{"version":"1.0","provider_name":"DevSecOps School","provider_url":"http:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"http:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"Shift Left in DevSecOps: A Comprehensive Tutorial - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"yk71JyBOPb\"><a href=\"http:\/\/devsecopsschool.com\/blog\/shift-left-in-devsecops-a-comprehensive-tutorial\/\">Shift Left in DevSecOps: A Comprehensive Tutorial<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/devsecopsschool.com\/blog\/shift-left-in-devsecops-a-comprehensive-tutorial\/embed\/#?secret=yk71JyBOPb\" width=\"600\" height=\"338\" title=\"&#8220;Shift Left in DevSecOps: A Comprehensive Tutorial&#8221; &#8212; DevSecOps School\" data-secret=\"yk71JyBOPb\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"1. Introduction &amp; Overview As software development cycles accelerate through Agile and DevOps practices, integrating security early in the software development lifecycle (SDLC) becomes critical. Traditionally, security was an afterthought\u2014tacked onto the final stages of development. The Shift Left approach revolutionizes this by embedding security and testing as early as possible, aligning with the ethos ... Read more"}