{"version":"1.0","provider_name":"FinOps School","provider_url":"https:\/\/finopsschool.com\/blog","author_name":"priteshgeek","author_url":"https:\/\/finopsschool.com\/blog\/author\/priteshgeek\/","title":"Comprehensive DevSecOps Usage Reports Tutorial - FinOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zJ3FJ2kAZO\"><a href=\"https:\/\/finopsschool.com\/blog\/comprehensive-devsecops-usage-reports-tutorial\/\">Comprehensive DevSecOps Usage Reports Tutorial<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/finopsschool.com\/blog\/comprehensive-devsecops-usage-reports-tutorial\/embed\/#?secret=zJ3FJ2kAZO\" width=\"600\" height=\"338\" title=\"&#8220;Comprehensive DevSecOps Usage Reports Tutorial&#8221; &#8212; FinOps School\" data-secret=\"zJ3FJ2kAZO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/finopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"1. Introduction &amp; Overview What are Usage Reports in DevSecOps? Usage reports in DevSecOps refer to aggregated data and metrics that provide insights into the performance, security, and operational efficiency of software development pipelines. These reports track resource consumption, security incidents, CI\/CD pipeline activity, and compliance metrics, enabling teams to monitor, optimize, and secure their ... Read more"}