{"id":9440,"date":"2025-10-30T09:27:46","date_gmt":"2025-10-30T09:27:46","guid":{"rendered":"https:\/\/amtivo.com\/us\/?post_type=resources-filter&#038;p=9440"},"modified":"2026-02-11T12:21:12","modified_gmt":"2026-02-11T12:21:12","slug":"iso-27001-requirements-a-comprehensive-guide","status":"publish","type":"resources-filter","link":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/","title":{"rendered":"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed"},"content":{"rendered":"<h2>Implementing the Requirements of ISO\/IEC 27001:2022 To Help Demonstrate Conformance and Achieve Certification<\/h2>\r\n<p><strong>To successfully achieve and retain\u00a0<a title=\"ISO\/IEC 27001\" href=\"https:\/\/amtivo.com\/us\/iso-certification\/iso-27001\/\">ISO\/IEC 27001<\/a>\u00a0certification, it is a critical success factor for organizations to properly understand its technical and mandatory requirements. As a result, they must establish, operate, maintain and continually improve a conformant\u00a0<a title=\"Information Security Management System\" href=\"https:\/\/amtivo.com\/us\/resources\/insights\/what-is-an-information-security-management-system-isms\/\">Information Security Management System<\/a>\u00a0(ISMS) in an effective and efficient manner.\u00a0\u00a0\u00a0<\/strong><\/p>\r\n<p>The following information explores\u202fISO\/IEC 27001,\u00a0providing insights into the standard\u2019s clauses and controls and their requirements to achieve conformance and also explains the documentation your ISMS will be audited against during an ISO certification audit. It focuses on the technical requirements of ISO 27001\u2014ideal if you are ready to learn more about the specifics.\u00a0\u00a0<\/p>\r\n<p><span data-contrast=\"auto\">If you\u2019re just starting out and looking for a high-level overview of what ISO 27001 is and why it matters, we recommend heading over to our\u00a0<\/span><a title=\"Beginner\u2019s Guide to ISO 27001\" href=\"https:\/\/amtivo.com\/us\/resources\/guides-downloads\/what-is-iso-27001\/\"><span data-contrast=\"none\">Beginner\u2019s Guide to ISO 27001<\/span><\/a><span data-contrast=\"auto\">\u00a0instead.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<ul>\r\n\t<li><span data-contrast=\"auto\">Summary insights into ISO\/IEC 27001 requirements<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">ISMS management components<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Annex A information security controls reference<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Key documents auditors commonly reference<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Useful resources<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n\t<li><span data-contrast=\"auto\">Get started on your ISO\/IEC 27001 certification journey<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<h2>\u00a0<\/h2>\r\n<h2>Summary Insights Into ISO\/IEC 27001 Requirements<\/h2>\r\n<p><span data-contrast=\"auto\">ISO\/IEC 27001 is divided into<\/span><b><span data-contrast=\"auto\"> two <\/span><\/b><span data-contrast=\"auto\">components, or parts:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<h3>1. Mandatory \u201cManagement\u201d or \u201cISMS\u201d component (Clauses 4 to 10)<\/h3>\r\n<p><span data-contrast=\"auto\">This part contains\u00a0<\/span><i><span data-contrast=\"auto\">approximately\u00a0<\/span><\/i><span data-contrast=\"auto\">140-150 requirements for setting up, running, maintaining, and continually improving an\u00a0<\/span><a title=\"Information Security Management System\" href=\"https:\/\/amtivo.com\/us\/resources\/insights\/what-is-an-information-security-management-system-isms\/\"><span data-contrast=\"none\">Information Security Management System<\/span><\/a><span data-contrast=\"auto\">. These are the core requirements that every organization must follow to be in line with the standard.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<h3>2. Annex A information security controls (Clauses 5 to 8) \u00a0\u00a0<\/h3>\r\n<p><span data-contrast=\"auto\">This part contains ninety-three<\/span><span>\u00a0<\/span><i><span data-contrast=\"auto\">potential<\/span><\/i><span data-contrast=\"auto\">\u00a0controls \u2013 practical measures or actions that help reduce risks to information and systems. You do not need to use all of them. The ones you choose depend on what comes out of your risk assessment and planning process (Clause 6).\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">Although ISO\/IEC 27001 includes\u00a0<\/span><b><span data-contrast=\"auto\">Clauses 1 to 3<\/span><\/b><span data-contrast=\"auto\">, these clauses\u00a0<\/span><b><span data-contrast=\"auto\">do not<\/span><\/b><span data-contrast=\"auto\">\u00a0contain any conformance requirements. They explain the scope, give references, and define terms. They do not include any requirements for certification, meaning they can be safely ignored when focusing on the core requirements.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">The table below summarizes ISO\/IEC 27001\u2019s\u00a0<\/span><b><span data-contrast=\"auto\">Clauses 4 to 10<\/span><\/b><span data-contrast=\"auto\">\u00a0and the\u00a0<\/span><b><span data-contrast=\"auto\">Annex A information security controls reference Clauses 5 to 10<\/span><\/b><i>\u2014<\/i><span data-contrast=\"auto\">including identification of\u00a0<\/span><b><span data-contrast=\"auto\">mandatory<\/span><\/b><span data-contrast=\"auto\">\u00a0documentation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:240,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<div class=\"dcf-overflow-x-auto\" tabindex=\"0\">\r\n<table class=\"dcf-table dcf-table-bordered dcf-table-striped dcf-w-100%\" style=\"font-family: Montserrat;\">\r\n<thead>\r\n<tr>\r\n<th colspan=\"3\" scope=\"col\">\r\n<p><span style=\"font-size: 17px;\"><b>ISMS\/Management Component:<\/b> <\/span><\/p>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\"><b><span data-contrast=\"none\">Summary of ISO\/IEC 27001 Requirements<\/span><\/b> <\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\"><b>Mandatory<\/b><b>-Only Documentation<\/b>\u00a0<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 4 Context of the organization<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p>This clause in ISO\/IEC 27001 asks organizations to consider both external and internal factors that could affect how they manage information security. It also asks you to understand the needs and expectations of stakeholders, and to identify any key relationships or dependencies. All of this is considered when defining the scope of your ISMS.<\/p>\r\n<p>Your <strong>ISMS scope<\/strong> sets the boundaries for which data and information will be protected under the system, and which will not. This applies no matter where the information is stored or accessed, whether it is in your offices, in the cloud, or from a remote location.<\/p>\r\n<p>ISO\/IEC 27001 refers to the scope as the \u201cboundary and applicability\u201d of the ISMS. In simple terms, it is about being clear on what is included in your security efforts, and what sits outside of them.<\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">The ISMS Scope<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 5 Leadership<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p>ISO\/IEC 27001 is frequently referred to as a \u201ctop-down management driven\u201d management system. One of the standard\u2019s key clauses outlines what is expected from top management. It requires them to show <strong>clear leadership and commitment<\/strong>, set and share a high-level <a href=\"https:\/\/www.exabeam.com\/explainers\/information-security\/the-12-elements-of-an-information-security-policy\/\" target=\"_blank\" rel=\"noopener\">Information Security Policy<\/a>, and make sure that everyone involved in the ISMS knows their roles, responsibilities and authority. In short, it is about strong governance and clear communication from the top.<\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">An Information Security Policy<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 6 Planning<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p>As the clause title indicates, organizations are required to <strong>plan<\/strong> the establishment and implementation of their ISMS.<\/p>\r\n<p>This involves identifying and addressing risks and opportunities, assessing, and treating information security risks, setting clear information security objectives, and planning for change.<\/p>\r\n<p>These objectives should be communicated effectively and, where practical, monitored and measured, taking into account security requirements as well as the outcomes of risk assessments and treatments.<\/p>\r\n<p>Plans should be developed to achieve these objectives, detailing the \u201cwhat,\u201d \u201chow,\u201d \u201cwhen,\u201d and \u201cwho.\u201d<\/p>\r\n<p>Additionally, any changes to the ISMS must be managed in a planned and controlled manner.<span style=\"font-size: 17px;\"> <\/span><span style=\"font-size: 17px;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Information security risk assessment process<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Information security risk treatment process<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Information security objectives<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 7 Support<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p>Another well-named clause in ISO\/IEC 27001 sets out what is needed to properly <strong>support<\/strong> an ISMS.<\/p>\r\n<p>This includes making sure the organization provides enough time, people, funding, information, and infrastructure to run it effectively.<\/p>\r\n<p>It also covers the <strong>competence of personnel<\/strong>, with a requirement to take action if someone lacks the necessary skills.<\/p>\r\n<p>Everyone in the organization must have a basic level of <strong>information security awareness<\/strong>. On top of that, communication around the ISMS must be planned and purposeful, and the management of ISMS-related documents (known as \u201c<strong>documented information<\/strong>\u201d) needs to be handled in a clear, efficient, and effective way.<\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Evidence of competence (<i>for all relevant ISMS roles<\/i>)<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 8 Operation<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p>Building on previous clause requirements which establish and implement an ISMS, organizations now need to <strong>operate<\/strong> and <strong>maintain<\/strong> (including continual improvement) their ISMS.<\/p>\r\n<p>Clause 8 focuses on putting the ISMS into action. It outlines what is needed to run the system day to day and make sure it meets the standard\u2019s requirements and supports your organization\u2019s ISMS objectives.<\/p>\r\n<p>This includes planning, implementing, and controlling all relevant processes. To do this, you need to set clear criteria for how processes should work and make sure they are followed.<\/p>\r\n<p>The clause also highlights the need to manage changes effectively, oversee any outsourced processes, and keep up with ongoing risk assessment and treatment.<\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">The results of <i>operationalised<\/i> risk assessment and treatment<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Additionally, <i>optional<\/i> documentation can be generated to underpin organizational confidence that ISMS processes are carried out as planned<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 9 Performance evaluation<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">This clause focuses on using data and insight to support <b>continual improvement<\/b> of the ISMS. It sets out requirements for <b>monitoring, measuring, analysing and evaluating<\/b> how the system is performing. The organization decides what to monitor, how to do it, when it should happen and who is responsible.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">It also covers the need for <b>internal audits<\/b> and <b>regular management reviews<\/b> at planned intervals.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">In short, this clause asks organizations to review how well their ISMS is working, and whether it continues to be suitable, effective and fit for purpose.\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">The results of monitoring, measurement, analysis and evaluation<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">A fully documented internal audit program<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">The results of ISMS review by Top Management<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 10 Improvement<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Building on the results from performance evaluation in Clause 9, this final mandatory clause focuses on <b>continual improvement<\/b> of the ISMS.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">It requires organizations to regularly review how suitable, adequate and effective their ISMS is. It also covers how to handle <b>nonconformities<\/b> when something doesn\u2019t meet the standard by taking the right <b>corrective action<\/b>.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Nonconformities might be spotted during internal or external audits, reviews of security incidents, or day-to-day observations. Addressing these issues properly is a key part of keeping the ISMS effective over time.\u00a0<\/span><span style=\"font-size: 17px;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:60,&quot;335559739&quot;:60,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Nonconformities (<i>the nature of<\/i>), corrective actions and their results<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<p>&nbsp;<\/p>\r\n<div class=\"dcf-overflow-x-auto\" tabindex=\"0\">\r\n<table class=\"dcf-table dcf-table-bordered dcf-table-striped dcf-w-100%\" style=\"font-family: Montserrat;\">\r\n<thead>\r\n<tr>\r\n<th colspan=\"3\" scope=\"col\">\r\n<p><span style=\"font-size: 17px;\">Annex A Information Security Controls Reference <\/span><\/p>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th colspan=\"3\" scope=\"row\">\r\n<p>IMPORTANT NOTE: The controls provided in Annex A are NOT MANDATORY as the standard specifies that organizations can design their own controls as required or identify them from any source\u2014of course including from Annex A. Irrespective of the source of an organization\u2019s controls, they are only implemented when determined necessary to implement risk treatment options (in response to analyzed unacceptable risk to the confidentiality, integrity and availability of organizational information and information processing facilities).<\/p>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\"><b>Summary of Requirements<\/b>\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\"><b><i>Example<\/i><\/b><b>, <\/b><b><i>typical or suggested\/inferred <\/i><\/b><b>documentation<\/b>\u00a0<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 5 Organizational controls<\/b> (37 Controls)<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">This group includes <b>37 controls<\/b> that are <b>organizational in nature<\/b>. They focus on managing risks linked to governance, management, and day-to-day operations rather than technical systems, people, or physical security.<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Like all Annex A controls, these can be <b>preventive<\/b>, <b>detective<\/b> and\/or <b>corrective<\/b> in how they work.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Examples include controls related to information security governance (<i>policies, procedures, roles and responsibilities, segregation of duties, contacts, etc.<\/i>), threat intelligence, asset management, Identity and Access Management (<i>IAM<\/i>), supplier relations, information security incident management, legal, statutory, regulatory and contractual requirements (<i>including IP, record and PII protection, independent review and compliance<\/i>).\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Information security and topic-specific policies<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Inventory of assets<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Rules for acceptable use of assets (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Information classification and labelling procedures<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Rules for physical and logical access<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Supplier agreements (<i>to include organizational information security requirements<\/i>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Information security incident management procedures (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Information security continuity (<i>plans, testing, etc.<\/i>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Legal, statutory, regulatory and contractual requirements and approach to compliance (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Documented information process and information process facilities operating procedures (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 6 People controls (8 Controls)<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">This section includes <strong>8 controls<\/strong> that are HR-related. They focus on <b>managing risks connected to people<\/b> in the organization and how they interact with information and the systems used to process it.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Like all Annex A controls, these can be <b>preventive, detective <\/b>and\/or <b>corrective <\/b>in how they work.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Examples include controls related to pre-employment (<i>screening, terms and conditions, confidentiality\/NDAs<\/i>), during employment (<i>awareness, disciplinary process, remote working, incident reporting<\/i>) and personnel termination (<i>responsibilities after termination or change<\/i>).\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Personnel terms and conditions of employment (<i>including information security responsibilities<\/i>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Formal disciplinary process<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Confidentiality or non-disclosure agreements (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Remote working requirements<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 7 Physical controls (14 Controls)<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Contains a selection of <strong>14 controls<\/strong> designed to primarily respond to or modify risks associated with the <b>physical site and environment<\/b>.\u00a0\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Like all Annex A controls, these can be <b>preventive, detective <\/b>and\/or <b>corrective <\/b>in how they work.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Examples include controls for physical perimeter, entry and the internal security of offices, rooms and facilities (<i>all including monitoring<\/i>), procedures for working in secure areas, protection of all physical assets (<i>onsite and offsite<\/i>), equipment maintenance, secure disposal and clear desk and screen.\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Building and services schematics<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Procedures for working in secure areas<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Rules for clear desks and screens<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Rules for the management of the lifecycle of storage media (<i>can be related to organizational asset management controls, including classification and labelling<\/i>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Equipment maintenance agreements and records (<i>can be related to organizational supplier relation controls<\/i>)<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><span style=\"font-size: 17px;\"><b>Clause 8 Technological controls (34 Controls)<\/b>\u00a0<\/span><\/p>\r\n<\/th>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Contains a selection of <strong>34 controls<\/strong> designed to primarily respond to or modify risks associated with the use of <b>technology<\/b>.\u00a0\u00a0\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">As with all Annex A controls, they have <b>preventive, detective<\/b> and\/or <b>corrective <\/b>attributes.\u00a0<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Examples include controls for IT operations (<i>configuration management, capacity management, end point device management, information and utility access restrictions, authentication, malware protection, technical vulnerability management, backup, data masking and leakage prevention, redundancy, logging and monitoring<\/i>), network operations (<i>network security, services, segregation, filtering<\/i>), cryptography, secure software development (<i>lifecycle, policy, principles, coding, testing, outsourcing<\/i>) and change management.\u00a0<\/span><\/p>\r\n<\/td>\r\n<td>\r\n<p><span style=\"font-size: 17px;\">Technical vulnerability management process and procedures<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Configuration management (<b><i>mandatory<\/i><\/b>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Backup policy<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Logging and monitoring procedures and activities<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Network diagrams<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Rules for secure development (<i>lifecycle and secure coding<\/i>)<\/span><\/p>\r\n<p><span style=\"font-size: 17px;\">Change management procedure or process<\/span><\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<h2>\u00a0<\/h2>\r\n<h2>What To Expect From the ISO\/IEC 27001 Certification Process<\/h2>\r\n<p><span data-contrast=\"auto\">Undertaking ISO\/IEC 27001 certification is a strategic investment, helping an organization to improve its information security management.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">The journey begins with a <\/span><b><span data-contrast=\"auto\">Stage 1 Audit\u00a0<\/span><\/b><span data-contrast=\"auto\">by a qualified auditor, who will review the readiness of the ISMS and identify, if necessary, any potential nonconformities. An organization will then implement any necessary changes before continuing the certification process.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p><span data-contrast=\"auto\">Once the identified issues are addressed, the organization will progress to the <\/span><b><span data-contrast=\"auto\">Stage 2 Audit.<\/span><\/b><span data-contrast=\"auto\"> On successful completion, they will be awarded ISO\/IEC 27001 certification<i>\u2014<\/i>demonstrating that their organization takes information security seriously and manages it to a recognized international standard.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<p>Amtivo in the U.S. is an ANAB-accredited certification body for ISO certifications, with proven expertise to provide services to support your business \u201cjourney\u201d towards successful ISO certifications. (The<span>\u00a0<\/span><a title=\"ANSI National Accreditation Board (ANAB)\" href=\"https:\/\/anab.ansi.org\/\" target=\"_blank\" rel=\"noopener\">ANSI National Accreditation Board (ANAB)<\/a><span>\u00a0<\/span>\u202fis the national body with responsibility for the accreditation of certification bodies in the United States).\u00a0<\/p>\r\n<p>&nbsp;<\/p>\r\n<h2>Key Documents Auditors Commonly Reference<\/h2>\r\n<p>Our Auditors will reference the following documents to audit your ISMS, as set out by the <a href=\"https:\/\/iaf.nu\/en\/home\/\" target=\"_blank\" rel=\"noopener\">International Accreditation Forum<\/a> (IAF), <a href=\"https:\/\/www.iso.org\/home.html\" target=\"_blank\" rel=\"noopener\">International Organization for Standardization<\/a> (ISO), and the <a href=\"https:\/\/iec.ch\/homepage\" target=\"_blank\" rel=\"noopener\">International Electrotechnical Commission<\/a> (IEC):\u00a0<\/p>\r\n<div class=\"dcf-overflow-x-auto\" tabindex=\"0\">\r\n<table class=\"dcf-table dcf-table-responsive dcf-table-bordered dcf-table-striped dcf-w-100%\" style=\"font-family: Montserrat; font-weight: 400; width: 100%; height: 832px;\">\r\n<thead>\r\n<tr>\r\n<th scope=\"col\">\r\n<p><b><span data-contrast=\"auto\">Standard<\/span><\/b><\/p>\r\n<\/th>\r\n<th scope=\"col\">\r\n<p><b><span data-contrast=\"auto\">Title<\/span><\/b><\/p>\r\n<\/th>\r\n<th scope=\"col\">\r\n<p><b><span data-contrast=\"auto\">Purpose (in relation to ISO\/IEC 27001:2022)<\/span><\/b><\/p>\r\n<\/th>\r\n<\/tr>\r\n<\/thead>\r\n<tbody>\r\n<tr>\r\n<th colspan=\"3\" scope=\"col\">\r\n<p><span style=\"font-size: 17px;\">Certifiable standard:<\/span><\/p>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 27001:2022<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Information security, cybersecurity, and privacy protection\u2014Information security management systems\u2014Requirements<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>The <b><span data-contrast=\"auto\">core standard<\/span><\/b> that specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It is the <b><span data-contrast=\"auto\">certifiable standard<\/span><\/b> organizations are audited against.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th colspan=\"3\" scope=\"col\">\r\n<p><span style=\"font-size: 17px;\">Supporting standards that auditors often refer to:<\/span><\/p>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 27002:2022<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Information security, cybersecurity, and privacy protection\u2014Information security controls<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>Provides <b><span data-contrast=\"auto\">detailed guidance on the controls<\/span><\/b> listed in Annex A of ISO\/IEC 27001. Used to help organizations implement and interpret the required security controls.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 27005:2022<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Information security, cybersecurity, and privacy protection\u2014Guidance on information security risk management<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>Offers <b><span data-contrast=\"auto\">comprehensive guidance on risk management<\/span><\/b> tailored for ISMS implementation. It supports the risk assessment and treatment processes required by ISO 27001 (Clause 6.1).<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 27007:2020<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Guidelines for information security management systems auditing<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>Provides <b><span data-contrast=\"auto\">guidance on auditing ISMSs<\/span><\/b> and on the competence of ISMS auditors. It complements ISO 19011 and is primarily used by auditors performing ISO 27001 audits.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th colspan=\"3\" scope=\"col\">\r\n<p><span style=\"font-size: 17px;\">Audit governance standards that guide how certification bodies operate:<\/span><\/p>\r\n<\/th>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 27006-1:2024<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Requirements for bodies providing audit and certification of information security management systems<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>Specifies <b><span data-contrast=\"auto\">requirements for certification bodies<\/span><\/b> performing ISO\/IEC 27001 audits to ensure consistency, competence, and impartiality. It operationalizes ISO\/IEC 17021-1 for ISMS certification.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO\/IEC 17021-1:2015<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Conformity assessment\u2014Requirements for bodies providing audit and certification of management systems\u2014Part 1: Requirements<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>The <b><span data-contrast=\"auto\">generic framework<\/span><\/b> for all management system certification schemes. It defines how certification bodies must manage impartiality, competence, audit processes, and certification decisions\u2014applicable to ISO 27001 through ISO\/IEC 27006-1.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr>\r\n<th scope=\"row\">\r\n<p><b><span data-contrast=\"auto\">ISO 19011:2018<\/span><\/b><\/p>\r\n<\/th>\r\n<td data-label=\"\r\nTitle\r\n\">\r\n<p><i><span data-contrast=\"auto\">Guidelines for auditing management systems<\/span><\/i><\/p>\r\n<\/td>\r\n<td data-label=\"\r\nPurpose (in relation to ISO\/IEC 27001:2022)\r\n\">\r\n<p>Provides <b><span data-contrast=\"auto\">generic principles and guidance for auditing<\/span><\/b> all types of management systems. It serves as the foundation for audit processes, upon which ISO\/IEC 27007 builds for ISMS-specific auditing.<\/p>\r\n<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\r\n<h2>Contact Us to Get Started\u00a0<\/h2>\r\n<p><span data-contrast=\"auto\">Start your journey to ISO 27001 certification today<i>\u2014<\/i><\/span><a href=\"https:\/\/amtivo.com\/us\/certification-quote\/\">get a quote<\/a> or <a href=\"https:\/\/amtivo.com\/us\/contact-us\/\">contact our team<\/a> <span data-contrast=\"auto\">to discuss your needs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:120,&quot;335559739&quot;:120,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"A guide to the requirements for ISO 27001 certification, outlining key steps and necessary criteria for compliance.","protected":false},"author":24,"featured_media":13571,"template":"","resource":[18,23],"resource-tag":[39],"class_list":["post-9440","resources-filter","type-resources-filter","status-publish","has-post-thumbnail","hentry","resource-guides-downloads","resource-insights","resource-tag-iso-27001"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed<\/title>\n<meta name=\"description\" content=\"Explore ISO\/IEC 27001:2022 clauses and Annex A controls. Understand key requirements to implement, manage, and certify your Information Security System.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed\" \/>\n<meta property=\"og:description\" content=\"Explore ISO\/IEC 27001:2022 clauses and Annex A controls. Understand key requirements to implement, manage, and certify your Information Security System.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo US\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T12:21:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2026\/02\/Guide-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"367\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed","description":"Explore ISO\/IEC 27001:2022 clauses and Annex A controls. Understand key requirements to implement, manage, and certify your Information Security System.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/","og_locale":"en_US","og_type":"article","og_title":"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed","og_description":"Explore ISO\/IEC 27001:2022 clauses and Annex A controls. Understand key requirements to implement, manage, and certify your Information Security System.","og_url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/","og_site_name":"Amtivo US","article_modified_time":"2026-02-11T12:21:12+00:00","og_image":[{"width":600,"height":367,"url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2026\/02\/Guide-Thumbnail.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/","url":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/","name":"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed","isPartOf":{"@id":"https:\/\/amtivo.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2026\/02\/Guide-Thumbnail.png","datePublished":"2025-10-30T09:27:46+00:00","dateModified":"2026-02-11T12:21:12+00:00","description":"Explore ISO\/IEC 27001:2022 clauses and Annex A controls. Understand key requirements to implement, manage, and certify your Information Security System.","breadcrumb":{"@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/#primaryimage","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2026\/02\/Guide-Thumbnail.png","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2026\/02\/Guide-Thumbnail.png","width":600,"height":367,"caption":"Guide - Amtivo"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/us\/resources\/insights\/iso-27001-requirements-a-comprehensive-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/us\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/amtivo.com\/us\/all-resources\/"},{"@type":"ListItem","position":3,"name":"Insights","item":"https:\/\/amtivo.com\/us\/resources\/insights\/"},{"@type":"ListItem","position":4,"name":"ISO 27001 Clauses 4-10\u2014Technical Requirements Detailed"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/us\/#website","url":"https:\/\/amtivo.com\/us\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/us\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","contentUrl":"https:\/\/amtivo.com\/us\/wp-content\/uploads\/sites\/18\/2025\/09\/cropped-Amtivo-US-Registered-logo-XXL_Cobalt-Logo-Stacked-copy-2.png","width":2557,"height":2121,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter"}],"about":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/types\/resources-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":20,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9440\/revisions"}],"predecessor-version":[{"id":12964,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resources-filter\/9440\/revisions\/12964"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media\/13571"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/media?parent=9440"}],"wp:term":[{"taxonomy":"resource","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource?post=9440"},{"taxonomy":"resource-tag","embeddable":true,"href":"https:\/\/amtivo.com\/us\/wp-json\/wp\/v2\/resource-tag?post=9440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}