{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"Rahul","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/rahulgorain\/","title":"A Comprehensive Guide to Implementing Azure Security Technologies - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Yglc081Bd8\"><a href=\"https:\/\/devsecopsschool.com\/blog\/a-comprehensive-guide-to-implementing-azure-security-technologies\/\">A Comprehensive Guide to Implementing Azure Security Technologies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/a-comprehensive-guide-to-implementing-azure-security-technologies\/embed\/#?secret=Yglc081Bd8\" width=\"600\" height=\"338\" title=\"&#8220;A Comprehensive Guide to Implementing Azure Security Technologies&#8221; &#8212; DevSecOps School\" data-secret=\"Yglc081Bd8\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction: Problem, Context &amp; Outcome Cloud platforms allow teams to deliver features faster than ever, but security weaknesses continue to be a major source of outages, data exposure, and compliance failures. In many Azure environments, engineers and DevOps teams struggle with challenges such as identity sprawl, misconfigured access permissions, publicly exposed resources, and poorly segmented ... Read more"}