    <meta property="twitter:title" content="Creating A Secure 5G Service Based Architecture: Part 1 － Vulnerability Management" />
    <meta property="twitter:description" content="Hands on guide to best practices for securing Service Based Architecture of your packet core deployment Hands on guide to best practices for securing Service Based Architecture of your packet core deployment" />
<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Palo Alto Networks Blog</provider_name><provider_url>https://origin-researchcenter.paloaltonetworks.com/blog</provider_url><author_name>Mitch Rappard</author_name><author_url>https://origin-researchcenter.paloaltonetworks.com/blog/author/mitch-rappard/</author_url><title>Creating A Secure 5G Service Based Architecture: Part 1 &#xFF0D; Vulnerability Management</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="XfbXztCWXD"&gt;&lt;a href="https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/seo-5g-sba-vulnerability/"&gt;Creating A Secure 5G Service Based Architecture: Part 1 &#xFF0D; Vulnerability Management&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://origin-researchcenter.paloaltonetworks.com/blog/cloud-security/seo-5g-sba-vulnerability/embed/#?secret=XfbXztCWXD" width="600" height="338" title="&#x201C;Creating A Secure 5G Service Based Architecture: Part 1 &#xFF0D; Vulnerability Management&#x201D; &#x2014; Palo Alto Networks Blog" data-secret="XfbXztCWXD" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://origin-researchcenter.paloaltonetworks.com/blog/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/05/Tablet-Close-up.jpg</thumbnail_url><thumbnail_width>400</thumbnail_width><thumbnail_height>300</thumbnail_height><description>Hands on guide to best practices for securing Service Based Architecture of your packet core deployment Hands on guide to best practices for securing Service Based Architecture of your packet core deployment</description></oembed>
