{"id":259,"date":"2025-11-17T12:31:19","date_gmt":"2025-11-17T12:31:19","guid":{"rendered":"https:\/\/www.atelye.com.tr\/?page_id=259"},"modified":"2025-11-17T12:31:21","modified_gmt":"2025-11-17T12:31:21","slug":"ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template","status":"publish","type":"page","link":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/","title":{"rendered":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"h-master-your-cyber-security-posture-with-the-ultimate-nist-csf-2-0-toolkit\">Master Your Cyber Security Posture with the Ultimate NIST CSF 2.0 Toolkit<\/h3>\n\n\n\n<p>Stop struggling with complex cybersecurity standards. This <strong>Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template<\/strong> is designed to transform the daunting task of compliance into a straightforward, systematic process. Leveraging the newly updated <strong>NIST Cybersecurity Framework 2.0<\/strong>\u2014including the critical <strong>Govern<\/strong> function\u2014this digital download provides every tool necessary for a comprehensive <strong>cyber risk assessment<\/strong> and maturity evaluation. It&#8217;s the essential <strong>risk management spreadsheet<\/strong> for organizations of all sizes looking for a Risk Management Tool &amp; Template.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-comprehensive-coverage-of-all-six-csf-2-0-functions\">Comprehensive Coverage of All Six CSF 2.0 Functions<\/h4>\n\n\n\n<p>This toolkit meticulously covers all six core functions of the CSF 2.0: <strong>Govern (GV), Identify (ID), Protect (PR), Detect (DE), Respond (RS), and Recover (RC)<\/strong>. Our templates allow you to assess your security posture against hundreds of subcategories, ensuring full alignment with the framework&#8217;s outcomes. The Tool &amp; Template ensures thorough evaluation and alignment with these functions. Use the integrated Cybersecurity Compliance Checklist to easily map your current security controls. Consider deploying the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template as a part of these initiatives.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-key-benefits-of-our-nist-csf-2-0-template\">Key Benefits of Our NIST CSF 2.0 Template:<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Save Time:<\/strong> Instantly apply the official framework without having to build complex documentation from scratch.<\/li>\n\n\n\n<li><strong>Achieve Compliance:<\/strong> Clearly track progress towards meeting legal, regulatory, and contractual requirements related to <strong>cyber risk management<\/strong> with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template.<\/li>\n\n\n\n<li><strong>Standardized Reporting:<\/strong> Use the standardized format to effectively communicate risks and control gaps to executives and stakeholders.<\/li>\n\n\n\n<li><strong>Risk Prioritization:<\/strong> Focus your resources on the highest priority risks using the built-in assessment and scoring features.<\/li>\n<\/ul>\n\n\n\n<p>Don&#8217;t rely on generic risk forms. Invest in a dedicated, high-quality <strong>NIST CSF 2.0 template<\/strong> that saves hundreds of hours of manual work. Download the Cyber Risk Assessment Tool &amp; Template instantly and start building a robust defense against evolving cyber threats today. This is the definitive solution to elevate your <strong>cybersecurity compliance<\/strong> efforts.<\/p>\n\n\n\n<div class=\"wp-block-group alignfull has-raft-fg-alt-color has-raft-accent-background-color has-text-color has-background is-layout-constrained wp-container-core-group-is-layout-87ba1f51 wp-block-group-is-layout-constrained\" style=\"margin-top:0px;margin-bottom:0px;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<h2 class=\"wp-block-heading has-text-align-center has-raft-fg-alt-color has-text-color\">Get started today, get in touch!<\/h2>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-a89b3969 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-raft-fg-alt-color has-text-color wp-element-button\" href=\"https:\/\/www.etsy.com\/listing\/4402217618\/ultimate-nist-csf-20-cyber-risk?ref=listings_manager_grid\">Buy Now<\/a><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-26666c0f wp-block-group-is-layout-constrained\" style=\"margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--80);padding-right:var(--wp--preset--spacing--40);padding-bottom:var(--wp--preset--spacing--80);padding-left:var(--wp--preset--spacing--40)\">\n<div class=\"wp-block-group alignwide is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h2 class=\"wp-block-heading\" id=\"h-if-you-need-more-in-touch\">If you need more, in touch!<\/h2>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p class=\"has-text-align-left\">We create professionally designed, audit-ready toolkits to help CISOs, consultants, and modern organizations manage security, risk, and compliance with confidence.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-primary is-style-fill\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.atelye.com.tr\/index.php\/elevate-your-security-posture-comprehensive-cybersecurity-grc-solutions\/\">Toolkits<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Master Your Cyber Security Posture with the Ultimate NIST CSF 2.0 Toolkit Stop struggling with complex cybersecurity standards. This Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template is designed to transform the daunting task of compliance into a straightforward, systematic process. Leveraging the newly updated NIST Cybersecurity Framework 2.0\u2014including the critical Govern function\u2014this [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":260,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-259","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v26.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool Overview<\/title>\n<meta name=\"description\" content=\"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template designed for all organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIST CSF 2.0 Cyber Risk Assessment Tool\" \/>\n<meta property=\"og:description\" content=\"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template designed for all organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\" \/>\n<meta property=\"og:site_name\" content=\"Atelye\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-17T12:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template\" \/>\n<meta name=\"twitter:description\" content=\"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool &amp; Template designed for all organizations.\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"WebPage\",\"ItemPage\"],\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\",\"url\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\",\"name\":\"Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool Overview\",\"isPartOf\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png\",\"datePublished\":\"2025-11-17T12:31:19+00:00\",\"dateModified\":\"2025-11-17T12:31:21+00:00\",\"description\":\"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template designed for all organizations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png\",\"width\":1600,\"height\":896,\"caption\":\"Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.atelye.com.tr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.atelye.com.tr\/#website\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"name\":\"Atelye\",\"description\":\"Designing Digital Resilience\",\"publisher\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.atelye.com.tr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.atelye.com.tr\/#organization\",\"name\":\"Atelye\",\"url\":\"https:\/\/www.atelye.com.tr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"contentUrl\":\"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png\",\"width\":250,\"height\":250,\"caption\":\"Atelye\"},\"image\":{\"@id\":\"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/\",\"https:\/\/www.youtube.com\/@AtelyeDR-k5t\"],\"publishingPrinciples\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"ownershipFundingInfo\":\"https:\/\/www.atelye.com.tr\/index.php\/about-us\/\",\"actionableFeedbackPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\",\"correctionsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"ethicsPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityPolicy\":\"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/\",\"diversityStaffingReport\":\"https:\/\/www.atelye.com.tr\/index.php\/faq\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool Overview","description":"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template designed for all organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/","og_locale":"en_US","og_type":"article","og_title":"NIST CSF 2.0 Cyber Risk Assessment Tool","og_description":"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template designed for all organizations.","og_url":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/","og_site_name":"Atelye","article_modified_time":"2025-11-17T12:31:21+00:00","og_image":[{"width":1600,"height":896,"url":"http:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template","twitter_description":"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template designed for all organizations.","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["WebPage","ItemPage"],"@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/","url":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/","name":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool Overview","isPartOf":{"@id":"https:\/\/www.atelye.com.tr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage"},"image":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage"},"thumbnailUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png","datePublished":"2025-11-17T12:31:19+00:00","dateModified":"2025-11-17T12:31:21+00:00","description":"Transform your cybersecurity efforts with the Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template designed for all organizations.","breadcrumb":{"@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#primaryimage","url":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/11\/Ultimate-NIST-CSF-2.0-Cyber-Risk-Assessment-Toolkit-Governance-Identify-Protect-Detect-Respond-Recover-Template.png","width":1600,"height":896,"caption":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Tool & Template"},{"@type":"BreadcrumbList","@id":"https:\/\/www.atelye.com.tr\/index.php\/ultimate-nist-csf-2-0-cyber-risk-assessment-tool-template\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.atelye.com.tr\/"},{"@type":"ListItem","position":2,"name":"Ultimate NIST CSF 2.0 Cyber Risk Assessment Toolkit | Governance, Identify, Protect, Detect, Respond, Recover Template"}]},{"@type":"WebSite","@id":"https:\/\/www.atelye.com.tr\/#website","url":"https:\/\/www.atelye.com.tr\/","name":"Atelye","description":"Designing Digital Resilience","publisher":{"@id":"https:\/\/www.atelye.com.tr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.atelye.com.tr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.atelye.com.tr\/#organization","name":"Atelye","url":"https:\/\/www.atelye.com.tr\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/","url":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","contentUrl":"https:\/\/www.atelye.com.tr\/wp-content\/uploads\/2025\/05\/Classic-Journalistic-Signature-Logo-250-x-250-piksel.png","width":250,"height":250,"caption":"Atelye"},"image":{"@id":"https:\/\/www.atelye.com.tr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/atelye-dr-976413366\/","https:\/\/www.youtube.com\/@AtelyeDR-k5t"],"publishingPrinciples":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","ownershipFundingInfo":"https:\/\/www.atelye.com.tr\/index.php\/about-us\/","actionableFeedbackPolicy":"https:\/\/www.atelye.com.tr\/index.php\/faq\/","correctionsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","ethicsPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityPolicy":"https:\/\/www.atelye.com.tr\/index.php\/privacy-policy\/","diversityStaffingReport":"https:\/\/www.atelye.com.tr\/index.php\/faq\/"}]}},"_links":{"self":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":1,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/259\/revisions"}],"predecessor-version":[{"id":261,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/pages\/259\/revisions\/261"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/media\/260"}],"wp:attachment":[{"href":"https:\/\/www.atelye.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}