{"version":1,"pages":[{"id":"JeUKgXM0JpDqjzg1707a","title":"Introduction","pathname":"/start","siteSpaceId":"sitesp_4I15Z","description":""},{"id":"keLjb8S1OVxcB0KE9kyy","title":"Set up your ISMS","pathname":"/start/getting-started/set-up-your-isms","siteSpaceId":"sitesp_4I15Z","description":"Welcome to Harpe - lets get you set up","breadcrumbs":[{"label":"Getting started"}]},{"id":"5B6V4pBsTKjNf3Un64Bv","title":"Add employees","pathname":"/start/getting-started/set-up-your-isms/add-employees","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"KrM3kRWoNcKAOG4f6p1u","title":"Complete management details","pathname":"/start/getting-started/set-up-your-isms/complete-management-details","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"JlFhSAHrtQd4eU1UGAal","title":"Add your first asset","pathname":"/start/getting-started/set-up-your-isms/add-your-first-asset","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"Tz6drNNwBiM3gz9Rvvmi","title":"Add your first supplier","pathname":"/start/getting-started/set-up-your-isms/add-your-first-supplier","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"oD9MdZxKeSWzBIzAJ5mV","title":"Add your first risk","pathname":"/start/getting-started/set-up-your-isms/add-your-first-risk","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"SskY9fbrVbWOWPxNB5SS","title":"Add your first CAPA","pathname":"/start/getting-started/set-up-your-isms/add-your-first-capa","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"oaBSXzpTjnkbJ1yu1CXs","title":"Add your first incident","pathname":"/start/getting-started/set-up-your-isms/add-your-first-incident","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"U14OwuXAmq0ltNwRf7FR","title":"Review your documents tab","pathname":"/start/getting-started/set-up-your-isms/review-your-documents-tab","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"t6fm0PvkGYksdt2xoE5V","title":"Assess your compliance","pathname":"/start/getting-started/set-up-your-isms/assess-your-compliance","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"V9WkZS9uwjWlQQVnE9FX","title":"Configure your Harpe feed","pathname":"/start/getting-started/set-up-your-isms/configure-your-harpe-feed","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"Set up your ISMS"}]},{"id":"tz7lSiZHfekJvta9dIRz","title":"Management","pathname":"/start/manual/management","siteSpaceId":"sitesp_4I15Z","description":"Configure key pieces of information about your organisation.","breadcrumbs":[{"label":"Manual"}]},{"id":"VhMIobTdmIxJ0VKiIGxi","title":"Overview","pathname":"/start/manual/management/overview","siteSpaceId":"sitesp_4I15Z","description":"Highlight key points about your business.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"vC2xsUTOmiI0m1O8FBRN","title":"Objectives","pathname":"/start/manual/management/objectives","siteSpaceId":"sitesp_4I15Z","description":"Set your organisation's goals and targets.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"haoeTo5T2aiBv8Udcg9z","title":"Overview","pathname":"/start/manual/management/objectives/overview","siteSpaceId":"sitesp_4I15Z","description":"Set your organisation's goals and targets.","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Objectives"}]},{"id":"WfYQo4dx84vs11ApE0is","title":"Adding an Objective","pathname":"/start/manual/management/objectives/adding-an-objective","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Objectives"}]},{"id":"aTYzcavjeSxLt0fxwAcf","title":"Viewing an Objective","pathname":"/start/manual/management/objectives/viewing-an-objective","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Objectives"}]},{"id":"lB6LNgMyrbakm2tw6kkz","title":"Example Objectives","pathname":"/start/manual/management/objectives/example-objectives","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Objectives"}]},{"id":"qbDIsNaUoAv5ZXWLvTTn","title":"Interested Parties","pathname":"/start/manual/management/interested-parties","siteSpaceId":"sitesp_4I15Z","description":"Track parties with a vested interest in your organisation.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"HZvgKbGWb1zmR37qY4Hp","title":"Overview","pathname":"/start/manual/management/interested-parties/overview","siteSpaceId":"sitesp_4I15Z","description":"Track parties with a vested interest in your organisation.","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Interested Parties"}]},{"id":"YTUIItlSNsiPHtDosY4Q","title":"Adding an Interested Party","pathname":"/start/manual/management/interested-parties/adding-an-interested-party","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Interested Parties"}]},{"id":"OvdUUnWKwcZYKxb7jbYJ","title":"Viewing an Interested Party","pathname":"/start/manual/management/interested-parties/viewing-an-interested-party","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Interested Parties"}]},{"id":"AolJl6NtjwzQ7EPKonAx","title":"Example Interested Parties","pathname":"/start/manual/management/interested-parties/example-interested-parties","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Interested Parties"}]},{"id":"hdirscxAG6YAwHbC6PKj","title":"Management Review","pathname":"/start/manual/management/management-review","siteSpaceId":"sitesp_4I15Z","description":"Plan reviews to keep your organisation on track.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"DP2HVge95Cbycbxw3adj","title":"Overview","pathname":"/start/manual/management/management-review/overview","siteSpaceId":"sitesp_4I15Z","description":"Plan reviews to keep your organisation on track.","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Management Review"}]},{"id":"AZY2xIzc2VIRbzks3SHp","title":"Adding a Management Review","pathname":"/start/manual/management/management-review/adding-a-management-review","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Management Review"}]},{"id":"44IMJEKjeK79Au32mNDP","title":"Viewing a Management Review","pathname":"/start/manual/management/management-review/viewing-a-management-review","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Management Review"}]},{"id":"fYnDu2BrCMkvIzwSm32G","title":"Example Management Reviews","pathname":"/start/manual/management/management-review/example-management-reviews","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Management Review"}]},{"id":"0qR570LcCkoeykH16LMS","title":"Audit","pathname":"/start/manual/management/audit","siteSpaceId":"sitesp_4I15Z","description":"Plan your internal and external audits.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"jxTZStw98H8wtdGhnUsR","title":"Overview","pathname":"/start/manual/management/audit/overview","siteSpaceId":"sitesp_4I15Z","description":"Plan your internal and external audits.","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Audit"}]},{"id":"UeADSoGifkonXqX1hmNn","title":"Adding an Audit","pathname":"/start/manual/management/audit/adding-an-audit","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Audit"}]},{"id":"2PQJ4dujFkCFRvpd6Qq6","title":"Viewing an Audit","pathname":"/start/manual/management/audit/viewing-an-audit","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Audit"}]},{"id":"BtwsSAppNLpeCmHrzTJx","title":"Example Audits","pathname":"/start/manual/management/audit/example-audits","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Audit"}]},{"id":"nam4sYpNnuL88BILNReB","title":"Legal and Regulatory","pathname":"/start/manual/management/legal-and-regulatory","siteSpaceId":"sitesp_4I15Z","description":"Track legislations governing your organisation's operations.","breadcrumbs":[{"label":"Manual"},{"label":"Management"}]},{"id":"WovYTOuRtbvMzlcBILE6","title":"Overview","pathname":"/start/manual/management/legal-and-regulatory/overview","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Legal and Regulatory"}]},{"id":"4VpW8qJndbY1hVVOlsAE","title":"Adding a Legislation","pathname":"/start/manual/management/legal-and-regulatory/adding-a-legislation","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Legal and Regulatory"}]},{"id":"wHAxnB0yKPXs5I7Z4NOU","title":"Viewing a Legislation","pathname":"/start/manual/management/legal-and-regulatory/viewing-a-legislation","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Legal and Regulatory"}]},{"id":"pnzRhj3eLztk3zPHhOhl","title":"Example Legislations","pathname":"/start/manual/management/legal-and-regulatory/example-legislations","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Management"},{"label":"Legal and Regulatory"}]},{"id":"zFuxTvd5QisDY5YQwt2C","title":"Feed","pathname":"/start/manual/feed","siteSpaceId":"sitesp_4I15Z","description":"Monitor your notifications and tasks.","breadcrumbs":[{"label":"Manual"}]},{"id":"3pSML8kFnXMKtV6gVvYL","title":"Assets","pathname":"/start/manual/assets","siteSpaceId":"sitesp_4I15Z","description":"Manage your assets and compliance.","breadcrumbs":[{"label":"Manual"}]},{"id":"jynRQ2v1YR4uhsLMtws7","title":"Overview","pathname":"/start/manual/assets/overview","siteSpaceId":"sitesp_4I15Z","description":"Manage your assets and compliance.","breadcrumbs":[{"label":"Manual"},{"label":"Assets"}]},{"id":"LOQuGW71jVB5OQnt9cIl","title":"Adding an Asset","pathname":"/start/manual/assets/adding-an-asset","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Assets"}]},{"id":"xCZwk3ewCDmby5faS4UA","title":"Viewing an Asset","pathname":"/start/manual/assets/viewing-an-asset","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Assets"}]},{"id":"ZHMdZDnwDh22a7Tsk2Zw","title":"Example Assets","pathname":"/start/manual/assets/example-assets","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Assets"}]},{"id":"sT5kekUePT8Vx8CGnZBd","title":"Suppliers","pathname":"/start/manual/suppliers","siteSpaceId":"sitesp_4I15Z","description":"Track your organisation's suppliers and their compliance.","breadcrumbs":[{"label":"Manual"}]},{"id":"Y0LJa6AELLwTlrJRPqZA","title":"Overview","pathname":"/start/manual/suppliers/overview","siteSpaceId":"sitesp_4I15Z","description":"Track your organisation's suppliers and their compliance.","breadcrumbs":[{"label":"Manual"},{"label":"Suppliers"}]},{"id":"ChgolPnI4UHul3BmIK0F","title":"Adding a Supplier","pathname":"/start/manual/suppliers/adding-a-supplier","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Suppliers"}]},{"id":"6W77wbf6T0GbmPLBXnp0","title":"Viewing a Supplier","pathname":"/start/manual/suppliers/viewing-a-supplier","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Suppliers"}]},{"id":"oHhiibMqZht3NkGqAfBW","title":"Example Suppliers","pathname":"/start/manual/suppliers/example-suppliers","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Suppliers"}]},{"id":"DhMTCd9jqMmqy50467SX","title":"People","pathname":"/start/manual/people","siteSpaceId":"sitesp_4I15Z","description":"Track your employees and their training.","breadcrumbs":[{"label":"Manual"}]},{"id":"CQKptp7Up84UMeCvUDtF","title":"Overview","pathname":"/start/manual/people/overview","siteSpaceId":"sitesp_4I15Z","description":"Track your employees and their training.","breadcrumbs":[{"label":"Manual"},{"label":"People"}]},{"id":"4S7nqukIwU7I8MBNpZ2D","title":"Adding a Person","pathname":"/start/manual/people/adding-a-person","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"People"}]},{"id":"ZzuJzJ7NiWVlu0nq9kZL","title":"Viewing a Person","pathname":"/start/manual/people/viewing-a-person","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"People"}]},{"id":"oLhcjGtmqPqRGBRnOob9","title":"Example People","pathname":"/start/manual/people/example-people","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"People"}]},{"id":"4BVBLHkDqjAoVNKMucwA","title":"Risks","pathname":"/start/manual/risks","siteSpaceId":"sitesp_4I15Z","description":"Identify and mitigate risks towards your organisation's security.","breadcrumbs":[{"label":"Manual"}]},{"id":"TgxipU4QaMkc1yfPDk3A","title":"Overview","pathname":"/start/manual/risks/overview","siteSpaceId":"sitesp_4I15Z","description":"Identify and mitigate risks towards your organisation's security.","breadcrumbs":[{"label":"Manual"},{"label":"Risks"}]},{"id":"NEbZjto3MlEVjWp6KrrQ","title":"Adding a Risk","pathname":"/start/manual/risks/adding-a-risk","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Risks"}]},{"id":"ADllFdaBkUDiHPrkvM8i","title":"Viewing a Risk","pathname":"/start/manual/risks/viewing-a-risk","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Risks"}]},{"id":"KKFzSRSMmJN0Vm0AA51v","title":"Example Risks","pathname":"/start/manual/risks/example-risks","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Risks"}]},{"id":"gU8lsFtRwQJKoUaXfEVt","title":"CAPA","pathname":"/start/manual/capa","siteSpaceId":"sitesp_4I15Z","description":"Corrective and Preventative Actions to solidify your organisation's security.","breadcrumbs":[{"label":"Manual"}]},{"id":"W8gjlYvtMn8s6DX29zFK","title":"Overview","pathname":"/start/manual/capa/overview","siteSpaceId":"sitesp_4I15Z","description":"Corrective and Preventative Actions to solidify your organisation's security.","breadcrumbs":[{"label":"Manual"},{"label":"CAPA"}]},{"id":"cK7Xg0vR4GryEsBWKTch","title":"Adding a CAPA","pathname":"/start/manual/capa/adding-a-capa","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"CAPA"}]},{"id":"xwE4NtKbQKJySQd0P2uz","title":"Viewing a CAPA","pathname":"/start/manual/capa/viewing-a-capa","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"CAPA"}]},{"id":"cKZg9jiSD5OhNbNhbwr7","title":"Example CAPAs","pathname":"/start/manual/capa/example-capas","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"CAPA"}]},{"id":"dgqOHWqv6nKeDzVytgmG","title":"Incidents","pathname":"/start/manual/incidents","siteSpaceId":"sitesp_4I15Z","description":"Track the remediation of incidents.","breadcrumbs":[{"label":"Manual"}]},{"id":"bvJT9GlQrYJmaiK6PyIA","title":"Overview","pathname":"/start/manual/incidents/overview","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Incidents"}]},{"id":"53qy3j7HHWT4hmIvZab3","title":"Adding an Incident","pathname":"/start/manual/incidents/adding-an-incident","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Incidents"}]},{"id":"nYdStYPkjdqOEt9pgrzD","title":"Viewing an Incident","pathname":"/start/manual/incidents/viewing-an-incident","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Incidents"}]},{"id":"1dPQ01x5J3Tkd4UmtKkS","title":"Example Incidents","pathname":"/start/manual/incidents/example-incidents","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Incidents"}]},{"id":"q68pWBjml4TccmODNnis","title":"Docs","pathname":"/start/manual/docs","siteSpaceId":"sitesp_4I15Z","description":"Store your organisation's various documents.","breadcrumbs":[{"label":"Manual"}]},{"id":"L2KhuplcPUsGhjuk3BNS","title":"Overview","pathname":"/start/manual/docs/overview","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Docs"}]},{"id":"t9J8k6fwoIIvbaUNg6HY","title":"Adding a Document","pathname":"/start/manual/docs/adding-a-document","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Docs"}]},{"id":"Bp99wWokIUBAtf0KneV7","title":"Viewing a Document","pathname":"/start/manual/docs/viewing-a-document","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Docs"}]},{"id":"Y8RJ6uNLSNrJFANjZduA","title":"Example Docs","pathname":"/start/manual/docs/example-docs","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Manual"},{"label":"Docs"}]},{"id":"iEK0gyS2oYAIF3rctUbE","title":"Assess","pathname":"/start/manual/assess","siteSpaceId":"sitesp_4I15Z","description":"Assess your compliance.","breadcrumbs":[{"label":"Manual"}]},{"id":"aCUsTOHi8w1BqbcBnPEC","title":"Harpe Wizard","pathname":"/start/manual/assess/harpe-wizard","siteSpaceId":"sitesp_4I15Z","description":"Your default compliance.","breadcrumbs":[{"label":"Manual"},{"label":"Assess"}]},{"id":"qPwtakAHTTRS70HT7Soa","title":"ISO27001:2013","pathname":"/start/manual/assess/iso27001-2013","siteSpaceId":"sitesp_4I15Z","description":"The 2013 ISO27001 controls and requirements.","breadcrumbs":[{"label":"Manual"},{"label":"Assess"}]},{"id":"8mdEuXGlXCmmyWaQPWbk","title":"ISO27001:2022","pathname":"/start/manual/assess/iso27001-2022","siteSpaceId":"sitesp_4I15Z","description":"The updated ISO27001 standard.","breadcrumbs":[{"label":"Manual"},{"label":"Assess"}]},{"id":"90qlzqQp8I1uBeCFq3Qf","title":"Phishing","pathname":"/start/manual/assess/phishing","siteSpaceId":"sitesp_4I15Z","description":"Test and harden your ISMS against external attacks.","breadcrumbs":[{"label":"Manual"},{"label":"Assess"}]},{"id":"AZ2cw0pMW7hqstegLM03","title":"Training","pathname":"/start/manual/training","siteSpaceId":"sitesp_4I15Z","description":"Keep your employees in the cyber security know.","breadcrumbs":[{"label":"Manual"}]},{"id":"WSDRpjOkQTP4HEzkXgYQ","title":"Security Awareness Training","pathname":"/start/manual/training/security-awareness-training","siteSpaceId":"sitesp_4I15Z","description":"Keep employees aware of common cybersecurity threats.","breadcrumbs":[{"label":"Manual"},{"label":"Training"}]},{"id":"csv6Y0vH3p6n1WdH7ney","title":"Policy and Procedure Training","pathname":"/start/manual/training/policy-and-procedure-training","siteSpaceId":"sitesp_4I15Z","description":"Keep your staff up-to-date with your internal policies and procedures.","breadcrumbs":[{"label":"Manual"},{"label":"Training"}]},{"id":"3aCyAcDObYIUfxDg4vXX","title":"Company Settings","pathname":"/start/settings/company-settings","siteSpaceId":"sitesp_4I15Z","description":"Tweak your basic company details and automations.","breadcrumbs":[{"label":"Settings"}]},{"id":"s6TvTa1cbAzOOvFCLuLO","title":"Connected Services","pathname":"/start/settings/company-settings/connected-services","siteSpaceId":"sitesp_4I15Z","description":"Link other services to Harpe.","breadcrumbs":[{"label":"Settings"},{"label":"Company Settings"}]},{"id":"m4qOI5MfogDtfgGzBVac","title":"Targets to monitor","pathname":"/start/settings/company-settings/targets-to-monitor","siteSpaceId":"sitesp_4I15Z","description":"Customised security alerts.","breadcrumbs":[{"label":"Settings"},{"label":"Company Settings"}]},{"id":"9YMmcjA8qRZx3WDTSWxK","title":"Automations","pathname":"/start/settings/company-settings/automations","siteSpaceId":"sitesp_4I15Z","description":"Automate your tasks.","breadcrumbs":[{"label":"Settings"},{"label":"Company Settings"}]},{"id":"pLDKspuUjb07ueTCWFY7","title":"Overview","pathname":"/start/iso27001-2013-wiki/overview","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"}]},{"id":"K6RfL5WKPDye3duL1CxS","title":"The Clauses","pathname":"/start/iso27001-2013-wiki/the-clauses","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"}]},{"id":"PuH6FSLVZ9Q2Ce9pQdIT","title":"Clause 4 - Context of the Organisation","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-4-context-of-the-organisation","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"N7pqa3WRTQb88v71koIH","title":"Clause 5 - Leadership","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-5-leadership","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"py0vynsllmw9zypgabFq","title":"Clause 6 - Planning","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-6-planning","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"YnBKOfCBlC8cz3c6YIQ8","title":"Clause 7 - Support","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-7-support","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"NKMtlK6SXmZRSo60burR","title":"Clause 8 - Operation","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-8-operation","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"czbC8f8k2Tf6DFeYDFLv","title":"Clause 9 - Performance Evaluation","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-9-performance-evaluation","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"pruyDMlsSlguqdiZ0vxZ","title":"Clause 10 - Improvement","pathname":"/start/iso27001-2013-wiki/the-clauses/clause-10-improvement","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"The Clauses"}]},{"id":"LH38XCCBqXKofrbV1twp","title":"Annex A Controls","pathname":"/start/iso27001-2013-wiki/annex-a-controls","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"}]},{"id":"bNwG8KVzDYrocEmLLDCe","title":"Annex A.5 - Information Security Policies","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.5-information-security-policies","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"EmNFlHkwAf8CTBi8qbZl","title":"Annex A.6 - Organisation of Information Security","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.6-organisation-of-information-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"a49JGjiMyVj65PS98bHV","title":"Annex A.7 - Human Resources Security","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.7-human-resources-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"KzTpm5pSdblWIpapDfit","title":"Annex A.8 - Asset Management","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.8-asset-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"iWMgDSV0hSoE5H2ccUOq","title":"Annex A.9 - Access Control","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.9-access-control","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"UDWfV6GfW8nhXVgLPsHd","title":"Annex A.10 - Cryptography","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.10-cryptography","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"NsuihkEtFiN8RjlK4r46","title":"Annex A.11 - Physical and Environmental Security","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.11-physical-and-environmental-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"Gyy1xR1EfZW43dHScyHj","title":"Annex A.12 - Operations Security","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.12-operations-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"n7pLJoLOTW4CxZYdtuFo","title":"Annex A.13 - Communications Security","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.13-communications-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"fb6fVQUHS1IS2OAjKdUK","title":"Annex A.14 - Systems Acquisition, Development, and Maintenance","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.14-systems-acquisition-development-and-maintenance","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"FnzQwYih3P2ey0NHTGPR","title":"Annex A.15 - Supplier Relationships","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.15-supplier-relationships","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"VIxB7g7y1Ii8zX29F6Cw","title":"Annex A.16 - Information Security Incident Management","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.16-information-security-incident-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"SPfoapkVDmxpZPvf3RTE","title":"Annex A.17 - Information Security Aspects of Business Continuity","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.17-information-security-aspects-of-business-continuity","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"wecqjGbGlOey18xkyx3U","title":"Annex A.18 - Compliance","pathname":"/start/iso27001-2013-wiki/annex-a-controls/annex-a.18-compliance","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2013 Wiki"},{"label":"Annex A Controls"}]},{"id":"UO64mRPwPQ4fRx4kc9Hf","title":"Overview","pathname":"/start/iso27001-2022-wiki/overview","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"}]},{"id":"3jjPzB2EV32D4uGWg7f2","title":"Annex A Controls","pathname":"/start/iso27001-2022-wiki/annex-a-controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"}]},{"id":"tr9AHp92fofQuy5VW6k4","title":"Annex A.5 - Organisational Controls","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"}]},{"id":"xnn71KVD0n25oWPUJVO6","title":"Annex A 5.1 - Policies for Information Security","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.1-policies-for-information-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"4tf62kICSZv5ISeWIuNN","title":"Annex A 5.2 - Information Security Roles and Responsibilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.2-information-security-roles-and-responsibilities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"ibMAou6bNLFlAzekMvPr","title":"Annex A 5.3 - Segregation of Duties","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.3-segregation-of-duties","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"mUNjQxaidUpswIVaojEw","title":"Annex A 5.4 - Management Responsibilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.4-management-responsibilities","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"QCv5sb5o42qZJnkZurVM","title":"Annex A 5.5 - Contact With Authorities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.5-contact-with-authorities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"f6un9MScQn0LY89o7KKY","title":"Annex A 5.6 - Contact With Special Interest Groups","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.6-contact-with-special-interest-groups","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"1IZZNEoeNMR7WJEdEVS1","title":"Annex A 5.7 - Threat Intelligence","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.7-threat-intelligence","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"a3yuirkUdqdEHFsaGHTC","title":"Annex A 5.8 - Information Security in Project Management","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.8-information-security-in-project-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"FeZMK7uuIRe9yD6wooAg","title":"Annex A 5.9 - Inventory of Information and Other Associated Assets","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.9-inventory-of-information-and-other-associated-assets","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"4HWbunjMdYDVEF6PN7Td","title":"Annex A 5.10 - Acceptable Use of Information and Other Associated Assets","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.10-acceptable-use-of-information-and-other-associated-assets","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"Rak9y19ZTpfLUeSaUAbO","title":"Annex A 5.11 - Return of Assets","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.11-return-of-assets","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"BvC2q0L6dkQchZbB0d7S","title":"Annex A 5.12 - Classification of Information","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.12-classification-of-information","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"kW7r9ALEjMSCeiJXPvpI","title":"Annex A 5.13 - Labelling of Information","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.13-labelling-of-information","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"XRcRtpBsffd2YEExfCbJ","title":"Annex A 5.14 - Information Transfer","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.14-information-transfer","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"PG6kexLC2jE9RuyWBo6u","title":"Annex A 5.15 - Access Control","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.15-access-control","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"0zRbZxfpwIo580bj4JJq","title":"Annex A 5.16 - Identity Management","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.16-identity-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"8MkdXAm7goOZmELbXeM1","title":"Annex A 5.17 - Authentication Information","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.17-authentication-information","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"zf1DRgtq288oxq078vvR","title":"Annex A 5.18 - Access Rights","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.18-access-rights","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"TiX34AgGfYLi2naT7nqZ","title":"Annex A 5.19 - Information Security in Supplier Relationships","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.19-information-security-in-supplier-relationships","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"mpEZaGK1jYoRLNReC3Kd","title":"Annex A 5.20 - Addressing Information Security Within Supplier Agreements","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.20-addressing-information-security-within-supplier-agreements","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"nH3U2iAS5OTak83JWcdk","title":"Annex A 5.21 - Managing Information Security in the ICT Supply Chain","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.21-managing-information-security-in-the-ict-supply-chain","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"raxec6LylLrTjLQADk6x","title":"Annex A 5.22 - Monitoring, Review and Change Management of Supplier Services","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.22-monitoring-review-and-change-management-of-supplier-services","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"HWTHzXkTNGa91pr1c4BA","title":"Annex A 5.23 - Information Security for Use of Cloud Services","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.23-information-security-for-use-of-cloud-services","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"mLnQT3EiDtVJ5ENyxYQP","title":"Annex A 5.24 - Information Security Incident Management Planning and Preparation","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.24-information-security-incident-management-planning-and-preparation","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"sN6k4IDFka2JcXYegQe1","title":"Annex A 5.25 - Assessment and Decision on Information Security Events","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.25-assessment-and-decision-on-information-security-events","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"7HTIJ7iTnLaoJeDzLRXm","title":"Annex A 5.26 - Response to Information Security Incidents","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.26-response-to-information-security-incidents","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"ulmQlQmg1Wkrb8jkFH7w","title":"Annex A 5.27 - Learning From Information Security Incidents","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.27-learning-from-information-security-incidents","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"v3dGZwREuG3ZY3bjC2I4","title":"Annex A 5.28 - Collection of Evidence","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.28-collection-of-evidence","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"lb8vaKJvqx4JElCbnTPd","title":"Annex A 5.29 - Information Security During Disruption","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.29-information-security-during-disruption","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"0kYZCfGrs4tVRtZwBUuh","title":"Annex A 5.30 - ICT Readiness for Business Continuity","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.30-ict-readiness-for-business-continuity","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"Fg8S8dMB0Mnvvkdm4SHx","title":"Annex A 5.31 - Legal, Statutory, Regulatory and Contractual Requirements","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.31-legal-statutory-regulatory-and-contractual-requirements","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"LRRimKzTCRZUJ9bmfRWO","title":"Annex A 5.32 - Intellectual Property Rights","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.32-intellectual-property-rights","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"0q0tRyRcn6ae4ZQOyF7X","title":"Annex A 5.33 - Protection of Records","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.33-protection-of-records","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"z4kJ2imfPQ6A42adPyKx","title":"Annex A 5.34 - Privacy and Protection of PII","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.34-privacy-and-protection-of-pii","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"HMM1njObg3wFhr8QSldU","title":"Annex A 5.35 - Independent Review of Information Security","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.35-independent-review-of-information-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"id7J3sZw1EDOCKy1g2Xn","title":"Annex A 5.36 - Compliance With Policies, Rules and Standards for Information Security","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.36-compliance-with-policies-rules-and-standards-for-information-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"ja4DOuX9t9EsV3F9jLtI","title":"Annex A 5.37 - Documented Operating Procedures","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.5-organisational-controls/annex-a-5.37-documented-operating-procedures","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.5 - Organisational Controls"}]},{"id":"NWDio8SDMp33Euh4elUd","title":"Annex A.6 - People Controls","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"}]},{"id":"kGHwXCNQehItefGOKqW8","title":"Annex A 6.1 - Screening","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.1-screening","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"e036H3gvmDZhscw2oyDY","title":"Annex A 6.2 - Terms and Conditions of Employment","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.2-terms-and-conditions-of-employment","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"WRynTJH4trLqvwdYmqMU","title":"Annex A 6.3 - Information Security Awareness, Education and Training","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.3-information-security-awareness-education-and-training","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"HQp7KVgxuALNTm8rctYj","title":"Annex A 6.4 - Disciplinary Process","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.4-disciplinary-process","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"XCLtSVstbEsJbTFQaboK","title":"Annex A 6.5 - Responsibilities After Termination or Change of Employment","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.5-responsibilities-after-termination-or-change-of-employment","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"VvX6P75VJVsE8r9JIlkg","title":"Annex A 6.6 - Confidentiality or Non-Disclosure Agreements","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.6-confidentiality-or-non-disclosure-agreements","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"2DFAkqaRMNznKqCSsaGB","title":"Annex A 6.7 - Remote Working","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.7-remote-working","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"dUHdQWKvLQYxn7Of46mM","title":"Annex A 6.8 - Information Security Event Reporting","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.6-people-controls/annex-a-6.8-information-security-event-reporting","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.6 - People Controls"}]},{"id":"NwSfRAZZ9u0IJyY8qwBV","title":"Annex A.7 -Physical Controls","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"}]},{"id":"yvbBFBrI72AInQpG1CUN","title":"Annex A 7.1 - Physical Security Perimeters","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.1-physical-security-perimeters","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"OSkQvIyOVYigFvfB03Qj","title":"Annex A 7.2 - Physical Entry","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.2-physical-entry","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"ZoybYlsJdRkfzlstKraU","title":"Annex A 7.3 - Securing Offices, Rooms and Facilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.3-securing-offices-rooms-and-facilities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"4zJDgTWjBACmMo2RzzjX","title":"Annex A 7.4 - Physical Security Monitoring","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.4-physical-security-monitoring","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"az6wgWbK6JCgVpDVNOEY","title":"Annex A 7.5 - Protecting Against Physical and Environmental Threats","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.5-protecting-against-physical-and-environmental-threats","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"Ilfy549ZD2mYQgDLdR45","title":"Annex A 7.6 - Working In Secure Areas","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.6-working-in-secure-areas","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"a86oGdFPgpv9PadFRJZV","title":"Annex A 7.7 - Clear Desk and Clear Screen","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.7-clear-desk-and-clear-screen","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"4zTav1VowmlIyxmn7yZn","title":"Annex A 7.8 - Equipment Siting and Protection","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.8-equipment-siting-and-protection","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"wSamBLh1Qwik6mV6f9Rw","title":"Annex A 7.9 - Security of Assets Off-Premises","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.9-security-of-assets-off-premises","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"SjZyHzEXIjwA1x4cF8gr","title":"Annex A 7.10 - Storage Media","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.10-storage-media","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"Sil533PKaBYEip3tzxk0","title":"Annex A 7.11 - Supporting Utilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.11-supporting-utilities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"6jKw04rkGAt7sXxfVlNN","title":"Annex A 7.12 - Cabling Security","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.12-cabling-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"ufkGWJ9Y93dCpgG784nd","title":"Annex A 7.13 - Equipment Maintenance","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.13-equipment-maintenance","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"CCnXr8OinOEIR1MYE5pf","title":"Annex A 7.14 - Secure Disposal or Re-Use of Equipment","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.7-physical-controls/annex-a-7.14-secure-disposal-or-re-use-of-equipment","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.7 -Physical Controls"}]},{"id":"gz7hNo8qEdNq7cOJbwBg","title":"Annex A.8 - Technological Controls","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"}]},{"id":"Od8v3hVvTC0onR2XjwIf","title":"Annex A 8.1 - User Endpoint Devices","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.1-user-endpoint-devices","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"z5oLQ9AOqMHrPtKKsH1D","title":"Annex A 8.2 - Privileged Access Rights","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.2-privileged-access-rights","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"xlEUTuACuUq1jY0eFNhU","title":"Annex A 8.3 - Information Access Restriction","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.3-information-access-restriction","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"8qFxGZa1jU0pVMcSsOr6","title":"Annex A 8.4 - Access to Source Code","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.4-access-to-source-code","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"87MmBYHLf9lXPWKRjZSQ","title":"Annex A 8.5 - Secure Authentication","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.5-secure-authentication","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"G5GBSjbtsq9Wv2Sv0Wna","title":"Annex A 8.6 - Capacity Management","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.6-capacity-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"aZhIYcPaenfxmCGv8F9Y","title":"Annex A 8.7 - Protection Against Malware","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.7-protection-against-malware","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"mxWkDapuHaxEYvu9Fu86","title":"Annex A 8.8 - Management of Technical Vulnerabilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.8-management-of-technical-vulnerabilities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"gSRPIGgp2VSqq3o5Q03r","title":"Annex A 8.9 - Configuration Management","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.9-configuration-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"0sdvHnfmS2VRwQCE1IyV","title":"Annex A 8.10 - Information Deletion","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.10-information-deletion","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"IuiEoya3CXX2JYs7k2Ch","title":"Annex A 8.11 - Data Masking","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.11-data-masking","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"iE0yqHHN8vPm5adwBWXc","title":"Annex A 8.12 - Data Leakage Prevention","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.12-data-leakage-prevention","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"KF0r8heVfNv9NbMIxSw3","title":"Annex A 8.13 - Information Backup","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.13-information-backup","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"jChEBDEcorWknIO3nTp8","title":"Annex A 8.14 - Redundancy of Information Processing Facilities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.14-redundancy-of-information-processing-facilities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"oRXL2SsRV2HOs6ynk4wF","title":"Annex A 8.15 - Logging","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.15-logging","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"A1zH38TsaWLAvydNd9gE","title":"Annex A 8.16 - Monitoring Activities","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.16-monitoring-activities","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"Im1UqNtNBd2pxdjVMxmX","title":"Annex A 8.17 - Clock Synchronization","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.17-clock-synchronization","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"ZhPUFgvMw7QSWPSPwBTM","title":"Annex A 8.18 - Use of Privileged Utility Programs","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.18-use-of-privileged-utility-programs","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"wFVJ1B6BmZ7B7yeawTOZ","title":"Annex A 8.19 - Installation of Software on Operational Systems","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.19-installation-of-software-on-operational-systems","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"azvxoLLQEHmHPsuufOpf","title":"Annex A 8.20 - Networks Security","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.20-networks-security","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"B0RuUzGbH8CxS8kP6bvZ","title":"Annex A 8.21 - Security of Network Services","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.21-security-of-network-services","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"cpGCe4zLmCXc2GHHfC5Q","title":"Annex A 8.22 - Segregation of Networks","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.22-segregation-of-networks","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"ymPJ32HmM4YByRhbePzj","title":"Annex A 8.23 - Web filtering","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.23-web-filtering","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"px35nBIGPRPej02Li5K6","title":"Annex A 8.24 - Use of Cryptography","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.24-use-of-cryptography","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"YUfj381NO0L3OkylWZjC","title":"Annex A 8.25 - Secure Development Life Cycle","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.25-secure-development-life-cycle","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"CnvL69g0YnFpgXBP22tS","title":"Annex A 8.26 - Application Security Requirements","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.26-application-security-requirements","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"SqdnC2lR93aa7jUTRuZj","title":"Annex A 8.27 - Secure System Architecture and Engineering Principles","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.27-secure-system-architecture-and-engineering-principles","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"VPB3l68vQuyZt1DcI071","title":"Annex A 8.28 - Secure Coding","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.28-secure-coding","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"vIgedfzUB3sRPfJGdoz5","title":"Annex A 8.29 - Security Testing in Development and Acceptance","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.29-security-testing-in-development-and-acceptance","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"tlyJIOWUJatwuySb0Hd5","title":"Annex A 8.30 - Outsourced Development","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.30-outsourced-development","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"oRzOklUt3E5ouOeWlAtF","title":"Annex A 8.31 - Separation of Development, Test and Production Environments","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.31-separation-of-development-test-and-production-environments","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"C3tLc22ROZEnasdOCAO1","title":"Annex A 8.32 - Change Management","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.32-change-management","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"L3XhAUyTJe4PE8eN8snQ","title":"Annex A 8.33 - Test Information","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.33-test-information","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"yaAdyB8uzQLwPiLNsAyS","title":"Annex A 8.34 - Protection of Information Systems During Audit Testing","pathname":"/start/iso27001-2022-wiki/annex-a-controls/annex-a.8-technological-controls/annex-a-8.34-protection-of-information-systems-during-audit-testing","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"ISO27001:2022 Wiki"},{"label":"Annex A Controls"},{"label":"Annex A.8 - Technological Controls"}]},{"id":"Jma1dLgC3jNoNluWwNNa","title":"Overview","pathname":"/start/cyber-essentials-wiki/overview","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"}]},{"id":"jRjCyuJpRDH2jpSDyHOZ","title":"Controls","pathname":"/start/cyber-essentials-wiki/controls","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"}]},{"id":"ObwWZzMxKwY5zlbdIIry","title":"1. Firewalls","pathname":"/start/cyber-essentials-wiki/controls/1.-firewalls","siteSpaceId":"sitesp_4I15Z","description":"Secure your network boundaries.","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"ABJBR0gvW4gYULhFkS24","title":"2. Secure Configuration","pathname":"/start/cyber-essentials-wiki/controls/2.-secure-configuration","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"CG9FYtUZ3wA95LpyZGl3","title":"3. User Access Control","pathname":"/start/cyber-essentials-wiki/controls/3.-user-access-control","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"vEKeUoK8unSrxQVchV3I","title":"4. Malware Protection","pathname":"/start/cyber-essentials-wiki/controls/4.-malware-protection","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"3IEF24csNxpYCMGUU4wE","title":"5. Security Update Management","pathname":"/start/cyber-essentials-wiki/controls/5.-security-update-management","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"f6c9OSJuQTScwz46KMR6","title":"Further Guidance","pathname":"/start/cyber-essentials-wiki/controls/further-guidance","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"}]},{"id":"nINwQkjOxSTP7mD7X73R","title":"Backup Your Data","pathname":"/start/cyber-essentials-wiki/controls/further-guidance/backup-your-data","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Cyber Essentials WIKI"},{"label":"Controls"},{"label":"Further Guidance"}]},{"id":"XotJt24ggXNFyPU2YSt5","title":"Tools","pathname":"/start/harpe-approved/tools","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"}]},{"id":"qSh92lRmOGJvhXnpbgZm","title":"Asana","pathname":"/start/harpe-approved/tools/asana","siteSpaceId":"sitesp_4I15Z","description":"Asana system review carried out by the security experts at Harpe.","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"pYgd1fnzo6YK5cnx6gQ8","title":"Confluence","pathname":"/start/harpe-approved/tools/confluence","siteSpaceId":"sitesp_4I15Z","description":"Here is the system review for Confluence carried out by the security experts at Harpe","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"D8LqmVlsjizzyqFP6JhC","title":"Datadoghq.com","pathname":"/start/harpe-approved/tools/datadoghq.com","siteSpaceId":"sitesp_4I15Z","description":"Here is the system review for Datadoghq.com carried out by the security experts at Harpe","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"CO2nyqBkWKW3gZQjiKgZ","title":"GitHub","pathname":"/start/harpe-approved/tools/github","siteSpaceId":"sitesp_4I15Z","description":"Here is the system review for Datadoghq.com carried out by the security experts at Harpe","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"QWapNGYP0uzEzYGeUpBl","title":"Jira","pathname":"/start/harpe-approved/tools/jira","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"NzXx8BcXLYApiebJTdAW","title":"Logz.io","pathname":"/start/harpe-approved/tools/logz.io","siteSpaceId":"sitesp_4I15Z","description":"Here is the system review for Logz.io carried out by the security experts at Harpe","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"W5OaYd5ZyI1MQqcZ6wUF","title":"Opsgenie","pathname":"/start/harpe-approved/tools/opsgenie","siteSpaceId":"sitesp_4I15Z","description":"Here is the system review for OpsGenie carried out by the security experts at Harpe","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"zvdbND3exTO3ICIIjbXS","title":"Slack","pathname":"/start/harpe-approved/tools/slack","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"1uKTOErTvN6HCWfoVoCN","title":"Trello","pathname":"/start/harpe-approved/tools/trello","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"8w9n4dSFTkEqv7FbWIW2","title":"Twilio","pathname":"/start/harpe-approved/tools/twilio","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"},{"label":"Tools"}]},{"id":"0kDMlDay705ogp1qtQYf","title":"Suppliers","pathname":"/start/harpe-approved/suppliers","siteSpaceId":"sitesp_4I15Z","description":"","breadcrumbs":[{"label":"Harpe approved"}]},{"id":"ULfkTnB3jxBxzb6qg9nB","title":"Acer","pathname":"/start/harpe-approved/suppliers/acer","siteSpaceId":"sitesp_4I15Z","description":"https://www.acer.com/gb-en","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"X0kEeB6bqjLmYCdalOvk","title":"Adobe Creative Cloud","pathname":"/start/harpe-approved/suppliers/adobe-creative-cloud","siteSpaceId":"sitesp_4I15Z","description":"https://www.adobe.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"BEcwOmuI71N47XusB7xa","title":"AgileBits Inc","pathname":"/start/harpe-approved/suppliers/agilebits-inc","siteSpaceId":"sitesp_4I15Z","description":"https://1password.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"Qu9hqSR5jRWNkvJzL6l3","title":"Apple Inc.","pathname":"/start/harpe-approved/suppliers/apple-inc.","siteSpaceId":"sitesp_4I15Z","description":"https://www.apple.com/uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"GrJGDhXAJS23ewZ11Owi","title":"Apptio","pathname":"/start/harpe-approved/suppliers/apptio","siteSpaceId":"sitesp_4I15Z","description":"https://www.apptio.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"zNCjQtMNZt91HFbE0P2u","title":"Atlassian","pathname":"/start/harpe-approved/suppliers/atlassian","siteSpaceId":"sitesp_4I15Z","description":"https://www.atlassian.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"UKLnnTdZI1LFVbmuw7sL","title":"AWS","pathname":"/start/harpe-approved/suppliers/aws","siteSpaceId":"sitesp_4I15Z","description":"https://aws.amazon.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"lAjuB23axu6EwV0X2nxf","title":"BILL","pathname":"/start/harpe-approved/suppliers/bill","siteSpaceId":"sitesp_4I15Z","description":"https://www.bill.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"Qftfy854QtYijhsMxlBK","title":"Block","pathname":"/start/harpe-approved/suppliers/block","siteSpaceId":"sitesp_4I15Z","description":"https://block.xyz/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"iJhkKZC2ZJAKA9gEwkvp","title":"Box","pathname":"/start/harpe-approved/suppliers/box","siteSpaceId":"sitesp_4I15Z","description":"https://www.box.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"TXWSzZCGiVwy3rAwYiTE","title":"Chargebee","pathname":"/start/harpe-approved/suppliers/chargebee","siteSpaceId":"sitesp_4I15Z","description":"https://www.chargebee.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"kz259oYyCO4jCPdbHmTy","title":"Datadog","pathname":"/start/harpe-approved/suppliers/datadog","siteSpaceId":"sitesp_4I15Z","description":"https://www.datadoghq.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"W6TYyDI1oe0UG1DOdjti","title":"Dell Technologies","pathname":"/start/harpe-approved/suppliers/dell-technologies","siteSpaceId":"sitesp_4I15Z","description":"https://www.dell.com/en-uk","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"lfdvIW716xxqsLz2hftV","title":"Densify","pathname":"/start/harpe-approved/suppliers/densify","siteSpaceId":"sitesp_4I15Z","description":"https://www.densify.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"CpAkFLb7Y8zY4n5aGt0S","title":"DocuSign","pathname":"/start/harpe-approved/suppliers/docusign","siteSpaceId":"sitesp_4I15Z","description":"https://www.docusign.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"HVGpYTcwFL7ZaLSjBxWT","title":"Duffel","pathname":"/start/harpe-approved/suppliers/duffel","siteSpaceId":"sitesp_4I15Z","description":"https://duffel.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"zDwofcZYNxXKydjosxFg","title":"EMIS Health","pathname":"/start/harpe-approved/suppliers/emis-health","siteSpaceId":"sitesp_4I15Z","description":"https://emishealth.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"fwnU1tvWW7mOMfaAnLPg","title":"Epignosis","pathname":"/start/harpe-approved/suppliers/epignosis","siteSpaceId":"sitesp_4I15Z","description":"https://www.epignosishq.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"W379GrQfBGnr05aQSYFt","title":"ESET","pathname":"/start/harpe-approved/suppliers/eset","siteSpaceId":"sitesp_4I15Z","description":"https://www.eset.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"gv7IqYJUMqVQJ5GHGrT3","title":"E-Sign","pathname":"/start/harpe-approved/suppliers/e-sign","siteSpaceId":"sitesp_4I15Z","description":"https://www.esign.co.uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"OsY7K0610mrmxzEpFwBn","title":"GitLab","pathname":"/start/harpe-approved/suppliers/gitlab","siteSpaceId":"sitesp_4I15Z","description":"https://about.gitlab.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"0YEW5OySZTmJWLTqAxTx","title":"Google","pathname":"/start/harpe-approved/suppliers/google","siteSpaceId":"sitesp_4I15Z","description":"https://workspace.google.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"QNgM9wyEsXRsWQjMro8T","title":"Gremlin","pathname":"/start/harpe-approved/suppliers/gremlin","siteSpaceId":"sitesp_4I15Z","description":"https://www.gremlin.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"xWrMCVVX5eXXhYY75ZAb","title":"Guidewire","pathname":"/start/harpe-approved/suppliers/guidewire","siteSpaceId":"sitesp_4I15Z","description":"https://www.guidewire.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"olIwv09ig7aZPjCSJMbZ","title":"Gusto","pathname":"/start/harpe-approved/suppliers/gusto","siteSpaceId":"sitesp_4I15Z","description":"https://gusto.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"ms2BWdWOngDnMtuGlZTT","title":"HP (Hewlett - Packard)","pathname":"/start/harpe-approved/suppliers/hp-hewlett-packard","siteSpaceId":"sitesp_4I15Z","description":"https://www.hp.com/gb-en/home.html","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"xZIf0uPZSqTbBydPOmv4","title":"HSO","pathname":"/start/harpe-approved/suppliers/hso","siteSpaceId":"sitesp_4I15Z","description":"https://www.hso.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"QM8z3fQapWVhCKvCD7uu","title":"HubSpot","pathname":"/start/harpe-approved/suppliers/hubspot","siteSpaceId":"sitesp_4I15Z","description":"https://hubspot.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"RAy45wxG6rvXs1smTnV6","title":"IASME","pathname":"/start/harpe-approved/suppliers/iasme","siteSpaceId":"sitesp_4I15Z","description":"https://iasme.co.uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"HIUAkQgvHQY5UpUmSeNT","title":"Intuit","pathname":"/start/harpe-approved/suppliers/intuit","siteSpaceId":"sitesp_4I15Z","description":"https://www.intuit.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"gOdc2J71YiXaoDLIDkjP","title":"JetBrains","pathname":"/start/harpe-approved/suppliers/jetbrains","siteSpaceId":"sitesp_4I15Z","description":"https://www.jetbrains.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"QsE9uu9UYXb8dtMq2jPj","title":"Lenovo","pathname":"/start/harpe-approved/suppliers/lenovo","siteSpaceId":"sitesp_4I15Z","description":"https://www.lenovo.com/gb/en/pc/?orgRef=https%253A%252F%252Fwww.google.com%252F","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"s5HV9oBN3Q4JBybJ51I3","title":"Logz.io","pathname":"/start/harpe-approved/suppliers/logz.io","siteSpaceId":"sitesp_4I15Z","description":"https://logz.io/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"8pV1iKIc1WUx2zbp0CAz","title":"Lucid Software Inc","pathname":"/start/harpe-approved/suppliers/lucid-software-inc","siteSpaceId":"sitesp_4I15Z","description":"https://www.lucidchart.com/pages","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"n70QEEKc0dh2O0U5641P","title":"Meta Platforms Inc","pathname":"/start/harpe-approved/suppliers/meta-platforms-inc","siteSpaceId":"sitesp_4I15Z","description":"https://about.meta.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"OPhQRNnIvvMO0gEMMdCy","title":"Microsoft","pathname":"/start/harpe-approved/suppliers/microsoft","siteSpaceId":"sitesp_4I15Z","description":"https://www.microsoft.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"BjYsiOdwPkGvspBcRQeg","title":"MongoDB Atlas","pathname":"/start/harpe-approved/suppliers/mongodb-atlas","siteSpaceId":"sitesp_4I15Z","description":"https://www.mongodb.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"rtRv0KCy7mcNh3cueFSq","title":"New Relic","pathname":"/start/harpe-approved/suppliers/new-relic","siteSpaceId":"sitesp_4I15Z","description":"https://newrelic.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"HPpd3IYWUZ6N1sgJG0MY","title":"Obsidian.md","pathname":"/start/harpe-approved/suppliers/obsidian-md","siteSpaceId":"sitesp_4I15Z","description":"https://obsidian.md/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"oqjF4t3f3yp1zfs3kgZ2","title":"Paycom","pathname":"/start/harpe-approved/suppliers/paycom","siteSpaceId":"sitesp_4I15Z","description":"https://www.paycom.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"cykWrBfORHJ8qUbaQiaY","title":"Periculo","pathname":"/start/harpe-approved/suppliers/periculo","siteSpaceId":"sitesp_4I15Z","description":"https://www.periculo.co.uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"Eyl9haAx3sH4Ca0rWKyw","title":"Process Street","pathname":"/start/harpe-approved/suppliers/process-street","siteSpaceId":"sitesp_4I15Z","description":"https://www.process.st/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"y31b0otjuqUcK5IGfzIK","title":"Qualtrics","pathname":"/start/harpe-approved/suppliers/qualtrics","siteSpaceId":"sitesp_4I15Z","description":"https://www.qualtrics.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"lTteg0vmXXn9sy6rtLQt","title":"Salesforce","pathname":"/start/harpe-approved/suppliers/salesforce","siteSpaceId":"sitesp_4I15Z","description":"https://www.salesforce.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"xVJiPkTUjxoVDYaoB2Ow","title":"ServiceNow","pathname":"/start/harpe-approved/suppliers/servicenow","siteSpaceId":"sitesp_4I15Z","description":"https://www.servicenow.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"1W7GDw1sXtKGTXqN9sH4","title":"Shopify","pathname":"/start/harpe-approved/suppliers/shopify","siteSpaceId":"sitesp_4I15Z","description":"https://www.shopify.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"adD6yznF3AZjqfUOnkr8","title":"Slack","pathname":"/start/harpe-approved/suppliers/slack","siteSpaceId":"sitesp_4I15Z","description":"https://www.slack.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"g8NnxusS2ztP3TdiUI3V","title":"Smartsheet","pathname":"/start/harpe-approved/suppliers/smartsheet","siteSpaceId":"sitesp_4I15Z","description":"https://www.smartsheet.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"2ym3KB9FCMLRATfz2iOS","title":"SolarWinds","pathname":"/start/harpe-approved/suppliers/solarwinds","siteSpaceId":"sitesp_4I15Z","description":"https://www.solarwinds.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"mVTRTTxbESHZU7TIKDkB","title":"Spendesk","pathname":"/start/harpe-approved/suppliers/spendesk","siteSpaceId":"sitesp_4I15Z","description":"https://www.spendesk.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"sR1yPqsb17rclLfMcHwh","title":"Splunk","pathname":"/start/harpe-approved/suppliers/splunk","siteSpaceId":"sitesp_4I15Z","description":"https://www.splunk.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"8etA67QIs4pjnMy6JKgB","title":"Stripe","pathname":"/start/harpe-approved/suppliers/stripe","siteSpaceId":"sitesp_4I15Z","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"80y5Ebg5UxIE9IACWGK6","title":"Tenable","pathname":"/start/harpe-approved/suppliers/tenable","siteSpaceId":"sitesp_4I15Z","description":"https://www.tenable.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"YR3qz2uRe79bVfTjWnNY","title":"Toshiba","pathname":"/start/harpe-approved/suppliers/toshiba","siteSpaceId":"sitesp_4I15Z","description":"https://www.toshiba.co.uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"NgiMx57wOacJZh9hB35D","title":"Twilio","pathname":"/start/harpe-approved/suppliers/twilio","siteSpaceId":"sitesp_4I15Z","description":"https://www.twilio.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"a2m5YWFf4KqHYbWasDcd","title":"Uber","pathname":"/start/harpe-approved/suppliers/uber","siteSpaceId":"sitesp_4I15Z","description":"https://www.uber.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"sYDv6BP3PSbrmhmGGLFD","title":"Upwork","pathname":"/start/harpe-approved/suppliers/upwork","siteSpaceId":"sitesp_4I15Z","description":"https://www.upwork.com/en-gb/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"YipsVrTzc5223OUsRQQL","title":"Webflow","pathname":"/start/harpe-approved/suppliers/webflow","siteSpaceId":"sitesp_4I15Z","description":"https://webflow.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"RwWIorzvkzRuZtR8Qqp5","title":"Workday","pathname":"/start/harpe-approved/suppliers/workday","siteSpaceId":"sitesp_4I15Z","description":"https://www.workday.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"hWHETBiJ1KUCPfuJuYud","title":"Workiva","pathname":"/start/harpe-approved/suppliers/workiva","siteSpaceId":"sitesp_4I15Z","description":"https://www.workiva.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"uK1Emxgm4dzk3GFTpJnH","title":"Xero","pathname":"/start/harpe-approved/suppliers/xero","siteSpaceId":"sitesp_4I15Z","description":"https://www.xero.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"oPjQuzCoh9SFA0eBBbXB","title":"Zendesk","pathname":"/start/harpe-approved/suppliers/zendesk","siteSpaceId":"sitesp_4I15Z","description":"https://www.zendesk.co.uk/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"BKhtt98KIlaPCw2t3g80","title":"ZipRecruiter","pathname":"/start/harpe-approved/suppliers/ziprecruiter","siteSpaceId":"sitesp_4I15Z","description":"https://www.ziprecruiter.com/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"D5ZS46MVL7i6B0YR3sbz","title":"Zoom","pathname":"/start/harpe-approved/suppliers/zoom","siteSpaceId":"sitesp_4I15Z","description":"https://zoom.us/","breadcrumbs":[{"label":"Harpe approved"},{"label":"Suppliers"}]},{"id":"OftT1B4bur93j1mjZxRg","title":"Payments and refunds","pathname":"/start/payments-and-refunds","siteSpaceId":"sitesp_4I15Z","description":"We do not have a refund policy in place, once you pay it is non refundable."}]}