{"id":43807,"date":"2022-05-11T18:20:59","date_gmt":"2022-05-11T22:20:59","guid":{"rendered":"https:\/\/www.andysowards.com\/blog\/?p=43807"},"modified":"2022-05-11T18:21:02","modified_gmt":"2022-05-11T22:21:02","slug":"5-tips-to-help-secure-your-software-deployments","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/","title":{"rendered":"5 Tips To Help Secure Your Software Deployments"},"content":{"rendered":"\n<p>Security is arguably one of the most important factors in software development &#8211; thanks to the rise of cybercriminals. According to <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/01\/19\/16-tips-for-ensuring-your-team-keeps-up-with-software-and-security-updates\/?sh=6c99244b14a2\" target=\"_blank\" rel=\"noreferrer noopener\">Forbes<\/a>, a culture of security begins at the top. Even though it is impossible to create a completely secure application, developers can use different techniques to protect their software. Usually, <a href=\"https:\/\/snyk.io\/learn\/application-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">application security<\/a> starts at the development phase. This post will introduce five tips that help enhance software security.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Build Security in Every Phase of the Software&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/infinigeek.com\/increasing-app-security-devops\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" data-src=\"https:\/\/infinigeek.com\/assets\/devsecops-automate-security-testing.jpg\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/a><figcaption><em>Increasing App Security Through DevOps<\/em><\/figcaption><\/figure>\n\n\n\n<p>Avoid relegating security to the last step. Instead, embrace a mindset that favors security in every step of the software supply chain. This approach aligns well with <a href=\"https:\/\/www.andysowards.com\/blog\/2021\/how-can-cloud-native-architecture-change-the-way-businesses-develop\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud-native development<\/a>, Kubernetes and containers. Introducing automation of container security early (ideally from day one) in the CI\/CD pipeline is crucial. Integrating security automation at important points throughout the pipeline helps with software deployment and safe updates.\u00a0<\/p>\n\n\n\n<p>Security should not be the last check, or something software developers prioritize once an issue arises. Rather, it should be holistic. Deploying software requires the implementation of security capabilities throughout the software supply chain. For instance, during the build phase, developers should apply admission controllers as a way of blocking deployments that do not meet the pre-configured policies. This helps to complement the deployment phase.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Include Sensors to Avoid Security Scanning in the SDLC<\/h2>\n\n\n\n<p>Scanning is an extra step in the software release cycle and eventually results in slow deployment. This implies there is a point in time when no scanning is taking place to capture what is happening. Fortunately, RASP (Runtime Application Self-Protection) and IAST (Interactive Application Security Testing) tools embed sensors that are fundamentally always on in an application. These help avoid security testing as a different phase in the software development Life cycle by infusing it throughout the process.&nbsp;<\/p>\n\n\n\n<p>Vendors who offer RASP and IAST are capable of extending protection to production. As such, customers can deploy software even when a vulnerability is yet to be fixed. The vendors introduce full lifecycle protection as well as management and implementation of one solution. Such an approach provides the ability to rapidly respond to exploits and offer closed-loop feedback regarding the exploit to developers concurrently. Not all vulnerabilities can be resolved before deployment. So, the same degree of control must exist in production environments after deploying the software. Vendors that provide RASP and IAST solutions cater to the full SDLC.&nbsp;<\/p>\n\n\n\n<p>Consider embedding controls that reside within the asset you wish to protect. In applications, most security solutions are capable of scanning or reviewing software (SAST or static analysis) or the application itself (DAST or dynamic analysis). These solutions are incomplete and cater to specific segments in the SDLC. To cater to the full SDLC, DevOps employ security solutions such as RASP and IAST that reside in or close to the application as it runs.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Move and Scale Security Controls<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.infoworld.com\/article\/3571186\/6-tips-for-rapidly-scaling-applications.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"1024\" height=\"692\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/6-tips-for-rapidly-scaling-applications-1024x692.jpg\" alt=\"\" class=\"wp-image-43809 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/6-tips-for-rapidly-scaling-applications-1024x692.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/6-tips-for-rapidly-scaling-applications-768x519.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/6-tips-for-rapidly-scaling-applications.jpg 1200w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/692;\" \/><\/a><figcaption><em>6 tips for rapidly scaling applications<\/em><\/figcaption><\/figure>\n\n\n\n<p>As the software evolves and scales, security measures must also evolve and scale accordingly. Failure to do so risks the performance and stability of the software. This is especially true for cloud-based environments where infrastructure and <a href=\"https:\/\/www.andysowards.com\/blog\/2021\/5-brilliant-app-development-ideas-to-build-in-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">applications<\/a> are deployed, scaled and moved regularly.\u00a0<\/p>\n\n\n\n<p>The efficacy of security controls should remain the same regardless of deployment type. It should work smoothly whether the application is deployed on a physical box, container or VM. As well, it should work irrespective of the underlying infrastructure &#8211; be it a public cloud, private data center or hybrid.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Avoid Manual Management of Clusters and Default Configurations&nbsp;<\/h2>\n\n\n\n<p>Automation is essential since it is crucial for secure deployments. Sometimes, it can be enticing to perform quick fixes manually. However, it is often a bad idea from a reliability and security point of view. Avoid managing the state of clusters manually. Manually editing deployments and services to make quick changes to small things such as variables or container images is very easy. However, the process can quickly result in technical issues since it can result in uncertainty about the state of the cluster. Also, when another individual who is not aware of the manual changes makes additional changes, eventually, it may result in confusion and possible outages.&nbsp;<\/p>\n\n\n\n<p>Please do not depend on the default configurations since they are not always optimized for security. Usually, default configurations are optimized for operational success instead of security. So, always keep that in mind. For instance, network segmentation policies are not applied on deployments; thus, every asset can communicate with any other asset. So, using the default settings during deployment leaves the organization very vulnerable.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fine Tune Security Elements in the Environment<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/www.infoworld.com\/article\/3607914\/6-security-risks-in-software-development-and-how-to-address-them.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" width=\"1024\" height=\"683\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them-1024x683.jpg\" alt=\"\" class=\"wp-image-43810 lazyload\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them-1024x683.jpg 1024w, https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them-768x512.jpg 768w, https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg 1200w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/683;\" \/><\/a><figcaption><em>6 security risks in software development and how to address them<\/em><\/figcaption><\/figure>\n\n\n\n<p>Various open-source orchestration platforms offer various security and reliability features meant for deploying, scaling and managing applications. The key is to ensure they are properly configured and managed over time. Some security vulnerabilities arise from misconfigurations or a lack of a properly hardened environment. For instance, avoid leaving sensitive ports exposed or not configuring role-based access control. To secure the infrastructure, there are a few steps administrators can embrace.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Limit the Use of a Privileged Container to when it is Necessary<\/strong><\/h3>\n\n\n\n<p>The approach will give access to anyone with container access with full privileges in the node. This helps control the blast radius. Some orchestration platforms provide objects for managing access and deployment of containers with elevated privileges.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ensure Appropriate Logging&nbsp;<\/strong><\/h3>\n\n\n\n<p>Put in place an audit server to log access to the various nodes. As well as log the various commands executed on the server.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Perform Network Isolation&nbsp;<\/strong><\/h3>\n\n\n\n<p>This ensures services within each namespace are accessible in line with the set network rules. It further isolates and secures tenant services from one another.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consider Service Mesh Technology&nbsp;<\/strong><\/h3>\n\n\n\n<p>Embrace technologies that allow teams to automate authentication\/authorization and TLS services in software.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Integrate a Storage System<\/strong><\/h3>\n\n\n\n<p>Lastly, put in place a storage system that supports encrypted volumes and persistent volume access authentication and authorization. A secure storage system will extend the security model beyond isolation by ensuring only authenticated tenants get appropriate access to the storage volume.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>Secure deployment is possible by leveraging the five tips outlined above. These tips bring on board essential stakeholders, which help improve software security. With the right tools, developers can detect and correct vulnerabilities in software before deployment.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is arguably one of the most important factors in software development &#8211; thanks to the rise of cybercriminals. According to Forbes, a culture of security begins at the top.<\/p>\n","protected":false},"author":1,"featured_media":43810,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[537,109,5695],"tags":[9524,5861,13424,342,5891,1259,14080,6557,15345,988,784,9273,5888,11034,15343,15348,15347,177,15344,227,10795,15346,5879,21,115],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Tips To Help Secure Your Software Deployments<\/title>\n<meta name=\"description\" content=\"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Tips To Help Secure Your Software Deployments\" \/>\n<meta property=\"og:description\" content=\"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T22:20:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-11T22:21:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/\",\"name\":\"5 Tips To Help Secure Your Software Deployments\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg\",\"datePublished\":\"2022-05-11T22:20:59+00:00\",\"dateModified\":\"2022-05-11T22:21:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Tips To Help Secure Your Software Deployments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Tips To Help Secure Your Software Deployments","description":"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/","og_locale":"en_US","og_type":"article","og_title":"5 Tips To Help Secure Your Software Deployments","og_description":"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of","og_url":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2022-05-11T22:20:59+00:00","article_modified_time":"2022-05-11T22:21:02+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg","type":"image\/jpeg"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/","url":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/","name":"5 Tips To Help Secure Your Software Deployments","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg","datePublished":"2022-05-11T22:20:59+00:00","dateModified":"2022-05-11T22:21:02+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"Security is arguably one of the most important factors in software development - thanks to the rise of cybercriminals. According to Forbes, a culture of","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/6-security-risks-in-software-development-and-how-to-address-them.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2022\/5-tips-to-help-secure-your-software-deployments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Tips To Help Secure Your Software Deployments"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43807"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=43807"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43807\/revisions"}],"predecessor-version":[{"id":43811,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/43807\/revisions\/43811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/43810"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=43807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=43807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=43807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}