, evolving with your organization and security environment. Maintaining an accurate and justifiable SoA helps meet ISO 27001 requirements and demonstrates a thorough, risk-based approach to information security.<\/p>\r\n<h3>7. Provide Ongoing Training and Awareness Program<\/h3>\r\n<p>Regular information security training and awareness are a cornerstone of ISO 27001 compliance.<\/p>\r\n<p>It demonstrates that everyone in your organization understands their role in maintaining information security.<\/p>\r\n<p>Start by identifying training needs based on employee roles, then develop <span data-contrast=\"auto\">relevant <\/span>programs. Topics should include the ISMS, incident response and specific data protection and access control policies.<\/p>\r\n<p>Training should be ongoing, not just a one-off event, with records of participation and competency kept.<\/p>\r\n<p>Frequent refreshers and updates help employees stay informed about emerging risks and changing policies, fostering a security-conscious culture across the business.<\/p>\r\n<h3>8. Implement ISMS Documentation and Controls<\/h3>\r\n<p>Proper documentation is essential for ISO 27001 compliance with all ISMS processes clearly defined and auditable.<\/p>\r\n<p>This includes policies, procedures and records that detail how security controls are implemented and maintained.<\/p>\r\n<p>Key areas to document include:<\/p>\r\n<ul>\r\n\t<li>Access control measures, such as who can access information and systems.<\/li>\r\n\t<li>Incident response procedures for managing security breaches.<\/li>\r\n\t<li>Supplier management and the security controls expected from third parties.<\/li>\r\n<\/ul>\r\n<p style=\"margin-top: 1em;\">You must regularly review and update documentation to reflect current practices, legal requirements and risk environments.<\/p>\r\n<h3>9. Perform Internal Audits and Management Reviews<\/h3>\r\n<p>Regular internal audits are crucial to assess the functioning of your ISMS.<\/p>\r\n<p>Audits should identify non-conformities and areas for improvement so that your ISMS remains aligned with ISO 27001 requirements.<\/p>\r\n<p>After each audit, you should conduct a management review to evaluate findings and take corrective actions. This review allows senior leadership to monitor ISMS performance, allocate resources and make strategic decisions.<\/p>\r\n<p>Document each review and save it for reference during future reviews and the formal ISO 27001 certification process.<\/p>\r\n<h3>10. Drive Continual Improvement<\/h3>\r\n<p>Continual improvement is an ongoing requirement for ISO 27001 compliance and essential for maintaining an effective ISMS. The process doesn\u2019t end with certification; instead, you should establish a structured approach for evolving your security practices as new risks emerge.<\/p>\r\n<p>Key elements include:<\/p>\r\n<ul>\r\n\t<li><strong>Incident tracking<\/strong>\u2014Use data from security incidents, breaches and audit findings to pinpoint areas for improvement.<\/li>\r\n\t<li><strong>Corrective and preventive actions<\/strong>\u2014Address non-conformities, ensuring permanent solutions.<\/li>\r\n\t<li><strong>Regular ISMS updates<\/strong>\u2014Review and revise policies and procedures to reflect technological changes, business processes, or legal requirements.<\/li>\r\n<\/ul>\r\n<p style=\"margin-top: 1em;\">The <strong><a href=\"https:\/\/amtivo.com\/us\/resources\/insights\/what-is-the-plan-do-check-act-pdca-cycle\/\">Plan, Do, Check, Act (PDCA)<\/a><\/strong> approach is a particularly useful model for continual improvement, making it highly effective for implementing ISO 27001.<\/p>\r\n<p>Continually refining your ISMS helps meet compliance and also bolsters your organization\u2019s resilience against evolving security threats, maintaining a strong security posture over time.<\/p>\r\n<table class=\"wp-list-table widefat fixed striped table-view-list posts\">\r\n<tbody id=\"the-list\" class=\"ui-sortable\">\r\n<tr id=\"post-9460\" class=\"iedit author-self level-0 post-9460 type-banners_and_tracking status-publish hentry\">\r\n<td class=\"shortcode column-shortcode\" data-colname=\"Shortcode\"><a href=\"https:\/\/amtivo.com\/us\/iso-training-courses\/iso-27001-training-courses\/iso-27001-implementation-training-course\/\" target=\"_blank\" data-banner-id=\"9460\"><img decoding=\"async\" src=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/ISO-27001-Checklist-Steps-to-Compliance-Implementing-ISO-27001.jpg\" class=\"bannerTrackingImg\" alt=\"ISO 27001 Checklist Steps to Compliance - Implementing ISO 27001\" title=\"ISO 27001 Checklist Steps to Compliance - Implementing ISO 27001\" \/><\/a><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2>\u00a0<\/h2>\r\n<h2>Prepare for Your Certification Audit<\/h2>\r\n<p>In preparation for an external certification audit, you may wish to:<\/p>\r\n<ul>\r\n\t<li><strong>Review the required documentation<\/strong>\u2014Make sure all your documents are complete, up to date and accurately reflect your ISMS.<\/li>\r\n\t<li><strong>Conduct a final internal audit or gap analysis<\/strong>\u2014Check that you have identified any oversights or weaknesses in your ISMS.<\/li>\r\n\t<li><strong>Contact your certification body\u2014<\/strong>Confirm the audit dates and clarify any specific requirements or expectations your external auditor might have.<\/li>\r\n\t<li><strong>Brief staff<\/strong>\u2014Check that all employees know what to expect during the audit and their role in answering questions or providing evidence.<\/li>\r\n\t<li><strong>Prepare evidence<\/strong>\u2014Collect relevant records that demonstrate the effective implementation and operation of your ISMS.<\/li>\r\n\t<li><strong>Address any last-minute issues<\/strong>\u2014Resolve issues or nonconformities with corrective actions to maintain compliance before the certification audit.<\/li>\r\n<\/ul>\r\n<h2>\u00a0<\/h2>\r\n<h2>Why You Should Choose Amtivo<\/h2>\r\n<p><a href=\"https:\/\/amtivo.com\/us\/accreditations\/\">Amtivo is an ANAB-accredited<\/a> certification body with proven expertise to help guide your business towards successful certifications. The <a href=\"https:\/\/anab.ansi.org\/\" target=\"_blank\" rel=\"noopener\">ANSI National Accreditation Board (ANAB)<\/a> is the largest accreditation body in North America and provides accreditation services and training to public\u2014and private-sector organizations serving the global marketplace.<\/p>\r\n<p>The first step of certifying your organization for ISO 27001 is the Stage 1 audit, performed by one of our expert auditors. They will identify any gaps in your current ISMS that you must address and rectify before you can continue your certification journey.<\/p>\r\n<p>Once these are addressed and your auditor is satisfied, your organization will then undergo an in-depth Stage 2 assessment before you can successfully achieve ISO 27001 certification.<\/p>\r\n<p><a href=\"https:\/\/amtivo.com\/us\/resources\/insights\/discover-the-benefits-of-iso-27001-certification\/\">Read more about the many benefits of ISO 27001 certification<\/a>\u00a0<\/p>\r\n<p>Get started on your ISO 27001 certification journey\u2014<a href=\"https:\/\/amtivo.com\/us\/certification-quote\/\"><strong>get a quote<\/strong><\/a> today or <a href=\"https:\/\/amtivo.com\/us\/contact-us\/\"><strong>contact our team<\/strong><\/a> to discuss your needs.<\/p>","protected":false},"excerpt":{"rendered":"A step-by-step guide to implementing ISO 27001 in your organization, from planning to certification.","protected":false},"author":24,"featured_media":9446,"template":"","resource":[23],"resource-tag":[39],"class_list":["post-9438","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-insights","resource-tag-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ISO 27001 Checklist - 10 steps to compliance - Amtivo<\/title>\n<meta name=\"description\" content=\"Free ISO 27001 checklist PDF. Discover how to make your Information Security Management System (ISMS) ISO 27001 compliant.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 Checklist - 10 steps to compliance\" \/>\n<meta property=\"og:description\" content=\"Free ISO 27001 checklist PDF. Discover how to make your Information Security Management System (ISMS) ISO 27001 compliant.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo US\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T21:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/Steps-to-Compliance-ISO-27001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISO 27001 Checklist - 10 steps to compliance - Amtivo","description":"Free ISO 27001 checklist PDF. Discover how to make your Information Security Management System (ISMS) ISO 27001 compliant.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001 Checklist - 10 steps to compliance","og_description":"Free ISO 27001 checklist PDF. Discover how to make your Information Security Management System (ISMS) ISO 27001 compliant.","og_url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/","og_site_name":"Amtivo US","article_modified_time":"2026-01-20T21:27:48+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/Steps-to-Compliance-ISO-27001.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/","url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/","name":"ISO 27001 Checklist - 10 steps to compliance - Amtivo","isPartOf":{"@id":"https:\/\/amtivo.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/Steps-to-Compliance-ISO-27001.jpg","datePublished":"2024-11-26T17:27:47+00:00","dateModified":"2026-01-20T21:27:48+00:00","description":"Free ISO 27001 checklist PDF. Discover how to make your Information Security Management System (ISMS) ISO 27001 compliant.","breadcrumb":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/#primaryimage","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/Steps-to-Compliance-ISO-27001.jpg","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2024\/11\/Steps-to-Compliance-ISO-27001.jpg","width":600,"height":400,"caption":"Steps to Compliance ISO 27001"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-checklist-10-steps-to-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/us\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/us\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Insights","item":"https:\/\/amtivo.com\/us\/resources\/insights\/"},{"@type":"ListItem","position":4,"name":"ISO 27001 Checklist &#8211; 10 steps to compliance"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/us\/#website","url":"https:\/\/amtivo.com\/us\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/us\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","width":2557,"height":2121,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":1,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9438\/revisions"}],"predecessor-version":[{"id":13327,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9438\/revisions\/13327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media\/9446"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media?parent=9438"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource?post=9438"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource-tag?post=9438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}