{"id":6187,"date":"2022-06-17T10:50:05","date_gmt":"2022-06-17T10:50:05","guid":{"rendered":"https:\/\/adarma.wpengine.com\/?p=6187"},"modified":"2023-08-17T09:05:36","modified_gmt":"2023-08-17T09:05:36","slug":"cloud-security-understanding-your-attack-surface","status":"publish","type":"post","link":"https:\/\/adarma.wpengine.com\/identifying-misconfigurations-how-to-fix-them\/","title":{"rendered":"Cloud Security Part 3: Identifying Cloud Misconfigurations & How to Fix Them"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":17,"featured_media":6198,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[197],"tags":[232,231,220,211],"acf":[],"yoast_head":"\n