{"id":6701,"date":"2026-03-27T09:22:15","date_gmt":"2026-03-27T08:22:15","guid":{"rendered":"https:\/\/www.bitformer.net\/?page_id=6701"},"modified":"2026-05-06T12:36:24","modified_gmt":"2026-05-06T10:36:24","slug":"isms","status":"publish","type":"page","link":"https:\/\/www.bitformer.net\/en\/it-security\/isms\/","title":{"rendered":"Information Security Management System"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"6701\" class=\"elementor elementor-6701\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7264766 e-flex e-con-boxed e-con e-parent\" data-id=\"7264766\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;video&quot;,&quot;background_video_link&quot;:&quot;https:\\\/\\\/www.bitformer.net\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/blue-bg-flowing.mp4&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-background-video-container elementor-hidden-mobile\">\n\t\t\t\t\t\t\t<video class=\"elementor-background-video-hosted\" role=\"presentation\" autoplay muted playsinline loop><\/video>\n\t\t\t\t\t<\/div><div class=\"elementor-element elementor-element-4b70b60 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"4b70b60\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d0bada1 elementor-align-left elementor-widget elementor-widget-raven-breadcrumbs\" data-id=\"d0bada1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"raven-breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"raven-breadcrumbs raven-breadcrumbs-default\"><div class=\"breadcrumb\">\t\t\t\t\t\t\t\t<div class=\"breadcrumb-item active\" aria-current=\"page\"><span>Home<\/span><\/div>\n\n\t\t\t\t<\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6941c1b elementor-widget elementor-widget-heading\" data-id=\"6941c1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Management System<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-986f775 elementor-widget elementor-widget-heading\" data-id=\"986f775\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Holistic approach to protecting sensitive company data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fc6152c e-con-full e-flex e-con e-child\" data-id=\"fc6152c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81b7218 main-layout-vertical raven-nav-alignment-start pointer-none submenu-anim-fade raven-dropdown-stretch raven-nav-menu-align-flex-start raven-nav-menu-align-center elementor-widget elementor-widget-raven-advanced-nav-menu\" data-id=\"81b7218\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;submenu_indicator&quot;:{&quot;value&quot;:&quot;fas fa-angle-down&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;full_width&quot;:&quot;stretch&quot;,&quot;mobile_layout&quot;:&quot;dropdown&quot;,&quot;close_menu_on_scroll&quot;:&quot;yes&quot;}\" data-widget_type=\"raven-advanced-nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<!-- Main Menu -->\n\t\t<nav data-layout=\"vertical\" class=\"raven-adnav-menu-main raven-adnav-menu-vertical\">\n\t\t\t\t\t<ul id=\"menu-81b7218\" class=\"raven-adnav-menu\">\n\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/externer-isb\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tExternal ISO\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/cybersicherheit\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tCybersecurity\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/quick-audit-it\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tQuick Audit IT\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/nis2\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tNIS2\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t<li class=\"menu-item\" data-width_type=\"default\" data-submenu_pos=\"center\">\n\t\t\t\t\t\t\t\t<a href=\"\/en\/iso27001\/\" class=\"raven-link-item raven-menu-item jupiterx-blur-background-surface\">\n\t\t\t\t\t\t<span class=\"link-text\">\n\t\t\t\t<span class=\"link-label\">\n\t\t\t\t\tISO 27001\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/span>\n\t\t<\/a>\n\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f63448e e-con-full e-flex e-con e-parent\" data-id=\"f63448e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b59ff9a e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"b59ff9a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48aab4a elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"48aab4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Management System<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c53cb01 elementor-widget elementor-widget-text-editor\" data-id=\"1c53cb01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div data-subtree=\"aimfl,mfl\" data-sfc-root=\"c\" data-sfc-cb=\"\" data-processed=\"true\"><p class=\"p1\">An Information Security Management System (ISMS) is a structured and holistic approach to protecting sensitive company information. It encompasses clearly defined policies, established processes, and appropriate technical and organisational measures that are systematically coordinated.<\/p><p class=\"p1\">The goal of an ISMS is to <strong>Confidentiality, Integrity and Availability of Data<\/strong> and to ensure the long-term security of IT systems, to recognise risks at an early stage, and to continuously improve information security and adapt it to new threat landscapes.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dc2ff2b e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"dc2ff2b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17ab4f3 elementor-widget elementor-widget-image\" data-id=\"17ab4f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-1024x683.png\" class=\"attachment-large size-large wp-image-5963\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-1024x683.png 1024w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-300x200.png 300w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-768x512.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-1536x1024.png 1536w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-2048x1365.png 2048w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/laptop-18x12.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3a156a5 e-flex e-con-boxed e-con e-parent\" data-id=\"3a156a5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-232e81a elementor-widget elementor-widget-text-editor\" data-id=\"232e81a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Identification, analysis, and treatment of security risks to proactively ward off threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0594599 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"0594599\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ddadaa8 elementor-widget elementor-widget-spacer\" data-id=\"ddadaa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfc522f elementor-widget elementor-widget-heading\" data-id=\"dfc522f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Goals and benefits of an ISMS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dc65e1 elementor-widget elementor-widget-text-editor\" data-id=\"7dc65e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div data-subtree=\"aimfl,mfl\" data-sfc-root=\"c\" data-sfc-cb=\"\" data-processed=\"true\"><div data-subtree=\"aimfl\" data-sfc-root=\"c\" data-sfc-cb=\"\"><p class=\"p1\">An Information Security Management System (ISMS) describes a structured and holistic approach with which companies can plan, implement, and continuously improve their information security. It encompasses clear policies, defined processes, and technical and organisational measures that ensure information is treated confidentially, remains unaltered, and is available at all times.<\/p><p class=\"p1\">An ISMS is often based on the international standard <strong><a href=\"\/en\/it-security\/iso27001\/\">ISO\/IEC 27001<\/a><\/strong>, which provides a recognised framework for building, monitoring and improving effective security management.<\/p><p class=\"p1\">Also in the context <strong><a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Regulierte-Wirtschaft\/Kritische-Infrastrukturen\/Allgemeine-Infos-zu-KRITIS\/allgemeine-infos-zu-kritis_node.html\" target=\"_blank\" rel=\"noopener\">Critical Infrastructure<\/a> <\/strong>An ISMS takes on particular significance here, as the failure or impairment of IT systems can have considerable consequences for public safety, the supply of the population and the functioning of the community.  Consequently, operators of critical infrastructures must meet particularly high requirements for information security and observe specific legal provisions.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-baa3b5b e-flex e-con-boxed e-con e-parent\" data-id=\"baa3b5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fbefa4 elementor-widget elementor-widget-button\" data-id=\"5fbefa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Arrange a free initial consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ab2d9cb e-flex e-con-boxed e-con e-parent\" data-id=\"ab2d9cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5264d30 elementor-widget elementor-widget-spacer\" data-id=\"5264d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-864814a elementor-widget elementor-widget-heading\" data-id=\"864814a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Eine ISMS-Implementierung umfasst typischerweise die folgenden Schritte und Komponenten:\n\n1.  **Planung und Vorbereitung:**\n    *   **Festlegen des Geltungsbereichs:** Definieren, welche Teile der Organisation, welche Systeme und welche Daten durch das ISMS abgedeckt werden sollen.\n    *   **Festlegen der ISMS-Richtlinie:** Erstellen eines \u00fcbergeordneten Dokuments, das das Engagement der Organisation f\u00fcr Informationssicherheit beschreibt.\n    *   **Ressourcenplanung:** Sicherstellen ausreichender personeller, finanzieller und technischer Ressourcen.\n    *   **Festlegen von Rollen und Verantwortlichkeiten:** Zuweisen von Verantwortlichkeiten f\u00fcr die Informationssicherheit innerhalb der Organisation.\n\n2.  **Risikomanagement:**\n    *   **Risikoidentifizierung:** Ermitteln von Informationen, Bedrohungen und Schwachstellen, die die Informationssicherheit beeintr\u00e4chtigen k\u00f6nnten.\n    *   **Risikoanalyse:** Bewerten der Wahrscheinlichkeit und der Auswirkungen identifizierter Risiken.\n    *   **Risikobewertung:** Priorisieren der Risiken basierend auf ihrer Analyse.\n    *   **Risikobehandlung:** Ausw\u00e4hlen und Implementieren von Ma\u00dfnahmen, um die identifizierten Risiken zu mindern, zu \u00fcbertragen, zu vermeiden oder zu akzeptieren.\n\n3.  **Implementierung von Sicherheitskontrollen:**\n    *   **Ausw\u00e4hlen von Kontrollen:** Basierend auf der Risikobewertung eine Auswahl geeigneter Sicherheitskontrollen treffen (oft basierend auf Anh\u00e4ngen relevanter Standards wie ISO 27001).\n    *   **Umsetzung von Kontrollen:** Implementieren der ausgew\u00e4hlten technischen, organisatorischen und physischen Sicherheitsma\u00dfnahmen. Dies kann umfassen:\n        *   Zugriffskontrollen\n        *   Physische Sicherheit\n        *   Sichere Entwicklungspraktiken\n        *   Schutz vor Malware\n        *   Datensicherungs- und Wiederherstellungspl\u00e4ne\n        *   Netzwerksicherheit\n        *   Verschl\u00fcsselung\n        *   Sicherheitsbewusstseinsschulung f\u00fcr Mitarbeiter\n        *   Incident-Management-Prozesse\n\n4.  **Dokumentation:**\n    *   **Erstellen des ISMS-Handbuchs:** Ein zentrales Dokument, das die Struktur und die Richtlinien des ISMS beschreibt.\n    *   **Erstellen von Richtlinien und Verfahren:** Detaillierte Dokumentation der Sicherheitsrichtlinien und der zugeh\u00f6rigen Verfahren zur Umsetzung der Kontrollen.\n    *   **Erstellen von Aufzeichnungen:** F\u00fchren von Aufzeichnungen \u00fcber Schulungen, Audits, Vorf\u00e4lle usw.\n\n5.  **Schulung und Bewusstsein:**\n    *   **Sensibilisierung der Mitarbeiter:** Sicherstellen, dass alle Mitarbeiter die Bedeutung der Informationssicherheit verstehen und ihre Rolle bei der Aufrechterhaltung dieser verstehen.\n    *   **Spezifische Schulungen:** Bereitstellen von Schulungen f\u00fcr Mitarbeiter mit spezifischen Sicherheitsverantwortlichkeiten.\n\n6.  **Betrieb und \u00dcberwachung:**\n    *   **Implementierung der etablierten Richtlinien und Verfahren.**\n    *   **Regelm\u00e4\u00dfige \u00dcberwachung und Messung der Wirksamkeit der Sicherheitskontrollen.**\n    *   **Betrieb des Incident-Management-Prozesses.**\n\n7.  **\u00dcberpr\u00fcfung und Verbesserung:**\n    *   **Interne Audits:** Durchf\u00fchrung regelm\u00e4\u00dfiger interner Audits zur \u00dcberpr\u00fcfung der Konformit\u00e4t und Wirksamkeit des ISMS.\n    *   **Management-Reviews:** Regelm\u00e4\u00dfige \u00dcberpr\u00fcfung des ISMS durch das Management, um dessen fortgesetzte Eignung, Angemessenheit und Wirksamkeit sicherzustellen.\n    *   **Korrektur- und Vorbeugema\u00dfnahmen:** Identifizieren und Beheben von Nichtkonformit\u00e4ten und Ergreifen von Ma\u00dfnahmen zur kontinuierlichen Verbesserung des ISMS.\n\nDie Implementierung eines ISMS ist ein fortlaufender Prozess und kein einmaliges Projekt. Ziel ist es, ein System zu etablieren, das sich st\u00e4ndig weiterentwickelt und an neue Bedrohungen und Gesch\u00e4ftsbed\u00fcrfnisse anpasst.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6bb44c e-flex e-con-boxed e-con e-parent\" data-id=\"c6bb44c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-35b8cb2c e-con-full e-flex e-con e-child\" data-id=\"35b8cb2c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b2ce163 elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"b2ce163\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">1. Management Engagement and Resources<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><div class=\"elementor-element elementor-element-231a0e0a elementor-widget elementor-widget-text-editor\" data-id=\"231a0e0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p><b>Management commitment<\/b>Management support and commitment to information security.<\/p><\/div><\/div><div class=\"elementor-element elementor-element-76c2ebd6 elementor-widget elementor-widget-text-editor\" data-id=\"76c2ebd6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p><b>Resource Allocation<\/b>Provision of the necessary means and resources for the implementation and maintenance of the ISMS.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">2. Governance and Organisation<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Setting roles:<ul><li><p class=\"p1\">Information Security Officer (ISB \/ CISO)<\/p><\/li><li><p class=\"p1\">Owner of the asset<\/p><\/li><li><p class=\"p1\">Risk Owner<\/p><\/li><\/ul><\/li><li><p class=\"p1\"><span class=\"s1\">Structure of a <\/span><b>Security Governance Structure<\/b><b><\/b><\/p><\/li><li><p class=\"p1\">Ensure management commitment<\/p><\/li><\/ul><p class=\"p3\"><strong>Without top management support, any ISMS will fail!<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">3. Guidelines &amp; Documentation<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Creation of:<\/li><li style=\"list-style-type: none\"><ul><li><p class=\"p1\">Information Security Policy<\/p><\/li><li><p class=\"p1\">Security policies (e.g. password, access, mobile devices)<\/p><\/li><li><p class=\"p1\">Work Instructions \/ Standards<\/p><\/li><\/ul><\/li><li><p class=\"p1\">Document control (versioning, approvals)<\/p><\/li><\/ul><p class=\"p3\"><strong>If it's not documented, it doesn't exist for the audit!<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">4. Asset Management<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Inventory of:<ul><li class=\"p1\">Hardware<\/li><li><p class=\"p1\">Software<\/p><\/li><li><p class=\"p1\">Data \/ Information<\/p><\/li><\/ul><\/li><li><p class=\"p1\">Classification (e.g. public, internal, confidential)<\/p><\/li><\/ul><p class=\"p3\"><strong>Basis for all further security measures<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">5. Risk Management (The core!)<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Identification of risks:<ul><li class=\"p1\">Threats + Vulnerabilities<\/li><\/ul><\/li><li class=\"p1\">Assessment (e.g. likelihood of occurrence \u00d7 damage)<ul><li><p class=\"p1\">avoid<\/p><\/li><li><p class=\"p1\">reduce<\/p><\/li><li><p class=\"p1\">transfer<\/p><\/li><li><p class=\"p1\">accept<\/p><\/li><\/ul><\/li><\/ul><p class=\"p3\"><span class=\"s2\">Result: <\/span><b>Risikobehandlungsplan<\/b><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">6. Implement Controls<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p class=\"p1\">Based on, for example, ISO 27001 or IT-Grundschutz:<\/p><p class=\"p1\">Typical areas:<\/p><ul><li><p class=\"p1\">Access Control (IAM)<\/p><\/li><li><p class=\"p1\">Cryptography<\/p><\/li><li><p class=\"p1\">Network security<\/p><\/li><li><p class=\"p1\">Endpoint Security<\/p><\/li><li><p class=\"p1\">Backup y Recuperaci\u00f3n<\/p><\/li><li><p class=\"p1\">Supplier management<\/p><\/li><li><p class=\"p1\">Physical security<\/p><\/li><\/ul><p class=\"p1\">Technical + organisational!<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">7. Awareness &amp; Training<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon e-font-icon-svg e-fas-chevron-right\" viewbox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M285.476 272.971L91.132 467.314c-9.373 9.373-24.569 9.373-33.941 0l-22.667-22.667c-9.357-9.357-9.375-24.522-.04-33.901L188.505 256 34.484 101.255c-9.335-9.379-9.317-24.544.04-33.901l22.667-22.667c9.373-9.373 24.569-9.373 33.941 0L285.475 239.03c9.373 9.372 9.373 24.568.001 33.941z\"><\/path><\/svg><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Staff training<\/li><li>Phishing simulations<\/li><li>Security Awareness Programme<\/li><\/ul><p class=\"p3\"><strong>Man is often the biggest risk<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f0cd75a elementor-widget elementor-widget-raven-advanced-accordion\" data-id=\"3f0cd75a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;scroll_to_content&quot;:&quot;false&quot;}\" data-widget_type=\"raven-advanced-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div id=\"jupiterx-advanced-accordion-wrapper\" class=\"jupiterx-advanced-accordion-wrapper\">\n\t\t\t\t<div class=\"jupiterx-advanced-accordion-inner-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-first  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">8. Incident Management<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Processes for security incidents<ul><li class=\"p1\">Recognition<\/li><li class=\"p1\">Message<\/li><li class=\"p1\">Treatment<\/li><\/ul><\/li><li><p class=\"p1\">Definition of escalation routes<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">9. Business Continuity &amp; Emergency Management<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Business Impact Analysis (BIA)<\/li><li>Business Continuity Plans (BCP)<\/li><li>Disaster Recovery (DR)<\/li><\/ul><p class=\"p3\"><strong>Objective: Ensure operations even in the event of a crisis<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">10. Monitoring &amp; Logging<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p class=\"p1\">Monitoring of:<\/p><ul><li style=\"list-style-type: none\"><ul><li class=\"p1\">Systems<\/li><li>Networking<\/li><li>Access<\/li><\/ul><\/li><li><p class=\"p1\">SIEM \/ Log Management<\/p><\/li><\/ul><p class=\"p1\"><strong>Basis for attack detection<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">11. Audits and Reviews<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">Internal Audits<\/li><li>Management Reviews<\/li><li>possibly external certification<a href=\"\/en\/it-security\/iso27001\/\">ISO 27001<\/a>)<\/li><\/ul><p class=\"p3\"><strong>Checks the effectiveness of the ISMS<\/strong><\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">12. Continuous Improvement<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><p class=\"p1\">Das ISMS lebt vom <span class=\"s1\"><b>PDCA model<\/b><\/span>:<\/p><ul><li><p class=\"p1\">Plan \u2192 Do \u2192 Check \u2192 Act<\/p><\/li><\/ul><p class=\"p1\"><strong>The security level is constantly being improved.<\/strong><\/p><p><b>Improvements<\/b>Identification of vulnerabilities and implementation of improvement measures for the continuous development of the ISMS in accordance with ISO 27001.<\/p><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">13. Legal requirements<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li>GDPR<\/li><li class=\"p1\">Contract requirements<\/li><li class=\"p1\">Industry-specific requirements<\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"jupiterx-single-advanced-accordion-wrapper  jx-ac-last  jx-ac-inactive\" id=\"\" >\n\t\t\t\t<div class=\"jx-single-accordion-header\">\n\t\t\t\t\t<div class=\"jx-single-accordion-header-left\">\n\t\t\t\t\t\t<div class=\"jx-single-accordion-header-icon-toggle-wrapper jx-single-accordion-header-icon-toggle-wrapper-hide\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"jx-ac-title\">14. Documentation<\/span>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"jx-single-accordion-header-right\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"jx-ac-icon-body-closed jx-ac-toggle-icon fas fa-chevron-right\"><\/i><i aria-hidden=\"true\" class=\"jx-ac-icon-body-opened jx-ac-toggle-icon fas fa-chevron-down\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"jx-single-accordion-body  jx-ac-body-none\">\n\t\t\t\t\t<div class=\"jx-ac-content\">\n\t\t\t\t\t\t<div class=\"jx-ac-content-inner-wrapper\">\n\t\t\t\t\t\t\t<div class=\"jupiterx-ac-content-is-editor\"><ul><li class=\"p1\">List of all relevant controls<\/li><li><p class=\"p1\">Justification<\/p><ul><li><p class=\"p1\">Why implemented \/ not implemented<\/p><\/li><\/ul><p>Central Audit Document<\/p><\/li><\/ul><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e9900c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1e9900c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: An ISMS implementation consists of:\nOrganisation + Processes + Technology + Culture!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1c128a e-flex e-con-boxed e-con e-parent\" data-id=\"c1c128a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9892c elementor-widget elementor-widget-spacer\" data-id=\"5c9892c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16ea6722 e-flex e-con-boxed e-con e-parent\" data-id=\"16ea6722\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-64f38971 e-con-full e-flex e-con e-child\" data-id=\"64f38971\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ff5dbd5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7ff5dbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">YOUR CONTACT PERSON<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-15e99bb9 elementor-widget elementor-widget-text-editor\" data-id=\"15e99bb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Connect with our expert.<br \/>Non-binding, uncomplicated, but always with<br \/>added value for you.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50b56fe3 e-con-full e-flex e-con e-child\" data-id=\"50b56fe3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-402faed5 elementor-widget elementor-widget-heading\" data-id=\"402faed5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RALPH D\u00d6RFLER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443e567b elementor-widget elementor-widget-text-editor\" data-id=\"443e567b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Head of IT Security<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f503164 e-transform elementor-widget elementor-widget-image\" data-id=\"6f503164\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_transform_scale_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:0.7,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_scale_effect_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"857\" height=\"1024\" src=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-857x1024.png\" class=\"attachment-large size-large wp-image-7423\" alt=\"\" srcset=\"https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-857x1024.png 857w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-251x300.png 251w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-768x918.png 768w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2-10x12.png 10w, https:\/\/www.bitformer.net\/wp-content\/uploads\/2026\/03\/ralphdoerfler1-2.png 1080w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-318c518f e-con-full e-flex e-con e-child\" data-id=\"318c518f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-88d3233 elementor-widget elementor-widget-shortcode\" data-id=\"88d3233\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\" data-forminator-render=\"0\" data-form=\"forminator-module-2470\" data-uid=\"69fc4bb8888f8\"><br\/><\/div><form\n\t\t\t\tid=\"forminator-module-2470\"\n\t\t\t\tclass=\"forminator-ui forminator-custom-form forminator-custom-form-2470 forminator-design--material  forminator_ajax\"\n\t\t\t\tmethod=\"post\"\n\t\t\t\tdata-forminator-render=\"0\"\n\t\t\t\tdata-form-id=\"2470\"\n\t\t\t\t data-color-option=\"theme\" data-design=\"material\" data-grid=\"open\" style=\"display: none;\"\n\t\t\t\tdata-uid=\"69fc4bb8888f8\" action=\"\"\n\t\t\t><div role=\"alert\" aria-live=\"polite\" class=\"forminator-response-message forminator-error\" aria-hidden=\"true\"><\/div><div class=\"forminator-row\"><div id=\"name-3\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-3_69fc4bb8888f8\" id=\"forminator-field-name-3_69fc4bb8888f8-label\" class=\"forminator-label\">Your company <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-3\" value=\"\" placeholder=\"\" id=\"forminator-field-name-3_69fc4bb8888f8\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><div id=\"name-1\" class=\"forminator-field-name forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-name-1_69fc4bb8888f8\" id=\"forminator-field-name-1_69fc4bb8888f8-label\" class=\"forminator-label\">Your name <span class=\"forminator-required\">*<\/span><\/label><input type=\"text\" name=\"name-1\" value=\"\" placeholder=\"\" id=\"forminator-field-name-1_69fc4bb8888f8\" class=\"forminator-input forminator-name--field\" aria-required=\"true\" autocomplete=\"name\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"email-1\" class=\"forminator-field-email forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-email-1_69fc4bb8888f8\" id=\"forminator-field-email-1_69fc4bb8888f8-label\" class=\"forminator-label\">Email address <span class=\"forminator-required\">*<\/span><\/label><input type=\"email\" name=\"email-1\" value=\"\" placeholder=\"\" id=\"forminator-field-email-1_69fc4bb8888f8\" class=\"forminator-input forminator-email--field\" data-required=\"true\" aria-required=\"true\" autocomplete=\"email\" \/><\/div><\/div><div id=\"phone-1\" class=\"forminator-field-phone forminator-col forminator-col-6\"><div class=\"forminator-field\"><label for=\"forminator-field-phone-1_69fc4bb8888f8\" id=\"forminator-field-phone-1_69fc4bb8888f8-label\" class=\"forminator-label\">Phone number<\/label><input type=\"text\" name=\"phone-1\" value=\"\" placeholder=\"\" id=\"forminator-field-phone-1_69fc4bb8888f8\" class=\"forminator-input forminator-field--phone\" data-required=\"\" aria-required=\"false\" autocomplete=\"off\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"text-1\" class=\"forminator-field-text forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-text-1_69fc4bb8888f8\" id=\"forminator-field-text-1_69fc4bb8888f8-label\" class=\"forminator-label\">Subject<\/label><input type=\"text\" name=\"text-1\" value=\"\" placeholder=\"\" id=\"forminator-field-text-1_69fc4bb8888f8\" class=\"forminator-input forminator-name--field\" data-required=\"\" \/><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"textarea-1\" class=\"forminator-field-textarea forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-textarea-1_69fc4bb8888f8\" id=\"forminator-field-textarea-1_69fc4bb8888f8-label\" class=\"forminator-label\">Message<\/label><textarea name=\"textarea-1\" placeholder=\"\" id=\"forminator-field-textarea-1_69fc4bb8888f8\" class=\"forminator-textarea\" rows=\"6\" style=\"--forminator-textarea-min-height:140px;\" ><\/textarea><\/div><\/div><\/div><div class=\"forminator-row\"><div id=\"consent-1\" class=\"forminator-field-consent forminator-col forminator-col-12\"><div class=\"forminator-field\"><label for=\"forminator-field-consent-1_69fc4bb8888f8\" id=\"forminator-field-consent-1_69fc4bb8888f8-label\" class=\"forminator-label\">Consent <span class=\"forminator-required\">*<\/span><\/label><div class=\"forminator-checkbox__wrapper\"><label id=\"forminator-field-consent-1_69fc4bb8888f8__label\" class=\"forminator-checkbox forminator-consent\"><input type=\"checkbox\" name=\"consent-1\" id=\"forminator-field-consent-1_69fc4bb8888f8\" value=\"checked\" aria-labelledby=\"forminator-field-consent-1_69fc4bb8888f8-label\" aria-describedby=\"forminator-field-consent-1_69fc4bb8888f8__description\" data-required=\"true\" aria-required=\"true\" \/><span class=\"forminator-checkbox-box\" aria-hidden=\"true\"><\/span><\/label><div id=\"forminator-field-consent-1_69fc4bb8888f8__description\" class=\"forminator-checkbox__label forminator-consent__label\"><p>I have the information on <a href=\"\/en\/datenschutz\/\">Data protection<\/a> Read and agree to the processing and storage of my data in the context of case processing.<\/p><\/div><\/div><\/div><\/div><\/div><input type=\"hidden\" name=\"referer_url\" value=\"\" \/><div class=\"forminator-row forminator-row-last\"><div class=\"forminator-col\"><div class=\"forminator-field\"><button class=\"forminator-button forminator-button-submit\"><span>Send<\/span><span aria-hidden=\"true\"><\/span><\/button><\/div><\/div><\/div><input type=\"hidden\" id=\"forminator_nonce\" name=\"forminator_nonce\" value=\"9c75c93b76\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/6701\" \/><input type=\"hidden\" name=\"form_id\" value=\"2470\"><input type=\"hidden\" name=\"page_id\" value=\"6701\"><input type=\"hidden\" name=\"form_type\" value=\"default\"><input type=\"hidden\" name=\"current_url\" value=\"https:\/\/www.bitformer.net\/en\/it-security\/isms\/\"><input type=\"hidden\" name=\"render_id\" value=\"0\"><input type=\"hidden\" name=\"action\" value=\"forminator_submit_form_custom-forms\"><label for=\"input_8\" class=\"forminator-hidden\" aria-hidden=\"true\">Please do not fill in this field. <input id=\"input_8\" type=\"text\" name=\"input_8\" value=\"\" autocomplete=\"off\"><\/label><input type=\"hidden\" name=\"trp-form-language\" value=\"en\"\/><\/form><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Home ISMS Ganzheitlicher Ansatz zum Schutz sensibler Unternehmensdaten Externer ISB Cybersicherheit Quick Audit IT NIS2 ISO 27001 Information Security Management System Ein Information Security Management System (ISMS) ist ein strukturierter und ganzheitlicher Ansatz zum Schutz sensibler Unternehmensinformationen. Es umfasst klar definierte Richtlinien, etablierte Prozesse sowie geeignete technische und organisatorische Ma\u00dfnahmen, die systematisch aufeinander abgestimmt sind. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":2320,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6701","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/comments?post=6701"}],"version-history":[{"count":10,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6701\/revisions"}],"predecessor-version":[{"id":9333,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/6701\/revisions\/9333"}],"up":[{"embeddable":true,"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/pages\/2320"}],"wp:attachment":[{"href":"https:\/\/www.bitformer.net\/en\/wp-json\/wp\/v2\/media?parent=6701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}