{"id":89348,"date":"2023-11-24T12:59:24","date_gmt":"2023-11-24T12:59:24","guid":{"rendered":"https:\/\/advisera.com\/27001academy\/?p=89348"},"modified":"2026-03-17T18:58:34","modified_gmt":"2026-03-17T18:58:34","slug":"implement-iso-27001-controls-using-ai","status":"publish","type":"post","link":"https:\/\/advisera.com\/27001academy\/implement-iso-27001-controls-using-ai\/","title":{"rendered":"How to implement ISO 27001 Annex A controls by using AI"},"content":{"rendered":"<p>If you\u2019re implementing an Information Security Management System (ISMS), you\u2019re probably wondering how to implement ISO 27001 controls from Annex A. There are 93 controls listed in this annex of ISO 27001, and most people get confused over which documents to use, which technology they need, what kind of evidence to produce for the certification audit, etc.<\/p>\n<p>Actually, you can get this information by using generative AI chatbots, and I\u2019ll show you examples of prompts you can use for that purpose.<\/p>\n<div class=\"post-featured\">\n<div class=\"post-featured--content\">\n<p>AI chatbots can help you with the following types of questions about ISO 27001 controls implementation:<\/p>\n<ul>\n<li>The basics of Annex A<\/li>\n<li>How to implement controls<\/li>\n<li>How to write documents<\/li>\n<li>Which technology to use<\/li>\n<li>What kind of evidence is needed<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>In this article, I\u2019ll use <a href=\"https:\/\/advisera.com\/experta\/\" target=\"_blank\" rel=\"noopener\">Experta<\/a>, an AI-powered chatbot-style knowledge base focused on ISO 27001. The reason for using this chatbot is that ChatGPT and other generic chatbots are trained using data available on the Internet, which means that the quality of their answers depends on the quality of their inputs \u2014 sometimes you\u2019ll get a correct answer, but sometimes you won\u2019t (the \u201cgarbage in \u2014 garbage out\u201d concept). As opposed to that, Experta is trained with the proprietary knowledge base that was created by Advisera\u2019s experts, and it provides much more accurate answers.<\/p>\n<p>To learn how to implement the whole ISO 27001 standard, read this article: <a href=\"https:\/\/advisera.com\/27001academy\/iso-27001-implementation-using-ai\/\" target=\"_blank\" rel=\"noopener\">How to implement ISO 27001 using generative AI<\/a>.<\/p>\n<h2>Learn about Annex A basics<\/h2>\n<p>To start, you can ask a couple of questions to learn general things about Annex A controls (click the question or the image to show the full answer):<\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/37ef8cdb-aaa8-463c-8c13-c7745cbd6534\" target=\"_blank\" rel=\"noopener\">&#8220;How is Annex A structured?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/37ef8cdb-aaa8-463c-8c13-c7745cbd6534\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-is-Annex-A-structured.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/9f93b25b-7a50-45c5-b50e-cbef27e0236f\" target=\"_blank\" rel=\"noopener\">\u201cList all controls from ISO 27001 Annex A\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/9f93b25b-7a50-45c5-b50e-cbef27e0236f\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/List-all-controls-from-ISO-27001-Annex-A.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/a73a0b00-a398-4e8a-afcf-632f9631cb69\" target=\"_blank\" rel=\"noopener\">\u201cAre any of Annex A controls mandatory?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/a73a0b00-a398-4e8a-afcf-632f9631cb69\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Are-any-of-Annex-A-controls-mandatory.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/367d5f2c-e60f-4187-9faf-cb44fb209cdc\" target=\"_blank\" rel=\"noopener\">\u201cWhich controls to use for hacker attack?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/367d5f2c-e60f-4187-9faf-cb44fb209cdc\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Which-controls-to-use-for-hacker-attack.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/25d50986-679b-44f3-a7f9-bad8ab74abe2\" target=\"_blank\" rel=\"noopener\">\u201cWhat is control A.5.7 Threat intelligence?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/25d50986-679b-44f3-a7f9-bad8ab74abe2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/What-is-control-A.5.7-Threat-intelligence.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><div id=\"middle-banner\" class=\"banner-shortcode\"><\/div><script>loadMiddleBanner();<\/script><div id=\"side-banner-trigger\" class=\"banner-shortcode\"><\/div><\/p>\n<h2>How to implement controls<\/h2>\n<p>Once you decide which controls you need, you can ask questions like these about the implementation of ISO 27001 controls:<\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/18239fd3-c66e-4c9c-acad-9a98bc2961fc\" target=\"_blank\" rel=\"noopener\">\u201cDoes ISO 27001 Annex A specify how each security control needs to be implemented?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/18239fd3-c66e-4c9c-acad-9a98bc2961fc\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Does-ISO-27001-Annex-A-specify-how-each-security-control-needs-to-be-implemented.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/ec120a4e-0262-40fb-9ba3-94074fef9f6c\" target=\"_blank\" rel=\"noopener\">\u201cHow to implement ISO 27001 controls?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/ec120a4e-0262-40fb-9ba3-94074fef9f6c\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-implement-ISO-27001-controls.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/bd70f749-5ba4-46eb-9e68-d60aaf8c9421\" target=\"_blank\" rel=\"noopener\">\u201cWhat are the steps for implementing ISO 27001 controls?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/bd70f749-5ba4-46eb-9e68-d60aaf8c9421\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/What-are-the-steps-for-implementing-ISO-27001-controls.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/e85c338f-efe2-48d5-a57e-4d4a337112dd\" target=\"_blank\" rel=\"noopener\">\u201cWho should be in charge of implementing Annex A controls?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/e85c338f-efe2-48d5-a57e-4d4a337112dd\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Who-should-be-in-charge-of-implementing-Annex-A-controls.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/90530306-c26f-44e6-87ad-b1fdab0f05de\" target=\"_blank\" rel=\"noopener\">\u201cHow to implement control A.8.9 Configuration management?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/90530306-c26f-44e6-87ad-b1fdab0f05de\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-implement-control-A.8.9-Configuration-management.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<h2>How to write documents for Annex A controls<\/h2>\n<p>To get a better picture of how to write policies and procedures related to Annex A, you can ask the following questions:<\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/cfdb4c6d-401d-4d88-b35c-539af1de3870\" target=\"_blank\" rel=\"noopener\">\u201cDo we need to document each Annex A control?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/cfdb4c6d-401d-4d88-b35c-539af1de3870\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Do-we-need-to-document-each-Annex-A-control.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/2cb61d0d-6ec9-44d8-8373-dd90539f0222\" target=\"_blank\" rel=\"noopener\">\u201cWhich documents are mandatory for Annex A?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/2cb61d0d-6ec9-44d8-8373-dd90539f0222\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Which-documents-are-mandatory-for-Annex-A.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/e2ef6d72-da9e-4e36-a877-dbee3a6230ed\" target=\"_blank\" rel=\"noopener\">\u201cHow to structure documentation for Annex A?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/e2ef6d72-da9e-4e36-a877-dbee3a6230ed\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-structure-documentation-for-Annex-A_.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/3e839b7d-4eaf-4a8c-b278-bc97748f7624\" target=\"_blank\" rel=\"noopener\">\u201cHow to document control A.8.13 Information backup?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/3e839b7d-4eaf-4a8c-b278-bc97748f7624\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-document-control-A.8.13-Information-backup.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/96728f01-feec-4be2-afac-48af3fb6a2b3\" target=\"_blank\" rel=\"noopener\">\u201cHow to structure a Classification Policy?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/96728f01-feec-4be2-afac-48af3fb6a2b3\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-structure-a-Classification-Policy.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<h2>Which technology to use for Annex A controls<\/h2>\n<p>When deciding if you need any new technology, or if your existing technology is good enough, you can ask something like this:<\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/eb0456c6-8f67-4b62-8bdf-cc1ef9fd0658\" target=\"_blank\" rel=\"noopener\">\u201cDoes ISO 27001 specify which technology must be used?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/eb0456c6-8f67-4b62-8bdf-cc1ef9fd0658\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Does-ISO-27001-specify-which-technology-must-be-used.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/3e40d868-6c2e-4a3f-a717-ef0e3d2ee936\" target=\"_blank\" rel=\"noopener\">\u201cIs VPN required for ISO 27001 implementation?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/3e40d868-6c2e-4a3f-a717-ef0e3d2ee936\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Is-VPN-required-for-ISO-27001-implementation.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/c589df9c-2c31-42da-ada8-86d59ef572f1\" target=\"_blank\" rel=\"noopener\">\u201cWhich technology to use for control A.8.23 Web filtering?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/c589df9c-2c31-42da-ada8-86d59ef572f1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/Which-technology-to-use-for-control-A.8.23-Web-filtering.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<h2>What kind of evidence is needed?<\/h2>\n<p>Once you have completed the implementation, you must start preparing evidence that will be needed at the certification audit. For that purpose, you can ask the following questions:<\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/cbe4cc65-0d87-4467-a9dd-d7104e073e17\" target=\"_blank\" rel=\"noopener\">\u201cWhat will the certification auditor ask regarding secure software development?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/cbe4cc65-0d87-4467-a9dd-d7104e073e17\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/What-will-the-certification-auditor-ask-regarding-secure-software-development.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/5dfb2751-be37-4701-ae58-02140e818e3c\" target=\"_blank\" rel=\"noopener\">\u201cWhat kind of evidence is needed for control A.5.23 Information security for use of cloud services?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/5dfb2751-be37-4701-ae58-02140e818e3c\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/What-kind-of-evidence-is-needed-for-control-A.5.23-Information-security-for-use-of-cloud-services.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/76090f9c-b81f-4edd-a056-18120a237291\" target=\"_blank\" rel=\"noopener\">\u201cHow to make sure employees comply with security policies and procedures?\u201d <img decoding=\"async\" class=\"external-link-icon\" src=\"\/wp-content\/themes\/academy_v2.0\/assets\/icons\/external-link.svg\" alt=\"-\"><\/a><\/p>\n<p><a href=\"https:\/\/experta.com\/shared-post\/76090f9c-b81f-4edd-a056-18120a237291\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"small-margins aligncenter wp-image-88119 size-full\" src=\"\/wp-content\/uploads\/\/sites\/5\/2023\/11\/How-to-make-sure-employees-comply-with-security-policies-and-procedures.png\" alt=\"-\" width=\"2400\" height=\"776\"><\/a><\/p>\n<h2>AI speeds up your learning considerably<\/h2>\n<p>Here, I have presented only some questions that you can ask \u2013 of course, you\u2019ll probably have hundreds (if not thousands) of questions during the project, but the chances are, chatbots like Experta will probably answer most of them.<\/p>\n<p>In some cases, chatbots will not be able to answer a very complicated question, but at least you can get the majority of answers without researching the Internet or waiting for a consultation with an expert.<\/p>\n<p><em>Experta AI-powered knowledgebase is free to use \u2014 <\/em><a href=\"https:\/\/advisera.com\/experta\/\" target=\"_blank\" rel=\"noopener\">click here to start using it<\/a><em>. Experta is trained on a proprietary knowledge base built by Advisera\u2019s ISO 27001 experts.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re implementing an Information Security Management System (ISMS), you\u2019re probably wondering how to implement ISO 27001 controls from Annex A. There are 93 controls listed in this annex of ISO 27001, and most people get confused over which documents to use, which technology they need, what kind of evidence to produce for the certification &#8230;<\/p>\n","protected":false},"author":26,"featured_media":89349,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[1471,1527,1932],"class_list":["post-89348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-iso-27001-implementation","tag-annex-a-controls","tag-ai"],"acf":[],"_links":{"self":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/89348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/comments?post=89348"}],"version-history":[{"count":3,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/89348\/revisions"}],"predecessor-version":[{"id":105263,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/posts\/89348\/revisions\/105263"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media\/89349"}],"wp:attachment":[{"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/media?parent=89348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/categories?post=89348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advisera.com\/27001academy\/wp-json\/wp\/v2\/tags?post=89348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}