{"id":48350,"date":"2025-06-03T12:52:50","date_gmt":"2025-06-03T18:52:50","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=48350"},"modified":"2025-12-10T05:57:33","modified_gmt":"2025-12-10T12:57:33","slug":"auditoria-de-conformidade-de-seguranca-cibernetica","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/","title":{"rendered":"Como realizar uma auditoria de conformidade de ciberseguran\u00e7a em 6 etapas"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-06-03T12:52:50-06:00\">Jun 3, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">How to Conduct a Cybersecurity Compliance Audit in 6 Steps<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/pt\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('How%20to%20Conduct%20a%20Cybersecurity%20Compliance%20Audit%20in%206%20Steps').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-compliance-audit%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=How%20to%20Conduct%20a%20Cybersecurity%20Compliance%20Audit%20in%206%20Steps&url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-compliance-audit%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-compliance-audit%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fpt%2Fblog%2Fcyber-security-compliance-audit%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">How to Conduct a Cybersecurity Compliance Audit in 6 Steps<\/h2>\n\n\n\n<p>Whether you&#8217;re preparing for a cybersecurity audit and compliance review or working to meet standards like <a href=\"https:\/\/www.iso.org\/standard\/27001\">ISO 27001<\/a>, <a href=\"https:\/\/www.nist.gov\/\">NIST<\/a>, <a href=\"https:\/\/swimlane.com\/blog\/soc-2-type-2-compliance\/\">SOC 2<\/a>, or <a href=\"https:\/\/gdpr-info.eu\/\">GDPR<\/a>, the traditional fragmented approach simply isn\u2019t sustainable. That\u2019s why organizations are turning to <a href=\"https:\/\/swimlane.com\/blog\/security-automation\/\">security automation<\/a>, control mapping, and continuous monitoring as essential tools.<\/p>\n\n\n\n<p>In this guide, we\u2019ll walk through six practical steps to help you conduct a cybersecurity compliance audit, driven by automation, real-time control validation, and audit preparedness.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Cybersecurity Audit and Why is it Needed for Regulatory Compliance?<\/h2>\n\n\n\n<p>A security compliance audit is a formal evaluation of an organization\u2019s cybersecurity policies, controls, and practices to ensure alignment with regulatory and industry standards.<\/p>\n\n\n\n<p>Failing to conduct regular audits can expose your business to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data breaches that compromise sensitive information<\/li>\n\n\n\n<li>Operational disruptions that damage business continuity<\/li>\n\n\n\n<li>Legal and regulatory penalties, including fines and reputational damage<\/li>\n<\/ul>\n\n\n\n<p>An effective cybersecurity compliance audit helps organizations prevent these issues by proactively identifying vulnerabilities and demonstrating accountability to customers and regulators.<\/p>\n\n\n\n<p>Next, we\u2019ll walk you through six key steps to conduct a successful cybersecurity compliance audit\u2014efficiently and with confidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Define Regulatory Requirements and Compliance Scope<\/h2>\n\n\n\n<p>Before diving into evidence collection, clearly define which compliance frameworks or regulations your organization must follow. These may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOC 2 for service organizations<\/li>\n\n\n\n<li>HIPAA for healthcare<\/li>\n\n\n\n<li>ISO\/IEC 27001 for global information security<\/li>\n\n\n\n<li>NIST CSF for federal agencies or vendors<\/li>\n<\/ul>\n\n\n\n<p>Establish the scope of the audit by identifying the departments, data types, systems, and regions that fall under compliance requirements. Align each regulatory obligation to specific business processes and controls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2. Perform Risk Assessments and Asset Inventory<\/h2>\n\n\n\n<p>Next, conduct a <strong>risk assessment<\/strong> to identify where your organization is most vulnerable. This involves:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Mapping <strong>digital assets<\/strong>, including devices, applications, and data repositories<\/li>\n\n\n\n<li>Assessing threats and potential impact of breaches<\/li>\n\n\n\n<li>Ranking risk levels and defining mitigation strategies<\/li>\n<\/ul>\n\n\n\n<p>A comprehensive <strong>asset inventory<\/strong> ensures nothing is overlooked and sets the foundation for compliance control mapping.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3. Automate Control Monitoring and Evidence Collection<\/h2>\n\n\n\n<p>One of the most significant challenges in maintaining compliance is keeping up with evidence collection\u2014especially across distributed teams and systems. Manual processes tend to break down under pressure, leading to outdated or incomplete records.<\/p>\n\n\n\n<p>To overcome this, organizations are increasingly adopting automated methods to monitor controls and collect audit evidence continuously. These systems validate whether controls are working as intended, track changes over time, and centralize audit artifacts in one place. The result is a more consistent compliance posture with significantly less overhead.<\/p>\n\n\n\n<p><a href=\"https:\/\/swimlane.com\/platform\/compliance-audit-readiness\/\">Swimlane\u2019s Compliance Audit Readiness (CAR) solution<\/a> is designed specifically for this purpose\u2014enabling continuous compliance monitoring, reducing manual workloads, and ensuring audit readiness through automation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">4. Detect and Respond to Non-Compliance or Gaps<\/h2>\n\n\n\n<p>After your controls are in place, the focus shifts to vigilance. Identifying when something goes wrong\u2014and acting on it quickly\u2014is a core part of compliance readiness.<\/p>\n\n\n\n<p>Start by defining what \u201cnon-compliance\u201d looks like in your context. Then:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement regular scans or reviews of key control areas<\/li>\n\n\n\n<li>Establish alerting mechanisms for deviations or failures<\/li>\n\n\n\n<li>Create a process to investigate, document, and resolve issues<\/li>\n<\/ul>\n\n\n\n<p>What matters most is not perfection, but responsiveness. Timely remediation, combined with a documented history of corrective actions, shows auditors that your organization treats compliance as an ongoing discipline.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">5. Document Policies, Procedures, and Controls<\/h2>\n\n\n\n<p>A strong compliance program is built on clear, well-maintained documentation. This isn\u2019t just for the auditors\u2014it ensures that your teams understand expectations and can respond consistently when incidents occur.<\/p>\n\n\n\n<p>Your documentation should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security policies (e.g., access control, incident response)<\/li>\n\n\n\n<li>Defined procedures for applying and reviewing controls<\/li>\n\n\n\n<li>Control maps aligned to each compliance framework<\/li>\n\n\n\n<li>Revision history and approval records for traceability<\/li>\n<\/ul>\n\n\n\n<p>Many teams treat this step as an afterthought. But when policies are hard to find\u2014or worse, outdated\u2014compliance readiness is compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6. Conduct Internal Audits and Prepare for External Reviews<\/h2>\n\n\n\n<p>Before an external audit takes place, an internal audit helps validate your readiness and surface potential issues.<\/p>\n\n\n\n<p>This internal review should mimic the structure of an external assessment as closely as possible. Consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reviewing all control tests and evidence for completeness<\/li>\n\n\n\n<li>Interviewing stakeholders to verify policy adherence<\/li>\n\n\n\n<li>Testing response workflows (e.g., access revocation or breach handling)<\/li>\n\n\n\n<li>Evaluating how quickly and accurately audit data can be retrieved<\/li>\n<\/ul>\n\n\n\n<p>Internal audits serve a dual purpose: improving your compliance posture and building confidence across teams. They help turn compliance into a repeatable, scalable function\u2014rather than a stressful, last-minute scramble.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Cybersecurity Compliance<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">SOC 2&nbsp;<\/h3>\n\n\n\n<p>Focuses on five trust service principles: security, availability, processing integrity, confidentiality, and privacy. It\u2019s a must-have for SaaS and service-based companies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">ISO\/IEC 27001<\/h3>\n\n\n\n<p>A global standard that outlines best practices for an information security management system (ISMS). Ideal for companies operating across multiple jurisdictions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">NIST Cybersecurity Framework (CSF)<\/h3>\n\n\n\n<p>Developed by the National Institute of Standards and Technology, it provides a flexible approach to managing and reducing cybersecurity risk.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HIPAA (Health Insurance Portability and Accountability Act)<\/h3>\n\n\n\n<p>Applies to healthcare providers and business associates managing protected health information (PHI). Ensures patient data privacy and security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Compliance Audit Best Practices&nbsp;<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Leverage automation to reduce audit prep time<\/li>\n\n\n\n<li>Use a unified platform for control mapping across frameworks<\/li>\n\n\n\n<li>Engage stakeholders early, including compliance officers, IT, and legal<\/li>\n\n\n\n<li>Monitor continuously, not just once a year<\/li>\n\n\n\n<li>Train teams regularly on evolving requirements and tools<\/li>\n<\/ol>\n\n\n\n<p>Cybersecurity compliance audits are no longer optional\u2014they\u2019re essential for regulatory alignment, risk reduction, and customer trust. Using AI automation platforms like Swimlane Turbine can dramatically streamline the audit process, reduce manual effort, and improve control reliability across your organization.<\/p>\n\n\n\n<p>Learn how <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> simplifies compliance and keeps your organization audit-ready.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Audit FAQs<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">What is a compliance audit in cybersecurity?<\/h3>\n\n\n\n<p>It\u2019s a formal process to assess whether an organization\u2019s cybersecurity controls align with regulatory standards and internal policies.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How frequently should you conduct a cybersecurity audit?&nbsp;<\/h3>\n\n\n\n<p>At least once a year or more frequently if required by industry standards, risk exposure, or after significant changes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is the difference between a cybersecurity audit vs. an IT audit?<\/h3>\n\n\n\n<p>An IT audit covers all aspects of IT systems and processes, while a cybersecurity audit focuses specifically on protecting data, systems, and networks from cyber threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Do you conduct a cybersecurity audit internally?<\/h3>\n\n\n\n<p>Yes, internal audits are conducted by the organization\u2019s own teams to assess readiness. External audits are performed by certified third parties.<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-939259790b0f59da6c2ffc38ae25254cd5645641 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-939259790b0f59da6c2ffc38ae25254cd5645641 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/CONNECTORS_2024_Masthead.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-request-a-demo\">Request a demo<\/h3>\n\n\n\n<p>If you haven&#8217;t had the chance to explore Swimlane Turbine yet, request a demo.&nbsp;<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-644b861a108c1afb5bc4810598dc6885843a6e8c\"><style>.bs-pro-button-p-btn-644b861a108c1afb5bc4810598dc6885843a6e8c .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/demo\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Request a demo<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/pt\/tag\/grc\/'><span class='tag-content'>GRC<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d4c3baa5a89 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/ai-cybersecurity-compliance\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Mai 30, 2024<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>AI, Cybersecurity and Compliance: A Data-Driven Perspective<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d4c3baa6e49 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/chatgpt-openai-security-risks-considerations\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Abr 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>ChatGPT is a Security Risk, But We\u2019ll Still Use it.<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d4c3baa8078 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/pt\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>Jul 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":48351,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[204],"resource-type":[67],"resource-topic":[228],"resource-industry":[119],"blog-category":[69,70],"class_list":["post-48350","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-grc","resource-type-blogs","resource-topic-compliance","resource-industry-compliance","blog-category-use-cases","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Conduct a Cybersecurity Compliance Audit in 6 Steps<\/title>\n<meta name=\"description\" content=\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/pt\/blogue\/auditoria-de-conformidade-de-seguranca-cibernetica\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Conduct a Cybersecurity Compliance Audit in 6 Steps\" \/>\n<meta property=\"og:description\" content=\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/pt\/blogue\/auditoria-de-conformidade-de-seguranca-cibernetica\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T12:57:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to Conduct a Cybersecurity Compliance Audit in 6 Steps\" \/>\n<meta name=\"twitter:description\" content=\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-6.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/\",\"url\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/\",\"name\":\"How to Conduct a Cybersecurity Compliance Audit in 6 Steps\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg\",\"datePublished\":\"2025-06-03T18:52:50+00:00\",\"dateModified\":\"2025-12-10T12:57:33+00:00\",\"description\":\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Conduct a Cybersecurity Compliance Audit in 6 Steps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/pt\/#website\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/pt\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Como realizar uma auditoria de conformidade de ciberseguran\u00e7a em 6 etapas","description":"Descubra seis etapas essenciais para realizar uma auditoria de conformidade em ciberseguran\u00e7a, reduzir riscos e otimizar seu processo de conformidade.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/pt\/blogue\/auditoria-de-conformidade-de-seguranca-cibernetica\/","og_locale":"pt_PT","og_type":"article","og_title":"How to Conduct a Cybersecurity Compliance Audit in 6 Steps","og_description":"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.","og_url":"https:\/\/swimlane.com\/pt\/blogue\/auditoria-de-conformidade-de-seguranca-cibernetica\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T12:57:33+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-6.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"How to Conduct a Cybersecurity Compliance Audit in 6 Steps","twitter_description":"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-6.jpg","twitter_site":"@swimlane","twitter_misc":{"Tempo estimado de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/","url":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/","name":"Como realizar uma auditoria de conformidade de ciberseguran\u00e7a em 6 etapas","isPartOf":{"@id":"https:\/\/swimlane.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg","datePublished":"2025-06-03T18:52:50+00:00","dateModified":"2025-12-10T12:57:33+00:00","description":"Descubra seis etapas essenciais para realizar uma auditoria de conformidade em ciberseguran\u00e7a, reduzir riscos e otimizar seu processo de conformidade.","breadcrumb":{"@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-24.jpg","width":1120,"height":666,"caption":"Discover six key steps to conduct a cybersecurity compliance audit, reduce risk, and streamline your compliance process."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/pt\/blog\/cyber-security-compliance-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"How to Conduct a Cybersecurity Compliance Audit in 6 Steps"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/pt\/#website","url":"https:\/\/swimlane.com\/pt\/","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","description":"Automa\u00e7\u00e3o de IA ag\u00eantica para todas as fun\u00e7\u00f5es de seguran\u00e7a","publisher":{"@id":"https:\/\/swimlane.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/pt\/#organization","name":"Automa\u00e7\u00e3o de seguran\u00e7a de baixo c\u00f3digo e plataforma SOAR | Swimlane","url":"https:\/\/swimlane.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/48350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/sw_resource\/48350\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media\/48351"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/media?parent=48350"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/tags?post=48350"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-type?post=48350"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-topic?post=48350"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/resource-industry?post=48350"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/pt\/wp-json\/wp\/v2\/blog-category?post=48350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}