{"version":"1.0","provider_name":"Software Engineering Daily","provider_url":"https:\/\/softwareengineeringdaily.com","author_name":"SE Daily","author_url":"https:\/\/softwareengineeringdaily.com\/author\/carlos\/","title":"SPIFFE: Zero Trust Workload Identification with Evan Gilman - Software Engineering Daily","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"cMw1EAZURJ\"><a href=\"https:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/\">SPIFFE: Zero Trust Workload Identification with Evan Gilman<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/softwareengineeringdaily.com\/2018\/11\/14\/spiffe-zero-trust-workload-identification-with-evan-gilman\/embed\/#?secret=cMw1EAZURJ\" width=\"600\" height=\"338\" title=\"&#8220;SPIFFE: Zero Trust Workload Identification with Evan Gilman&#8221; &#8212; Software Engineering Daily\" data-secret=\"cMw1EAZURJ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i0.wp.com\/softwareengineeringdaily.com\/wp-content\/uploads\/2018\/11\/spiffe.jpg?fit=2500%2C1600","thumbnail_width":2500,"thumbnail_height":1600,"description":"Modern software consists of sprawling international networks of servers. Users contact these servers to access applications. Microservices talk to each other to fulfill complicated requests. Databases and machine learning frameworks crunch terabytes of information to provide complicated answers. Across this infrastructure, there is a lot of different activities&#8211;and a lot of vulnerabilities. Without a reliable"}