    <meta property="twitter:title" content="From Manifest to Workload: Embedding Kubernetes Security at Each Phase of the DevOps Lifecycle" />
    <meta property="twitter:description" content="How do you secure Kubernetes? Part of the answer is to identify and address security risks within the various components of Kubernetes itself as well as Holistic Kubernetes security requires that you proactively identify and prevent risks at each stage of the DevOps lifecycle" />
<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Palo Alto Networks Blog</provider_name><provider_url>https://www.paloaltonetworks.ca/blog</provider_url><author_name>Maria Gkili</author_name><author_url>https://www.paloaltonetworks.ca/blog/author/mgkili/</author_url><title>From Manifest to Workload: Embedding Kubernetes Security at Each Phase of the DevOps Lifecycle</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="l2v0eBCbi0"&gt;&lt;a href="https://www.paloaltonetworks.ca/blog/cloud-security/devops-lifecycle-embedding-kubernetes-security/"&gt;From Manifest to Workload: Embedding Kubernetes Security at Each Phase of the DevOps Lifecycle&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.paloaltonetworks.ca/blog/cloud-security/devops-lifecycle-embedding-kubernetes-security/embed/#?secret=l2v0eBCbi0" width="600" height="338" title="&#x201C;From Manifest to Workload: Embedding Kubernetes Security at Each Phase of the DevOps Lifecycle&#x201D; &#x2014; Palo Alto Networks Blog" data-secret="l2v0eBCbi0" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.paloaltonetworks.ca/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2023/01/ASM-cyber-resilience.jpg</thumbnail_url><thumbnail_width>3000</thumbnail_width><thumbnail_height>1688</thumbnail_height><description>How do you secure Kubernetes? Part of the answer is to identify and address security risks within the various components of Kubernetes itself as well as Holistic Kubernetes security requires that you proactively identify and prevent risks at each stage of the DevOps lifecycle</description></oembed>
