{"id":27542,"date":"2026-02-12T14:13:39","date_gmt":"2026-02-12T14:13:39","guid":{"rendered":"https:\/\/www.openedr.com\/blog\/?p=27542"},"modified":"2026-02-12T14:13:39","modified_gmt":"2026-02-12T14:13:39","slug":"cyber-security-audit","status":"publish","type":"post","link":"https:\/\/www.openedr.com\/blog\/cyber-security-audit\/","title":{"rendered":"Cyber Security Audit: A Complete Guide for Modern Businesses"},"content":{"rendered":"<p data-start=\"333\" data-end=\"599\">When was the last time your organization conducted a cyber security audit? If you\u2019re unsure, that alone could signal risk. Cyberattacks are increasing in frequency and sophistication, and many breaches occur because businesses fail to identify security gaps in time.<\/p>\n<p data-start=\"601\" data-end=\"850\">A cyber security audit is a structured evaluation of your organization\u2019s information systems, policies, and security controls. It assesses whether your cybersecurity framework effectively protects sensitive data and complies with industry standards.<\/p>\n<p data-start=\"852\" data-end=\"1055\">For IT managers, cybersecurity professionals, CEOs, and founders, understanding the value of a cyber security audit is essential for protecting assets, maintaining compliance, and reducing business risk.<\/p>\n<hr data-start=\"1057\" data-end=\"1060\" \/>\n<h2 data-start=\"1062\" data-end=\"1096\">What Is a Cyber Security Audit?<\/h2>\n<p data-start=\"1098\" data-end=\"1302\">A cyber security audit is a formal review of an organization\u2019s security posture. It examines how well security policies, technologies, and procedures align with best practices and regulatory requirements.<\/p>\n<p data-start=\"1304\" data-end=\"1410\">Unlike routine monitoring, a cyber security audit provides an independent and comprehensive assessment of:<\/p>\n<ul data-start=\"1412\" data-end=\"1565\">\n<li data-start=\"1412\" data-end=\"1441\">\n<p data-start=\"1414\" data-end=\"1441\">Network security controls<\/p>\n<\/li>\n<li data-start=\"1442\" data-end=\"1474\">\n<p data-start=\"1444\" data-end=\"1474\">Endpoint protection measures<\/p>\n<\/li>\n<li data-start=\"1475\" data-end=\"1504\">\n<p data-start=\"1477\" data-end=\"1504\">Access management systems<\/p>\n<\/li>\n<li data-start=\"1505\" data-end=\"1533\">\n<p data-start=\"1507\" data-end=\"1533\">Data protection policies<\/p>\n<\/li>\n<li data-start=\"1534\" data-end=\"1565\">\n<p data-start=\"1536\" data-end=\"1565\">Incident response readiness<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1567\" data-end=\"1654\">In simple terms, a cyber security audit identifies vulnerabilities before attackers do.<\/p>\n<h2 data-start=\"1661\" data-end=\"1708\">Why a Cyber Security Audit Is Critical Today<\/h2>\n<p data-start=\"1710\" data-end=\"1870\">Modern businesses operate in hybrid environments that combine cloud platforms, remote endpoints, and on-premises infrastructure. This complexity increases risk.<\/p>\n<p data-start=\"1872\" data-end=\"1915\"><strong>A cyber security audit helps organizations:<\/strong><\/p>\n<ul data-start=\"1917\" data-end=\"2079\">\n<li data-start=\"1917\" data-end=\"1950\">\n<p data-start=\"1919\" data-end=\"1950\">Detect hidden vulnerabilities<\/p>\n<\/li>\n<li data-start=\"1951\" data-end=\"1984\">\n<p data-start=\"1953\" data-end=\"1984\">Strengthen compliance posture<\/p>\n<\/li>\n<li data-start=\"1985\" data-end=\"2012\">\n<p data-start=\"1987\" data-end=\"2012\">Prevent costly breaches<\/p>\n<\/li>\n<li data-start=\"2013\" data-end=\"2054\">\n<p data-start=\"2015\" data-end=\"2054\">Improve governance and accountability<\/p>\n<\/li>\n<li data-start=\"2055\" data-end=\"2079\">\n<p data-start=\"2057\" data-end=\"2079\">Build customer trust<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2081\" data-end=\"2178\">Without a cyber security audit, security gaps may remain unnoticed until a cyber incident occurs.<\/p>\n<h2 data-start=\"2185\" data-end=\"2218\">Types of Cyber Security Audits<\/h2>\n<p data-start=\"2220\" data-end=\"2317\">Not all audits are the same. The scope of a cyber security audit depends on organizational needs.<\/p>\n<h3 data-start=\"2319\" data-end=\"2340\">1. Internal Audit<\/h3>\n<p data-start=\"2342\" data-end=\"2435\">Conducted by in-house security teams. It focuses on reviewing existing policies and controls.<\/p>\n<h3 data-start=\"2437\" data-end=\"2458\">2. External Audit<\/h3>\n<p data-start=\"2460\" data-end=\"2554\">Performed by independent third-party experts. It provides unbiased evaluation and credibility.<\/p>\n<h3 data-start=\"2556\" data-end=\"2579\">3. Compliance Audit<\/h3>\n<p data-start=\"2581\" data-end=\"2622\"><strong>Ensures alignment with standards such as:<\/strong><\/p>\n<ul data-start=\"2624\" data-end=\"2701\">\n<li data-start=\"2624\" data-end=\"2637\">\n<p data-start=\"2626\" data-end=\"2637\">ISO 27001<\/p>\n<\/li>\n<li data-start=\"2638\" data-end=\"2670\">\n<p data-start=\"2640\" data-end=\"2670\">NIST Cybersecurity Framework<\/p>\n<\/li>\n<li data-start=\"2671\" data-end=\"2682\">\n<p data-start=\"2673\" data-end=\"2682\">PCI DSS<\/p>\n<\/li>\n<li data-start=\"2683\" data-end=\"2692\">\n<p data-start=\"2685\" data-end=\"2692\">HIPAA<\/p>\n<\/li>\n<li data-start=\"2693\" data-end=\"2701\">\n<p data-start=\"2695\" data-end=\"2701\">GDPR<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"2703\" data-end=\"2725\">4. Technical Audit<\/h3>\n<p data-start=\"2727\" data-end=\"2826\">Examines firewalls, encryption systems, intrusion detection tools, and endpoint security platforms.<\/p>\n<p data-start=\"2828\" data-end=\"2909\">Each type of cyber security audit addresses different aspects of risk management.<\/p>\n<h2 data-start=\"2916\" data-end=\"2959\">Key Components of a Cyber Security Audit<\/h2>\n<p data-start=\"2961\" data-end=\"3031\">A successful cyber security audit typically covers several core areas.<\/p>\n<h3 data-start=\"3033\" data-end=\"3052\">Risk Assessment<\/h3>\n<p data-start=\"3054\" data-end=\"3120\">Identifies potential threats, vulnerabilities, and asset exposure.<\/p>\n<h3 data-start=\"3122\" data-end=\"3147\">Access Control Review<\/h3>\n<p data-start=\"3149\" data-end=\"3207\">Evaluates user permissions and role-based access policies.<\/p>\n<h3 data-start=\"3209\" data-end=\"3238\">Network Security Analysis<\/h3>\n<p data-start=\"3240\" data-end=\"3311\">Examines firewall configurations, segmentation, and monitoring systems.<\/p>\n<h3 data-start=\"3313\" data-end=\"3343\">Data Protection Evaluation<\/h3>\n<p data-start=\"3345\" data-end=\"3407\">Reviews encryption practices and data classification policies.<\/p>\n<h3 data-start=\"3409\" data-end=\"3438\">Incident Response Testing<\/h3>\n<p data-start=\"3440\" data-end=\"3502\">Assesses preparedness to detect and contain security breaches.<\/p>\n<p data-start=\"3504\" data-end=\"3584\">By reviewing these areas, a cyber security audit strengthens overall resilience.<\/p>\n<h2 data-start=\"3591\" data-end=\"3635\">How to Prepare for a Cyber Security Audit<\/h2>\n<p data-start=\"3637\" data-end=\"3687\">Preparation is crucial for a smooth audit process.<\/p>\n<h3 data-start=\"3689\" data-end=\"3725\">Step 1: Review Security Policies<\/h3>\n<p data-start=\"3727\" data-end=\"3788\">Ensure documentation is current and aligned with regulations.<\/p>\n<h3 data-start=\"3790\" data-end=\"3837\">Step 2: Conduct a Pre-Audit Risk Assessment<\/h3>\n<p data-start=\"3839\" data-end=\"3904\">Identify obvious vulnerabilities before the formal review begins.<\/p>\n<h3 data-start=\"3906\" data-end=\"3940\">Step 3: Organize Documentation<\/h3>\n<p data-start=\"3942\" data-end=\"3962\"><strong>Maintain records of:<\/strong><\/p>\n<ul data-start=\"3964\" data-end=\"4049\">\n<li data-start=\"3964\" data-end=\"3985\">\n<p data-start=\"3966\" data-end=\"3985\">Security policies<\/p>\n<\/li>\n<li data-start=\"3986\" data-end=\"4003\">\n<p data-start=\"3988\" data-end=\"4003\">Incident logs<\/p>\n<\/li>\n<li data-start=\"4004\" data-end=\"4024\">\n<p data-start=\"4006\" data-end=\"4024\">Risk assessments<\/p>\n<\/li>\n<li data-start=\"4025\" data-end=\"4049\">\n<p data-start=\"4027\" data-end=\"4049\">Access control lists<\/p>\n<\/li>\n<\/ul>\n<h3 data-start=\"4051\" data-end=\"4080\">Step 4: Engage Leadership<\/h3>\n<p data-start=\"4082\" data-end=\"4151\">Executive involvement ensures accountability and resource allocation.<\/p>\n<p data-start=\"4153\" data-end=\"4212\">A proactive approach improves audit outcomes significantly.<\/p>\n<h2 data-start=\"4219\" data-end=\"4263\">Common Findings in a Cyber Security Audit<\/h2>\n<p data-start=\"4265\" data-end=\"4340\">Many organizations discover recurring issues during a cyber security audit.<\/p>\n<h3 data-start=\"4342\" data-end=\"4368\">Weak Password Policies<\/h3>\n<p data-start=\"4370\" data-end=\"4434\">Employees may reuse passwords or ignore complexity requirements.<\/p>\n<h3 data-start=\"4436\" data-end=\"4457\">Outdated Software<\/h3>\n<p data-start=\"4459\" data-end=\"4512\">Unpatched systems create exploitable vulnerabilities.<\/p>\n<h3 data-start=\"4514\" data-end=\"4543\">Poor Network Segmentation<\/h3>\n<p data-start=\"4545\" data-end=\"4606\">Lack of segmentation enables lateral movement during attacks.<\/p>\n<h3 data-start=\"4608\" data-end=\"4632\">Insufficient Logging<\/h3>\n<p data-start=\"4634\" data-end=\"4703\">Without proper logs, detecting suspicious activity becomes difficult.<\/p>\n<p data-start=\"4705\" data-end=\"4783\">Identifying these gaps early reduces exposure to ransomware and data breaches.<\/p>\n<h2 data-start=\"4790\" data-end=\"4845\">Benefits of Conducting Regular Cyber Security Audits<\/h2>\n<p data-start=\"4847\" data-end=\"4908\">A one-time audit is not enough. Cyber threats evolve rapidly.<\/p>\n<p data-start=\"4910\" data-end=\"4971\">Regular cyber security audit cycles offer long-term benefits.<\/p>\n<h3 data-start=\"4973\" data-end=\"5002\">1. Continuous Improvement<\/h3>\n<p data-start=\"5004\" data-end=\"5049\">Security controls evolve with changing risks.<\/p>\n<h3 data-start=\"5051\" data-end=\"5077\">2. Stronger Compliance<\/h3>\n<p data-start=\"5079\" data-end=\"5138\">Ongoing audits ensure alignment with regulatory frameworks.<\/p>\n<h3 data-start=\"5140\" data-end=\"5169\">3. Reduced Incident Costs<\/h3>\n<p data-start=\"5171\" data-end=\"5231\">Preventing breaches saves financial and reputational damage.<\/p>\n<h3 data-start=\"5233\" data-end=\"5265\">4. Enhanced Board Confidence<\/h3>\n<p data-start=\"5267\" data-end=\"5330\">Clear reporting demonstrates risk awareness and accountability.<\/p>\n<p data-start=\"5332\" data-end=\"5409\">For executives, a cyber security audit supports informed strategic decisions.<\/p>\n<h2 data-start=\"5416\" data-end=\"5463\">Cyber Security Audit vs. Penetration Testing<\/h2>\n<p data-start=\"5465\" data-end=\"5496\">These terms are often confused.<\/p>\n<p data-start=\"5498\" data-end=\"5569\">A cyber security audit evaluates policies and controls comprehensively.<\/p>\n<p data-start=\"5571\" data-end=\"5647\">Penetration testing simulates real-world attacks to exploit vulnerabilities.<\/p>\n<p data-start=\"5649\" data-end=\"5738\">Both are important. However, a cyber security audit provides broader governance insights.<\/p>\n<h2 data-start=\"5745\" data-end=\"5784\">Industry-Specific Audit Requirements<\/h2>\n<h3 data-start=\"5786\" data-end=\"5806\">Financial Sector<\/h3>\n<p data-start=\"5808\" data-end=\"5872\">Requires strict audit documentation due to regulatory oversight.<\/p>\n<h3 data-start=\"5874\" data-end=\"5888\">Healthcare<\/h3>\n<p data-start=\"5890\" data-end=\"5952\">Must demonstrate HIPAA compliance through regular assessments.<\/p>\n<h3 data-start=\"5954\" data-end=\"5971\">Manufacturing<\/h3>\n<p data-start=\"5973\" data-end=\"6041\">Operational technology (OT) systems require specialized audit focus.<\/p>\n<h3 data-start=\"6043\" data-end=\"6072\">SaaS and Technology Firms<\/h3>\n<p data-start=\"6074\" data-end=\"6139\">Cloud infrastructure and API security demand detailed evaluation.<\/p>\n<p data-start=\"6141\" data-end=\"6216\">Each industry tailors its cyber security audit process to operational risk.<\/p>\n<h2 data-start=\"6223\" data-end=\"6258\">Metrics to Measure Audit Success<\/h2>\n<p data-start=\"6260\" data-end=\"6341\">After completing a cyber security audit, organizations should track improvements.<\/p>\n<p data-start=\"6343\" data-end=\"6378\"><strong>Key performance indicators include:<\/strong><\/p>\n<ul data-start=\"6380\" data-end=\"6553\">\n<li data-start=\"6380\" data-end=\"6427\">\n<p data-start=\"6382\" data-end=\"6427\">Number of critical vulnerabilities resolved<\/p>\n<\/li>\n<li data-start=\"6428\" data-end=\"6459\">\n<p data-start=\"6430\" data-end=\"6459\">Mean time to detect threats<\/p>\n<\/li>\n<li data-start=\"6460\" data-end=\"6486\">\n<p data-start=\"6462\" data-end=\"6486\">Incident response time<\/p>\n<\/li>\n<li data-start=\"6487\" data-end=\"6514\">\n<p data-start=\"6489\" data-end=\"6514\">Compliance audit scores<\/p>\n<\/li>\n<li data-start=\"6515\" data-end=\"6553\">\n<p data-start=\"6517\" data-end=\"6553\">Employee training completion rates<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6555\" data-end=\"6627\">Monitoring these metrics ensures accountability and measurable progress.<\/p>\n<h2 data-start=\"6634\" data-end=\"6685\">The Role of Employee Training in Audit Readiness<\/h2>\n<p data-start=\"6687\" data-end=\"6735\">Human error remains a leading cause of breaches.<\/p>\n<p data-start=\"6737\" data-end=\"6792\">Security awareness training strengthens audit outcomes.<\/p>\n<p data-start=\"6794\" data-end=\"6822\"><strong>Employees should understand:<\/strong><\/p>\n<ul data-start=\"6824\" data-end=\"6915\">\n<li data-start=\"6824\" data-end=\"6842\">\n<p data-start=\"6826\" data-end=\"6842\">Phishing risks<\/p>\n<\/li>\n<li data-start=\"6843\" data-end=\"6863\">\n<p data-start=\"6845\" data-end=\"6863\">Password hygiene<\/p>\n<\/li>\n<li data-start=\"6864\" data-end=\"6890\">\n<p data-start=\"6866\" data-end=\"6890\">Data handling policies<\/p>\n<\/li>\n<li data-start=\"6891\" data-end=\"6915\">\n<p data-start=\"6893\" data-end=\"6915\">Reporting procedures<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"6917\" data-end=\"7003\">A cyber security audit often evaluates training programs as part of compliance checks.<\/p>\n<h2 data-start=\"7010\" data-end=\"7051\">Future Trends in Cyber Security Audits<\/h2>\n<p data-start=\"7053\" data-end=\"7098\">Cybersecurity governance is evolving rapidly.<\/p>\n<p data-start=\"7100\" data-end=\"7124\"><strong>Emerging trends include:<\/strong><\/p>\n<ul data-start=\"7126\" data-end=\"7263\">\n<li data-start=\"7126\" data-end=\"7160\">\n<p data-start=\"7128\" data-end=\"7160\">Automated compliance reporting<\/p>\n<\/li>\n<li data-start=\"7161\" data-end=\"7188\">\n<p data-start=\"7163\" data-end=\"7188\">AI-driven risk analysis<\/p>\n<\/li>\n<li data-start=\"7189\" data-end=\"7223\">\n<p data-start=\"7191\" data-end=\"7223\">Continuous security monitoring<\/p>\n<\/li>\n<li data-start=\"7224\" data-end=\"7263\">\n<p data-start=\"7226\" data-end=\"7263\">Zero Trust architecture integration<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"7265\" data-end=\"7379\">Forward-thinking organizations treat the cyber security audit as an ongoing process rather than a checklist event.<\/p>\n<h3 data-start=\"7386\" data-end=\"7421\"><strong>Frequently Asked Questions (FAQ)<\/strong><\/h3>\n<p data-start=\"7423\" data-end=\"7461\"><strong>1. What is a cyber security audit?<\/strong><\/p>\n<p data-start=\"7463\" data-end=\"7625\">A cyber security audit is a structured evaluation of an organization\u2019s security policies, systems, and controls to identify vulnerabilities and ensure compliance.<\/p>\n<p data-start=\"7627\" data-end=\"7687\"><strong>2. How often should a cyber security audit be conducted?<\/strong><\/p>\n<p data-start=\"7689\" data-end=\"7792\">Most organizations conduct audits annually, but high-risk industries may require more frequent reviews.<\/p>\n<p data-start=\"7794\" data-end=\"7837\"><strong>3. Is a cyber security audit mandatory?<\/strong><\/p>\n<p data-start=\"7839\" data-end=\"7941\">Certain industries require compliance audits by law. Others conduct audits voluntarily to reduce risk.<\/p>\n<p data-start=\"7943\" data-end=\"8010\"><strong>4. What is the difference between internal and external audits?<\/strong><\/p>\n<p data-start=\"8012\" data-end=\"8120\">Internal audits are performed by in-house teams. External audits are conducted by independent third parties.<\/p>\n<p data-start=\"8122\" data-end=\"8171\"><strong>5. How long does a cyber security audit take?<\/strong><\/p>\n<p data-start=\"8173\" data-end=\"8273\">The duration depends on organization size and complexity. It can range from weeks to several months.<\/p>\n<h4 data-start=\"8280\" data-end=\"8333\">Final Thoughts: Turning Audit Insights into Action<\/h4>\n<p data-start=\"8335\" data-end=\"8499\">A cyber security audit is more than a compliance exercise. It is a strategic tool for identifying weaknesses, strengthening defenses, and protecting sensitive data.<\/p>\n<p data-start=\"8501\" data-end=\"8552\">However, audits alone do not prevent cyber threats.<\/p>\n<p data-start=\"8554\" data-end=\"8581\"><strong>Organizations must combine:<\/strong><\/p>\n<ul data-start=\"8583\" data-end=\"8706\">\n<li data-start=\"8583\" data-end=\"8608\">\n<p data-start=\"8585\" data-end=\"8608\">Continuous monitoring<\/p>\n<\/li>\n<li data-start=\"8609\" data-end=\"8632\">\n<p data-start=\"8611\" data-end=\"8632\">Endpoint protection<\/p>\n<\/li>\n<li data-start=\"8633\" data-end=\"8653\">\n<p data-start=\"8635\" data-end=\"8653\">Threat detection<\/p>\n<\/li>\n<li data-start=\"8654\" data-end=\"8675\">\n<p data-start=\"8656\" data-end=\"8675\">Employee training<\/p>\n<\/li>\n<li data-start=\"8676\" data-end=\"8706\">\n<p data-start=\"8678\" data-end=\"8706\">Incident response planning<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"8708\" data-end=\"8813\">The digital threat landscape is constantly evolving. Staying prepared requires both knowledge and action.<\/p>\n<p data-start=\"8815\" data-end=\"8950\">If you want to deepen your cybersecurity expertise and strengthen your organization\u2019s defensive capabilities, take the next step today.<\/p>\n<p data-start=\"8952\" data-end=\"9041\">\ud83d\udc49 Build your skills and enhance your security knowledge with Xcitium\u2019s OpenEDR platform.<\/p>\n<p data-start=\"9043\" data-end=\"9105\">Register now:<br data-start=\"9056\" data-end=\"9059\" \/><a class=\"decorated-link\" href=\"https:\/\/openedr.platform.xcitium.com\/register\/\" target=\"_new\" rel=\"noopener\" data-start=\"9059\" data-end=\"9105\">https:\/\/openedr.platform.xcitium.com\/register\/<\/a><\/p>\n<p data-start=\"9107\" data-end=\"9187\" data-is-last-node=\"\" data-is-only-node=\"\">Strong security starts with visibility, accountability, and continuous learning.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When was the last time your organization conducted a cyber security audit? If you\u2019re unsure, that alone could signal risk. Cyberattacks are increasing in frequency and sophistication, and many breaches occur because businesses fail to identify security gaps in time. A cyber security audit is a structured evaluation of your organization\u2019s information systems, policies, and&hellip; <a class=\"more-link\" href=\"https:\/\/www.openedr.com\/blog\/cyber-security-audit\/\">Continue reading <span class=\"screen-reader-text\">Cyber Security Audit: A Complete Guide for Modern Businesses<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":27552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-27542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"_links":{"self":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/27542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/comments?post=27542"}],"version-history":[{"count":1,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/27542\/revisions"}],"predecessor-version":[{"id":27562,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/posts\/27542\/revisions\/27562"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media\/27552"}],"wp:attachment":[{"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/media?parent=27542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/categories?post=27542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.openedr.com\/blog\/wp-json\/wp\/v2\/tags?post=27542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}