{"version":"1.0","provider_name":"CloudThat Resources","provider_url":"https:\/\/www.cloudthat.com\/resources","author_name":"Ritushree Dutta","author_url":"https:\/\/www.cloudthat.com\/resources\/author\/ritushree-dutta\/","title":"Defending Your Resources with API Security in AWS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"vuVRc0Pg6T\"><a href=\"https:\/\/www.cloudthat.com\/resources\/blog\/defending-your-resources-with-api-security-in-aws\">Defending Your Resources with API Security in AWS<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cloudthat.com\/resources\/blog\/defending-your-resources-with-api-security-in-aws\/embed\/#?secret=vuVRc0Pg6T\" width=\"600\" height=\"338\" title=\"&#8220;Defending Your Resources with API Security in AWS&#8221; &#8212; CloudThat Resources\" data-secret=\"vuVRc0Pg6T\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/content.cloudthat.com\/resources\/wp-content\/uploads\/2023\/09\/A-Guide-to-Deploy-a-Node.js-.webp","thumbnail_width":1201,"thumbnail_height":626,"description":"In the changing world of cloud computing, it is crucial to prioritize the security of Application Programming Interfaces (APIs) on Amazon Web Services (AWS). APIs act as gateways for exchanging data between applications, making them vulnerable to risks."}