{"id":13999,"date":"2021-04-08T09:02:33","date_gmt":"2021-04-08T13:02:33","guid":{"rendered":"https:\/\/gottbs.com\/?post_type=product&p=13999"},"modified":"2021-04-08T09:02:33","modified_gmt":"2021-04-08T13:02:33","slug":"tts-iso-iec-270032020-information-technology-security-techniques-information-security-management-systems-guidance","status":"publish","type":"product","link":"https:\/\/gottbs.com\/product\/tts-iso-iec-270032020-information-technology-security-techniques-information-security-management-systems-guidance\/","title":{"rendered":"TTS\/ISO\/IEC 27003:2020, Information Technology – Security Techniques – Information Security Management Systems \u2013 Guidance"},"content":{"rendered":"

This document provides explanation and guidance on TTS\/ISO\/IEC 27001:2020.<\/p>\n","protected":false},"excerpt":{"rendered":"

This document provides explanation and guidance on TTS\/ISO\/IEC 27001:2020.<\/p>\n

Status: Current | Published: 2020<\/p>\n","protected":false},"featured_media":14001,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"product_cat":[73],"product_tag":[],"_links":{"self":[{"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/product\/13999"}],"collection":[{"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/media\/14001"}],"wp:attachment":[{"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/media?parent=13999"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/product_cat?post=13999"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/gottbs.com\/wp-json\/wp\/v2\/product_tag?post=13999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}