{"version":"1.0","provider_name":"DevSecOps School","provider_url":"http:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"http:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"Policy as Code in DevSecOps: A Comprehensive Tutorial - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"oVKeKRIS1N\"><a href=\"http:\/\/devsecopsschool.com\/blog\/policy-as-code-in-devsecops-a-comprehensive-tutorial\/\">Policy as Code in DevSecOps: A Comprehensive Tutorial<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/devsecopsschool.com\/blog\/policy-as-code-in-devsecops-a-comprehensive-tutorial\/embed\/#?secret=oVKeKRIS1N\" width=\"600\" height=\"338\" title=\"&#8220;Policy as Code in DevSecOps: A Comprehensive Tutorial&#8221; &#8212; DevSecOps School\" data-secret=\"oVKeKRIS1N\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction &amp; Overview As organizations increasingly adopt DevSecOps practices, integrating security into every stage of the software development lifecycle (SDLC) becomes paramount. One of the most transformative concepts enabling this shift is Policy as Code (PaC). By codifying policies and embedding them into automated workflows, organizations ensure that compliance, security, and operational standards are enforced ... Read more","thumbnail_url":"https:\/\/blog.techiescamp.com\/content\/images\/size\/w1200\/2024\/07\/Policy-as-Code.png"}