Important definitions and terminologies used in DevOps Security
A
- Abnormal Behavior Detection in DevOps Security
- Access Control in DevOps Security
- Active Directory in DevOps Security
- Agile Development in DevOps Security
- Agile methodology in DevOps Security
- AIOps (artificial intelligence operations) in DevOps Security
- Apache in DevOps Security
- API Gateway Security in DevOps Security
- API management in DevOps Security
- API Security in DevOps Security
- Application containerization in DevOps Security
- Application infrastructure in DevOps Security
- Application lifecycle management in DevOps Security
- Application migration in DevOps Security
- Application performance monitoring (APM) in DevOps Security
- Application program interface (API) in DevOps Security
- Application Security in DevOps Security
- Application whitelisting in DevOps Security
- ASP.Net Core monitoring in DevOps Security
- Asset Management in DevOps Security
- Attack vector in DevOps Security
- Audit Trails in DevOps Security
- Authentication and Authorization (AuthZ) in DevOps Security
- Authentication factor in DevOps Security
- Authentication in DevOps Security
- Authorization in DevOps Security
- Authorization Management in DevOps Security
- Automated Compliance Checking in DevOps Security
- Automated Incident Response in DevOps Security
- Automated Testing in DevOps Security
- Automation Frameworks in DevOps Security
- AWS app development tools in DevOps Security
- AWS CloudWatch in DevOps Security
- AWS CodeDeploy in DevOps Security
- AWS CodePipeline in DevOps Security
- AWS EC2 in DevOps Security
- AWS ELB in DevOps Security
- AWS Lambda in DevOps Security
- AWS monitoring in DevOps Security
- AWS RDS in DevOps Security
- AWS RDS Postgres monitoring in DevOps Security
- AWS S3 cost optimization in DevOps Security
- AWS S3 in DevOps Security
- AWS Security in DevOps Security
B
- Baseline Security in DevOps Security
- Behavior Analysis in DevOps Security
- Behavioral Analytics in DevOps Security
- Benchmarks in DevOps Security
- Blue/green deployment in DevOps Security
- Business analytics in DevOps Security
- Business intelligence in DevOps Security
- Business technology in DevOps Security
C
- CaaS in DevOps Security
- CASB in DevOps Security
- Change Management in DevOps Security
- Cloud Access Security Brokers (CASBs) in DevOps Security
- Cloud application in DevOps Security
- Cloud automation in DevOps Security
- Cloud computing in DevOps Security
- Cloud infrastructure in DevOps Security
- Cloud management in DevOps Security
- Cloud migration in DevOps Security
- Cloud Native Security in DevOps Security
- Cloud orchestration in DevOps Security
- Cloud Security in DevOps Security
- Cloud security monitoring in DevOps Security
- Code Analysis in DevOps Security
- Code Review in DevOps Security
- Code Signing in DevOps Security
- Compliance in DevOps Security
- Configuration Management in DevOps Security
- Container in DevOps Security
- Container Security in DevOps Security
- Containerization in DevOps Security
- Content delivery network (CDN) in DevOps Security
- Continuous delivery in DevOps Security
- Continuous Deployment in DevOps Security
- Continuous Integration in DevOps Security
- Continuous intelligence in DevOps Security
- Continuous monitoring in DevOps Security
- CRUD (create, read, update and delete) in DevOps Security
- Cryptography in DevOps Security
- Cyber Resilience in DevOps Security
- Cyber security in DevOps Security
- Cyber Threat Intelligence in DevOps Security
- Cybersecurity in DevOps Security
D
- Data Encryption in DevOps Security
- Data Loss Prevention (DLP) in DevOps Security
- Data Security in DevOps Security
- Database management in DevOps Security
- Denial of service (DoS) in DevOps Security
- DevOps in DevOps Security
- DevOps-as-a-Service in DevOps Security
- DevSecOps in DevOps Security
- Digital Certificates in DevOps Security
- Digital customer experience in DevOps Security
- Digital Identity Management in DevOps Security
- Directory traversal in DevOps Security
- Distributed Denial of Service (DDoS) Protection in DevOps Security
- Distributed tracing in DevOps Security
- DNS Security in DevOps Security
- Docker in DevOps Security
- Docker log management in DevOps Security
- Docker Security in DevOps Security
- Docker Swarm in DevOps Security
- DORA metrics in DevOps Security
E
- Encapsulation in DevOps Security
- Encryption in DevOps Security
- Endpoint Security in DevOps Security
- Enterprise application integration (EAI) in DevOps Security
- Enterprise Security in DevOps Security
- Error budget in DevOps Security
- Error tracking in DevOps Security
- Event Management in DevOps Security
F
- Federated Identity in DevOps Security
- Federated Identity Management in DevOps Security
- File inclusion in DevOps Security
- Firewall in DevOps Security
- Firewall Management in DevOps Security
- Firewall Rules in DevOps Security
- Function-as-a-Service (FaaS) in DevOps Security
G
- Gain privileges in DevOps Security
- Governance in DevOps Security
H
- Hadoop architecture in DevOps Security
- Hardening in DevOps Security
- Hybrid cloud in DevOps Security
I
- Identity and Access Management (IAM) in DevOps Security
- Identity Governance in DevOps Security
- IIS Log Viewer in DevOps Security
- IIS server in DevOps Security
- Incident Management in DevOps Security
- Incident Response in DevOps Security
- Indicators of compromise (IoC) in DevOps Security
- Information security management in DevOps Security
- Infrastructure as Code (IaC) in DevOps Security
- Infrastructure management (IM) in DevOps Security
- Infrastructure monitoring in DevOps Security
- Infrastructure Security in DevOps Security
- Infrastructure Security Management in DevOps Security
- Infrastructure-as-a-Service in DevOps Security
- Infrastructure-as-code in DevOps Security
- Insider Threat Detection in DevOps Security
- Insider Threats in DevOps Security
- Intelligent Security Analytics in DevOps Security
- Intrusion Detection in DevOps Security
- Intrusion Prevention System (IPS) in DevOps Security
- ISO 27001 in DevOps Security
- IT Governance in DevOps Security
- IT Infrastructure in DevOps Security
- IT operations in DevOps Security
- IT operations management (ITOM) in DevOps Security
- IT Security Policy in DevOps Security
- ITSI in DevOps Security
K
- Kubernetes Access Control in DevOps Security
- Kubernetes Admission Controllers in DevOps Security
- Kubernetes monitoring in DevOps Security
- Kubernetes Network Policies in DevOps Security
- Kubernetes RBAC in DevOps Security
- Kubernetes Security in DevOps Security
L
- Least Privilege in DevOps Security
- Load balancer in DevOps Security
- Log aggregation in DevOps Security
- Log Analysis in DevOps Security
- Log file in DevOps Security
- Log levels in DevOps Security
- Log management in DevOps Security
- Log management policy in DevOps Security
- Log management process in DevOps Security
- Log4Shell vulnerability in DevOps Security
M
- Machine data in DevOps Security
- Machine learning in DevOps Security
- Malware Detection in DevOps Security
- Managed detection and response in DevOps Security
- Managed SIEM in DevOps Security
- Microservices in DevOps Security
- Microservices Security in DevOps Security
- Microsoft Azure in DevOps Security
- Mutable and immutable infrastructure in DevOps Security
N
- Network Access Control (NAC) in DevOps Security
- Network performance monitoring (NPM) in DevOps Security
- Network Security in DevOps Security
- NIST SIEM requirements and standards in DevOps Security
- Node logging in DevOps Security
O
- Observability in DevOps Security
- Open Integration Framework (OIF) in DevOps Security
- Open Web Application Security Project (OWASP) in DevOps Security
- Operational Intelligence in DevOps Security
P
- PaaS (Platform-as-a-Service) in DevOps Security
- Patch Management in DevOps Security
- Penetration Testing as a Service (PTaaS) in DevOps Security
- Penetration Testing in DevOps Security
- Pivotal Cloud Foundry (PCF) in DevOps Security
- Policy Management in DevOps Security
- Polymorphism in DevOps Security
- Predictive analytics in DevOps Security
- Private cloud in DevOps Security
- Privilege Management in DevOps Security
- Public Key Infrastructure (PKI) in DevOps Security
R
- Real user monitoring (RUM) in DevOps Security
- Real-time big data analytics in DevOps Security
- Real-time dashboard in DevOps Security
- Regulatory Compliance in DevOps Security
- Remediation in DevOps Security
- Remote Access Management in DevOps Security
- Risk Assessment in DevOps Security
- Role-based access control in DevOps Security
- Root cause analysis in DevOps Security
S
- scrum in DevOps Security
- SecOps in DevOps Security
- Security Automation in DevOps Security
- Security Compliance in DevOps Security
- Security Controls in DevOps Security
- Security Information and Event Management (SIEM) in DevOps Security
- Security intelligence in DevOps Security
- Security Monitoring in DevOps Security
- Security Operations Center (SOC) in DevOps Security
- Security Orchestration in DevOps Security
- Security remediation in DevOps Security
- Security Risk Assessment in DevOps Security
- Security Testing Frameworks in DevOps Security
- Security Testing in DevOps Security
- Server monitoring in DevOps Security
- Serverless computing in DevOps Security
- Serverless Security in DevOps Security
- Service Level Agreement (SLA) in DevOps Security
- Service Level Agreements (SLAs) in DevOps Security
- Service Level Indicator (SLI) in DevOps Security
- Service Level Objective (SLO) in DevOps Security
- Service reliability in DevOps Security
- SIEM environment in DevOps Security
- SIEM in DevOps Security
- SIEM solutions in DevOps Security
- SIEM tools in DevOps Security
- SIEM-log in DevOps Security
- Single Sign-On (SSO) in DevOps Security
- SOAR in DevOps Security
- Software Composition Analysis (SCA) in DevOps Security
- Software Defined Networking (SDN) in DevOps Security
- Software deployment in DevOps Security
- Software lifecycle in DevOps Security
- Software stack in DevOps Security
- Software-as-a-Service (SaaS) in DevOps Security
- Standard operating procedures (SOPs) in DevOps Security
- Structured logging in DevOps Security
T
- Technology stack in DevOps Security
- Telemetry in DevOps Security
- Testing-as-a-Service (TaaS) in DevOps Security
- Threat detection and response (TDR) in DevOps Security
- Threat Hunting in DevOps Security
- Threat Intelligence in DevOps Security
- Threat Modeling in DevOps Security
- Threat Remediation in DevOps Security
- Threat Response in DevOps Security
- Tokenization in DevOps Security
- Tool sprawl in DevOps Security
U
- UEBA in DevOps Security
V
- Virtual private cloud (VPC) in DevOps Security
- VPC Flow Logging in DevOps Security
- Vulnerability Assessment in DevOps Security
- Vulnerability Management in DevOps Security
W
- Web application development in DevOps Security
- Web Application Firewalls (WAFs) in DevOps Security
Z
- Zero Trust Architecture in DevOps Security