{"version":"1.0","provider_name":"DevSecOps School","provider_url":"https:\/\/devsecopsschool.com\/blog","author_name":"pritesh k","author_url":"https:\/\/devsecopsschool.com\/blog\/author\/priteshgeek\/","title":"Encrypted Secrets in DevSecOps: A Comprehensive Tutorial - DevSecOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"206G2x5WA0\"><a href=\"https:\/\/devsecopsschool.com\/blog\/encrypted-secrets-in-devsecops-a-comprehensive-tutorial\/\">Encrypted Secrets in DevSecOps: A Comprehensive Tutorial<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/devsecopsschool.com\/blog\/encrypted-secrets-in-devsecops-a-comprehensive-tutorial\/embed\/#?secret=206G2x5WA0\" width=\"600\" height=\"338\" title=\"&#8220;Encrypted Secrets in DevSecOps: A Comprehensive Tutorial&#8221; &#8212; DevSecOps School\" data-secret=\"206G2x5WA0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/devsecopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Introduction &amp; Overview In the fast-paced world of DevSecOps, securing sensitive data like API keys, database credentials, and access tokens is critical. Encrypted Secrets refers to the practice of securely storing, managing, and accessing sensitive information using encryption to prevent unauthorized access. This tutorial provides an in-depth guide to encrypted secrets in DevSecOps, covering their ... Read more"}