{"id":10766,"date":"2025-11-27T15:55:26","date_gmt":"2025-11-27T11:55:26","guid":{"rendered":"https:\/\/ucsiso.com\/en-au\/?p=10766"},"modified":"2025-12-25T15:34:41","modified_gmt":"2025-12-25T11:34:41","slug":"iso-27001-certification-australia","status":"publish","type":"post","link":"https:\/\/ucsiso.com\/en-au\/iso-27001-certification-australia\/","title":{"rendered":"ISO\/IEC 27001:2022 Information Security Management Systems"},"content":{"rendered":"\n<p>In our digital world, the information we handle has become one of the most valuable things an organization can have, and with the growing number of cyber attacks, making sure sensitive information stays protected has become a key priority. This is where ISO\/IEC 27001:2022 proves its value, the internationally recognized standard that helps organizations establish a structured Information Security Management System (ISMS) to manage information risks and safeguard data effectively.<\/p>\n\n\n\n<p>From startups in Sydney to enterprises in Melbourne, achieving ISO\/IEC 27001 certification demonstrates a commitment to security, trust, and compliance \u2014 strengthening stakeholder confidence across Australia and beyond.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Demonstrate Your Commitment to Information Security<\/h2>\n\n\n\n<p>Begin your ISO\/IEC 27001:2022 certification journey with Universal Certification and Services (UCS), an accredited and globally recognized certification body.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><a href=\"https:\/\/ucsiso.com\/en-au\/contact\/\" data-type=\"page\" data-id=\"1138\">Apply for Information Security Management Systems Certification<\/a><\/em><\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">What is ISO\/IEC 27001:2022?<\/h2>\n\n\n\n<p>ISO\/IEC 27001:2022 specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System. It provides a systematic, risk-based framework for protecting sensitive information across people, processes, and technology.<br>The standard helps organizations ensure data confidentiality, integrity, and availability \u2014 supporting operational resilience and business continuity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Key Updates in the 2022 Revision<\/h2>\n\n\n\n<p>The 2022 update introduced several key enhancements to reflect modern security practices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Annex A Controls Restructured: Reduced from 114 to 93 controls, grouped under four categories \u2014 organizational, people, physical, and technological.<\/li>\n\n\n\n<li>11 new Controls Introduced: Addressing areas such as threat intelligence, cloud services security, data masking, and more.<\/li>\n\n\n\n<li>Clause 6.3 Added: A new requirement for Planning of Changes to ensure documented and controlled system modifications.<\/li>\n\n\n\n<li>Alignment with ISO\/IEC 27002:2022: Annex A controls are now mapped directly to the updated ISO\/IEC 27002 guidance.<\/li>\n\n\n\n<li>Enhanced Focus on Context and Leadership: Strengthened requirements for understanding internal and external factors and demonstrating leadership involvement.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Why ISO 27001 Certification Matters in Australia<\/h2>\n\n\n\n<p>Cyberattacks are on the rise across Australia, affecting businesses in healthcare, government, finance, and education sectors. This increasing pressure highlights the need for organizations to adopt recognized and trusted security management system. This is where ISO\/IEC 27001 serves as a trusted solution, where it enables organizations to demonstrate that their information security practices align with international best practices and comply with national regulations, such as the Australian Privacy Act 1988 and the Notifiable Data Breaches Scheme.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-large-font-size\">Key Benefits:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regulatory Compliance: Demonstrates alignment with Australian and international data protection laws.<\/li>\n\n\n\n<li>Customer Confidence: Builds trust among clients, investors, and partners.<\/li>\n\n\n\n<li>Operational Resilience: Minimizes the impact of potential security incidents.<\/li>\n\n\n\n<li>Global Recognition: ISO certification is accepted and respected worldwide.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Core Principles of ISO\/IEC 27001:2022<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Confidentiality \u2013 Ensuring that information is accessible only to authorized individuals.<\/li>\n\n\n\n<li>Integrity \u2013 Protecting data from unauthorized alteration or destruction.<\/li>\n\n\n\n<li>Availability \u2013 Ensuring that systems and data remain accessible to authorized users when needed.<\/li>\n\n\n\n<li>Evidence-Based Decision Making \u2013 Using documented information, records, logs, and metrics to demonstrate compliance and drive decisions.<\/li>\n\n\n\n<li>Incident Response &amp; Resilience \u2013 Preparing to detect, respond to, and recover from information security incidents.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Structure of ISO\/IEC 27001:2022<\/h2>\n\n\n\n<p>ISO\/IEC 27001 follows the <strong>Annex SL framework<\/strong>, aligning with other ISO management systems such as <strong>ISO 9001<\/strong> (Quality Management) and <strong>ISO 14001<\/strong> (Environmental Management).<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Overview of The Main Clauses:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clause 4: Context of the Organization<\/li>\n\n\n\n<li>Clause 5: Leadership<\/li>\n\n\n\n<li>Clause 6: Planning<\/li>\n\n\n\n<li>Clause 7: Support<\/li>\n\n\n\n<li>Clause 8: Operation<\/li>\n\n\n\n<li>Clause 9: Performance Evaluation<\/li>\n\n\n\n<li>Clause 10: Improvement<\/li>\n<\/ul>\n\n\n\n<p>These clauses outline the requirements that organizations must meet to establish and maintain an effective ISMS.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Annex A \u2013 Information Security Controls <strong>Reference<\/strong><\/h2>\n\n\n\n<p>Annex A contains 93 controls grouped into four categories:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Organizational Controls (37) \u2013 Policies, governance, and procedural measures.<\/li>\n\n\n\n<li>People Controls (8) \u2013 Awareness, training, and roles-related security measures.<\/li>\n\n\n\n<li>Physical Controls (14) \u2013 Facility and equipment protection.<\/li>\n\n\n\n<li>Technological Controls (34) \u2013 Encryption, access management, and cyber defense.<\/li>\n<\/ol>\n\n\n\n<p>Each control supports the risk management objectives of ISO\/IEC 27001 and is aligned with ISO\/IEC 27002:2022 for implementation guidance.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Key Components of an Effective ISMS<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Risk Assessment and Treatment: Identifying and managing information security risks.<\/li>\n\n\n\n<li>Policies and Procedures: Defining and enforcing security rules.<\/li>\n\n\n\n<li>Leadership Commitment: Demonstrating management accountability and oversight.<\/li>\n\n\n\n<li>Monitoring and Review: Evaluating the performance of controls and processes.<\/li>\n\n\n\n<li>Continuous Improvement: Maintaining alignment with evolving threats and technologies.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">The ISO\/IEC 27001 Certification Process<\/h2>\n\n\n\n<p>At Universal Certification and Services (UCS), certification is granted in accordance with international accreditation requirements to ensure impartiality and global recognition. The certification steps are:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>Application: The organization submits a certification request.<\/li>\n\n\n\n<li>Certification Agreement: UCS shares an agreement for review and signature.<\/li>\n\n\n\n<li>Stage 1 Audit: Evaluation of ISMS documentation and readiness.<\/li>\n\n\n\n<li>Stage 1 Audit Report: UCS shares audit findings and observations.<\/li>\n\n\n\n<li>Stage 2 Audit: Assessment of ISMS implementation and effectiveness.<\/li>\n\n\n\n<li>Final Report &amp; Certification: Upon closure of any findings, UCS issues the ISO\/IEC 27001:2022 certificate.<\/li>\n\n\n\n<li>Surveillance Audits: Conducted annually to maintain certification validity.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Ready to Begin the Certification Process?<\/h2>\n\n\n\n<p>Take the first step toward achieving globally recognized ISO\/IEC 27001:2022 certificate.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><a href=\"https:\/\/ucsiso.com\/en-au\/contact\/\" data-type=\"page\" data-id=\"1138\">Submit Your Certification Application<\/a><\/em><\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Industries That Benefit from ISO 27001 Certification<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Technology &amp; Software Development \u2013 Protect client and system data.<\/li>\n\n\n\n<li>Finance &amp; Banking \u2013 Safeguard financial records and comply with data regulations.<\/li>\n\n\n\n<li>Healthcare \u2013 Protect patient data and maintain confidentiality.<\/li>\n\n\n\n<li>Government &amp; Public Services \u2013 Ensure secure handling of citizen and operational data.<\/li>\n\n\n\n<li>Telecommunications (ISPs and Mobile Operators) \u2013 Manage national communications networks and massive data volumes.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Challenges for Organizations<\/h2>\n\n\n\n<p>While ISO\/IEC 27001 brings significant value, organizations may face challenges such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limited cybersecurity awareness among staff.<\/li>\n\n\n\n<li>Resource constraints in small and medium enterprises.<\/li>\n\n\n\n<li>Rapidly evolving threat landscapes.<\/li>\n<\/ul>\n\n\n\n<p>Regular training, risk awareness, and strong leadership support help sustain the effectiveness of an ISMS.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">The Role of Accredited Certification Bodies<\/h2>\n\n\n\n<p>Accredited certification bodies like Universal Certification and Services (UCS) ensure that the certification process meets international standards of competence and impartiality.<br>UCS conducts independent evidence-based audits to verify that organizations comply with ISO\/IEC 27001:2022 requirements, providing assurance that the certificate represents genuine and globally recognized conformity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Maintaining ISO\/IEC 27001 Certification<\/h2>\n\n\n\n<p>Certification is an ongoing commitment that requires continuous evaluation and improvement.<br>Certified organizations must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Undergo annual surveillance audits.<\/li>\n\n\n\n<li>Conduct regular internal audits and management reviews.<\/li>\n\n\n\n<li>Update their controls to reflect new risks and regulatory changes.<\/li>\n\n\n\n<li>Promote information security awareness across all levels.<\/li>\n<\/ul>\n\n\n\n<p>Learn More About ISO 27001 on the <a href=\"https:\/\/www.iso.org\/standard\/27001\" data-type=\"link\" data-id=\"https:\/\/www.iso.org\/standard\/27001\" rel=\"noopener\">Official ISO Website<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-large-font-size\">Achieve Globally Recognized ISO\/IEC 27001 Certification<\/h2>\n\n\n\n<p>ISO\/IEC 27001:2022 empowers organizations to build trust, safeguard data, and maintain resilience in an evolving digital landscape. <\/p>\n\n\n\n<p>Partner with Universal Certification and Services (UCS) an accredited certification body dedicated to providing transparent, professional, and globally recognized ISO certifications.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em><a href=\"https:\/\/ucsiso.com\/en-au\/contact\/\" data-type=\"page\" data-id=\"1138\">Apply for ISO\/IEC 27001 Certification Today<\/a><\/em>.<\/p>\n<\/blockquote>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1763556387824\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">How does ISO\/IEC 27001:2022 help protect company data?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>It provides a clear framework for managing security risks and safeguarding information. Certification confirms that your organization follows global best practices to keep data secure and reliable.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1763556403468\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Who needs ISO 27001 certification in Australia?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Any organization that stores, processes, or manages sensitive information can benefit from ISO\/IEC 27001 certification, including IT firms, government agencies, healthcare providers, financial institutions, and telecommunications service providers.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1763556412977\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What are the main updates in ISO\/IEC 27001:2022?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>The 2022 version reduced the controls from 114 to 93, addressed new areas like cloud and threat intelligence, and has a new requirement under Clause 6.3 \u2013 Planning of Changes \u00a0\u2013 to better improve adaptability and modern cyber-risk coverage.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1763556423041\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What happens during the ISO 27001 certification audit?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>UCS conducts a step-by-step process to review your Information Security Management System and confirm that it meets the requirements of ISO\/IEC 27001:2022. This includes document review, implementation assessment, and addressing nonconformities.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1763556435971\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Why should organizations choose UCS for ISO 27001 certification?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>UCS is an accredited certification body that delivers impartial evidence-based audits. Every certificate issued is globally recognized and reflects genuine conformity with ISO standards\u2019 requirements.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our digital world, the information we handle has become one of the most valuable things an organization can have, and with the growing number of cyber attacks, making sure sensitive information stays protected has become a key priority. This is where ISO\/IEC 27001:2022 proves its value, the internationally recognized standard that helps organizations establish a structured Information Security Management System (ISMS) to manage information risks and safeguard data effectively. From startups in Sydney to enterprises in Melbourne, achieving ISO\/IEC 27001 certification demonstrates a commitment to security, trust, and compliance \u2014 strengthening stakeholder confidence across Australia and beyond. Demonstrate Your Commitment to Information Security Begin your ISO\/IEC 27001:2022 certification journey with Universal Certification and Services (UCS), an accredited and globally recognized certification body. Apply for Information Security Management Systems Certification What is ISO\/IEC 27001:2022? ISO\/IEC 27001:2022 specifies the requirements for establishing, implementing, maintaining, and continually improving an Information Security Management System. It provides a systematic, risk-based framework for protecting sensitive information across people, processes, and technology.The standard helps organizations ensure data confidentiality, integrity, and availability \u2014 supporting operational resilience and business continuity. Key Updates in the 2022 Revision The 2022 update introduced several key enhancements to reflect modern security practices: Why ISO 27001 Certification Matters in Australia Cyberattacks are on the rise across Australia, affecting businesses in healthcare, government, finance, and education sectors. This increasing pressure highlights the need for organizations to adopt recognized and trusted security management system. This is where ISO\/IEC 27001 serves as a trusted solution, where it enables organizations to demonstrate that their information security practices align with international best practices and comply with national regulations, such as the Australian Privacy Act 1988 and the Notifiable Data Breaches Scheme. Key Benefits: Core Principles of ISO\/IEC 27001:2022 Structure of ISO\/IEC 27001:2022 ISO\/IEC 27001 follows the Annex SL framework, aligning with other ISO management systems such as ISO 9001 (Quality Management) and ISO 14001 (Environmental Management). Overview of The Main Clauses: These clauses outline the requirements that organizations must meet to establish and maintain an effective ISMS. Annex A \u2013 Information Security Controls Reference Annex A contains 93 controls grouped into four categories: Each control supports the risk management objectives of ISO\/IEC 27001 and is aligned with ISO\/IEC 27002:2022 for implementation guidance. Key Components of an Effective ISMS The ISO\/IEC 27001 Certification Process At Universal Certification and Services (UCS), certification is granted in accordance with international accreditation requirements to ensure impartiality and global recognition. The certification steps are: Ready to Begin the Certification Process? Take the first step toward achieving globally recognized ISO\/IEC 27001:2022 certificate. Submit Your Certification Application Industries That Benefit from ISO 27001 Certification Challenges for Organizations While ISO\/IEC 27001 brings significant value, organizations may face challenges such as: Regular training, risk awareness, and strong leadership support help sustain the effectiveness of an ISMS. The Role of Accredited Certification Bodies Accredited certification bodies like Universal Certification and Services (UCS) ensure that the certification process meets international standards of competence and impartiality.UCS conducts independent evidence-based audits to verify that organizations comply with ISO\/IEC 27001:2022 requirements, providing assurance that the certificate represents genuine and globally recognized conformity. Maintaining ISO\/IEC 27001 Certification Certification is an ongoing commitment that requires continuous evaluation and improvement.Certified organizations must: Learn More About ISO 27001 on the Official ISO Website. Achieve Globally Recognized ISO\/IEC 27001 Certification ISO\/IEC 27001:2022 empowers organizations to build trust, safeguard data, and maintain resilience in an evolving digital landscape. Partner with Universal Certification and Services (UCS) an accredited certification body dedicated to providing transparent, professional, and globally recognized ISO certifications. Apply for ISO\/IEC 27001 Certification Today.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[9],"tags":[],"class_list":["post-10766","post","type-post","status-publish","format-standard","hentry","category-iso-standards"],"_links":{"self":[{"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/posts\/10766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/comments?post=10766"}],"version-history":[{"count":3,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/posts\/10766\/revisions"}],"predecessor-version":[{"id":10881,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/posts\/10766\/revisions\/10881"}],"wp:attachment":[{"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/media?parent=10766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/categories?post=10766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ucsiso.com\/en-au\/wp-json\/wp\/v2\/tags?post=10766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69af655646fa5c0b2ee567cc. Config Timestamp: 2026-03-10 00:27:01 UTC, Cached Timestamp: 2026-05-14 18:20:38 UTC -->