{"id":654,"date":"2025-05-09T02:58:19","date_gmt":"2025-05-09T07:58:19","guid":{"rendered":"https:\/\/stagefoursecurity.com\/blog\/?p=654"},"modified":"2025-05-09T02:58:19","modified_gmt":"2025-05-09T07:58:19","slug":"cloud-native-security-k8s-api","status":"publish","type":"post","link":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/","title":{"rendered":"Cloud Native Security K8s API"},"content":{"rendered":"<article>\n<header>\n<h1>\ud83e\uddf1 Cloud Native \u2260 Cloud Secure: What Kubernetes, Terraform, and APIs Leave Behind<\/h1>\n<p><em>By James K. Bishop, vCISO | Founder, <a href=\"https:\/\/stagefoursecurity.com\" target=\"_blank\" rel=\"noopener\">Stage Four Security<\/a><\/em><\/p>\n<\/header>\n<section><a href=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-657\" src=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png\" alt=\"\" width=\"400\" height=\"267\" srcset=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png 300w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-1024x683.png 1024w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-768x512.png 768w, https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png 1536w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a>Cloud-native isn\u2019t a synonym for secure. Just because you deploy with Terraform, orchestrate with Kubernetes, and integrate through APIs doesn\u2019t mean you\u2019ve reduced your risk. In many cases, you\u2019ve simply shifted it.<\/p>\n<p>Security in cloud-native environments requires intentional design across infrastructure, identity, workload behavior, and automation tooling. Here\u2019s where teams often fall short\u2014and what mature security looks like in a cloud-native world.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udd0d Cloud-Native \u2260 Automatically Hardened<\/h2>\n<ul>\n<li><strong>Kubernetes doesn\u2019t enforce RBAC by default<\/strong>\u2014it must be configured with least privilege in mind<\/li>\n<li><strong>Terraform can deploy insecure defaults at scale<\/strong>\u2014faster doesn&#8217;t mean safer<\/li>\n<li><strong>API integrations often bypass traditional controls<\/strong>\u2014and are poorly monitored or authenticated<\/li>\n<li><strong>Secrets often land in config files, YAML, or environment variables<\/strong>\u2014instead of a secure vault<\/li>\n<li><strong>Observability tools can expose too much<\/strong>\u2014such as logs with sensitive data or open dashboards<\/li>\n<\/ul>\n<p>These are feature-rich systems, not secure-by-default platforms.<\/p>\n<\/section>\n<section>\n<h2>\ud83d\udea8 Common Gaps in Cloud-Native Security<\/h2>\n<table style=\"border-collapse: collapse;\" border=\"1\" cellpadding=\"6\">\n<thead style=\"background: #f2f2f2;\">\n<tr>\n<th>Component<\/th>\n<th>Typical Oversight<\/th>\n<th>Security Risk<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Kubernetes<\/strong><\/td>\n<td>Cluster-admin rights, no network policies, open dashboards<\/td>\n<td>Privilege escalation, lateral movement, data exfiltration<\/td>\n<\/tr>\n<tr>\n<td><strong>Terraform \/ IaC<\/strong><\/td>\n<td>Unreviewed pull requests, no policy-as-code, insecure resource defaults<\/td>\n<td>Inconsistent posture, drift, overexposed resources<\/td>\n<\/tr>\n<tr>\n<td><strong>Serverless Functions<\/strong><\/td>\n<td>Broad IAM roles, no time limits, environment leakage<\/td>\n<td>Excessive privilege, data exposure, code injection<\/td>\n<\/tr>\n<tr>\n<td><strong>APIs<\/strong><\/td>\n<td>No rate limiting, weak auth, lack of audit logging<\/td>\n<td>Abuse, data theft, service disruption<\/td>\n<\/tr>\n<tr>\n<td><strong>CI\/CD Pipelines<\/strong><\/td>\n<td>Exposed tokens, unvalidated pull requests, no secrets management<\/td>\n<td>Credential leaks, supply chain attacks<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/section>\n<section>\n<h2>\ud83e\uddf0 What Secure Looks Like in a Cloud-Native World<\/h2>\n<ul>\n<li><strong>Enforce RBAC + Network Policies in K8s:<\/strong> Prevent lateral movement and least-privilege access for users and services<\/li>\n<li><strong>Use policy-as-code (OPA, Sentinel, Conftest):<\/strong> Automate enforcement of IaC security rules in CI\/CD<\/li>\n<li><strong>Enable container and workload runtime detection:<\/strong> Use eBPF-based tools like Falco, Tetragon, or runtime rules from Wiz\/Lacework<\/li>\n<li><strong>Secure your software supply chain:<\/strong> Sign and verify artifacts with Sigstore\/Cosign and use SBOMs (Software Bill of Materials)<\/li>\n<li><strong>Scan APIs and third-party integrations:<\/strong> Use tools like APIClarity, 42Crunch, and ZAP for automated security testing<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\ud83d\udce6 Cloud Native Brings Speed\u2014So Must Your Security<\/h2>\n<p>Cloud-native environments move fast. That means your security must move faster. Waiting for post-deployment scans or manual reviews won&#8217;t scale. Security controls must be:<\/p>\n<ul>\n<li><strong>Embedded:<\/strong> in IaC, pipelines, templates, and admission controllers<\/li>\n<li><strong>Context-aware:<\/strong> risk scoring based on sensitivity and exposure<\/li>\n<li><strong>Developer-friendly:<\/strong> with fix suggestions, not just failure flags<\/li>\n<li><strong>Observable:<\/strong> logging, metrics, and traces mapped to attack behavior<\/li>\n<\/ul>\n<\/section>\n<section>\n<h2>\ud83d\udce3 Final Thought<\/h2>\n<p>Cloud-native systems are powerful, flexible\u2014and dangerous when security is assumed. Build security into the templates, workflows, and runtime behavior of your infrastructure. Harden what\u2019s abstracted. And never confuse velocity with resilience.<\/p>\n<p><strong>Need help securing your Kubernetes clusters, IaC practices, or API surface area?<\/strong> <a href=\"https:\/\/stagefoursecurity.com\/blog\/partner-with-stage-four-security\/\" target=\"_blank\" rel=\"noopener\">Let\u2019s talk<\/a>.<\/p>\n<\/section>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>\ud83e\uddf1 Cloud Native \u2260 Cloud Secure: What Kubernetes, Terraform, and APIs Leave Behind By James K. Bishop, vCISO | Founder, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-654","post","type-post","status-publish","format-standard","hentry","category-cloud-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Native Security K8s API - Stage Four Security Blog<\/title>\n<meta name=\"description\" content=\"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Native Security K8s API - Stage Four Security Blog\" \/>\n<meta property=\"og:description\" content=\"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\" \/>\n<meta property=\"og:site_name\" content=\"Stage Four Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-09T07:58:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"stagefoursec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stagefoursec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\"},\"author\":{\"name\":\"stagefoursec\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\"},\"headline\":\"Cloud Native Security K8s API\",\"datePublished\":\"2025-05-09T07:58:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\"},\"wordCount\":466,\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png\",\"articleSection\":[\"Cloud Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\",\"name\":\"Cloud Native Security K8s API - Stage Four Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png\",\"datePublished\":\"2025-05-09T07:58:19+00:00\",\"description\":\"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.\",\"breadcrumb\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stagefoursecurity.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Native Security K8s API\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#website\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"name\":\"Stage Four Security Blog\",\"description\":\"Protecting today, fortifying tomorrow\",\"publisher\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#organization\",\"name\":\"Stage Four Security Blog\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"contentUrl\":\"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png\",\"width\":1000,\"height\":150,\"caption\":\"Stage Four Security Blog\"},\"image\":{\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde\",\"name\":\"stagefoursec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g\",\"caption\":\"stagefoursec\"},\"sameAs\":[\"https:\/\/stagefoursecurity.com\/blog\"],\"url\":\"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Native Security K8s API - Stage Four Security Blog","description":"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Native Security K8s API - Stage Four Security Blog","og_description":"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.","og_url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/","og_site_name":"Stage Four Security Blog","article_published_time":"2025-05-09T07:58:19+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png","type":"image\/png"}],"author":"stagefoursec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"stagefoursec","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#article","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/"},"author":{"name":"stagefoursec","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde"},"headline":"Cloud Native Security K8s API","datePublished":"2025-05-09T07:58:19+00:00","mainEntityOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/"},"wordCount":466,"publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png","articleSection":["Cloud Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/","url":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/","name":"Cloud Native Security K8s API - Stage Four Security Blog","isPartOf":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage"},"thumbnailUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure-300x200.png","datePublished":"2025-05-09T07:58:19+00:00","description":"Kubernetes, Terraform, and APIs aren\u2019t secure by default. This guide explores the hidden risks in cloud-native stacks and how to close gaps with policy, visibility, and automation.","breadcrumb":{"@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#primaryimage","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/05\/Cloud-Native-Cloud-Secure.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/stagefoursecurity.com\/blog\/2025\/05\/09\/cloud-native-security-k8s-api\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stagefoursecurity.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Native Security K8s API"}]},{"@type":"WebSite","@id":"https:\/\/stagefoursecurity.com\/blog\/#website","url":"https:\/\/stagefoursecurity.com\/blog\/","name":"Stage Four Security Blog","description":"Protecting today, fortifying tomorrow","publisher":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stagefoursecurity.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/stagefoursecurity.com\/blog\/#organization","name":"Stage Four Security Blog","url":"https:\/\/stagefoursecurity.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","contentUrl":"https:\/\/stagefoursecurity.com\/blog\/wp-content\/uploads\/2025\/02\/cropped-Stage-Four-Security-Blog-Logo-1000x150-1.png","width":1000,"height":150,"caption":"Stage Four Security Blog"},"image":{"@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/9224811ebe1947fee603931e220ecfde","name":"stagefoursec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/stagefoursecurity.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fdb94f17254222fa9c8b7db050a58a5fa4fb24ae32e20e7e1974b87b01a751d4?s=96&d=mm&r=g","caption":"stagefoursec"},"sameAs":["https:\/\/stagefoursecurity.com\/blog"],"url":"https:\/\/stagefoursecurity.com\/blog\/author\/admin_w171pcka\/"}]}},"_links":{"self":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":3,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/654\/revisions"}],"predecessor-version":[{"id":669,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/posts\/654\/revisions\/669"}],"wp:attachment":[{"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stagefoursecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}