{"id":13229,"date":"2025-12-08T06:12:48","date_gmt":"2025-12-08T14:12:48","guid":{"rendered":"https:\/\/www.coretechnologies.com\/blog\/?p=13229"},"modified":"2025-12-21T12:11:48","modified_gmt":"2025-12-21T20:11:48","slug":"implementing-iso-27001-isms","status":"publish","type":"post","link":"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/implementing-iso-27001-isms\/","title":{"rendered":"How AlwaysUp Supports Your ISO 27001 ISMS"},"content":{"rendered":"<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"\/blog\/images\/iso-27001-logo-200x200.webp\" style=\"margin-bottom:20px;\" title=\"How AlwaysUp Supports Your ISO 27001 ISMS\" alt=\"How AlwaysUp Supports Your ISO 27001 ISMS\" border=\"0\" width=\"200\" height=\"200\" \/><\/div>\n<p><a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\">ISO 27001<\/a> is an internationally recognized information security standard. It focuses on three core principles &mdash; <a href=\"https:\/\/www.itgovernance.co.uk\/blog\/what-is-the-cia-triad-and-why-is-it-important\" target=\"_blank\">confidentiality, integrity and availability (CIA)<\/a> &mdash; and provides detailed guidance to help you keep your company&#8217;s information assets safe from bad actors, data breaches, extended downtime and much more.<\/p>\n<p><a href=\"\/products\/AlwaysUp\/\">AlwaysUp<\/a> is our professional software that runs any application as a Windows Service. Today, many of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fortune_500\" target=\"_blank\">Fortune 500<\/a> companies rely on AlwaysUp to keep their key software running 24\/7. And because every single one of those companies obsesses about information security, we do too. Indeed, we design and build all our software atop CIA principles.<\/p>\n<p>Does your company operate an information security management system (ISMS) based on ISO 27001? If so, here are a five important <a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/\" target=\"_blank\">Annex A controls<\/a> that AlwaysUp will help you implement.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">Annex A 5.15: Access Control<\/h2>\n<p>ISO 27001 <a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/5-15-access-control-2022\/\" target=\"_blank\">Annex A 5.15<\/a> focuses on controlling access to information assets. Its objective is to ensure that employees only have access to the information they need to perform their duties. In other words, Annex A 5.15 is all about enforcing the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\" target=\"_blank\">principle of least privilege<\/a>.<\/p>\n<h3 class=\"blog-caption\">How AlwaysUp helps you control access<\/h3>\n<h4>#1: Only admins can run AlwaysUp<\/h4>\n<p>AlwaysUp is restricted to administrators only. A standard user without admin rights cannot start the program on his own.<\/p>\n<p>If a standard user attempts to start AlwaysUp, Windows prompts for admin credentials:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/uac-prompts-for-admin-credentials.png\" class=\"zoomPopup\" title=\"Windows prompts for admin credentials when starting AlwaysUp\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/uac-prompts-for-admin-credentials.png\" title=\"Windows prompts for admin credentials when starting AlwaysUp (click to enlarge)\" alt=\"Windows prompts for admin credentials when starting AlwaysUp\" border=\"0\" \/><\/a><\/div>\n<p>That important safeguard prevents untrusted (or untrained) individuals from updating your critical applications.<\/p>\n<h4>#2: You can restrict access to your AlwaysUp Windows Services<\/h4>\n<p>After you install your program as a service with AlwaysUp, you have the power to enforce who can start, stop, restart or edit the service.<\/p>\n<p>That capability is available by selecting <b>Advanced &gt; Service Security Settings<\/b> from the <b>Application<\/b> menu:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-open-service-security-settings.png\" class=\"zoomPopup\" title=\"Open service security settings\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-open-service-security-settings.png\" title=\"Open service security settings (click to enlarge)\" alt=\"Open service security settings\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>From there, it&#8217;s easy for you to specify what each user can do. For example, here&#8217;s how we allow Hazel Jones to start or stop the service, but not to modify or delete it:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/allow-user-to-start-stop-service.png\" class=\"zoomPopup\" title=\"Allow Hazel to start or stop the service only\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/allow-user-to-start-stop-service.png\" title=\"Allow Hazel to start or stop the service only (click to enlarge)\" alt=\"Allow Hazel to start or stop the service only\" border=\"0\" \/><\/a><\/div>\n<h4>#3: You can run your applications without admin rights<\/h4>\n<p>By default, Windows Services operate with full rights. There&#8217;s no <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/application-security\/application-control\/user-account-control\/\" target=\"_blank\">User Account Control (UAC)<\/a> in place, where an administrator can run an application without elevated rights. And that can violate the principle of least privilege.<\/p>\n<p>AlwaysUp fixes that shortcoming. With AlwaysUp, you&#8217;re able to launch your application in the context of a full blown administrator yet have those powerful admin rights removed when your application runs. That&#8217;s a sure fire way to limit what your application is able to do &mdash; and protect your systems.<\/p>\n<p>The option to run your application with reduced rights is available on the <b>Logon<\/b> tab:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-run-application-without-admin-rights.png\" class=\"zoomPopup\" title=\"Run your application without admin rights\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-run-application-without-admin-rights.png\" title=\"Run your application without admin rights (click to enlarge)\" alt=\"Run your application without admin rights\" border=\"0\" \/><\/a><\/div>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">Annex A 5.30: Readiness for Business Continuity<\/h2>\n<p><a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/5-30-readiness-for-business-continuity-2022\/\" target=\"_blank\">Annex A 5.30<\/a> is an organizational control focusing on business resilience. It aims to prepare you to survive the inevitable operational bumps in the road as you serve your customers.<\/p>\n<p>AlwaysUp is designed to be a core component of your resilience plan. By quickly detecting failures and <b>automatically restarting your mission-critical software<\/b>, AlwaysUp reduces interruptions and downtime. And that&#8217;s great for your <a href=\"https:\/\/en.wikipedia.org\/wiki\/IT_disaster_recovery#Recovery_Time_Objective\" target=\"_blank\">Recovery Time Objective (RTO)<\/a>.<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-automatically-restarting-apointment-server.png\" class=\"zoomPopup\" title=\"AlwaysUp automatically restarts the Java Appointment Server\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-automatically-restarting-apointment-server.png\" title=\"AlwaysUp automatically restarts the Java Appointment Server (click to enlarge)\" alt=\"AlwaysUp automatically restarts the Java Appointment Server\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">Annex A 8.9: Configuration Management<\/h2>\n<p><a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/8-9-configuration-management-2022\/\" target=\"_blank\">Annex A 8.9<\/a> emphasizes the need for standardized configurations in IT operations.<\/p>\n<p>As ISO 27001 points out, relying on tested, predefined settings instead of having staff constantly &#8220;reinventing the wheel&#8221; is a guaranteed way to reduce risk, improve reliability and increase oversight.<\/p>\n<h3 class=\"blog-caption\">How AlwaysUp helps with configuration management<\/h3>\n<h4>#1: We&#8217;ve created guides for hundreds of applications<\/h4>\n<p>Did you know that our team has tested and documented <a href=\"\/products\/AlwaysUp\/Apps\/\">how to set up over 160 popular programs<\/a> with AlwaysUp? If you&#8217;re running one of those apps as a Windows Service, all you&#8217;ve got to do is follow our step-by-step instructions. There&#8217;s no need for you to re-engineer on your own.<\/p>\n<p><!-- Featured applications. --><\/p>\n<div class=\"advisor-logos-box\" align=\"center\">\n<img decoding=\"async\" src=\"\/images\/dropbox-logo-new-48x48.png\" title=\"Dropbox\" alt=\"Dropbox\"> <img decoding=\"async\" src=\"\/images\/onedrive-logo-48x48.webp\" title=\"OneDrive\" alt=\"OneDrive\"> <img decoding=\"async\" src=\"\/images\/google-drive-for-desktop-logo-48x48.png\" title=\"Google Drive for desktop\" alt=\"Google Drive for desktop\"> <img decoding=\"async\" src=\"\/images\/emby-server-logo-48x48.png\" title=\"Emby Server\" alt=\"Emby Server\"> <img decoding=\"async\" src=\"\/images\/influxdb-logo-48x48.png\" title=\"InfluxDB\" alt=\"InfluxDB\"> <img decoding=\"async\" src=\"\/images\/java-logo-48x48.gif\" title=\"Java\" alt=\"Java\"> <img decoding=\"async\" src=\"\/images\/kibana-logo-48x48.png\" title=\"Kibana\" alt=\"Kibana\"> <img decoding=\"async\" src=\"\/images\/node.js-logo-48x48.png\" title=\"Node.js\" alt=\"Node.js\"> <img decoding=\"async\" src=\"\/images\/php-script-logo-48x48.png\" title=\"PHP\" alt=\"PHP\"> <img decoding=\"async\" src=\"\/images\/plex-media-server-logo-48x48.png\" title=\"Plex Media Server\" alt=\"Plex Media Server\"> <img decoding=\"async\" src=\"\/images\/python-script-logo-48x48.png\" title=\"Python\" alt=\"Python\"> <img decoding=\"async\" src=\"\/images\/dotnet-logo-48x48.png\">\n<\/div>\n<h4>#2: You can easily export and import standard configurations<\/h4>\n<p>Once you&#8217;ve settled on a configuration that works for your application, you can export it to a file. And to re-create that application on a different computer, all you&#8217;ve got to do is import the file there.<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-importing-configuration-files.png\" class=\"zoomPopup\" title=\"AlwaysUp importing standard configuration files\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-importing-configuration-files.png\" title=\"AlwaysUp importing standard configuration files (click to enlarge)\" alt=\"AlwaysUp importing standard configuration files\" border=\"0\" \/><\/a><\/div>\n<p>With that approach, your team will deploy the same, standard AlwaysUp configurations every time &mdash; exactly what Annex A 8.9 encourages.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">Annex A 8.15: Logging<\/h2>\n<p>ISO 27001 stresses the importance of logging in robust, resilient systems. As such, the standard includes <a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/8-15-logging-2022\/\" target=\"_blank\">Annex A 8.15<\/a> to drive the point home.<\/p>\n<p>AlwaysUp is aligned with the recommendations of Annex A 8.15. As it runs your programs as services, <b>AlwaysUp writes key information to the <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/eventlog\/event-logging\" target=\"_blank\">Windows Event Logs<\/a><\/b> &mdash; the standard, centralized location where applications report important software and hardware events.<\/p>\n<p>Specifically, AlwaysUp writes entries to the Application event log. You can browse those records using the <a href=\"\/blog\/windows-services\/event-viewer-troubleshoot-windows-services\/\">Event Viewer<\/a>:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/event-viewer-alwaysup-application-logs.png\" class=\"zoomPopup\" title=\"Event Viewer shows the AlwaysUp logs\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/event-viewer-alwaysup-application-logs.png\" title=\"Event Viewer shows the AlwaysUp logs (click to enlarge)\" alt=\"Event Viewer shows the AlwaysUp logs\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>The bottom line is that you can rely on detailed logging from AlwaysUp when investigating incidents and providing root cause analysis to your management team.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<h2 class=\"blog-caption\">Annex A 8.16: Monitoring Activities<\/h2>\n<p>As described in ISO 27001 <a href=\"https:\/\/www.isms.online\/iso-27001\/annex-a-2022\/8-16-monitoring-activities-2022\/\" target=\"_blank\">Annex A 8.16<\/a>, organizations should proactively and reactively monitor IT and security operations to prevent incidents, detect anomalies, and ensure compliance.<\/p>\n<p>AlwaysUp fulfills those obligations by <b>closely monitoring your business-critical applications<\/b> and shouting whenever they misbehave.<\/p>\n<p>For example, AlwaysUp can detect when your application consumes too much memory, CPU or resource handles. And email from AlwaysUp will quickly alert you of the trouble, as it did here when the &#8220;Appointment Server&#8221; stopped responding to network requests:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-email-network-sanity-check-failed.png\" class=\"zoomPopup\" title=\"AlwaysUp sent an email when the network sanity check failed\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-email-network-sanity-check-failed.png\" title=\"AlwaysUp sent an email when the network sanity check failed (click to enlarge)\" alt=\"AlwaysUp sent an email when the network sanity check failed\" border=\"0\" width=\"520\" \/><\/a><\/div>\n<p>With those details in hand, you&#8217;ll be well positioned to investigate and determine if the situation requires your attention. For instance, is your application demanding too much CPU because it&#8217;s overloaded? Or is your network the victim of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\" target=\"_blank\">denial-of-service<\/a> attack?<\/p>\n<p>In any case, AlwaysUp&#8217;s monitoring and early warning systems allow you to quickly intervene and prevent incidents before they occur. And that strengthens your security posture.<\/p>\n<hr class=\"blog-section\">\n<div style=\"width:100%;margin-bottom:30px;\">\n<div style=\"margin:0px;float:right;\"><a href=\"#top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.coretechnologies.com\/images\/top.jpg\" border=\"0\" width=\"50\" height=\"18\" title=\"Go to the top\" alt=\"\" \/><\/a><\/div>\n<\/div>\n<p>So that&#8217;s a quick look at how AlwaysUp aligns with your security best practices. Rest assured that our company will continue to follow bedrock ISO 27001 principles as we improve our software.<\/p>\n<p>Finally, best of luck with your information security program! Please be sure to <a href=\"\/support\/\">get in touch<\/a> if you need any help with documentation or implementation.<\/p>\n<div style=\"margin-top:30px\" align=\"center\">\n<div class=\"cta-button-1\">\n<table role=\"presentation\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td align=\"center\"><a href=\"\/blog\/tag\/alwaysup-tag\/\" title=\"Click to read more articles about AlwaysUp\"><span><nobr>More articles about AlwaysUp&#8230;<\/nobr><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<!-- relpost-thumb-wrapper --><div class=\"relpost-thumb-wrapper\"><!-- filter-class --><div class=\"relpost-thumb-container\"><style>.relpost-block-single-image, .relpost-post-image { margin-bottom: 10px; }<\/style><h3>You may also like...<\/h3><div style=\"clear: both\"><\/div><div style=\"clear: both\"><\/div><!-- relpost-block-container --><div class=\"relpost-block-container relpost-block-column-layout\" style=\"--relposth-columns: 3;--relposth-columns_t: 2; --relposth-columns_m: 2\"><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/recycle-leaky-program\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Q&amp;A: Can AlwaysUp Auto-Start and Recycle my Leaky Program Once per Day?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/restart-app-on-schedule-150x150-1.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Q&amp;A: Can AlwaysUp Auto-Start and Recycle my Leaky Program Once per Day?<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/software\/4-affordable-web-monitoring-tools\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"4 Affordable Tools to Monitor &amp; Bulletproof your Web Application\/Server\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/monitor-web-application-150x150-1-150x150.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">4 Affordable Tools to Monitor &amp; Bulletproof your Web Application\/Server<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/reconnect-network-drives-feature\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"AlwaysUp Feature Spotlight: Automatically Reconnect Network Drives\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/connect-network-drives150x150.webp\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">AlwaysUp Feature Spotlight: Automatically Reconnect Network Drives<\/h2><\/div><\/div><\/a><\/div><!-- close relpost-block-container --><div style=\"clear: both\"><\/div><\/div><!-- close filter class --><\/div><!-- close relpost-thumb-wrapper -->","protected":false},"excerpt":{"rendered":"<p>ISO 27001 is an internationally recognized information security standard. It focuses on three core principles &mdash; confidentiality, integrity and availability (CIA) &mdash; and provides detailed guidance to help you keep your company&#8217;s information assets safe from bad actors, data breaches, &hellip; <a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/implementing-iso-27001-isms\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":13235,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[26,79,397,396,378,143],"class_list":["post-13229","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alwaysup","tag-alwaysup-tag","tag-event-viewer","tag-information-security","tag-isms","tag-iso-27001","tag-security"],"_links":{"self":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=13229"}],"version-history":[{"count":23,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13229\/revisions"}],"predecessor-version":[{"id":13284,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/13229\/revisions\/13284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media\/13235"}],"wp:attachment":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=13229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=13229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=13229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}