{"id":6394,"date":"2018-11-14T02:00:59","date_gmt":"2018-11-14T10:00:59","guid":{"rendered":"http:\/\/softwareengineeringdaily.com\/?p=6394"},"modified":"2021-11-01T18:48:29","modified_gmt":"2021-11-02T01:48:29","slug":"spiffe-zero-trust-workload-identification-with-evan-gilman","status":"publish","type":"post","link":"https:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/","title":{"rendered":"SPIFFE: Zero Trust Workload Identification with Evan Gilman"},"content":{"rendered":"<p><img decoding=\"async\" data-attachment-id=\"2475\" data-permalink=\"https:\/\/softwareengineeringdaily.com\/2016\/04\/19\/googles-container-management-brendan-burns\/brendan-burns\/\" data-orig-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" data-orig-size=\"175,175\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"brendan-burns\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2016\/04\/brendan-burns.jpg?fit=175%2C175&amp;ssl=1\" class=\"alignright size-full wp-image-2475\" style=\"border-radius: 50%; border: 1px solid #000000; max-width: 175px; max-height: 175px;\" src=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/evangilman.jpg?resize=175%2C175&#038;ssl=1\" width=\"175\" height=\"175\" data-recalc-dims=\"1\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Modern software consists of sprawling international networks of servers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users contact these servers to access applications. Microservices talk to each other to fulfill complicated requests. Databases and machine learning frameworks crunch terabytes of information to provide complicated answers. Across this infrastructure, there is a lot of different activities&#8211;and a lot of vulnerabilities. Without a reliable model for security and trust, software can be easily compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past, systems were often protected by a \u201cfirewall\u201d, which is a security system around the perimeter of the network. A problem with this model is that if the attacker is able to penetrate the firewall, they can compromise anywhere in the network. Firewalls can be penetrated, so a much better security model is to assume that your network has already been compromised, and to require every internal system to identify and authenticate with each other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cZero-trust security\u201d is a security model that requires internal systems to communicate with each other as if they were potentially compromised. Evan Gilman is the author of <\/span><a href=\"https:\/\/www.amazon.com\/Zero-Trust-Networks-Building-Untrusted\/dp\/1491962194\"><span style=\"font-weight: 400;\">Zero Trust Networks: Building Secure Systems in Untrusted Networks<\/span><\/a><span style=\"font-weight: 400;\">. He also works on SPIFFE, a system for managing identity and trust within a zero-trust network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a previous episode about <\/span><a href=\"https:\/\/softwareengineeringdaily.com\/2018\/02\/09\/google-beyondcorp-with-max-saltonstall\/\"><span style=\"font-weight: 400;\">Google BeyondCorp<\/span><\/a><span style=\"font-weight: 400;\">, Max Saltonstall talked about zero-trust networking in the context of user and device authentication. In today\u2019s episode, Evan discusses another side of zero-trust networking: workload identity and authentication. Just as Google BeyondCorp outlines an architecture for allowing devices to communicate with the network, the SPIFFE project outlines a system for workloads to identify and authenticate themselves. Workloads can range from MapReduce jobs to microservices to frontend application servers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Modern software consists of sprawling international networks of servers. Users contact these servers to access applications. Microservices talk to each other to fulfill complicated requests. Databases and machine learning frameworks crunch terabytes of information to provide complicated answers. Across this infrastructure, there is a lot of different activities&#8211;and a lot of vulnerabilities. Without a reliable<\/p>\n","protected":false},"author":16,"featured_media":6396,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"SPIFFE: Zero Trust Workload Identification with Evan Gilman @evan2645 #ZeroTrust #InfoSec","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1363,2143,1085,14],"tags":[2553,379,2552,1869],"class_list":["post-6394","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all-episodes","category-exclusive-content","category-hackers","category-podcast","tag-evan-gilman","tag-kubernetes","tag-zero-trust","tag-zero-trust-network"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily\" \/>\n<meta property=\"og:description\" content=\"Modern software consists of sprawling international networks of servers. Users contact these servers to access applications. Microservices talk to each other to fulfill complicated requests. Databases and machine learning frameworks crunch terabytes of information to provide complicated answers. Across this infrastructure, there is a lot of different activities&#8211;and a lot of vulnerabilities. Without a reliable\" \/>\n<meta property=\"og:url\" content=\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\" \/>\n<meta property=\"og:site_name\" content=\"Software Engineering Daily\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-14T10:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-02T01:48:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SE Daily\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@software_daily\" \/>\n<meta name=\"twitter:site\" content=\"@software_daily\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SE Daily\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\"},\"author\":{\"name\":\"SE Daily\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/9d521a3950512958a3bd9b49ac0f1000\"},\"headline\":\"SPIFFE: Zero Trust Workload Identification with Evan Gilman\",\"datePublished\":\"2018-11-14T10:00:59+00:00\",\"dateModified\":\"2021-11-02T01:48:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\"},\"wordCount\":278,\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"image\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1\",\"keywords\":[\"Evan Gilman\",\"Kubernetes\",\"Zero Trust\",\"zero trust network\"],\"articleSection\":[\"All Content\",\"Exclusive Content\",\"Hackers\",\"Podcast\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\",\"url\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\",\"name\":\"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily\",\"isPartOf\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1\",\"datePublished\":\"2018-11-14T10:00:59+00:00\",\"dateModified\":\"2021-11-02T01:48:29+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1\",\"width\":2500,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/softwareengineeringdaily.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SPIFFE: Zero Trust Workload Identification with Evan Gilman\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#website\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"name\":\"Software Engineering Daily\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#organization\",\"name\":\"Software Engineering Daily\",\"url\":\"https:\/\/softwareengineeringdaily.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1\",\"width\":549,\"height\":169,\"caption\":\"Software Engineering Daily\"},\"image\":{\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/software_daily\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/9d521a3950512958a3bd9b49ac0f1000\",\"name\":\"SE Daily\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/68086d3546ea765266ab442555c9fe44?s=96&d=retro&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/68086d3546ea765266ab442555c9fe44?s=96&d=retro&r=pg\",\"caption\":\"SE Daily\"},\"url\":\"https:\/\/softwareengineeringdaily.com\/author\/carlos\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/","og_locale":"en_US","og_type":"article","og_title":"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily","og_description":"Modern software consists of sprawling international networks of servers. Users contact these servers to access applications. Microservices talk to each other to fulfill complicated requests. Databases and machine learning frameworks crunch terabytes of information to provide complicated answers. Across this infrastructure, there is a lot of different activities&#8211;and a lot of vulnerabilities. Without a reliable","og_url":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/","og_site_name":"Software Engineering Daily","article_published_time":"2018-11-14T10:00:59+00:00","article_modified_time":"2021-11-02T01:48:29+00:00","og_image":[{"width":2500,"height":1600,"url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600","type":"image\/jpeg"}],"author":"SE Daily","twitter_card":"summary_large_image","twitter_creator":"@software_daily","twitter_site":"@software_daily","twitter_misc":{"Written by":"SE Daily","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#article","isPartOf":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/"},"author":{"name":"SE Daily","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/9d521a3950512958a3bd9b49ac0f1000"},"headline":"SPIFFE: Zero Trust Workload Identification with Evan Gilman","datePublished":"2018-11-14T10:00:59+00:00","dateModified":"2021-11-02T01:48:29+00:00","mainEntityOfPage":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/"},"wordCount":278,"publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"image":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1","keywords":["Evan Gilman","Kubernetes","Zero Trust","zero trust network"],"articleSection":["All Content","Exclusive Content","Hackers","Podcast"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/","url":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/","name":"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily","isPartOf":{"@id":"https:\/\/softwareengineeringdaily.com\/#website"},"primaryImageOfPage":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage"},"image":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1","datePublished":"2018-11-14T10:00:59+00:00","dateModified":"2021-11-02T01:48:29+00:00","breadcrumb":{"@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#primaryimage","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1","width":2500,"height":1600},{"@type":"BreadcrumbList","@id":"http:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/softwareengineeringdaily.com\/"},{"@type":"ListItem","position":2,"name":"SPIFFE: Zero Trust Workload Identification with Evan Gilman"}]},{"@type":"WebSite","@id":"https:\/\/softwareengineeringdaily.com\/#website","url":"https:\/\/softwareengineeringdaily.com\/","name":"Software Engineering Daily","description":"","publisher":{"@id":"https:\/\/softwareengineeringdaily.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/softwareengineeringdaily.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/softwareengineeringdaily.com\/#organization","name":"Software Engineering Daily","url":"https:\/\/softwareengineeringdaily.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","contentUrl":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2024\/01\/cropped-sed_website_banner.png?fit=549%2C169&ssl=1","width":549,"height":169,"caption":"Software Engineering Daily"},"image":{"@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/software_daily"]},{"@type":"Person","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/9d521a3950512958a3bd9b49ac0f1000","name":"SE Daily","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/softwareengineeringdaily.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/68086d3546ea765266ab442555c9fe44?s=96&d=retro&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/68086d3546ea765266ab442555c9fe44?s=96&d=retro&r=pg","caption":"SE Daily"},"url":"https:\/\/softwareengineeringdaily.com\/author\/carlos\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7GuoD-1F8","_links":{"self":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/6394"}],"collection":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/comments?post=6394"}],"version-history":[{"count":0,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/posts\/6394\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media\/6396"}],"wp:attachment":[{"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/media?parent=6394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/categories?post=6394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softwareengineeringdaily.com\/wp-json\/wp\/v2\/tags?post=6394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}