{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"Comprehensive Tutorial on Checkov in DevSecOps - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TbXfrjxcbh\"><a href=\"https:\/\/devsecopsschool.com\/blog\/comprehensive-tutorial-on-checkov-in-devsecops\/\">Comprehensive Tutorial on Checkov in DevSecOps<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/comprehensive-tutorial-on-checkov-in-devsecops\/embed\/#?secret=TbXfrjxcbh\" width=\"600\" height=\"338\" title=\"&#8220;Comprehensive Tutorial on Checkov in DevSecOps&#8221; &#8212; DevSecOps School\" data-secret=\"TbXfrjxcbh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction &amp; Overview What is Checkov? Checkov is an open-source static code analysis tool designed to scan Infrastructure as Code (IaC) files for security vulnerabilities, misconfigurations, and compliance issues. Developed by Bridgecrew (now part of Palo Alto Networks\u2019 Prisma Cloud), Checkov supports multiple IaC frameworks, including Terraform, CloudFormation, Kubernetes, Helm, and more. It integrates seamlessly ... Read more","thumbnail_url":"https:\/\/miro.medium.com\/v2\/resize:fit:642\/1*Emi2R_Dso18YJYU3iE0cqw.png"}