{"id":2557,"date":"2025-01-20T11:42:21","date_gmt":"2025-01-20T10:42:21","guid":{"rendered":"https:\/\/www.kvinne.de\/?page_id=2557"},"modified":"2025-01-20T11:45:32","modified_gmt":"2025-01-20T10:45:32","slug":"schritt-fuer-schritt-zur-iso-27001","status":"publish","type":"page","link":"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/","title":{"rendered":"Step by Step to ISO 27001"},"content":{"rendered":"<h3 class=\"wp-block-heading\">ISO 27001 Guide <\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Your path to ISO 27001 certification \u2013 step by step<\/strong><\/h3>\n\n\n\n<p class=\"translation-block\">The implementation of an Information Security Management System (ISMS) according to <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_self\">ISO 27001<\/a> is a key step in strengthening information security in your company. With this guide, we will show you how to carry out the entire process independently \u2013 from planning to certification.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why ISO 27001?<\/strong><\/h3>\n\n\n\n<p>ISO 27001 provides clear guidelines to minimize risks, protect data, and meet legal requirements. By achieving certification, you demonstrate to your customers and partners that your security measures meet the highest standards.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step-by-step guide to ISO 27001 implementation<\/strong><\/h3>\n\n\n\n<p>With our guide, you can implement ISO 27001 independently. Follow these 7 steps to successfully build your ISMS:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 1: Project planning and preparation<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Form a project team:<\/strong><br>Assemble a project team consisting of members from various departments. Define clear roles and responsibilities, such as project manager and security officer.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Define the scope:<\/strong><br>Determine which areas and systes of your company should be covered by the ISMS. The so-called \u201cscope\u201d should be documented and aligned with business objectives.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Establish a governance structure:<\/strong><br>Set up a structure that ensures active involvement of management. This promotes support and demonstrates the importance of information security.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 2: Security strategy and asset management<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Define security objectives:<\/strong><br>Formulate clear and measurable goals, such as reducing security incidents or improving data protection.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Identify assets:<\/strong><br>Create an asset register listing all relevant information, systems, and data. Also consider the value and responsibilities associated with each asset.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Classify information:<\/strong><br>Establish a scheme to classify information and assets based on their sensitivity (e.g., confidential, internal, public).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 3: Development of policies and procedures<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Create ISMS policies:<\/strong><br>Document clear instructions for handling information. These policies should cover topics such as password management, access control, and incident management.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Develop processes and procedures:<\/strong><br>Define processes for managing and protecting your data, such as how risks are identified and addressed.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Organize documentation:<\/strong><br>Establish a structured framework for all documents and implement regular reviews.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 4: Conducting risk management<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Identify risks:<\/strong><br>Create a list of potential risks that could threaten your information security, such as cyberattacks, data loss, or human error.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Assess risks:<\/strong><br>Evaluate the likelihood and potential impact of each risk. This helps you prioritize.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Create a risk treatment plan:<\/strong><br>Develop measures to minimize or completely eliminate risks. Examples include technical controls, training, or implementing new processes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 5: Prepare and conduct internal audit<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Develop an audit program:<\/strong><br>Plan regular internal audits to verify the effectiveness of your ISMS. Take into account all areas included in the scope.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Select auditors:<\/strong><br>Train internal auditors or engage external experts to ensure an objective evaluation.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Conduct audit:<\/strong><br>Check whether all policies, procedures, and security measures have been correctly implemented. Document the results carefully.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 6: Preparation for the Certification Audit<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Provide documentation:<\/strong><br>Gather all necessary documents to be reviewed during the certification audit, such as policies, risk assessments, and audit reports.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Team training:<\/strong><br>Ensure that your employees are prepared for the audit and understand the security processes.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Select an accredited auditor:<\/strong><br>Find an independent auditor to carry out the certification process.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Step 7: Regular Operation and Continuous Improvement<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Conduct surveillance audits:<\/strong><br>After certification, you should plan annual audits to ensure that your ISMS continues to meet the requirements.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Optimize ISMS:<\/strong><br>Use the results from audits and operational experience to continuously improve your ISMS.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Continue employee training:<\/strong><br>Regularly train your team to strengthen the security culture in your company.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Tips for a successful implementation<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Start small:<\/strong> Begin with a clearly defined scope and expand it step by step.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Involve management:<\/strong> Support from the leadership level is crucial for the success of your ISMS.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Use templates:<\/strong> Templates and checklists save time and make implementation easier.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Do you need support?<\/strong><\/h3>\n\n\n\n<p class=\"translation-block\">If you have any questions or need support with the implementation, we are at your side as experienced <strong>ISO 27001 consultants<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-kvinne-gmbh wp-block-embed-kvinne-gmbh\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"n1wnIfaH5o\"><a href=\"https:\/\/www.kvinne.de\/en\/kontakt\/\">Contact<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&quot;Contact\u201c \u2014 KVINNE GmbH\" src=\"https:\/\/www.kvinne.de\/kontakt\/embed\/#?secret=N0tutGOXO8#?secret=n1wnIfaH5o\" data-secret=\"n1wnIfaH5o\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-kvinne-gmbh wp-block-embed-kvinne-gmbh\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"EXplDTZZG7\"><a href=\"https:\/\/www.kvinne.de\/en\/digitales-managementsystem-dresden\/\">Digital management system<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8222;Digitales Managementsystem&#8220; &#8212; KVINNE GmbH\" src=\"https:\/\/www.kvinne.de\/digitales-managementsystem-dresden\/embed\/#?secret=7HhpCOpaHq#?secret=EXplDTZZG7\" data-secret=\"EXplDTZZG7\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>","protected":false},"excerpt":{"rendered":"<p>ISO 27001 Anleitung: Ihr Weg zur ISO 27001 Zertifizierung \u2013 Schritt f\u00fcr Schritt Die Implementierung eines Informationssicherheitsmanagementsystems (ISMS) nach ISO 27001 ist ein zentraler Schritt, um die Informationssicherheit in Ihrem Unternehmen zu st\u00e4rken. Mit dieser Anleitung zeigen wir Ihnen, wie Sie den gesamten Prozess eigenst\u00e4ndig umsetzen k\u00f6nnen \u2013 von der Planung bis zur Zertifizierung. Warum &#8230; <a title=\"Step by Step to ISO 27001\" class=\"read-more\" href=\"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/\" aria-label=\"Read more about Schritt f\u00fcr Schritt zur ISO 27001\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":2562,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2557","page","type-page","status-publish","has-post-thumbnail"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH<\/title>\n<meta name=\"description\" content=\"Mit unserer Anleitung k\u00f6nnen Sie die ISO 27001 eigenst\u00e4ndig umsetzen. Befolgen Sie diese 7 Schritte, um Ihr ISMS erfolgreich aufzubauen:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH\" \/>\n<meta property=\"og:description\" content=\"Mit unserer Anleitung k\u00f6nnen Sie die ISO 27001 eigenst\u00e4ndig umsetzen. Befolgen Sie diese 7 Schritte, um Ihr ISMS erfolgreich aufzubauen:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"KVINNE GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-20T10:45:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2025\/01\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"362\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/\",\"name\":\"Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg\",\"datePublished\":\"2025-01-20T10:42:21+00:00\",\"dateModified\":\"2025-01-20T10:45:32+00:00\",\"description\":\"Mit unserer Anleitung k\u00f6nnen Sie die ISO 27001 eigenst\u00e4ndig umsetzen. Befolgen Sie diese 7 Schritte, um Ihr ISMS erfolgreich aufzubauen:\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg\",\"contentUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg\",\"width\":640,\"height\":362,\"caption\":\"Schritt f\u00fcr Schritt Anleitung ISO 27001\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/schritt-fuer-schritt-zur-iso-27001\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.kvinne.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Schritt f\u00fcr Schritt zur ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#website\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/\",\"name\":\"KVINNE GmbH\",\"description\":\"Datenschutz und Informationssicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kvinne.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#organization\",\"name\":\"KVINNE GmbH Datenschutz & Dgitalberatung\",\"alternateName\":\"KVINNE\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png\",\"contentUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png\",\"width\":150,\"height\":183,\"caption\":\"KVINNE GmbH Datenschutz & Dgitalberatung\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/kvinne-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH","description":"With our guide, you can implement ISO 27001 independently. Follow these 7 steps to successfully build your ISMS:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/","og_locale":"en_US","og_type":"article","og_title":"Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH","og_description":"Mit unserer Anleitung k\u00f6nnen Sie die ISO 27001 eigenst\u00e4ndig umsetzen. Befolgen Sie diese 7 Schritte, um Ihr ISMS erfolgreich aufzubauen:","og_url":"https:\/\/www.kvinne.de\/en\/schritt-fuer-schritt-zur-iso-27001\/","og_site_name":"KVINNE GmbH","article_modified_time":"2025-01-20T10:45:32+00:00","og_image":[{"width":640,"height":362,"url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2025\/01\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/","url":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/","name":"Schritt f\u00fcr Schritt zur ISO 27001 - KVINNE GmbH","isPartOf":{"@id":"https:\/\/www.kvinne.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2025\/01\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg","datePublished":"2025-01-20T10:42:21+00:00","dateModified":"2025-01-20T10:45:32+00:00","description":"With our guide, you can implement ISO 27001 independently. Follow these 7 steps to successfully build your ISMS:","breadcrumb":{"@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/#primaryimage","url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2025\/01\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg","contentUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2025\/01\/Schritt-fuer-Schritt-Anleitung-ISO-27001.jpg","width":640,"height":362,"caption":"Schritt f\u00fcr Schritt Anleitung ISO 27001"},{"@type":"BreadcrumbList","@id":"https:\/\/www.kvinne.de\/schritt-fuer-schritt-zur-iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.kvinne.de\/"},{"@type":"ListItem","position":2,"name":"Schritt f\u00fcr Schritt zur ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/www.kvinne.de\/#website","url":"https:\/\/www.kvinne.de\/","name":"KVINNE GmbH","description":"Datenschutz und Informationssicherheit","publisher":{"@id":"https:\/\/www.kvinne.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kvinne.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kvinne.de\/#organization","name":"KVINNE GmbH Datenschutz & Dgitalberatung","alternateName":"KVINNE","url":"https:\/\/www.kvinne.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kvinne.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/07\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png","contentUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/07\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png","width":150,"height":183,"caption":"KVINNE GmbH Datenschutz & Dgitalberatung"},"image":{"@id":"https:\/\/www.kvinne.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kvinne-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages\/2557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/comments?post=2557"}],"version-history":[{"count":3,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages\/2557\/revisions"}],"predecessor-version":[{"id":2560,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages\/2557\/revisions\/2560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/media\/2562"}],"wp:attachment":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/media?parent=2557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}