    <meta property="twitter:title" content="Creating A Secure 5G Service Based Architecture: Part 2 － API Security" />
    <meta property="twitter:description" content="Hands on guide to best practices for securing Service Based Architecture of your packet core deployment Hands on guide to best practices for securing Service Based Architecture of your packet core deployment" />
{"version":"1.0","provider_name":"Palo Alto Networks Blog","provider_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog","author_name":"Mitch Rappard","author_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/author\/mitch-rappard\/","title":"Creating A Secure 5G Service Based Architecture: Part 2 \uff0d API Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8ms1QJ2G9C\"><a href=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/cloud-security\/seo-5g-sba-api\/\">Creating A Secure 5G Service Based Architecture: Part 2 \uff0d API Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/cloud-security\/seo-5g-sba-api\/embed\/#?secret=8ms1QJ2G9C\" width=\"600\" height=\"338\" title=\"&#8220;Creating A Secure 5G Service Based Architecture: Part 2 \uff0d API Security&#8221; &#8212; Palo Alto Networks Blog\" data-secret=\"8ms1QJ2G9C\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/Show-Me.jpg","thumbnail_width":400,"thumbnail_height":300,"description":"Hands on guide to best practices for securing Service Based Architecture of your packet core deployment Hands on guide to best practices for securing Service Based Architecture of your packet core deployment"}