{"version":"1.0","type":"photo","provider_name":"Gifyu","provider_url":"https:\/\/gifyu.com","title":"Automated Security Monitoring and Aws Configuration","url":"https:\/\/s3.gifyu.com\/images\/Automated-Security-Monitoring-and-Aws-Configuration.md.png","web_page":"https:\/\/gifyu.com\/image\/kZNc","width":"626","height":"365","author_name":"bluechipgulf2","author_url":"https:\/\/gifyu.com\/bluechipgulf2","thumbnail_url":"https:\/\/s3.gifyu.com\/images\/Automated-Security-Monitoring-and-Aws-Configuration.md.png","thumbnail_width":"500","thumbnail_height":292}