{"id":13085,"date":"2022-07-06T06:55:40","date_gmt":"2022-07-06T06:55:40","guid":{"rendered":"https:\/\/blog.cloudthat.com\/?p=13085"},"modified":"2024-06-25T10:57:47","modified_gmt":"2024-06-25T10:57:47","slug":"10-best-practices-of-kubernetes-security-risk-management","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/10-best-practices-of-kubernetes-security-risk-management-part-ii","title":{"rendered":"10 Best Practices of Kubernetes Security &#038; Risk Management &#8211; Part II"},"content":{"rendered":"","protected":false},"author":298,"featured_media":19155,"parent":0,"comment_status":"open","ping_status":"open","template":"","blog_category":[3606,3607,4459],"user_email":"shivanig@cloudthat.com","published_by":"2","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13085"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=13085"}],"version-history":[{"count":6,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13085\/revisions"}],"predecessor-version":[{"id":39795,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/13085\/revisions\/39795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/19155"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=13085"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=13085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}