{"id":1083,"date":"2019-07-02T10:00:15","date_gmt":"2019-07-02T04:30:15","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/?p=1083"},"modified":"2021-09-29T15:51:38","modified_gmt":"2021-09-29T10:21:38","slug":"devsecops-the-journey-from-theory-to-practice","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/","title":{"rendered":"DevSecOps-The Journey from Theory to Practice"},"content":{"rendered":"\r\n<p>DevSecOps has become the new security norm in the <strong><a href=\"https:\/\/www.urolime.com\/devops-services.html\">DevOps<\/a><\/strong> ecosystem. It is easy to understand DevSecOps philosophy but the game changes when you actually start implementing it. There is no specific tool or switch that you can simply flip to achieve DevSecOps.<\/p>\r\n<p><!--more--><\/p>\r\n\r\n\r\n\r\n<p><strong>DevSecOps in Action<\/strong><\/p>\r\n\r\n\r\n\r\n<p>DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process. Then, how exactly does DevSecOps work?<br \/>Let\u2019s get started.<\/p>\r\n\r\n\r\n\r\n<p><strong>Microservice-Based Infrastructure<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Segmenting your entire infrastructure is no easy feat but once you achieve it\u00a0 and everything becomes well-defined with specific individual functions, it becomes easier to monitor each and every step of the process and make necessary changes.<\/p>\r\n\r\n\r\n\r\n<p>As each team will have a process to claim, the blame game will not rear its ugly head in your organization. Thus, improving team collaboration and cooperation which is equally or perhaps more important for successful DevSecOps implementation.<\/p>\r\n\r\n\r\n\r\n<p><strong>Automation<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Automation has the power to streamline almost any business process, reduce human error and drastically improve the agility and speed. The key here is to properly apply automation\u00a0 to your security checks and other processes.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>When we refer to automation, it is not just about AI and machine learning. It includes using the highest quality software including:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Malware scanner<\/li>\r\n<li>Two-factor authentication\u00a0<\/li>\r\n<li>VPN<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>This equips your team to better implement security practices.<\/p>\r\n\r\n\r\n\r\n<p>AI and machine learning can play a vital role in enhancing your cybersecurity as it not only\u00a0<\/p>\r\n\r\n\r\n\r\n<p>automates the essential security protocols, but also learns, evolves, and adapts to new emerging threats.<\/p>\r\n\r\n\r\n\r\n<p><strong>Continuous Feedback<\/strong><\/p>\r\n\r\n\r\n\r\n<p>The ideal approach is to develop a continuous feedback based environment as it is essential to achieve efficiency and proficiency. It is this continuous and constant flow of information that helps your team know where they actually stand when it comes to security threats. Further, it educates your team about the latest security updates and helps implement the same.<\/p>\r\n\r\n\r\n\r\n<p>In the DevSecOps process, feedback should not only come from the management but from every team in the process. If the team has been properly divided into development, security, and operations in an organization they will surely need to provide feedback back and forth multiple times in a day.<\/p>\r\n\r\n\r\n\r\n<p><strong>Secure Coding-Train your developers<\/strong><\/p>\r\n\r\n\r\n\r\n<p>Secure coding is not something your development team will worry about as most of them think that there are no issues with their code. For the DevSecOps process to succeed this has to change. Even though training an entire development team on secure coding is an expensive affair but it is vital for the\u00a0 process to grow and flourish.<\/p>\r\n\r\n\r\n\r\n<p><strong>Analyzing Third-Party Vendors<\/strong><\/p>\r\n\r\n\r\n\r\n<p>As the age-old adage goes prevention is better than cure. In today\u2019s interconnected world, third-party vendors come with substantial security risks as your organization shares data and resources with them. Think and inspect every vendor your associated with, if any of them could be a security threat to your business.<\/p>\r\n\r\n\r\n\r\n<p><strong>DevSecOps Rules to follow<\/strong><\/p>\r\n\r\n\r\n\r\n<p>If you wish to achieve stunning results with DevSecOps, try the following:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>Right from the beginning, encourage your team to follow best cybersecurity practices including :<\/li>\r\n<li>Regularly update hardware and software<\/li>\r\n<li>Train your employees on VPN best practices (virtual private networks)<\/li>\r\n<li>Conduct penetration testing<\/li>\r\n<li>Try to reduce human error as much as possible<\/li>\r\n<li>Monitor all your software<\/li>\r\n<li>Check code continuously<\/li>\r\n<li>Implement code dependency checks<\/li>\r\n<li>Set up one-click compliance reporting<\/li>\r\n<li>Ensure different teams are communicating and collaborating\u00a0<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>It\u2019s time to evolve for organizations and embrace DevSecOps if they wish to survive and grow in a world of growing cybersecurity threats.<\/p>\r\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_1083\" class=\"pvc_stats all  \" data-element-id=\"1083\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>DevSecOps has become the new security norm in the DevOps ecosystem. It is easy to understand DevSecOps philosophy but the game changes when you actually start implementing it. There is no specific tool or switch that you can simply flip to achieve DevSecOps.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1083\" class=\"pvc_stats all  \" data-element-id=\"1083\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1084,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[295],"tags":[15,248,338,250,270,272,255,268],"class_list":["post-1083","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devsecops","tag-devops","tag-devops-automation","tag-devops-ecosystem","tag-devsecops","tag-devsecops-implementation","tag-devsecops-workflow","tag-microservices","tag-security-in-devops"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DevSecOps-The Journey from Theory to Practice - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevSecOps-The Journey from Theory to Practice - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-02T04:30:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-29T10:21:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"DevSecOps-The Journey from Theory to Practice\",\"datePublished\":\"2019-07-02T04:30:15+00:00\",\"dateModified\":\"2021-09-29T10:21:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\"},\"wordCount\":599,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png\",\"keywords\":[\"DevOps\",\"DevOps Automation\",\"DevOps Ecosystem\",\"DevSecOps\",\"devsecops implementation\",\"devsecops workflow\",\"microservices\",\"Security in DevOps\"],\"articleSection\":[\"DevSecOps\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\",\"name\":\"DevSecOps-The Journey from Theory to Practice - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png\",\"datePublished\":\"2019-07-02T04:30:15+00:00\",\"dateModified\":\"2021-09-29T10:21:38+00:00\",\"description\":\"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png\",\"width\":768,\"height\":432,\"caption\":\"Copy of Add a little bit of body text 2\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DevSecOps-The Journey from Theory to Practice - Urolime Blogs","description":"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/","og_locale":"en_US","og_type":"article","og_title":"DevSecOps-The Journey from Theory to Practice - Urolime Blogs","og_description":"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.","og_url":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/","og_site_name":"Urolime Blogs","article_published_time":"2019-07-02T04:30:15+00:00","article_modified_time":"2021-09-29T10:21:38+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"DevSecOps-The Journey from Theory to Practice","datePublished":"2019-07-02T04:30:15+00:00","dateModified":"2021-09-29T10:21:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/"},"wordCount":599,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","keywords":["DevOps","DevOps Automation","DevOps Ecosystem","DevSecOps","devsecops implementation","devsecops workflow","microservices","Security in DevOps"],"articleSection":["DevSecOps"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/","url":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/","name":"DevSecOps-The Journey from Theory to Practice - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","datePublished":"2019-07-02T04:30:15+00:00","dateModified":"2021-09-29T10:21:38+00:00","description":"DevSecOps is not possible by either asking your team to be more mindful about security or letting your security team randomly jump into the development process.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/devsecops-the-journey-from-theory-to-practice\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2019\/07\/Copy-of-Add-a-little-bit-of-body-text-2.png","width":768,"height":432,"caption":"Copy of Add a little bit of body text 2"},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/#website","url":"https:\/\/www.urolime.com\/blogs\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/comments?post=1083"}],"version-history":[{"count":4,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1083\/revisions"}],"predecessor-version":[{"id":2536,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1083\/revisions\/2536"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media\/1084"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media?parent=1083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/categories?post=1083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/tags?post=1083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}