{"id":26378,"date":"2024-07-25T15:53:56","date_gmt":"2024-07-25T13:53:56","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=26378"},"modified":"2024-07-25T15:59:20","modified_gmt":"2024-07-25T13:59:20","slug":"secure-code-fast-delivery-the-power-of-devsecops","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/25\/secure-code-fast-delivery-the-power-of-devsecops\/","title":{"rendered":"Secure Code, Fast Delivery: The Power of DevSecOps"},"content":{"rendered":"\n<p>In today\u2019s fast-paced digital world, security breaches are more than just a risk; they\u2019re almost a guarantee if you don\u2019t stay ahead. Imagine being able to develop software at lightning speed without compromising on security. Sounds like a dream, right? Welcome to the world of DevSecOps! If you\u2019re curious about how you can seamlessly integrate security into your development process, you\u2019re in the right place.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is DevSecOps?<\/h3>\n\n\n\n<p>DevSecOps stands for Development, Security, and Operations. It\u2019s a transformative approach that brings together these three crucial aspects of software development. Traditionally, security was an afterthought, often addressed just before a release or, worse, after a breach. DevSecOps shifts this paradigm by embedding security practices right from the start and throughout the development lifecycle.<\/p>\n\n\n\n<p>The key principle of DevSecOps is to make everyone accountable for security, integrating it into the workflows of developers and operations teams. This approach ensures that security is not just an add-on but a fundamental part of the entire development process.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is DevSecOps Important?<\/h3>\n\n\n\n<p>With the increasing frequency and sophistication of cyber attacks, it\u2019s clear that security can no longer be an isolated function. DevSecOps ensures that security is a shared responsibility, not just the security team\u2019s problem. This integrated approach helps in identifying and mitigating vulnerabilities early, thus reducing the risk of exploits.<\/p>\n\n\n\n<p><strong>Faster and More Secure Development Cycle<\/strong><\/p>\n\n\n\n<p>One of the main advantages of DevSecOps is that it speeds up the development process while maintaining a high level of security. By incorporating security checks and balances into every phase of development, teams can identify and address vulnerabilities as they arise, rather than retroactively. This proactive approach leads to faster releases and fewer last-minute security issues.<\/p>\n\n\n\n<p><strong>Cost Efficiency<\/strong><\/p>\n\n\n\n<p>Addressing security issues early in the development process is far more cost-effective than dealing with them post-deployment. A security breach or vulnerability discovered late in the development cycle, or worse, in production, can be incredibly costly. DevSecOps minimizes these risks by ensuring that security is considered at every stage, reducing the potential for expensive fixes later.<\/p>\n\n\n\n<p><strong>Enhanced Collaboration and Communication<\/strong><\/p>\n\n\n\n<p>DevSecOps fosters a culture of collaboration and communication among development, security, and operations teams. This cross-functional approach breaks down silos and ensures that everyone is working towards a common goal: delivering secure, high-quality software. Teams are more aligned, which leads to better decision-making and a more cohesive development process.<\/p>\n\n\n\n<p><strong>Continuous Improvement and Adaptability<\/strong><\/p>\n\n\n\n<p>The DevSecOps model promotes continuous improvement through regular feedback loops and constant monitoring. This allows teams to adapt quickly to new threats and vulnerabilities, ensuring that security measures are always up-to-date. In a rapidly changing threat landscape, the ability to respond and adapt swiftly is crucial.<\/p>\n\n\n\n<p><strong>Increased Trust and Confidence<\/strong><\/p>\n\n\n\n<p>For organizations, having a robust DevSecOps practice means they can assure customers and stakeholders that security is a top priority. This builds trust and confidence, which is particularly important in industries handling sensitive data, such as finance and healthcare.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Key Security Aspects in DevSecOps<\/h3>\n\n\n\n<p>Now, let\u2019s dive into some practical security aspects you can implement to make your DevSecOps journey smooth and effective.<\/p>\n\n\n\n<p><strong>1. Automated Security Testing<\/strong><\/p>\n\n\n\n<p>Automation is the heart of DevSecOps. By incorporating automated security testing tools into your CI\/CD pipeline, you can catch vulnerabilities early. Tools like OWASP ZAP and SonarQube can automatically scan your code for common security flaws such as SQL injection and cross-site scripting (XSS).<\/p>\n\n\n\n<p><strong>2. Shift-Left Security<\/strong><\/p>\n\n\n\n<p>The idea here is simple: move security to the left in your development process. This means integrating security practices right from the planning and design phases. Conduct threat modeling and security reviews before a single line of code is written. This proactive approach helps in identifying potential security issues early.<\/p>\n\n\n\n<p><strong>3. Continuous Monitoring<\/strong><\/p>\n\n\n\n<p>Security doesn\u2019t stop once the code is deployed. Implement continuous monitoring to keep an eye on your application and infrastructure. Tools like Prometheus and Grafana can help you monitor for unusual activity and potential breaches, allowing for quick response.<\/p>\n\n\n\n<p><strong>4. Infrastructure as Code (IaC)<\/strong><\/p>\n\n\n\n<p>IaC tools like Terraform and Ansible allow you to define and manage your infrastructure with code. This approach not only makes your infrastructure more consistent and repeatable but also allows you to embed security checks. Ensure that your IaC scripts include security best practices like proper network segmentation and least privilege access.<\/p>\n\n\n\n<p><strong>5. Security Awareness and Training<\/strong><\/p>\n\n\n\n<p>All the tools and automation in the world can\u2019t replace the need for a security-conscious culture. Regular training and awareness programs for your development and operations teams can go a long way. Teach them about secure coding practices, the latest security threats, and how to use security tools effectively.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"581\" data-attachment-id=\"26380\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/25\/secure-code-fast-delivery-the-power-of-devsecops\/grafik-11\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png\" data-orig-size=\"2000,1134\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"grafik\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-1024x581.png\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-1024x581.png\" alt=\"\" class=\"wp-image-26380\" style=\"width:966px;height:auto\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-1024x581.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-300x170.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-768x435.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik-1536x871.png 1536w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/grafik.png 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">DevSecOps in the Enterprise IT Context<\/h3>\n\n\n\n<p>In large enterprises, the shift to DevSecOps can be particularly challenging but also highly rewarding. Here are some specific considerations for implementing DevSecOps in an enterprise IT environment:<\/p>\n\n\n\n<p><strong>Scalability and Standardization<\/strong><\/p>\n\n\n\n<p>Enterprise IT environments often involve multiple teams and departments. Scalability and standardization become critical. Implementing DevSecOps practices at scale requires robust frameworks and governance models to ensure consistency across the organization. Standardized security protocols and automated compliance checks can help manage this complexity.<\/p>\n\n\n\n<p><strong>Legacy Systems Integration<\/strong><\/p>\n\n\n\n<p>Many enterprises still rely on legacy systems that may not easily integrate with modern DevSecOps tools. Developing a hybrid approach that bridges the gap between old and new systems is essential. This might involve containerization or creating APIs to allow legacy systems to interact with newer, more secure platforms.<\/p>\n\n\n\n<p><strong>Regulatory Compliance<\/strong><\/p>\n\n\n\n<p>Enterprises often operate in heavily regulated industries such as finance or healthcare. Ensuring that DevSecOps practices comply with industry regulations and standards is crucial. Automating compliance checks and maintaining detailed audit trails can help in meeting these regulatory requirements.<\/p>\n\n\n\n<p><strong>Cross-Functional Collaboration<\/strong><\/p>\n\n\n\n<p>Large organizations may have more pronounced silos between development, security, and operations teams. Fostering a culture of collaboration and communication is essential for DevSecOps to succeed. Regular cross-functional meetings, shared goals, and integrated toolsets can help break down these silos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>DevSecOps isn\u2019t just a buzzword; it\u2019s a necessity in today\u2019s digital landscape. By integrating security into every stage of your development process, you not only enhance your security posture but also speed up your delivery times. Remember, security is everyone\u2019s responsibility. Start small, automate what you can, and continuously improve your processes. Embrace DevSecOps and build a secure, resilient, and efficient development pipeline.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s fast-paced digital world, security breaches are more than just a risk; they\u2019re almost a guarantee if you don\u2019t stay ahead. Imagine being able to develop software at lightning speed without compromising on security. Sounds like a dream, right? Welcome to the world of DevSecOps! If you\u2019re curious about how you can seamlessly integrate [&hellip;]<\/p>\n","protected":false},"author":1205,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,659],"tags":[150,9,1032,27],"ppma_author":[1028],"class_list":["post-26378","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-devops","tag-ci-cd","tag-devops","tag-devsecops","tag-security"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":23067,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2022\/03\/15\/security-strategies-and-best-practices-for-microservices-architecture\/","url_meta":{"origin":26378,"position":0},"title":"Security Strategies and Best Practices for Microservices Architecture","author":"Larissa Schmauss","date":"15. March 2022","format":false,"excerpt":"Microservices architectures seem to be the new trend in the approach to application development. However, one should always keep in mind that microservices architectures are always closely associated with a specific environment:\u00a0Companies want to develop faster and faster, but resources are also becoming more limited, so they now want to\u2026","rel":"","context":"In &quot;Scalable Systems&quot;","block_context":{"text":"Scalable Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/"},"img":{"alt_text":"","src":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a","width":350,"height":200,"srcset":"https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1x, https:\/\/lh6.googleusercontent.com\/LbFspPRY1BxRBdAVjQwWXeJ6UOoxl6JWsRYrxboF5ObXlNNgy3uZikcGkc3cgzI0mr_ZlbWPxvdp0FoJC1k-odh7mRc2lCPXaMSq8TudjfoZ7e5HKstaMHmLpH319jCym6vQRo1a 1.5x"},"classes":[]},{"id":3221,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/03\/25\/security-in-a-saas-startup-and-todays-security-issues-with-devops\/","url_meta":{"origin":26378,"position":1},"title":"Security in a SaaS startup and today&#8217;s security issues with DevOps","author":"cp054","date":"25. March 2018","format":false,"excerpt":"Motivation Facing security in a company nowadays is a big job: it starts with a backup strategy ensuring the business continuation, plans for recovery after major breakdowns, ensuring physical security (entrance control, lock-pads, safes), screening of potential employees, monitoring servers, applications and workstations, training the employees in security issues and\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/09\/figure-3-push-to-public.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4005,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/20\/cloud-security-tools-and-recommendations-for-devops-in-2018\/","url_meta":{"origin":26378,"position":2},"title":"Cloud security tools and recommendations for DevOps in 2018","author":"Immanuel Haag","date":"20. August 2018","format":false,"excerpt":"Introduction Over the last five years, the use of cloud computing services has increased rapidly, in German companies. According to a statistic from Bitkom Research in \u00a02018, the acceptance of cloud-computing services is growing. Cloud-computing brings many advantages for a business. For example, expenses for the internal infrastructure and its\u2026","rel":"","context":"In &quot;DevOps&quot;","block_context":{"text":"DevOps","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/devops\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/19AAsLm7ATw8Fl8aVbJQdYw.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":26830,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/24\/gitops-demystified-principles-practices-and-challenges\/","url_meta":{"origin":26378,"position":3},"title":"GitOps Demystified: Principles, Practices, and Challenges","author":"Kay Kn\u00f6pfle","date":"24. February 2025","format":false,"excerpt":"GitOps, a term coined by Alexis Richardson (CEO of Weaveworks) in 2017, represents a modern approach to continuous deployment and infrastructure management that leverages Git as its core technological foundation [1]. At its essence, GitOps extends the familiar Git workflow patterns from application development to infrastructure management, establishing Git repositories\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/whats_gitops.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/whats_gitops.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/whats_gitops.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2025\/02\/whats_gitops.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27883,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/07\/25\/tools-zur-automatischen-erstellung-von-software-bill-of-materials-sbom-2\/","url_meta":{"origin":26378,"position":4},"title":"Tools zur automatischen Erstellung von Software Bill of Materials (SBOM)","author":"Luca-Max Baur","date":"25. July 2025","format":false,"excerpt":"Anmerkung:\u00a0Dieser Blogpost wurde w\u00e4hrend dem Sommersemester 2025 f\u00fcr das Modul Enterprise IT (113601a) verfasst. \u201eI cant fix what I cant see\u201cOhne Kenntnisse \u00fcber die benutzten Komponenten und Libraries agieren Softwareentwickler wie im Blindflug bez\u00fcglich ihrer Software-Sicherheit. Bekannte Supply Chain Angriffe wie SolarWinds oder die Log4shell L\u00fccke haben genau dies gezeigt.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3981,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/16\/usability-and-security\/","url_meta":{"origin":26378,"position":5},"title":"Usability and Security","author":"Christof Kost","date":"16. August 2018","format":false,"excerpt":"Usability and Security - Is a tradeoff necessary? Usability is one of the main reasons for a successful software with user interaction. But often it is worsened by high security standards. Furthermore many use cases need authentication, authorisation and system access where high damage is risked when security possibilities get\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/2018-08-16-12_12_42-NotificerffeationsForm.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":1028,"user_id":1205,"is_guest":0,"slug":"furkan_erdogan","display_name":"Furkan Erdogan","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/f630566cebf4abf71e9baf2a29a5d79325b1c6e45b1445a7dd1c345476e823c0?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/1205"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=26378"}],"version-history":[{"count":6,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26378\/revisions"}],"predecessor-version":[{"id":26386,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/26378\/revisions\/26386"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=26378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=26378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=26378"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=26378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}