{"id":2705,"date":"2021-09-09T05:37:53","date_gmt":"2021-09-09T05:37:53","guid":{"rendered":"https:\/\/www.cloudnowtech.com\/blog\/?p=2705"},"modified":"2021-12-09T18:07:47","modified_gmt":"2021-12-09T12:37:47","slug":"6-best-practices-to-secure-your-continuous-deployment-pipeline","status":"publish","type":"post","link":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/","title":{"rendered":"6 Best Practices to secure your Continuous Deployment pipeline"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Continuous Integration and Continuous Deployment (CI\/CD) is a fast, efficient iterative process. This means that, without a concentrated focus on security, there simply isn\u2019t enough time to build in security checks and balances before go-live.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A traditional Continuous Integration and Continuous Deployment (CI\/CD) pipeline uses a large number of tech tools. Each stage of the pipeline must be closely monitored at all times, to ensure that any irregularities are swiftly identified and addressed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using the right code analysis tools, it&#8217;s possible to automate the process of monitoring the code used at every stage of the pipeline. This guards against the possibility of vulnerabilities potentially creeping in and giving malicious actors a way into your system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To further secure your system, it is important to prevent misuse or improper access to key data like passwords, API, GitHub tokens, SSH keys, private certificates for secure communication, transmitting and receiving of data (TLS, SSL, and so on), private encryption keys for systems like PGP, and other application keys\/credentials. Eliminate hard-coded credentials in containerized applications and minimize broad access to credentials, data and systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition to automated system security, conduct regular comprehensive audits on system and code to maintain high-level security and reduce risk of cyberattack.<\/span><\/p>\n<p><b>Here are 6 best practices that could help you improve security in your CI\/CD processes.<\/b><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2707\" src=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-1.png?resize=121%2C121&#038;ssl=1\" alt=\"Remove hardcoded credentials from tools\" width=\"121\" height=\"121\" srcset=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-1.png?w=121&amp;ssl=1 121w, https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-1.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">1. Remove hardcoded credentials from tools<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">With automation, storing and keeping track of these credentials is no longer the responsibility of your team. By default, some of this data is hardcoded into Jenkins, GitHub and other CI\/CD tools. Remove the hardcoding from your tools before getting started, or the information could be misused.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2708\" src=\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-2.png?resize=121%2C121&#038;ssl=1\" alt=\"\" width=\"121\" height=\"121\" srcset=\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-2.png?w=121&amp;ssl=1 121w, https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-2.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">2. Don\u2019t concentrate data into a single location<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Distribute sensitive data as much as possible across a large number of Jenkinsfiles. This reduces the potential attack value of each file.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2709\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-3.png?resize=121%2C121&#038;ssl=1\" alt=\"\" width=\"121\" height=\"121\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-3.png?w=121&amp;ssl=1 121w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-3.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">3. Minimize access permitted to team members<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Maintain highly granular access management, following the principle of \u2018least privilege\u2019. A large number of people work concurrently on each project, making access management fundamental to CI\/CD security. Undertake segmentation by role, task and category to restrict access.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2710\" src=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-4.png?resize=121%2C121&#038;ssl=1\" alt=\"\" width=\"121\" height=\"121\" srcset=\"https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-4.png?w=121&amp;ssl=1 121w, https:\/\/i0.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-4.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">4. Restrict access to non-humans as well<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Once a container\u2019s machine identity is authenticated by the system, it can access multiple resources based on defined access control policy. To secure against non-human access, destroy containers and virtual machines after use.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2711\" src=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-5.png?resize=121%2C117&#038;ssl=1\" alt=\"\" width=\"121\" height=\"117\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">5. Apply rigorous security parameters<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Use password managers and frequently change passwords. Verify the identity of individuals accessing resources with <a href=\"https:\/\/www.akku.work\/product\/multi-factor-authentication.html\">multi-factor authentication<\/a> and OTPs to restrict access to the most sensitive tools and data.<\/span><\/p>\n<div class=\"cencontent\">\n<div class=\"left-content\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2712\" src=\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-6.png?resize=121%2C121&#038;ssl=1\" alt=\"\" width=\"121\" height=\"121\" srcset=\"https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-6.png?w=121&amp;ssl=1 121w, https:\/\/i2.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38-Icon-6.png?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 121px) 100vw, 121px\" data-recalc-dims=\"1\" \/><\/div>\n<div class=\"right-content\">\n<h3><span style=\"font-weight: 400;\">6. Safeguard credentials from excessive automation<\/span><\/h3>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">Ensure keys and secrets are not inadvertently passed on by default, during builds for pull requests via your CI\/CD pipelines.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember, the goal of CI\/CD is not just to make communication between team members seamless and effective, but safe as well. Follow these simple steps and best practices to optimize safety, speed and quality.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">CloudNow brings you a cutting-edge technology stack that enables single-click deployment, continuous integration, automated security alerts, easy code management and review, and on-premise, public, or hybrid cloud deployment. <a href=\"https:\/\/www.cloudnowtech.com\/contact-us.html\">Contact us<\/a> today to know more.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuous Integration and Continuous Deployment (CI\/CD) is a fast, efficient iterative process. This means that, without a concentrated focus on security, there simply isn\u2019t enough time to build in security checks and balances before go-live. A traditional Continuous Integration and Continuous Deployment (CI\/CD) pipeline uses a large number of tech tools. Each stage of the [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":2706,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","footnotes":""},"categories":[277],"tags":[299,298],"class_list":["post-2705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-development-modernization","tag-continuous-deployment","tag-continuous-integration"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster<\/title>\n<meta name=\"description\" content=\"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn &quot;6 Best Practices to secure your Continuous Deployment pipeline&quot;:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster\" \/>\n<meta property=\"og:description\" content=\"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn &quot;6 Best Practices to secure your Continuous Deployment pipeline&quot;:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/\" \/>\n<meta property=\"og:site_name\" content=\"Discover Better Value Faster\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-09T05:37:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-09T12:37:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&#038;ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1141\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SatyaDev Addeppally\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/\",\"name\":\"Discover Better Value Faster\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1\",\"contentUrl\":\"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1\",\"width\":1141,\"height\":761,\"caption\":\"6 Best Practices to secure your Continuous Deployment pipeline\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#webpage\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/\",\"name\":\"6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#primaryimage\"},\"datePublished\":\"2021-09-09T05:37:53+00:00\",\"dateModified\":\"2021-12-09T12:37:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\"},\"description\":\"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn \\\"6 Best Practices to secure your Continuous Deployment pipeline\\\":\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudnowtech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Best Practices to secure your Continuous Deployment pipeline\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6\",\"name\":\"SatyaDev Addeppally\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudnowtech.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"contentUrl\":\"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg\",\"caption\":\"SatyaDev Addeppally\"},\"description\":\"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/satyadevaddepally\/\"],\"url\":\"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster","description":"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn \"6 Best Practices to secure your Continuous Deployment pipeline\":","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/","og_locale":"en_US","og_type":"article","og_title":"6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster","og_description":"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn \"6 Best Practices to secure your Continuous Deployment pipeline\":","og_url":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/","og_site_name":"Discover Better Value Faster","article_published_time":"2021-09-09T05:37:53+00:00","article_modified_time":"2021-12-09T12:37:47+00:00","og_image":[{"width":1141,"height":761,"url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"SatyaDev Addeppally","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.cloudnowtech.com\/blog\/#website","url":"https:\/\/www.cloudnowtech.com\/blog\/","name":"Discover Better Value Faster","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudnowtech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1","contentUrl":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1","width":1141,"height":761,"caption":"6 Best Practices to secure your Continuous Deployment pipeline"},{"@type":"WebPage","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#webpage","url":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/","name":"6 Best Practices to secure your Continuous Deployment pipeline - Discover Better Value Faster","isPartOf":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#primaryimage"},"datePublished":"2021-09-09T05:37:53+00:00","dateModified":"2021-12-09T12:37:47+00:00","author":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6"},"description":"The fast-paced CI\/CD pipeline needs a special #cybersecurity focus to safeguard end products from internal and external vulnerabilities. Read our latest blog post to learn \"6 Best Practices to secure your Continuous Deployment pipeline\":","breadcrumb":{"@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudnowtech.com\/blog\/6-best-practices-to-secure-your-continuous-deployment-pipeline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudnowtech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"6 Best Practices to secure your Continuous Deployment pipeline"}]},{"@type":"Person","@id":"https:\/\/www.cloudnowtech.com\/blog\/#\/schema\/person\/2e76f56977117c409772392b0ced58c6","name":"SatyaDev Addeppally","image":{"@type":"ImageObject","@id":"https:\/\/www.cloudnowtech.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","contentUrl":"https:\/\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/11\/sathyadev-96x96.jpg","caption":"SatyaDev Addeppally"},"description":"Enterprising leader with an analytical bent of mind offering a proven history of success by supervising, planning &amp; managing multifaceted projects &amp; complex dependencies; chronicled success with 22 years of extensive experience including international experience.","sameAs":["https:\/\/www.linkedin.com\/in\/satyadevaddepally\/"],"url":"https:\/\/www.cloudnowtech.com\/blog\/author\/satyadev-a\/"}]}},"jetpack_featured_media_url":"https:\/\/i1.wp.com\/www.cloudnowtech.com\/blog\/wp-content\/uploads\/2021\/09\/Blog-38.jpg?fit=1141%2C761&ssl=1","_links":{"self":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/comments?post=2705"}],"version-history":[{"count":9,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2705\/revisions"}],"predecessor-version":[{"id":3179,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/posts\/2705\/revisions\/3179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media\/2706"}],"wp:attachment":[{"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/media?parent=2705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/categories?post=2705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudnowtech.com\/blog\/wp-json\/wp\/v2\/tags?post=2705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}