{"id":10445,"date":"2020-08-14T19:20:49","date_gmt":"2020-08-14T19:20:49","guid":{"rendered":"https:\/\/www.arab-academy.com\/demo\/iso-27001-information-security-management-system-iso-27001\/"},"modified":"2022-01-16T01:50:03","modified_gmt":"2022-01-15T22:50:03","slug":"iso-27001-information-security-management-system","status":"publish","type":"page","link":"https:\/\/www.arab-academy.com\/en\/iso-27001-information-security-management-system\/","title":{"rendered":"ISO 27001 Information Security Management System Certification"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;vc_sidebar_position_right&#8221; offset=&#8221;vc_col-lg-9 vc_col-md-9 vc_col-sm-12&#8243;][vc_custom_heading text=&#8221;ISMS ISO 27001 Information Security Management System Certification&#8221; font_container=&#8221;tag:h2|text_align:right&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_single_image image=&#8221;6491&#8243; img_size=&#8221;large&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][stm_sidebar sidebar=&#8221;12072&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]<\/p>\n<h2><strong>ISMS ISO\/IEC 27001 certification Overview<\/strong><\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-information-security-management-system\/\">ISO\/IEC 27001<\/a> is an international standard for Information Security Management System requirements (ISMS). It is a methodical and practical approach to effectively handle the risk related to information security of the organization. This ISO\/IEC 27001 standard will develop your organization coordinate all your security activities both physically and electronically. It will reveal to potential customers that you take the security of their business or own data seriously. ISO will help your organization to assure that you have an expected and cost-effective technique to deal with data management requirements. It will enable your organization to deal with the security of assets, for example, financial data, licensed innovation, representative subtleties or data entrusted to you by third parties. ISO certification obtained from the accredited certification bodies.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3><strong>Why your organization should implement ISMS ISO 27001 <\/strong><strong>requirements ?<\/strong><\/h3>\n<p style=\"text-align: justify;\">Information is an asset that an organization processes or owns. It can be electronically stored information, data sent out by email, written data, information that persons hold inside the organization.<\/p>\n<p style=\"text-align: justify;\">Implementation of ISMS ISO\/IEC 27001 requirements aids to secure all financial and secure data, minimizing the probability of it being accessed illegally or without permission. It describes the organization\u2019s commitment and compliance with global best practices, creating confidence in suppliers, stakeholders that the security system is predominant in the operation process of the organization.<\/p>\n<p style=\"text-align: justify;\">By implementing the requirement of ISO\/IEC 27001, an organization will recognize the type of information that exists inside the organization and define the risks and threats. Systems, controls, and measures can then be set up to reduce the risk. all of this will meet the needs of interested parties, stock holder and regulatory bodies locally and internationally<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2><strong>Certification processes for ISO 27001<\/strong><\/h2>\n<h3>Gap assessment<\/h3>\n<p style=\"text-align: justify;\"><span class=\"name-td-table\">we will use our own ISO 27001 gap analysis checklist to follow the best practices in implementation the information security management system this include the clauses of the standard + ISO 27001 annex a<br \/>\n<\/span><\/p>\n<h3>Develop policy and procedures<\/h3>\n<p>this will include preparing some useful documents, procedures and policy such as:<\/p>\n<ul>\n<li><span class=\"name-td-table\">ISO 27001 backup policy<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 business continuity<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 disaster recovery<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 data classification<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 documentation templates<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 implementation roadmap<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 firewall security audit checklist<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 asset management<\/span><\/li>\n<li><span class=\"name-td-table\">ISO 27001 access control<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2><strong>ISO 27001 certification benefits<\/strong><\/h2>\n<ul>\n<li>Provides customer and business partner with trust in how you handle risk<\/li>\n<li>Permits you to assure you are meeting your legal obligations<\/li>\n<li>Enhanced customer satisfaction that promotes client retention<\/li>\n<li>Permits for the protected exchange of information<\/li>\n<li>Keeps private information secure<\/li>\n<li>Afford you with an aggressive advantage<\/li>\n<li>Establishing a new culture of security<\/li>\n<li>Manages and reduces risk exposure<\/li>\n<li>Protects the organization, stockholders, and directors<\/li>\n<\/ul>\n<h3><strong>Benefits to Organization<\/strong><\/h3>\n<ul>\n<li>Identify the type of information that exists within the organization and defines risks and threats.<\/li>\n<li>Innovate, broaden your customer base and operate confidentially, knowing your data is secure.<\/li>\n<li>Avoiding incidents to happen results in cost reduction.<\/li>\n<li>Clearly defined responsibilities and roles for smooth operation.<\/li>\n<li>Enhanced the business image in the market.<\/li>\n<li>Maintaining the continuity of the ISMS ISO 27001 system<\/li>\n<li>Help the organization to be compliant with ISO 27001 clauses<\/li>\n<li>Develop a <a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-information-security-management-system-policy\/\">ISO 27001 policy<\/a> for ISMS ISO 27001<\/li>\n<li>Easy for integrated with other ISO certification scheme.<\/li>\n<li><a href=\"https:\/\/www.arab-academy.com\/en\/information-security-reviews-iso-27001-standard-certification\/\">Information security reviews<\/a><\/li>\n<\/ul>\n<h3><strong>Benefits to Customer<\/strong><\/h3>\n<ul>\n<li>Install confidence in the customer as a trustworthy organization resulting in a strong customer\/<a href=\"https:\/\/www.arab-academy.com\/en\/supplier-relationships-iso-27001\/\">supplier relationship<\/a>.<\/li>\n<li>Secures all data\/information<\/li>\n<\/ul>\n<h3><strong>Benefits to Employees<\/strong><\/h3>\n<ul>\n<li>Proper access controls lower the risk of accidental exposure to confidential\/sensitive information<\/li>\n<li>Provides evidence that the employer is meeting data handling security guidelines<\/li>\n<li>Job roles and responsibilities are clearly defined which enhance job satisfaction<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2>ISO 27001 requirements for certification<\/h2>\n<p>there are a mandatory requirements shall be implemented before certification, all requirements are listed in ISO 27001:2017 standards as:<\/p>\n<p>1.\u00a0\u00a0\u00a0 Scope of Integrated Management System<br \/>\n2.\u00a0\u00a0\u00a0 Structure, Responsibility and Document Control<br \/>\n2.1\u00a0\u00a0\u00a0 Structure of ISMS Manual<br \/>\n2.2\u00a0\u00a0\u00a0 Responsibility to Maintain ISO 27001 Manual<br \/>\n2.3\u00a0\u00a0\u00a0 Control of ISMS Manual<br \/>\n2.4\u00a0\u00a0\u00a0 Numbering and Document Control for ISO 27001 Manual<br \/>\n3.\u00a0\u00a0\u00a0 Terms and Definitions<br \/>\n4.\u00a0\u00a0\u00a0 Context of the Organization<br \/>\n4.1\u00a0\u00a0\u00a0 Understanding the Organization and its Context<br \/>\n4.2\u00a0\u00a0\u00a0 Understanding the Needs and Expectations of Interested Parties<br \/>\n4.3\u00a0\u00a0\u00a0 Determining the Scope of the Integrated Management System<br \/>\n4.5\u00a0\u00a0\u00a0 Integrated Management System (IMS)<br \/>\n5.\u00a0\u00a0\u00a0 Leadership<br \/>\n5.1\u00a0\u00a0\u00a0 Leadership, Management Commitment and Customer Focus<br \/>\n5.2\u00a0\u00a0\u00a0 Information security Policy for ISO 27001<br \/>\n5.3\u00a0\u00a0\u00a0 Organizational Roles, Responsibilities and Authorities<br \/>\n5.3.1\u00a0\u00a0\u00a0 Management Representative (MR)<br \/>\n5.3.2\u00a0\u00a0\u00a0 Chief Information Security Officer (CISO)<br \/>\n5.3.3\u00a0\u00a0\u00a0 Organization Employees<br \/>\n6.\u00a0\u00a0\u00a0 Planning<br \/>\n6.1\u00a0\u00a0\u00a0 Actions to Address Risks and Opportunities<br \/>\n6.1.1\u00a0\u00a0\u00a0 Environmental Aspects &amp; Hazard Identification<br \/>\n6.1.2\u00a0\u00a0\u00a0 Compliance Obligations<br \/>\n6.1.3\u00a0\u00a0\u00a0 Risk Assessment<br \/>\n6.1.4\u00a0\u00a0\u00a0 Risk Treatment<br \/>\n6.2\u00a0\u00a0\u00a0 IMS Objectives and Planning to Achieve Them<br \/>\n7.\u00a0\u00a0\u00a0 Support<br \/>\n7.1\u00a0\u00a0\u00a0 Resources<br \/>\n7.1.1\u00a0\u00a0\u00a0 Organizational Knowledge<br \/>\n7.2\u00a0\u00a0\u00a0 Competence<br \/>\n7.3\u00a0\u00a0\u00a0 Awareness<br \/>\n7.4\u00a0\u00a0\u00a0 Communication<br \/>\n7.5\u00a0\u00a0\u00a0 Documented Information<br \/>\n7.5.1\u00a0\u00a0\u00a0 Creating and Updating<br \/>\n7.5.2\u00a0\u00a0\u00a0 Control of Documented Information<br \/>\n8.\u00a0\u00a0\u00a0 Operation<br \/>\n8.1\u00a0\u00a0\u00a0 Operational Planning and Control<br \/>\n8.2\u00a0\u00a0\u00a0 Requirements for Products and Services<br \/>\n8.3\u00a0\u00a0\u00a0 Design &amp; Development of Products and Services<br \/>\n8.4\u00a0\u00a0\u00a0 Control of Externally Provided Processes, Products and Services<br \/>\n8.5\u00a0\u00a0\u00a0 Production and Service Provision<br \/>\n8.6\u00a0\u00a0\u00a0 Release of Products and Services<br \/>\n8.7\u00a0\u00a0\u00a0 Control of Nonconforming Outputs<br \/>\n8.8\u00a0\u00a0\u00a0 Emergency Preparedness and Response<br \/>\n8.9\u00a0\u00a0\u00a0 Risk Assessment<br \/>\n8.10\u00a0\u00a0\u00a0 Risk Treatment<br \/>\n8.11\u00a0\u00a0\u00a0 Service Delivery Processes<br \/>\n8.11.1\u00a0\u00a0\u00a0 Service Level Management<br \/>\n8.11.2\u00a0\u00a0\u00a0 Service Reporting<br \/>\n8.11.3\u00a0\u00a0\u00a0 Budgeting and Accounting for Services<br \/>\n8.11.4\u00a0\u00a0\u00a0 Capacity Management<br \/>\n8.11.5\u00a0\u00a0\u00a0 Information Security Management<br \/>\n8.12\u00a0\u00a0\u00a0 Relationship Processes<br \/>\n8.12.1\u00a0\u00a0\u00a0 Business Relationship Management<br \/>\n8.12.2\u00a0\u00a0\u00a0 Supplier Management<br \/>\n8.13\u00a0\u00a0\u00a0 Resolution Processes<br \/>\n8.13.1\u00a0\u00a0\u00a0 Incident Management<br \/>\n8.13.2\u00a0\u00a0\u00a0 Problem Management<br \/>\n8.14\u00a0\u00a0\u00a0 Control Processes<br \/>\n8.14.1\u00a0\u00a0\u00a0 Configuration Management<br \/>\n8.14.2\u00a0\u00a0\u00a0 Change Management<br \/>\n9.\u00a0\u00a0\u00a0 Performance Evaluation<br \/>\n9.1\u00a0\u00a0\u00a0 Monitoring, Measurement, Analysis and Evaluation<br \/>\n9.2\u00a0\u00a0\u00a0 Internal Audit<br \/>\n9.3\u00a0\u00a0\u00a0 Management Review<br \/>\n9.4\u00a0\u00a0\u00a0 Evaluation of Compliance<br \/>\n9.5\u00a0\u00a0\u00a0 Incident Investigation<br \/>\n10.\u00a0\u00a0\u00a0 Improvement<br \/>\n10.1\u00a0\u00a0\u00a0 Nonconformity and Corrective Action<br \/>\n10.2\u00a0\u00a0\u00a0 Continual Improvement[\/vc_column_text][vc_column_text]<\/p>\n<h2>Integration between All ISO certificates<\/h2>\n<p style=\"text-align: justify;\">If you organization is already certified for other ISO standards such as ISO 9001 or ISO 22301, it would be easy to integrate all ISO documents to cover all the clauses of these standard and that would be great to make your documentation system less and improve your documented information control, ISO standard now follow the HLS &#8220;High Level Structure&#8221;<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2>ISMS ISO 27001 certification cost<\/h2>\n<p><strong>the cost of ISO 27001 certification could be differed bases on many factors such as:<\/strong><\/p>\n<ol>\n<li>The nature of the organization\u2019s business and its activities<\/li>\n<li>the type of information security and infra structure in the organization<\/li>\n<li>the complexity and interaction of processes inside the organization<\/li>\n<li>the No. of employees in the organization<\/li>\n<li>Is the organization are <a href=\"https:\/\/www.arab-academy.com\/en\/iso-90012015-consultation\/\">ISO 9001<\/a> certified or not<\/li>\n<li>the location of the organization and its branches \u201cif there\u201d<\/li>\n<\/ol>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2><strong>Target Audiences for ISO 27001<br \/>\n<\/strong><\/h2>\n<ul>\n<li style=\"text-align: justify;\">Banks and companies operating in the banking and financial sector<\/li>\n<li style=\"text-align: justify;\">Insurance companies, asset management and wealth<\/li>\n<li style=\"text-align: justify;\">Investment funds and companies operating in the stock exchange, stock market and bonds<\/li>\n<li style=\"text-align: justify;\">Information and software and application design companies<\/li>\n<li style=\"text-align: justify;\">Data centers, data and data and information preservation and processing<\/li>\n<li style=\"text-align: justify;\">Any facility that retains important customer information, data or data<\/li>\n<\/ul>\n<h2><strong>What type of Organization should implement ISO\/IEC 27001?<\/strong><\/h2>\n<h3><strong>IT &amp; information security firms<\/strong><\/h3>\n<p style=\"text-align: justify;\">Programming organizations, and IT bolster organizations are just a portion of those that implement ISO\/IEC 27001 \u2013 most regularly, they do it since they might want to get new customers by demonstrating to them with an authentication that they can safeguard their data in the best plausible manner; some IT organizations likewise use ISMS ISO\/IEC 27001 requirements to act as per legally binding security requirements from their main customers, or SLAs (Service Level Agreements). At times, quickly developing organizations use ISO\/IEC 27001 as an approach to determine issues in their tasks, since this standard powers organizations to characterize who is liable for what and which steps should be done in the most significant procedures, which is all the time unclear in organizations that are becoming excessively quick.<\/p>\n<h3><strong>Financial companies &amp; agencies<br \/>\n<\/strong><\/h3>\n<p style=\"text-align: justify;\">Banks, insurance agencies, brokerage houses, and other fiscal foundations normally go for ISO\/IEC 27001 when they need to act in accordance with numerous laws and regulations. Information protection legislation is the strictest for the money related industry, and fortunately, the officials have put together their enactment for the most part with respect to ISO\/IEC 27001. This implies ISO\/IEC 27001 is an ideal philosophy to accomplish consistence, which makes it simple to present such a venture to the heads.<\/p>\n<p style=\"text-align: justify;\">The second most normal motivation behind why these sorts of associations implement ISO\/IEC 27001 is cost \u2013 they need to keep episodes from occurring, which is, obviously, a lot less expensive than managing the outcome of an occurrence. This methodology is run of the mill for the money related industry, since they are typically the most progressive with regards to hazard the board.<\/p>\n<h3><strong>Telecommunication companies<br \/>\n<\/strong><\/h3>\n<p style=\"text-align: justify;\">Telecommunication organizations, including Internet suppliers, are exceptionally eager about ensuring the tremendous measure of information they handle and lessening the quantity of outages, so normally they look toward ISO\/IEC 27001 as a system that helps them do that. Further, like the money related industry, there are a developing number of laws and guidelines for telecom, where ISO\/IEC 27001 is exceptionally useful for consistence.<\/p>\n<h3><strong>Government agencies<\/strong><\/h3>\n<p style=\"text-align: justify;\">Normally, government agencies handle sensitive information \u2013 in certain offices this information is classified, yet in all offices securing the respectability and accessibility of their information is of foremost significance. The way that ISO\/IEC 27001 was intended to fulfill those three ideas (the well known C-I-A triad) makes it an ideal philosophy to diminish the quantity of occurrences to a base.<\/p>\n<p style=\"text-align: justify;\">What\u2019s more, being an international standard perceived by standardization bodies in every nation, ISO\/IEC 27001 is an ideal structure with legitimate government acknowledgment.<\/p>\n<h3><strong>\u00a0<\/strong><strong>Any organization manage sensitive data<\/strong><\/h3>\n<p style=\"text-align: justify;\">This rundown could continue endlessly \u2013 e.g., hospitals need to ensure the information of their patients, pharmaceutical organizations need to secure their development information and information on formulas, food preparing organizations secure their exceptional plans, manufacturing organizations need to ensure their insight on how certain parts are delivered. Essentially, any organization that has sensitive data can discover ISO\/IEC 27001 helpful.<\/p>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h2><strong>Where we provide our services ?<br \/>\n<\/strong><\/h2>\n<p>We serve our clients over the world from our international operation center in Egypt, we manage all project of ISO 27001 training, consultation or training, ISO 27001 certification inside <a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-certification-in-egypt\/\">Egypt<\/a> (Cairo, Giza, Alexandria &#8230;etc) via site visits on frequent basics we will work together with our client to implement each clause of this ISO standard.<\/p>\n<p>for other projects outside Egypt such as (<a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-certification-in-saudi-arabia\/\">ISO 27001 Certification in Saudi Arabia<\/a>, IRAQ, UAE, Bahrain, Kuwait, Qatar &#8230;etc) it will be managed remotely via online meeting or by site visits by one of our consultants.<\/p>\n<p><strong>Useful links<br \/>\n<\/strong><\/p>\n<p><a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-certification-in-egypt\/\">ISO 27001 Certification in Egypt<\/a><\/p>\n<p><a href=\"https:\/\/www.arab-academy.com\/en\/iso-27001-information-security-management-system-policy\/\">ISO 27001 policy<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_cta h2=&#8221;Request for Quotation (ISO Consultation \/ Training)&#8221; h4=&#8221;Document, maintain &amp; training for ISO 27001 information security management system&#8221; shape=&#8221;round&#8221; color=&#8221;white&#8221; add_button=&#8221;bottom&#8221; btn_title=&#8221;Contact us \/ Request a quote&#8221; btn_color=&#8221;blue&#8221; btn_align=&#8221;right&#8221; btn_i_icon_fontawesome=&#8221;fas fa-phone-alt&#8221; add_icon=&#8221;bottom&#8221; btn_add_icon=&#8221;true&#8221; i_on_border=&#8221;true&#8221; css=&#8221;.vc_custom_1624832770356{background-color: #dd9933 !important;}&#8221; btn_link=&#8221;url:https%3A%2F%2Fwww.arab-academy.com%2Fen%2Frequest-quotation%2F|title:Request%20a%20quotation&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Arab Professionals Centers&#8217; ISO experts qualify all type of organization such as (banks, insurance companies, financial companies &amp; industrial and commercial companies) and provide technical support to document and maintain an efficient information security management system include (documents, procedures &amp; forms) As per ISO\/IEC 27001 standard in addition, providing all the required training courses and assist your organization in the external 3rd party audit by the Certification body for ISO 27001 certification.<\/span><\/p>\n<p>[\/vc_cta][vc_custom_heading text=&#8221;Browse our upcoming courses&#8221; font_container=&#8221;tag:h2|text_align:right&#8221; use_theme_fonts=&#8221;yes&#8221; link=&#8221;url:https%3A%2F%2Fwww.arab-academy.com%2Fdemo%2F%25d8%25a7%25d9%2584%25d8%25af%25d9%2588%25d8%25b1%25d8%25a7%25d8%25aa-%25d8%25a7%25d9%2584%25d8%25aa%25d8%25af%25d8%25b1%25d9%258a%25d8%25a8%25d9%258a%25d8%25a9%2F|title:Training%20courses|&#8221;][\/vc_column_inner][\/vc_row_inner]<div class=\"woocommerce columns-4 \"><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243; offset=&#8221;vc_hidden-sm vc_hidden-xs&#8221;][stm_sidebar sidebar=&#8221;12076&#8243; sidebar_position=&#8221;left&#8221;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;3\/4&#8243; el_class=&#8221;vc_sidebar_position_right&#8221; offset=&#8221;vc_col-lg-9 vc_col-md-9 vc_col-sm-12&#8243;][vc_custom_heading text=&#8221;ISMS ISO 27001 Information Security Management System Certification&#8221; font_container=&#8221;tag:h2|text_align:right&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_single_image image=&#8221;6491&#8243; img_size=&#8221;large&#8221;][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][stm_sidebar sidebar=&#8221;12072&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text] ISMS ISO\/IEC 27001 certification Overview ISO\/IEC 27001 is an international standard for Information Security Management System requirements (ISMS). It is a methodical and practical approach to effectively handle the risk related to information security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10446,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-10445","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/pages\/10445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/comments?post=10445"}],"version-history":[{"count":0,"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/pages\/10445\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/media\/10446"}],"wp:attachment":[{"href":"https:\/\/www.arab-academy.com\/en\/wp-json\/wp\/v2\/media?parent=10445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}