{"id":1496,"date":"2017-03-12T21:10:49","date_gmt":"2017-03-12T13:10:49","guid":{"rendered":"http:\/\/localhost\/portal\/2017\/03\/12\/iso-iec-27006-2015\/"},"modified":"2023-01-04T21:53:50","modified_gmt":"2023-01-04T13:53:50","slug":"iso-iec-27006-2015","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1496","title":{"rendered":"ISO\/IEC 27006:2015\u7248"},"content":{"rendered":"<p>ISO\/IEC 27006\u5df2\u7d93\u65bc2015\u5e74\u767c\u5e03\u65b0\u7248\uff0c\u8a2a\u9593\u5f88\u591a\u6a5f\u95dc\u67e5\u8a62ISO\/IEC 27001\u9a57\u8b49\u8cbb\u7528\u6642\uff0c\u90fd\u6703\u53c3\u8003\u5230\u8cfd\u535a\u97d3\u7279\u4e4b\u524d\u767c\u5e03<a href=\"http:\/\/localhost\/portal\/2008\/03\/16\/iso-27006\/\">\u6587\u7ae0\u7684\u7db2\u5740<\/a>\uff0c\u914d\u54082015\u5e74\u767c\u8868\u7684\u65b0\u7248\uff0c\u9a57\u8b49\u7bc4\u570d\u4eba\u6578\u8207\u9a57\u8b49\u6a5f\u69cb\u7a3d\u6838\u7684\u4eba\u5929\u5c0d\u9020\u8868\u5982\u4e0b\uff1a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-1495\" src=\"http:\/\/localhost\/portal\/wp-content\/uploads\/2017\/03\/27006.png\" alt=\"\" width=\"610\" height=\"562\" \/><\/p>\n<p>TAF\u8ca1\u5718\u6cd5\u4eba\u5168\u570b\u8a8d\u8b49\u57fa\u91d1\u6703\u6709\u63d0\u4f9b\u514d\u8cbb\u4e0b\u8f09ISO\/IEC 27006:2015\u7248\u7684\u9023\u7d50\uff0c\u6709\u8208\u8da3\u7684\u4eba\uff0c\u53ef\u4ee5\u53bb\u4e0b\u8f09\u4f86\u770b\uff1a<\/p>\n<p><a href=\"http:\/\/accreditation.taftw.org.tw\/taf\/public\/papersManagement\/docDownLoad.action?docId=2c90b2c753b3921b0153b5b6d35a0072\">\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u6a5f\u69cb\u8a8d\u8b49\u898f\u7bc4(ISO 27006:2015)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISO\/IEC 27006\u5df2\u7d93\u65bc2015\u5e74\u767c\u5e03\u65b0\u7248\uff0c\u8a2a\u9593\u5f88\u591a\u6a5f\u95dc\u67e5\u8a62ISO\/IEC 27001\u9a57\u8b49\u8cbb\u7528\u6642\uff0c\u90fd\u6703 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1495,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-1496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iso-27001"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1496"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1496\/revisions"}],"predecessor-version":[{"id":1536,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1496\/revisions\/1536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/media\/1495"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}