{"version":"1.0","provider_name":"Microsoft Power Platform Blog","provider_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog","author_name":"Kent Weare","author_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/author\/keweare\/","title":"Power platform Security &amp; Governance: Deploying a Defense in Depth Strategy - Microsoft Power Platform Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"9weqapwRvD\"><a href=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/\">Power platform Security &amp; Governance: Deploying a Defense in Depth Strategy<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/power-automate\/security-governance-strategy\/embed\/#?secret=9weqapwRvD\" width=\"600\" height=\"338\" title=\"&#8220;Power platform Security &amp; Governance: Deploying a Defense in Depth Strategy&#8221; &#8212; Microsoft Power Platform Blog\" data-secret=\"9weqapwRvD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"A common cyber security approach used by organizations to protect their digital assets is to leverage a defense-in-depth strategy. When customers ask how to best secure and govern their Microsoft Flow and PowerApps environments, we provide similar guidance. The following list represents different layers that you can use to protect your digital assets and apply governance to ensure your organization\u2019s interests are met.","thumbnail_url":"https:\/\/www.microsoft.com\/en-us\/power-platform\/blog\/wp-content\/uploads\/2024\/06\/1-flow.png"}