{"id":28658,"date":"2025-05-04T21:58:13","date_gmt":"2025-05-04T13:58:13","guid":{"rendered":"https:\/\/www.knowledge-gateway.com.my\/?page_id=28658"},"modified":"2025-05-05T14:06:37","modified_gmt":"2025-05-05T06:06:37","slug":"iso-27001-information-security-management-system-isms","status":"publish","type":"page","link":"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/","title":{"rendered":"ISO 27001 \u2013 Information Security Management System (ISMS)"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"28658\" class=\"elementor elementor-28658\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-504b7c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"504b7c7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b00b95a\" data-id=\"b00b95a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f10c95 elementor-widget elementor-widget-spacer\" data-id=\"2f10c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3936914 elementor-widget elementor-widget-heading\" data-id=\"3936914\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"selectable-text copyable-text xkrh14z\">ISO 27001 \u2013 Information Security Management System (ISMS)<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb616b5 elementor-widget elementor-widget-text-editor\" data-id=\"bb616b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"color: #3366ff;\"><strong><b>What is ISO\/IEC 27001:2022?<\/b><\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\"><strong>ISO\/IEC 27001:2022<\/strong> is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information to ensure its confidentiality, integrity, and availability.<\/span><br><span style=\"color: #000000;\">Achieving <strong>ISO\/IEC 27001<\/strong> certification demonstrates an organization\u2019s commitment to protecting data assets, managing information security risks, and aligning with global best practices.<\/span><\/p>\n<h3><span style=\"color: #3366ff;\"><strong><b>Core Elements of ISO\/IEC 27001:2022<\/b><\/strong><\/span><\/h3>\n<p style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><strong><b>1.Information Security Policy<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Define and approve a clear policy that reflects top management\u2019s commitment to information security.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>2.Risk Assessment and Treatment<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Identify, evaluate, and treat security risks through a structured and repeatable process.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>3.Asset Management<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Catalog and classify information assets and apply appropriate levels of protection.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>4.Human Resource Security<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Ensure that employees and contractors understand their responsibilities through pre-employment screening, ongoing training, and secure termination processes.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>5.Physical and Environmental Security<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Protect physical infrastructure and equipment from unauthorized access, damage, or interference.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>6.Access Control<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Restrict access to information based on business needs and user roles.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>7.Operations and Communications Security<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Maintain secure operations and protect information in networks and communication channels.<\/span><br><span style=\"color: #000000;\"><b><\/b><strong><b>8.System Acquisition, Development, and Maintenance<\/b><\/strong><\/span><br><span style=\"color: #000000;\">Build security into the lifecycle of information systems, including secure software development practices.<\/span><br><span style=\"color: #000000;\"><strong>9.Supplier Relationships<br><\/strong>Ensure third-party suppliers follow agreed-upon security controls to safeguard shared data.<br><\/span><b><span style=\"font-size: 11pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">10.<\/span><span style=\"font-size: 11.5pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">Information<\/span><span style=\"font-size: 11pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">&nbsp;<\/span><span style=\"background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 11.5pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">Security<\/span><\/span><span style=\"background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\"><span style=\"font-size: 11pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">&nbsp;Incident Management<\/span><\/span><\/b><span style=\"color: #000000;\"><strong style=\"font-size: 16px;\"><br><\/strong><\/span><span style=\"font-size: 11.5pt; line-height: 107%; font-family: Roboto; color: black; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;\">Establish procedures for reporting, responding to, and\nlearning from security incidents and breaches.<\/span><span style=\"color: #000000;\"><br><strong>11.Business Continuity Management<br><\/strong>Develop and test business continuity and disaster recovery plans to minimize downtime and maintain operations during disruptions.<br><strong>12.Compliance<br><\/strong>Adhere to legal, regulatory, and contractual information security requirements.<\/span><\/p>\n<h3><strong><span style=\"color: #3366ff;\">Benefits of ISO\/IEC 27001:2022<\/span><\/strong><\/h3>\n<ul>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Improved protection of confidential data and IT assets<\/span><\/li>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Reduced risks related to data breaches, cyber threats, and legal penalties<\/span><\/li>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Enhanced stakeholder trust and brand reputation<\/span><\/li>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Better alignment with IT governance frameworks such as ITIL<\/span><\/li>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Demonstrates reliability to clients, partners, and regulators<br><\/span><\/li>\n<li dir=\"ltr\"><span style=\"color: #000000;\">Supports continual improvement and business resilience<\/span><\/li>\n<\/ul>\n<h3 dir=\"ltr\"><strong><span style=\"color: #3366ff;\">How can Knowledge Gateway assist you?<\/span><\/strong><\/h3>\n<p dir=\"ltr\" style=\"padding-left: 40px;\"><span style=\"color: #000000;\"><strong>1. Initial Assessment<br><\/strong>We begin by understanding your business goals, current systems, and expectations for ISO implementation.<br><strong>2.<\/strong><strong> PLAN \u2013 Customization and Planning<\/strong><br>A tailored action plan is developed, defining scope, objectives, timelines, and resources needed for implementation.<br><strong>3. DO \u2013 Gap Analysis &amp; System <span style=\"color: #000000;\">Development<\/span><br><\/strong>We assess current processes against ISO requirements, identify gaps, and assist in establishing or updating necessary documentation, policies, and procedures.<br><strong><b>4. CHECK \u2013 Training &amp; Implementation<br><\/b><\/strong>We provide targeted training to staff, support the implementation of updated practices, and guide the internal audit process to monitor progress.<\/span><br><span style=\"color: #000000;\"><strong><b>5. ACT \u2013 Pre-Certification and Audit Support<br><\/b><\/strong>We conduct pre-certification audits, assist in corrective actions, help select a certification body, and support your team through the final certification audit.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>ISO 27001 \u2013 Information Security Management System (ISMS) What is ISO\/IEC 27001:2022? ISO\/IEC 27001:2022 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information to ensure its confidentiality, integrity, and availability.Achieving ISO\/IEC 27001 certification demonstrates an organization\u2019s &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/\"> <span class=\"screen-reader-text\">ISO 27001 \u2013 Information Security Management System (ISMS)<\/span> \u95b1\u8b80\u5168\u6587 &raquo;<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","footnotes":""},"class_list":["post-28658","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v17.5 (Yoast SEO v21.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ISO 27001 \u2013 Information Security Management System (ISMS) - Knowledge Gateway<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISO 27001 \u2013 Information Security Management System (ISMS)\" \/>\n<meta property=\"og:description\" content=\"ISO 27001 \u2013 Information Security Management System (ISMS) What is ISO\/IEC 27001:2022? ISO\/IEC 27001:2022 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information to ensure its confidentiality, integrity, and availability.Achieving ISO\/IEC 27001 certification demonstrates an organization\u2019s &hellip; ISO 27001 \u2013 Information Security Management System (ISMS) \u95b1\u8b80\u5168\u6587 &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/\" \/>\n<meta property=\"og:site_name\" content=\"Knowledge Gateway\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T06:06:37+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/\",\"url\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/\",\"name\":\"ISO 27001 \u2013 Information Security Management System (ISMS) - Knowledge Gateway\",\"isPartOf\":{\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/#website\"},\"datePublished\":\"2025-05-04T13:58:13+00:00\",\"dateModified\":\"2025-05-05T06:06:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.knowledge-gateway.com.my\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISO 27001 \u2013 Information Security Management System (ISMS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/#website\",\"url\":\"https:\/\/www.knowledge-gateway.com.my\/\",\"name\":\"Knowledge Gateway\",\"description\":\"Knowledge-Gateway is a HRDF registered training provider where customers, organisations or partners can utilize their HRDF allocated funds to claim for their desired training courses.\",\"publisher\":{\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.knowledge-gateway.com.my\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"zh-TW\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/#organization\",\"name\":\"Knowledge Gateway\",\"url\":\"https:\/\/www.knowledge-gateway.com.my\/\",\"logo\":{\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo\",\"url\":\"https:\/\/www.knowledge-gateway.com.my\/wp-content\/uploads\/2021\/07\/onlinelogomaker-070521-2136-0418-1.png\",\"contentUrl\":\"https:\/\/www.knowledge-gateway.com.my\/wp-content\/uploads\/2021\/07\/onlinelogomaker-070521-2136-0418-1.png\",\"width\":266,\"height\":106,\"caption\":\"Knowledge Gateway\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISO 27001 \u2013 Information Security Management System (ISMS) - Knowledge Gateway","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/","og_locale":"zh_TW","og_type":"article","og_title":"ISO 27001 \u2013 Information Security Management System (ISMS)","og_description":"ISO 27001 \u2013 Information Security Management System (ISMS) What is ISO\/IEC 27001:2022? ISO\/IEC 27001:2022 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information to ensure its confidentiality, integrity, and availability.Achieving ISO\/IEC 27001 certification demonstrates an organization\u2019s &hellip; ISO 27001 \u2013 Information Security Management System (ISMS) \u95b1\u8b80\u5168\u6587 &raquo;","og_url":"https:\/\/www.knowledge-gateway.com.my\/zh\/iso-27001-information-security-management-system-isms\/","og_site_name":"Knowledge Gateway","article_modified_time":"2025-05-05T06:06:37+00:00","twitter_card":"summary_large_image","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"2 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/","url":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/","name":"ISO 27001 \u2013 Information Security Management System (ISMS) - Knowledge Gateway","isPartOf":{"@id":"https:\/\/www.knowledge-gateway.com.my\/#website"},"datePublished":"2025-05-04T13:58:13+00:00","dateModified":"2025-05-05T06:06:37+00:00","breadcrumb":{"@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knowledge-gateway.com.my\/"},{"@type":"ListItem","position":2,"name":"ISO 27001 \u2013 Information Security Management System (ISMS)"}]},{"@type":"WebSite","@id":"https:\/\/www.knowledge-gateway.com.my\/#website","url":"https:\/\/www.knowledge-gateway.com.my\/","name":"Knowledge Gateway","description":"Knowledge-Gateway is a HRDF registered training provider where customers, organisations or partners can utilize their HRDF allocated funds to claim for their desired training courses.","publisher":{"@id":"https:\/\/www.knowledge-gateway.com.my\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knowledge-gateway.com.my\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"zh-TW"},{"@type":["Organization","Place"],"@id":"https:\/\/www.knowledge-gateway.com.my\/#organization","name":"Knowledge Gateway","url":"https:\/\/www.knowledge-gateway.com.my\/","logo":{"@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo"},"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"09:00","closes":"17:00"}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.knowledge-gateway.com.my\/iso-27001-information-security-management-system-isms\/#local-main-organization-logo","url":"https:\/\/www.knowledge-gateway.com.my\/wp-content\/uploads\/2021\/07\/onlinelogomaker-070521-2136-0418-1.png","contentUrl":"https:\/\/www.knowledge-gateway.com.my\/wp-content\/uploads\/2021\/07\/onlinelogomaker-070521-2136-0418-1.png","width":266,"height":106,"caption":"Knowledge Gateway"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"irvin","author_link":"https:\/\/www.knowledge-gateway.com.my\/zh\/author\/irvin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"ISO 27001 \u2013 Information Security Management System (ISMS) What is ISO\/IEC 27001:2022? ISO\/IEC 27001:2022 is the internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). It provides a systematic approach to managing sensitive company information to ensure its confidentiality, integrity, and availability.Achieving ISO\/IEC 27001 certification demonstrates an organization\u2019s...","_links":{"self":[{"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/pages\/28658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/comments?post=28658"}],"version-history":[{"count":28,"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/pages\/28658\/revisions"}],"predecessor-version":[{"id":28752,"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/pages\/28658\/revisions\/28752"}],"wp:attachment":[{"href":"https:\/\/www.knowledge-gateway.com.my\/zh\/wp-json\/wp\/v2\/media?parent=28658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}