{"version":"1.0","provider_name":"Masterminds - Maisteriainesta","provider_url":"https:\/\/blogit.metropolia.fi\/masterminds","author_name":"Metropolia Master's bloggers","author_url":"https:\/\/blogit.metropolia.fi\/masterminds\/author\/yamk\/","title":"Integrating Security into Continuous Delivery - Masterminds - Maisteriainesta","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yrKRhOgn5z\"><a href=\"https:\/\/blogit.metropolia.fi\/masterminds\/2024\/02\/12\/integrating-security-into-continuous-delivery\/\">Integrating Security into Continuous Delivery<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogit.metropolia.fi\/masterminds\/2024\/02\/12\/integrating-security-into-continuous-delivery\/embed\/#?secret=yrKRhOgn5z\" width=\"600\" height=\"338\" title=\"&#8221;Integrating Security into Continuous Delivery&#8221; &#8212; Masterminds - Maisteriainesta\" data-secret=\"yrKRhOgn5z\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blogit.metropolia.fi\/masterminds\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/blogit.metropolia.fi\/masterminds\/wp-content\/uploads\/sites\/10\/2024\/09\/MV_Blog_kansikuva.png.jpg","thumbnail_width":451,"thumbnail_height":301,"description":"Adopting a DevOps strategy for software development aims to significantly increase the speed of software delivery process by working in small batches and ensuring software is always releasable. This way of working is often called Continuous Delivery. However, the increased speed in software delivery creates challenges for existing security processes and practices. To ensure security [&hellip;]"}