{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"Amelia Olivia","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/amelia\/","title":"Certified Kubernetes Security Specialist: Roadmap - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"I4afhyB36A\"><a href=\"https:\/\/devsecopsschool.com\/blog\/certified-kubernetes-security-specialist-roadmap\/\">Certified Kubernetes Security Specialist: Roadmap<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/certified-kubernetes-security-specialist-roadmap\/embed\/#?secret=I4afhyB36A\" width=\"600\" height=\"338\" title=\"&#8220;Certified Kubernetes Security Specialist: Roadmap&#8221; &#8212; DevSecOps School\" data-secret=\"I4afhyB36A\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Over the years, I\u2019ve seen many engineers focus entirely on getting their applications to &#8220;just run.&#8221; While keeping things alive is important, the real challenge is keeping them safe. We used to worry about physical locks and server room keys. Now, we worry about container vulnerabilities, misconfigured API servers, and &#8220;leaky&#8221; pod communications. The Certified ... Read more","thumbnail_url":"https:\/\/devsecopsschool.com\/blog\/wp-content\/uploads\/2026\/03\/image-2.png"}