{"id":14464,"date":"2026-02-20T16:10:26","date_gmt":"2026-02-20T16:10:26","guid":{"rendered":"https:\/\/a-listware.com\/?p=14464"},"modified":"2026-02-20T16:10:26","modified_gmt":"2026-02-20T16:10:26","slug":"network-security-audits-cost","status":"publish","type":"post","link":"https:\/\/a-listware.com\/de\/blog\/network-security-audits-cost","title":{"rendered":"What Does a Network Security Audit Really Cost?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">When teams talk about tightening network security, the conversation usually jumps straight to tools \u2013 firewalls, endpoint protection, threat detection. But sooner or later, someone brings up audits. And that\u2019s when things get quiet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not because audits aren\u2019t important, they are, but because most people don\u2019t really know what they cost. You can Google it and find anything from a few thousand to tens of thousands. Not exactly helpful when you\u2019re trying to plan a realistic budget or pitch it to leadership.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we\u2019ll break down where the money actually goes during a network security audit. What affects pricing? What surprises tend to pop up? And how do you keep it efficient without cutting corners? Let\u2019s walk through it in plain language.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14471\" src=\"https:\/\/a-listware.com\/wp-content\/uploads\/2026\/02\/What-a-Network-Security-Audit-Is-and-What-It-Actually-Costs.png\" alt=\"\" width=\"1536\" height=\"1024\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">What a Network Security Audit Is and What It Actually Costs<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A network security audit sounds like something every company should do, and it usually is. But the cost is what catches people off guard. It\u2019s not a fixed number, and that can feel frustrating until you look at what\u2019s really being audited.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In short, these audits dig into how your network is set up, where the weak points are, and whether your current protections are actually doing anything useful. That could mean reviewing firewall rules, checking who has access to what, inspecting traffic patterns, and even interviewing staff to understand how policies play out in real life. Some audits go a step further and include manual testing to see if vulnerabilities are actually exploitable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a quick breakdown of typical pricing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Small businesses with basic setups typically pay $3,000 to $7,000.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mid-sized companies with more complexity often spend $7,000 to $20,000.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enterprises or regulated environments may pay $50,000 or more.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The price reflects not just the size of your infrastructure, but also how much time the auditors need to understand it, how prepared your documentation is, and how customized the recommendations need to be. The more tailored and hands-on the audit, the more time it takes, and time is what you\u2019re really paying for.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">A-listware Network Security\u2011Related Services<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Unter <\/span><a href=\"https:\/\/a-listware.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">A-listware<\/span><\/a><span style=\"font-weight: 400;\">, we are a software development and IT consulting company with over 20 years of combined experience in building secure and resilient technology environments. We help clients across industries design, develop, and support enterprise systems while keeping security and infrastructure stability front of mind. Part of that work includes helping organizations strengthen their cybersecurity posture, which often goes hand in hand with understanding and preparing for network security audits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We offer cybersecurity services alongside software, infrastructure, and help\u2011desk support, which means we can assist teams not just in identifying vulnerabilities but also in maintaining secure configurations and controls that auditors will look for. Preparing in advance for a network audit \u2013 from tightening access rules to documenting your architecture and policies \u2013 can streamline the audit process and make the associated costs more predictable. Our approach is practical and focused on delivering value, helping teams make audit outcomes more actionable and grounded in real improvements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Because we also provide infrastructure services and managed IT support, we work with clients to ensure that both cloud and on\u2011prem systems are set up with consistent practices. Those foundational elements \u2013 clear documentation, well defined controls, and reliable monitoring \u2013 not only improve network security in daily operations but can reduce the time auditors spend gathering information. That, in turn, helps teams plan and manage the overall cost of network security audits more effectively.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14474\" src=\"https:\/\/a-listware.com\/wp-content\/uploads\/2026\/02\/What-Youre-Paying-For-Audit-Phases.png\" alt=\"\" width=\"1536\" height=\"1024\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">What You\u2019re Paying For: Audit Phases<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A good chunk of the cost isn\u2019t the testing itself. It\u2019s the work before and after. Here&#8217;s what a typical audit includes and where the money goes.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Pre-Audit Planning<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Before anything is tested, someone has to define the scope. That means understanding your environment, deciding what will and won\u2019t be in the review, and gathering the right documentation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typical tasks include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scoping calls or discovery sessions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Collecting asset inventories.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reviewing past audits or reports.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Mapping out high-risk systems.<\/span><\/li>\n<\/ul>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $500 to $2,000. If your documentation is a mess, expect this number to go up.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Vulnerability Assessment<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Automated scans look for known issues like unpatched systems, open ports, outdated services, and exposed admin panels. This part is fast and cheap, but it&#8217;s only the beginning.<\/span><\/p>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $1,000 to $5,000. Cheaper if you&#8217;re doing regular scans in-house and only need validation.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Penetration Testing (Optional, but Common)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Pen testers go beyond the scan and try to exploit what they find. This simulates how a real attacker might move through your network, escalate privileges, or exfiltrate data.<\/span><\/p>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $3,000 to $20,000+. Depends on scope. Testing a single subnet is different from testing your entire hybrid environment with remote endpoints and SaaS integrations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Configuration and Policy Review<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Auditors look at how your network devices (firewalls, routers, switches) are actually configured. They also check documentation around access control, incident response, and data handling.<\/span><\/p>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $2,000 to $10,000. The more devices and custom policies you have, the longer this takes.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">5. Compliance Gap Analysis<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">If you\u2019re working toward something like SOC 2, HIPAA, or ISO 27001, this part checks how close you are to being compliant.<\/span><\/p>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $3,000 to $12,000. Focused audits may skip this if compliance isn\u2019t a goal.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">6. Reporting and Management Review<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The final deliverable isn\u2019t just a PDF. Good auditors walk through their findings, explain what matters, and suggest practical steps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Expect:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Executive summaries.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Technical findings with severity ratings.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recommended remediation actions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Follow-up Q&amp;A sessions.<\/span><\/li>\n<\/ul>\n<p><b>Kosten:<\/b><span style=\"font-weight: 400;\"> $1,000 to $3,000. Add extra if you want remediation support or validation scans afterward.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14479\" src=\"https:\/\/a-listware.com\/wp-content\/uploads\/2026\/02\/Hidden-Costs-You-Might-Miss.png\" alt=\"\" width=\"1536\" height=\"1024\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">Hidden Costs You Might Miss<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">What most people don\u2019t factor in is the internal cost. Your staff spends time gathering info, sitting through interviews, and fixing things mid-audit. That time adds up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s say you\u2019re a mid-size company and you\u2019ve got the following roles involved:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance lead<\/b><span style=\"font-weight: 400;\">: 10-15 hours<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>IT manager<\/b><span style=\"font-weight: 400;\">: 20-30 hours<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Admin assistant<\/b><span style=\"font-weight: 400;\">: 5-10 hours<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Developers or engineers<\/b><span style=\"font-weight: 400;\"> (for infra validation): 10-20 hours<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Executive or CISO<\/b><span style=\"font-weight: 400;\">: 2-4 hours<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Multiply that by average hourly rates, and you\u2019re looking at $3,000 to $7,000 in soft costs, even before any findings are fixed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">In-House vs. External Audits<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Some companies try to save money by keeping audits internal. It\u2019s doable, but it comes with trade-offs:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Internal Audit Pros<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">An internal network security audit can be appealing for a few reasons. It tends to cost less, especially if your team already has the time and technical skills to handle it. Internal staff are also more familiar with the systems, which can make the process faster and easier to schedule around day-to-day operations.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Internal Audit Cons<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">But there are trade-offs. Internal audits often come with some degree of bias, even if unintentional. It\u2019s easy to miss issues when you\u2019re too close to the setup. You also lose the benefit of external validation, which can be important for clients, partners, or regulatory audits. An in-house review may not carry the same weight as a third-party assessment when it comes to proving you\u2019ve taken security seriously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">External audits are more expensive, but they bring objectivity and often deeper expertise. Many companies do both \u2013 internal quarterly reviews plus external audits annually or before big launches.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Key Factors That Impact Final Cost<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Some costs are predictable. Others sneak up on you. Here are the variables that swing the price most:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Size of network<\/b><span style=\"font-weight: 400;\">: More subnets, more systems, more hours.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Remote vs. on-site<\/b><span style=\"font-weight: 400;\">: Travel adds cost unless the firm works fully remote.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Documentation readiness<\/b><span style=\"font-weight: 400;\">: Poor prep means more billable hours.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Level of testing<\/b><span style=\"font-weight: 400;\">: Surface scans vs. deep manual penetration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Compliance needs<\/b><span style=\"font-weight: 400;\">: The closer to certification, the more thorough the review.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Follow-up expectations<\/b><span style=\"font-weight: 400;\">: Some firms charge for retesting or post-audit support.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Network Security Audit Cost Summary<\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<td><b>Business Type<\/b><\/td>\n<td><b>Scope of Audit<\/b><\/td>\n<td><b>Typischer Kostenbereich<\/b><\/td>\n<td><b>Anmerkungen<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Small Business<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Basic external audit<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$3,000 \u2013 $7,000<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Limited assets, one location, standard IT stack<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Mid-Size Company<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Broader audit with deeper scope<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$7,000 \u2013 $20,000<\/span><\/td>\n<td><span style=\"font-weight: 400;\">May include cloud, multiple offices, policy review<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Enterprise or Regulated Org<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Full-scale third-party audit<\/span><\/td>\n<td><span style=\"font-weight: 400;\">$20,000 \u2013 $50,000+<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Complex environments, compliance-driven, often includes testing<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Internal Audit (all sizes)<\/b><\/td>\n<td><span style=\"font-weight: 400;\">Self-conducted by internal team<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Cost of time and resources<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Requires skilled staff, lacks external validation<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14485\" src=\"https:\/\/a-listware.com\/wp-content\/uploads\/2026\/02\/How-to-Keep-Costs-Manageable-Without-Sacrificing-Value.png\" alt=\"\" width=\"1536\" height=\"1024\" \/><\/p>\n<h2><span style=\"font-weight: 400;\">How to Keep Costs Manageable Without Sacrificing Value<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are smart ways to keep your audit budget under control without doing a half-baked job. Here\u2019s what works:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Narrow the scope strategically:<\/b><span style=\"font-weight: 400;\"> Don\u2019t try to audit everything at once. Start with internet-facing systems or your most critical data paths.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Fix obvious issues beforehand:<\/b><span style=\"font-weight: 400;\"> Run internal scans, patch known CVEs, close open ports, remove old users.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Prepare documentation early:<\/b><span style=\"font-weight: 400;\"> Clean inventories, access policies, and network diagrams save tons of time later.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Bundle services:<\/b><span style=\"font-weight: 400;\"> Some firms offer reduced rates if you combine a scan, pentest, and policy review.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Go remote if possible:<\/b><span style=\"font-weight: 400;\"> Remote audits are often cheaper and faster to schedule.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Schedule off-peak:<\/b><span style=\"font-weight: 400;\"> Avoid end-of-year rushes when auditors are swamped.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Abschlie\u00dfende \u00dcberlegungen<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Security audits aren\u2019t cheap, but breaches are worse. And while network security audits vary in price, they\u2019re not random. The biggest cost driver is how prepared you are before the auditor shows up.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For most small to mid-size companies, budgeting $10,000 to $20,000 gives you room for a professional review with real testing and follow-up. If you\u2019re trying to meet compliance standards, expect to spend more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think of the audit as a way to prove what\u2019s working, fix what\u2019s not, and get peace of mind that your network isn\u2019t quietly full of holes. And if you\u2019re strategic about scope and timing, you can do that without torching your entire budget.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">FAQ<\/span><\/h2>\n<ol>\n<li><b> How much should a small business expect to pay for a network security audit?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">For a small company with a basic network setup, a professional audit might run between $5,000 and $15,000. That typically covers a one-time assessment, reporting, and recommendations. If you&#8217;re bundling it with other services like penetration testing or infrastructure cleanup, expect the upper end of that range.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Are internal audits enough, or do I need an external firm?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Internal audits can be useful, especially if your team knows what to look for and has access to the right tools. But external firms bring fresh eyes and often spot risks your internal team is too close to see. For regulated industries or high-stakes environments, outside audits are usually the safer bet.<\/span><\/p>\n<ol start=\"3\">\n<li><b> What\u2019s the biggest cost driver in a security audit?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Complexity. The more systems, devices, access points, and cloud services you have, the longer it takes to review everything properly. Customized environments or poor documentation also add to the bill because the auditors spend more time figuring things out before they even begin testing.<\/span><\/p>\n<ol start=\"4\">\n<li><b> How often should we do a network security audit?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">At least once a year is a good baseline for most businesses. If you\u2019re in healthcare, finance, or any industry with compliance requirements, you might need one more often. Also, anytime you undergo major infrastructure changes or migrate systems to the cloud, it\u2019s smart to do another round.<\/span><\/p>\n<ol start=\"5\">\n<li><b> Can we reduce audit costs without cutting corners?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Yes, by getting your house in order before the audit starts. Have your documentation ready. Know your network map. Fix obvious gaps first. A well-prepared environment speeds up the process and can shave off hours (or even days) of billable time. Some companies even do a \u201cpre-audit\u201d internally to catch low-hanging fruit.<\/span><\/p>\n<ol start=\"6\">\n<li><b> What\u2019s the difference between a vulnerability scan and a full audit?<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">A vulnerability scan is automated and usually surface-level. It flags known issues but doesn\u2019t tell you much about how your business operates or whether your controls make sense. A full audit, on the other hand, looks at configurations, policies, user behavior, and the broader picture. Think of the scan as a blood test, and the audit as a full physical exam.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>When teams talk about tightening network security, the conversation usually jumps straight to tools \u2013 firewalls, endpoint protection, threat detection. But sooner or later, someone brings up audits. And that\u2019s when things get quiet. Not because audits aren\u2019t important, they are, but because most people don\u2019t really know what they cost. You can Google it [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":14466,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20],"tags":[],"class_list":["post-14464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"acf":[],"_links":{"self":[{"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/posts\/14464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/comments?post=14464"}],"version-history":[{"count":1,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/posts\/14464\/revisions"}],"predecessor-version":[{"id":14487,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/posts\/14464\/revisions\/14487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/media\/14466"}],"wp:attachment":[{"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/media?parent=14464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/categories?post=14464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/a-listware.com\/de\/wp-json\/wp\/v2\/tags?post=14464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}