{"id":69599,"date":"2025-08-26T06:53:58","date_gmt":"2025-08-26T06:53:58","guid":{"rendered":"https:\/\/www.cloudthat.com\/resources\/?post_type=blog&#038;p=69599"},"modified":"2025-08-26T06:53:58","modified_gmt":"2025-08-26T06:53:58","slug":"best-practices-for-securing-ai-and-ml-pipelines-in-aws","status":"publish","type":"blog","link":"https:\/\/www.cloudthat.com\/resources\/blog\/best-practices-for-securing-ai-and-ml-pipelines-in-aws","title":{"rendered":"Best Practices for Securing AI and ML Pipelines in AWS"},"content":{"rendered":"","protected":false},"author":339,"featured_media":69600,"parent":0,"comment_status":"open","ping_status":"closed","template":"","blog_category":[4046,3606,3607,3640],"user_email":"modi.r@cloudthat.com","published_by":"325","primary-authors":"","secondary-authors":"","acf":[],"_links":{"self":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/69599"}],"collection":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog"}],"about":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/types\/blog"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/users\/339"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/comments?post=69599"}],"version-history":[{"count":2,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/69599\/revisions"}],"predecessor-version":[{"id":69602,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog\/69599\/revisions\/69602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media\/69600"}],"wp:attachment":[{"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/media?parent=69599"}],"wp:term":[{"taxonomy":"blog_category","embeddable":true,"href":"https:\/\/www.cloudthat.com\/resources\/wp-json\/wp\/v2\/blog_category?post=69599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}