{"id":4132,"date":"2026-05-22T10:14:44","date_gmt":"2026-05-22T10:14:44","guid":{"rendered":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/05\/22\/modernizing-devops-security-with-intelligent-kyc-enforcement-layers\/"},"modified":"2026-05-22T10:14:44","modified_gmt":"2026-05-22T10:14:44","slug":"modernizing-devops-security-with-intelligent-kyc-enforcement-layers","status":"publish","type":"post","link":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/2026\/05\/22\/modernizing-devops-security-with-intelligent-kyc-enforcement-layers\/","title":{"rendered":"Modernizing DevOps Security With Intelligent KYC Enforcement Layers\u00a0"},"content":{"rendered":"<div><img data-opt-id=709108558  fetchpriority=\"high\" decoding=\"async\" width=\"770\" height=\"330\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2026\/02\/devsecops1.jpg\" class=\"attachment-large size-large wp-post-image\" alt=\"\" \/><\/div>\n<p><img data-opt-id=1019763079  fetchpriority=\"high\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/devops.com\/wp-content\/uploads\/2026\/02\/devsecops1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail wp-post-image\" alt=\"\" \/><\/p>\n<p><span data-contrast=\"auto\">DevOps teams don\u2019t have a firewall problem; <a href=\"https:\/\/devops.com\/the-mlsecops-era-why-devops-teams-must-care-about-prompt-security\/\" target=\"_blank\" rel=\"noopener\">they\u00a0have an identity problem<\/a>.<\/span><span data-ccp-props='{\"335559738\":120,\"335559739\":120}'>\u00a0<\/span><span data-contrast=\"auto\">When you consider the recent security incidents in cloud-native environments, the vast majority\u00a0do not begin with a network breach.\u00a0It begins with weakened credentials, overprivileged service accounts or tokens that are long past their expiry dates. With infrastructure being made ephemeral and pipelines being completely automated, identity becomes the actual control plane.\u00a0This\u00a0is where smart KYC enforcement layers fit in\u00a0\u2014\u00a0not a compliance box, but an engineering control that is directly part of DevOps processes.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This\u00a0is not\u00a0about banking-style KYC. It is\u00a0regarding\u00a0the implementation of constant identity validation principles to human beings and machines that are working within your delivery ecosystem.<\/span><span data-ccp-props='{\"335559738\":120,\"335559739\":120}'>\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">The Hidden Risk Inside Modern DevOps Pipelines<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Most of the teams have already introduced:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">CI\/CD\u00a0automation<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Infrastructure as\u00a0code<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Container\u00a0orchestration<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Secrets\u00a0management tools<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">RBAC\u00a0policies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"3\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">MFA for\u00a0human users<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Yet breaches still happen.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Why?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The access decisions are\u00a0largely static.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After onboarding a user and giving\u00a0them\u00a0a role, the assumption is that trust is achieved until it is revised manually. A service account is created, and it usually exists forever. As soon as a token is issued, it can outlive the workload it was designed to perform.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Trust in a dynamic cloud-native environment is a weakness.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">DevOps pipelines are constructed in a fast manner. Security controls should be automatic,\u00a0continuously\u00a0and contextually\u00a0operating\u00a0at the same pace.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Rethinking\u00a0\u2018KYC\u2019\u00a0for DevOps Practitioners<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Fundamentally, KYC implies checking identity prior to access.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The customer in a DevOps environment is:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"10\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">A developer pushing code<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"10\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">A CI runner executing builds<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"10\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">A service\u00a0invoking\u00a0another service<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"10\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">A\u00a0third-party integration hitting your API<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"11\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Provisioning infrastructure with a Terraform script<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">A smart KYC enforcement layer poses the following questions:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Is this identity legitimate?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Is it a normally behaving identity?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Is this the extent of access that this identity should have at this time?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Has its\u00a0risk\u00a0posture changed?<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Instead of granting access based solely on role, access becomes a real-time trust decision.<\/span><span data-ccp-props='{\"335559738\":120,\"335559739\":120}'>\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Why RBAC and MFA\u00a0Aren\u2019t\u00a0Enough<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Role-based access control\u00a0is necessary, but\u00a0it\u2019s\u00a0coarse-grained.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">MFA strengthens login security, but only the authentication event is protected \u2014 not the actions that follow.\u00a0<\/span><span data-ccp-props='{\"335559738\":120,\"335559739\":120}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is a typical situation to consider:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ol>\n<li><span data-contrast=\"auto\">Phishing the credentials of a developer<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">An attacker creating an entry into a new geography<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">An account already granted extensive deployment rights<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Production workloads adjusted before anyone observes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"auto\">Everything technically\u00a0complied with\u00a0policy. The identity was valid. MFA could even have been circumvented through session hijacking. What was missing was continuous validation. Smart\u00a0<\/span><a href=\"https:\/\/www.chainit.com\/product\/kyc-aml-compliance\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">KYC AML\u00a0compliance<\/span><\/a><span data-contrast=\"auto\">\u00a0enforcement puts security less about who you are and more about whether you should be trusted.<\/span><span data-ccp-props='{\"335559738\":120,\"335559739\":120}'>\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">What an Intelligent KYC Enforcement Layer Actually Looks Like<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">It is not some other dashboard.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It is a programmable identity checking system implanted in:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Git\u00a0platforms<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">CI\/CD\u00a0systems<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Kubernetes\u00a0clusters<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Cloud IAM\u00a0policies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">API\u00a0gateways<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"7\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Secrets\u00a0managers<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Core capabilities include:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>1. Constant Identity Scoring\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Each identity, human or machine is assigned a dynamic risk score depending on:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Device\u00a0posture<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Login\u00a0anomalies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Time-of-day\u00a0deviations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Unusual\u00a0privilege usage<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Geographic\u00a0irregularities<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"2\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Access\u00a0pattern changes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">The risk is recalculated dynamically.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Step-up authentication, limited\u00a0permissions\u00a0or automatic revocation are caused by high-risk\u00a0behavior.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>2. Short-Lived, Context-Bound Credentials\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">One of the least considered risks in DevOps is long-lived tokens.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The intelligent enforcement layers guarantee:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"6\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Tokens are ephemeral<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"6\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Service account permissions are workload-scoped<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"6\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Certificates auto-rotate<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"6\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Expired identities are automatically deprovisioned<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Machine identities should be first-class security\u00a0principals,\u00a0not background utilities.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>3. Behavior-Based Privilege Validation\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Access ought to be dynamic because a role\u00a0permits\u00a0it.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">When a developer who has access to the front-end code suddenly tries to change\u00a0Kubernetes\u00a0control plane configurations, this should be re-validated.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Not since they are not allowed to do so, but because the\u00a0behavior\u00a0is not within the baseline.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is where the AI-assisted anomaly detection comes in handy, particularly in large-scale settings with thousands of service interactions per minute.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>4. Embedded Pipeline Enforcement\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Security cannot be placed out of the pipeline.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It should be an inseparable part of:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"4\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Pre-commit hooks (signed commits only)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"4\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Approval of\u00a0pull requests\u00a0(verified identities\u00a0only)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"4\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Production deployments\u00a0(sensitive change multi-identity verification)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"4\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Container signing processes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"4\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Approval of infrastructure changes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Teams will evade enforcement in case it involves manual steps. When it is automated and contextual enforcement, teams will not be aware of it until it blocks something harmful.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">The Machine Identity Explosion<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In Kubernetes-intensive systems, the number of machine identities vastly outnumbers the number of human identities.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Every:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"8\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">pod<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"8\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">microservice<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"8\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">CI\u00a0job<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"8\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">API\u00a0call<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"8\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">service\u00a0mesh interaction<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">is\u00a0identity-driven.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, even today, many teams do service account management manually, with little rotation of credentials and default over-permission to prevent breakage of deployments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">That is operational debt.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">KYC enforcement is automated through intelligent:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"9\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Service account life cycle management<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"9\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Permission\u00a0minimization<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"9\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Revocation of identity on termination of workload<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"9\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lateral movement detection<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">It is especially important in multi-cluster and multi-cloud environments where visibility gaps are typical.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Where AI Fits (Without the Hype)<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">AI in DevOps security should be feasible.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Generative dashboards are not\u00a0the real\u00a0value.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It is\u00a0anomaly\u00a0detection on a large scale.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">AI models can:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"5\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Set\u00a0behavioral\u00a0standards<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"5\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Detect subtle deviations<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"5\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Reduce false positives<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"5\" data-list-defn-props='{\"335552541\":1,\"335559685\":720,\"335559991\":360,\"469769242\":[8226],\"469777803\":\"left\",\"469777804\":\"\u25cf\",\"469777815\":\"multilevel\"}' data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Abuse correlate identity distributed systems<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">It is not\u00a0meant to\u00a0substitute\u00a0security teams.\u00a0It is to signal identity\u00a0risks early\u00a0\u2014\u00a0before they turn into incidents.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Practical Implementation Strategy<\/span><span data-ccp-props='{\"134245418\":false,\"134245529\":false,\"335559738\":180,\"335559739\":180}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">For\u00a0practitioners, the following is a practical strategy:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 1: List all Identities\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">You cannot defend what you do not see.\u00a0Identify\u00a0human and machine identities in environments.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 2: Get Rid of Long-Lived Credentials\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Transfer to auto-rotated and short-lived tokens where possible.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 3: Realize Identity Telemetry\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Trace and\u00a0track\u00a0identity\u00a0behavior\u00a0\u2014\u00a0not only logins.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 4: Implement Risk-Based Access\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Begin with privileged roles and environments of production.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 5: Deprovisioning Automation<\/strong><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":320,\"335559739\":80}'>\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The access must automatically expire when the roles\u00a0change\u00a0or the contracts expire.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong>Step 6: Progressively Implement\u00a0Behavioral\u00a0Enforcement\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Non-critical environment before scaling: Pilot anomaly detection.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is not a complete\u00a0platform\u00a0rip-and-replace, but rather incremental\u00a0modernization.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"auto\">Conclusion<\/span><span data-ccp-props='{\"134245418\":true,\"134245529\":true,\"335559738\":360,\"335559739\":120}'>\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The current DevOps environments are as fast as the machine, yet the identity governance is slow. With the increased automation and\u00a0decentralization\u00a0of infrastructure, the old access controls are no longer applicable. Intelligent KYC enforcement layers add continuous identity validation, contextual risk\u00a0assessment\u00a0and automated privilege control to the DevOps processes.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To practitioners, this is not about introducing friction; it is about instilling programmable trust in the delivery pipeline. In a time when identity has become the main point of attack, we need to modernize our approach to verifying and enforcing trust to ensure the security of cloud-native systems without slackening the pace of innovation.<\/span><\/p>\n<p><a href=\"https:\/\/devops.com\/modernizing-devops-security-with-intelligent-kyc-enforcement-layers\/\" target=\"_blank\" class=\"feedzy-rss-link-icon\">Read More<\/a><\/p>\n<p>\u200b<\/p>","protected":false},"excerpt":{"rendered":"<p>DevOps teams don\u2019t have a firewall problem; they\u00a0have an identity problem.\u00a0When you consider the recent security incidents in cloud-native environments, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4133,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-4132","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-devops"],"_links":{"self":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/4132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/comments?post=4132"}],"version-history":[{"count":0,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/posts\/4132\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media\/4133"}],"wp:attachment":[{"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/media?parent=4132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/categories?post=4132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rssfeedtelegrambot.bnaya.co.il\/index.php\/wp-json\/wp\/v2\/tags?post=4132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}