{"version":"1.0","provider_name":"DevSecOps School","provider_url":"http:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"http:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"Zero Trust in DevSecOps: A Comprehensive Tutorial - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ezixI82DuG\"><a href=\"http:\/\/devsecopsschool.com\/blog\/zero-trust-in-devsecops-a-comprehensive-tutorial\/\">Zero Trust in DevSecOps: A Comprehensive Tutorial<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"http:\/\/devsecopsschool.com\/blog\/zero-trust-in-devsecops-a-comprehensive-tutorial\/embed\/#?secret=ezixI82DuG\" width=\"600\" height=\"338\" title=\"&#8220;Zero Trust in DevSecOps: A Comprehensive Tutorial&#8221; &#8212; DevSecOps School\" data-secret=\"ezixI82DuG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=http:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction &amp; Overview Zero Trust is a security model that assumes no entity\u2014whether inside or outside the network\u2014is inherently trustworthy. In the context of DevSecOps, it integrates security practices into the development and operations lifecycle, ensuring continuous protection across dynamic, cloud-native environments. This tutorial explores Zero Trust&#8217;s principles, architecture, and practical implementation in DevSecOps, providing ... Read more","thumbnail_url":"https:\/\/www.strongdm.com\/hubfs\/StrongDm_January2022\/Images\/618c430d49ffb50c3b506f38_zero-trust.jpeg"}