{"id":25736,"date":"2025-11-27T16:37:10","date_gmt":"2025-11-27T16:37:10","guid":{"rendered":"https:\/\/www.dionach.com\/?p=25736"},"modified":"2025-11-27T16:47:25","modified_gmt":"2025-11-27T16:47:25","slug":"penetration-testing-for-iso-27001-certification","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/","title":{"rendered":"From Policy to Practice: Penetration Testing for ISO 27001"},"content":{"rendered":"\n<p>ISO 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). While the standard does not explicitly mandate penetration testing, it remains a critical supporting activity for demonstrating technical assurance and verifying the effectiveness of security controls. By incorporating regular, scoped, and risk-aligned penetration testing into their ISMS, organisations can evidence a mature, proactive, and resilient security posture, identify hidden vulnerabilities, and validate that their security measures are effective in practice.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Why Penetration Testing Matters<\/strong><\/h2>\n\n\n\n<p>Even though ISO 27001:2022 does not mandate penetration testing, the guidance in ISO 27002 highlights its relevance across several Annex A controls, particularly:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>A.5.21 Managing information security in the ICT supply chain<\/strong>: Organisations must manage risks associated with ICT suppliers. Verification of critical supplier interfaces, APIs, or cloud-hosted services through supplier conducted penetration testing or evidence provided by the supplier, helps ensure that supply chain systems do not introduce vulnerabilities and supports compliance with this control.<\/li>\n\n\n\n<li><strong>A.8.8 Management of technical vulnerabilities<\/strong>: This is the primary control connected to penetration testing. Organisations are required to assess vulnerabilities and take timely action. Penetration testing is a proactive method to uncover weaknesses that might be missed by automated vulnerability scans, helping demonstrate control effectiveness and continuous improvement.<\/li>\n\n\n\n<li><strong>A.8.25 Secure development life cycle<\/strong>: Integrating security testing, including penetration testing, into the software development lifecycle ensures that information security is embedded from design to deployment. This usually includes penetration testing specific to the application such as web application penetration testing, API penetration testing or mobile app penetration testing.<\/li>\n\n\n\n<li><strong>A.8.29 Security testing in development and acceptance<\/strong>: During development and deployment, penetration testing identifies insecure code, misconfigurations, or design flaws, forming part of acceptance criteria for new systems or updates.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/i0.wp.com\/www.dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209-1024x684.jpeg?resize=1024%2C684&#038;ssl=1\" alt=\"\" class=\"wp-image-25738\" style=\"width:819px;height:auto\" srcset=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209.jpeg?resize=1024%2C684&amp;ssl=1 1024w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209.jpeg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209.jpeg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209.jpeg?resize=1536%2C1025&amp;ssl=1 1536w, https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_543101209.jpeg?w=2048&amp;ssl=1 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Organisations implementing ISO 27001:2022 should adopt a structured, penetration testing programme that aligns with both operational needs and ISO 27001 requirements. That means defining the scope based on critical assets and system changes, aligning tests with risk assessments, and ensuring responsibilities for planning, execution, remediation, and reporting are clearly assigned. Regular, risk-based testing not only supports compliance but also strengthens the organisations overall security posture and resilience against real-world threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Dionach Helps<\/strong><\/h2>\n\n\n\n<p>Dionach provides ISO 27001-aligned penetration testing to help organisations strengthen their security controls and demonstrate real assurance. As a <strong>CREST-certified, ISO 27001-certified, and CHECK-approved<\/strong> consultancy, we deliver targeted testing across networks, applications, cloud environments, and development pipelines.<\/p>\n\n\n\n<p>We help organisations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Uncover vulnerabilities missed by automated tools<\/li>\n\n\n\n<li>Validate Annex A controls such as A.8.8, A.8.25 and A.8.29<\/li>\n\n\n\n<li>Embed security testing into the SDLC<\/li>\n\n\n\n<li>Align testing with risk assessments and audit expectations<\/li>\n\n\n\n<li>Build a consistent, repeatable testing programme<\/li>\n<\/ul>\n\n\n\n<p>With clear reporting and practical remediation guidance, Dionach ensures your penetration testing is meaningful, compliant, and directly supportive of your ISO 27001 certification journey.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISO 27001:2022 is the international standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS). While the standard does not explicitly mandate penetration testing, it remains a critical supporting activity for demonstrating technical assurance and verifying the effectiveness of security controls. By incorporating regular, scoped, and risk-aligned penetration testing into their [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":25742,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-25736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>From Policy to Practice: Penetration Testing for ISO 27001<\/title>\n<meta name=\"description\" content=\"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Policy to Practice: Penetration Testing for ISO 27001\" \/>\n<meta property=\"og:description\" content=\"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-27T16:37:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T16:47:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1123\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach by Nomios\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach by Nomios\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/\"},\"author\":{\"name\":\"Dionach by Nomios\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\"},\"headline\":\"From Policy to Practice: Penetration Testing for ISO 27001\",\"datePublished\":\"2025-11-27T16:37:10+00:00\",\"dateModified\":\"2025-11-27T16:47:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/\"},\"wordCount\":462,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1\",\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/\",\"name\":\"From Policy to Practice: Penetration Testing for ISO 27001\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1\",\"datePublished\":\"2025-11-27T16:37:10+00:00\",\"dateModified\":\"2025-11-27T16:47:25+00:00\",\"description\":\"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1\",\"width\":2048,\"height\":1123,\"caption\":\"ISO 27001\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/penetration-testing-for-iso-27001-certification\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"From Policy to Practice: Penetration Testing for ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/cda8ad8b5715b4d431547564ed6a9ca9\",\"name\":\"Dionach by Nomios\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g\",\"caption\":\"Dionach by Nomios\"},\"sameAs\":[\"http:\\\/\\\/Dionach\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Policy to Practice: Penetration Testing for ISO 27001","description":"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/","og_locale":"nl_NL","og_type":"article","og_title":"From Policy to Practice: Penetration Testing for ISO 27001","og_description":"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.","og_url":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2025-11-27T16:37:10+00:00","article_modified_time":"2025-11-27T16:47:25+00:00","og_image":[{"width":2048,"height":1123,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","type":"image\/jpeg"}],"author":"Dionach by Nomios","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach by Nomios","Geschatte leestijd":"3 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/"},"author":{"name":"Dionach by Nomios","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9"},"headline":"From Policy to Practice: Penetration Testing for ISO 27001","datePublished":"2025-11-27T16:37:10+00:00","dateModified":"2025-11-27T16:47:25+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/"},"wordCount":462,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/","url":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/","name":"From Policy to Practice: Penetration Testing for ISO 27001","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","datePublished":"2025-11-27T16:37:10+00:00","dateModified":"2025-11-27T16:47:25+00:00","description":"Learn why penetration testing strengthens ISO 27001 compliance and how Dionach helps validate controls, uncover risks, and improve security.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","width":2048,"height":1123,"caption":"ISO 27001"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/penetration-testing-for-iso-27001-certification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"From Policy to Practice: Penetration Testing for ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/cda8ad8b5715b4d431547564ed6a9ca9","name":"Dionach by Nomios","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/175b11c7f601b43fdf197d3d5c39805acf0e97b19ca7a4c4aa333ac557e98a09?s=96&d=mm&r=g","caption":"Dionach by Nomios"},"sameAs":["http:\/\/Dionach"]}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/11\/AdobeStock_534361448.jpeg?fit=2048%2C1123&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-6H6","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/25736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=25736"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/25736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/25742"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=25736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=25736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=25736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}