{"id":946,"date":"2019-03-22T10:00:45","date_gmt":"2019-03-22T04:30:45","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/uk\/?p=946"},"modified":"2019-03-26T17:55:01","modified_gmt":"2019-03-26T12:25:01","slug":"transition-to-devsecops-part-i","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/","title":{"rendered":"Transition to DevSecOps Part-I"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><\/h2>\n\n\n\n<p>The rise of DevOps is quite high and increasing. Almost every organisations have adopted this methodology as it improves their business, overall working environment and results in efficient development and deployment of software applications. Despite all these advantages, one thing that everyone worries are about the security measures in order to make the software application security. Even though DevOps has its respective advantages, what\u2019s the point if there are no effective security measures. This is where the DevSecOps process comes in.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is DevSecOps<\/h2>\n\n\n\n<p>DevSecOps is a practice of integrating secure practices within the DevOps process. It encourages flexible collaboration between developers, security and the operations teams. Normally in a typical software development cycle, the security measures are employed in the end stages. There are many reasons for this such as its quite challenging, project deadlines and budget etc. The problem occurs when the security team is tasked with testing the completed software for security issues. They test the application using their tools and processes and if any vulnerabilities are found, the software is sent to the development team for rectifying the error, but here, the developers may not have the security knowledge or the kind of tools that the security team used for testing.<br><\/p>\n\n\n\n<p>This eventually leads to conflicts and delayed release of the product which in turn is not beneficial and affects the credibility of the organisation. The objective of DevSecOps is to implement the security measures right at the start of the development process itself such that the chances for any sort of delays or conflicts between the teams are slim and will significantly improve the reputation and credibility of the organisation.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why should Organisations adopt DevSecOps approach<br><\/h2>\n\n\n\n<p>The one good reason would be to ensure better security features for the application and efficient working between the development, security and operations team in the organisation. Also, when security measures are implemented in the initial stages itself, the development team will naturally become more proficient in security and fewer security vulnerabilities will be found at the end of the process. Also, by placing security responsibility to the DevOps team, it will encourage them to consider the security risks and take necessary actions and at the same time meeting the software delivery requirements. It also creates a shared responsibility in the team since earlier the security checks and related processes were handled by a particular team. However, transitioning to DevSecOps is not as easy as it looks. There are certain practices if followed correctly will ensure the successful transition of an organisation to DevSecOps.<br><\/p>\n\n\n\n<p>What those practices are and how they help in transitioning to DevSecOps for an organisation will be explained in Part-II of this blog. Until then stay tuned.<br><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About Us<\/strong><\/h2>\n\n\n\n<p>Urolime is one of the leading DevOps consulting company with considerable experience in supporting customers around the globe in adopting DevOps practices. As an AWS and Cloud consulting partner, Urolime not only has experience in Cloud Migrations but also support the vast customer base to enable scalable and highly available architecture on AWS, Azure, and GCP. The customers benefit from our expert involvement in Deployment Automation (CI\/CD), Infrastructure Automation, Dockerization, Security, Disaster Recovery Planning &amp; Implementation and 24\/7 Managed Services with 10 Minutes SLA. Urolime is one of the companies which deals with a bunch of Kubernetes solution build for the customer on AWS, Azure, and GCP.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_946\" class=\"pvc_stats all  \" data-element-id=\"946\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>The rise of DevOps is quite high and increasing. Almost every organisations have adopted this methodology as it improves their business, overall working environment and results in efficient development and deployment of software applications. Despite all these advantages, one thing that everyone worries are about the security measures in order to make the software application [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_946\" class=\"pvc_stats all  \" data-element-id=\"946\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":947,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[12],"tags":[160,15,274,21,250,270,199],"class_list":["post-946","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops","tag-cloud-services","tag-devops","tag-devops-lifecycle","tag-devops-services","tag-devsecops","tag-devsecops-implementation","tag-it-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Transition to DevSecOps Part-I - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Transition to DevSecOps Part-I - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-22T04:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-26T12:25:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1240\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Transition to DevSecOps Part-I\",\"datePublished\":\"2019-03-22T04:30:45+00:00\",\"dateModified\":\"2019-03-26T12:25:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\"},\"wordCount\":565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png\",\"keywords\":[\"cloud services\",\"DevOps\",\"DevOps lifecycle\",\"devops services\",\"DevSecOps\",\"devsecops implementation\",\"it managed services\"],\"articleSection\":[\"DevOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\",\"name\":\"Transition to DevSecOps Part-I - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png\",\"datePublished\":\"2019-03-22T04:30:45+00:00\",\"dateModified\":\"2019-03-26T12:25:01+00:00\",\"description\":\"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png\",\"width\":1240,\"height\":700,\"caption\":\"TRANSITION TO DEVSECOPS PART I\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Transition to DevSecOps Part-I\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Transition to DevSecOps Part-I - Urolime Blogs","description":"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/","og_locale":"en_US","og_type":"article","og_title":"Transition to DevSecOps Part-I - Urolime Blogs","og_description":"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.","og_url":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/","og_site_name":"Urolime Blogs","article_published_time":"2019-03-22T04:30:45+00:00","article_modified_time":"2019-03-26T12:25:01+00:00","og_image":[{"width":1240,"height":700,"url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Transition to DevSecOps Part-I","datePublished":"2019-03-22T04:30:45+00:00","dateModified":"2019-03-26T12:25:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/"},"wordCount":565,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png","keywords":["cloud services","DevOps","DevOps lifecycle","devops services","DevSecOps","devsecops implementation","it managed services"],"articleSection":["DevOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/","url":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/","name":"Transition to DevSecOps Part-I - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png","datePublished":"2019-03-22T04:30:45+00:00","dateModified":"2019-03-26T12:25:01+00:00","description":"In any field of technology, security is the most pressing concern, even in DevOps. To integrate security features into DevOps process, DevSecOps approach is introduced. Click to know more.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2019\/03\/TRANSITION-TO-DEVSECOPS-PART-I.png","width":1240,"height":700,"caption":"TRANSITION TO DEVSECOPS PART I"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/uk\/transition-to-devsecops-part-i\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/uk\/"},{"@type":"ListItem","position":2,"name":"Transition to DevSecOps Part-I"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#website","url":"https:\/\/www.urolime.com\/blogs\/uk\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/uk\/wp-content\/uploads\/sites\/3\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/uk\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/uk\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/946","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/comments?post=946"}],"version-history":[{"count":2,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/946\/revisions"}],"predecessor-version":[{"id":949,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/posts\/946\/revisions\/949"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/media\/947"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/media?parent=946"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/categories?post=946"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/uk\/wp-json\/wp\/v2\/tags?post=946"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}