DevOps Security Glossary

Important definitions and terminologies used in DevOps Security

A

  • Abnormal Behavior Detection in DevOps Security
  • Access Control in DevOps Security
  • Active Directory in DevOps Security
  • Agile Development in DevOps Security
  • Agile methodology in DevOps Security
  • AIOps (artificial intelligence operations) in DevOps Security
  • Apache in DevOps Security
  • API Gateway Security in DevOps Security
  • API management in DevOps Security
  • API Security in DevOps Security
  • Application containerization in DevOps Security
  • Application infrastructure in DevOps Security
  • Application lifecycle management in DevOps Security
  • Application migration in DevOps Security
  • Application performance monitoring (APM) in DevOps Security
  • Application program interface (API) in DevOps Security
  • Application Security in DevOps Security
  • Application whitelisting in DevOps Security
  • ASP.Net Core monitoring in DevOps Security
  • Asset Management in DevOps Security
  • Attack vector in DevOps Security
  • Audit Trails in DevOps Security
  • Authentication and Authorization (AuthZ) in DevOps Security
  • Authentication factor in DevOps Security
  • Authentication in DevOps Security
  • Authorization in DevOps Security
  • Authorization Management in DevOps Security
  • Automated Compliance Checking in DevOps Security
  • Automated Incident Response in DevOps Security
  • Automated Testing in DevOps Security
  • Automation Frameworks in DevOps Security
  • AWS app development tools in DevOps Security
  • AWS CloudWatch in DevOps Security
  • AWS CodeDeploy in DevOps Security
  • AWS CodePipeline in DevOps Security
  • AWS EC2 in DevOps Security
  • AWS ELB in DevOps Security
  • AWS Lambda in DevOps Security
  • AWS monitoring in DevOps Security
  • AWS RDS in DevOps Security
  • AWS RDS Postgres monitoring in DevOps Security
  • AWS S3 cost optimization in DevOps Security
  • AWS S3 in DevOps Security
  • AWS Security in DevOps Security

B

  • Baseline Security in DevOps Security
  • Behavior Analysis in DevOps Security
  • Behavioral Analytics in DevOps Security
  • Benchmarks in DevOps Security
  • Blue/green deployment in DevOps Security
  • Business analytics in DevOps Security
  • Business intelligence in DevOps Security
  • Business technology in DevOps Security

C

  • CaaS in DevOps Security
  • CASB in DevOps Security
  • Change Management in DevOps Security
  • Cloud Access Security Brokers (CASBs) in DevOps Security
  • Cloud application in DevOps Security
  • Cloud automation in DevOps Security
  • Cloud computing in DevOps Security
  • Cloud infrastructure in DevOps Security
  • Cloud management in DevOps Security
  • Cloud migration in DevOps Security
  • Cloud Native Security in DevOps Security
  • Cloud orchestration in DevOps Security
  • Cloud Security in DevOps Security
  • Cloud security monitoring in DevOps Security
  • Code Analysis in DevOps Security
  • Code Review in DevOps Security
  • Code Signing in DevOps Security
  • Compliance in DevOps Security
  • Configuration Management in DevOps Security
  • Container in DevOps Security
  • Container Security in DevOps Security
  • Containerization in DevOps Security
  • Content delivery network (CDN) in DevOps Security
  • Continuous delivery in DevOps Security
  • Continuous Deployment in DevOps Security
  • Continuous Integration in DevOps Security
  • Continuous intelligence in DevOps Security
  • Continuous monitoring in DevOps Security
  • CRUD (create, read, update and delete) in DevOps Security
  • Cryptography in DevOps Security
  • Cyber Resilience in DevOps Security
  • Cyber security in DevOps Security
  • Cyber Threat Intelligence in DevOps Security
  • Cybersecurity in DevOps Security

D

  • Data Encryption in DevOps Security
  • Data Loss Prevention (DLP) in DevOps Security
  • Data Security in DevOps Security
  • Database management in DevOps Security
  • Denial of service (DoS) in DevOps Security
  • DevOps in DevOps Security
  • DevOps-as-a-Service in DevOps Security
  • DevSecOps in DevOps Security
  • Digital Certificates in DevOps Security
  • Digital customer experience in DevOps Security
  • Digital Identity Management in DevOps Security
  • Directory traversal in DevOps Security
  • Distributed Denial of Service (DDoS) Protection in DevOps Security
  • Distributed tracing in DevOps Security
  • DNS Security in DevOps Security
  • Docker in DevOps Security
  • Docker log management in DevOps Security
  • Docker Security in DevOps Security
  • Docker Swarm in DevOps Security
  • DORA metrics in DevOps Security

E

  • Encapsulation in DevOps Security
  • Encryption in DevOps Security
  • Endpoint Security in DevOps Security
  • Enterprise application integration (EAI) in DevOps Security
  • Enterprise Security in DevOps Security
  • Error budget in DevOps Security
  • Error tracking in DevOps Security
  • Event Management in DevOps Security

F

  • Federated Identity in DevOps Security
  • Federated Identity Management in DevOps Security
  • File inclusion in DevOps Security
  • Firewall in DevOps Security
  • Firewall Management in DevOps Security
  • Firewall Rules in DevOps Security
  • Function-as-a-Service (FaaS) in DevOps Security

G

  • Gain privileges in DevOps Security
  • Governance in DevOps Security

H

  • Hadoop architecture in DevOps Security
  • Hardening in DevOps Security
  • Hybrid cloud in DevOps Security

I

  • Identity and Access Management (IAM) in DevOps Security
  • Identity Governance in DevOps Security
  • IIS Log Viewer in DevOps Security
  • IIS server in DevOps Security
  • Incident Management in DevOps Security
  • Incident Response in DevOps Security
  • Indicators of compromise (IoC) in DevOps Security
  • Information security management in DevOps Security
  • Infrastructure as Code (IaC) in DevOps Security
  • Infrastructure management (IM) in DevOps Security
  • Infrastructure monitoring in DevOps Security
  • Infrastructure Security in DevOps Security
  • Infrastructure Security Management in DevOps Security
  • Infrastructure-as-a-Service in DevOps Security
  • Infrastructure-as-code in DevOps Security
  • Insider Threat Detection in DevOps Security
  • Insider Threats in DevOps Security
  • Intelligent Security Analytics in DevOps Security
  • Intrusion Detection in DevOps Security
  • Intrusion Prevention System (IPS) in DevOps Security
  • ISO 27001 in DevOps Security
  • IT Governance in DevOps Security
  • IT Infrastructure in DevOps Security
  • IT operations in DevOps Security
  • IT operations management (ITOM) in DevOps Security
  • IT Security Policy in DevOps Security
  • ITSI in DevOps Security

K

  • Kubernetes Access Control in DevOps Security
  • Kubernetes Admission Controllers in DevOps Security
  • Kubernetes monitoring in DevOps Security
  • Kubernetes Network Policies in DevOps Security
  • Kubernetes RBAC in DevOps Security
  • Kubernetes Security in DevOps Security

L

  • Least Privilege in DevOps Security
  • Load balancer in DevOps Security
  • Log aggregation in DevOps Security
  • Log Analysis in DevOps Security
  • Log file in DevOps Security
  • Log levels in DevOps Security
  • Log management in DevOps Security
  • Log management policy in DevOps Security
  • Log management process in DevOps Security
  • Log4Shell vulnerability in DevOps Security

M

  • Machine data in DevOps Security
  • Machine learning in DevOps Security
  • Malware Detection in DevOps Security
  • Managed detection and response in DevOps Security
  • Managed SIEM in DevOps Security
  • Microservices in DevOps Security
  • Microservices Security in DevOps Security
  • Microsoft Azure in DevOps Security
  • Mutable and immutable infrastructure in DevOps Security

N

  • Network Access Control (NAC) in DevOps Security
  • Network performance monitoring (NPM) in DevOps Security
  • Network Security in DevOps Security
  • NIST SIEM requirements and standards in DevOps Security
  • Node logging in DevOps Security

O

  • Observability in DevOps Security
  • Open Integration Framework (OIF) in DevOps Security
  • Open Web Application Security Project (OWASP) in DevOps Security
  • Operational Intelligence in DevOps Security

P

  • PaaS (Platform-as-a-Service) in DevOps Security
  • Patch Management in DevOps Security
  • Penetration Testing as a Service (PTaaS) in DevOps Security
  • Penetration Testing in DevOps Security
  • Pivotal Cloud Foundry (PCF) in DevOps Security
  • Policy Management in DevOps Security
  • Polymorphism in DevOps Security
  • Predictive analytics in DevOps Security
  • Private cloud in DevOps Security
  • Privilege Management in DevOps Security
  • Public Key Infrastructure (PKI) in DevOps Security

R

  • Real user monitoring (RUM) in DevOps Security
  • Real-time big data analytics in DevOps Security
  • Real-time dashboard in DevOps Security
  • Regulatory Compliance in DevOps Security
  • Remediation in DevOps Security
  • Remote Access Management in DevOps Security
  • Risk Assessment in DevOps Security
  • Role-based access control in DevOps Security
  • Root cause analysis in DevOps Security

S

  • scrum in DevOps Security
  • SecOps in DevOps Security
  • Security Automation in DevOps Security
  • Security Compliance in DevOps Security
  • Security Controls in DevOps Security
  • Security Information and Event Management (SIEM) in DevOps Security
  • Security intelligence in DevOps Security
  • Security Monitoring in DevOps Security
  • Security Operations Center (SOC) in DevOps Security
  • Security Orchestration in DevOps Security
  • Security remediation in DevOps Security
  • Security Risk Assessment in DevOps Security
  • Security Testing Frameworks in DevOps Security
  • Security Testing in DevOps Security
  • Server monitoring in DevOps Security
  • Serverless computing in DevOps Security
  • Serverless Security in DevOps Security
  • Service Level Agreement (SLA) in DevOps Security
  • Service Level Agreements (SLAs) in DevOps Security
  • Service Level Indicator (SLI) in DevOps Security
  • Service Level Objective (SLO) in DevOps Security
  • Service reliability in DevOps Security
  • SIEM environment in DevOps Security
  • SIEM in DevOps Security
  • SIEM solutions in DevOps Security
  • SIEM tools in DevOps Security
  • SIEM-log in DevOps Security
  • Single Sign-On (SSO) in DevOps Security
  • SOAR in DevOps Security
  • Software Composition Analysis (SCA) in DevOps Security
  • Software Defined Networking (SDN) in DevOps Security
  • Software deployment in DevOps Security
  • Software lifecycle in DevOps Security
  • Software stack in DevOps Security
  • Software-as-a-Service (SaaS) in DevOps Security
  • Standard operating procedures (SOPs) in DevOps Security
  • Structured logging in DevOps Security

T

  • Technology stack in DevOps Security
  • Telemetry in DevOps Security
  • Testing-as-a-Service (TaaS) in DevOps Security
  • Threat detection and response (TDR) in DevOps Security
  • Threat Hunting in DevOps Security
  • Threat Intelligence in DevOps Security
  • Threat Modeling in DevOps Security
  • Threat Remediation in DevOps Security
  • Threat Response in DevOps Security
  • Tokenization in DevOps Security
  • Tool sprawl in DevOps Security

U

  • UEBA in DevOps Security

V

  • Virtual private cloud (VPC) in DevOps Security
  • VPC Flow Logging in DevOps Security
  • Vulnerability Assessment in DevOps Security
  • Vulnerability Management in DevOps Security

W

  • Web application development in DevOps Security
  • Web Application Firewalls (WAFs) in DevOps Security

Z

  • Zero Trust Architecture in DevOps Security
Kubernetes Glossary
Data Analysis with R Glossary

Get industry recognized certification – Contact us

keyboard_arrow_up
Open chat
Need help?
Hello 👋
Can we help you?