DevOps Glossary

From agile to automation to analytics, unpack the toolbox of modern

DevOps terminology.

Infrastructure Drift

Unplanned changes to infrastructure over time, deviating from the desired state.

Infrastructure Management (IM)

Process of managing essential operation components, such as policies, processes, equipment, data, human resources, and external contacts.

Infrastructure Metrics

Measurements used to assess the performance, health, and efficiency of IT infrastructure components.

Infrastructure Monitoring

Process of collecting and analyzing data from infrastructure to ensure optimal performance.

Infrastructure Resilience

Ability of IT infrastructure to withstand and recover from disruptions and disasters.

Infrastructure as Code (IaC)

Managing and provisioning infrastructure through code instead of manual processes. Enables version control, automation, and consistent environments.

Infrastructure as Code (IaC) Framework

Set of tools and practices for managing infrastructure through machine-readable definition files.

Infrastructure as Data

Approach to infrastructure management where the desired state is described as data, not procedural code.

Infrastructure as Software

Treating infrastructure configuration and management as a software development problem.

Infrastructure on Demand

Ability to provision and de-provision infrastructure resources as needed, often in cloud environments.

Infrastructure-as-a-Service (IaaS)

Cloud computing model providing virtualized computing resources over the internet. Users can rent servers, storage, networks, and operating systems.

Ingress Controller

Kubernetes resource managing external access to services in a cluster, typically HTTP.

Injection

Security vulnerability where untrusted data is sent to an interpreter as part of a command or query.

Inner Loop vs Outer Loop

Inner loop is local development cycle; outer loop involves CI/CD processes for team collaboration and deployment.

Insecure Deserialization

Security vulnerability occurring when untrusted data is used to abuse the logic of an application.

Insecure Direct Object Reference (IDOR)

Security flaw allowing attackers to bypass authorization and access resources directly by modifying the value of a parameter.

Instance

Single copy of a running computer program, often referring to a virtual server in cloud computing.

Insufficient Logging & Monitoring

Security weakness where systems lack adequate logging and real-time monitoring, hindering threat detection and forensics.

Integration Testing

Phase in software testing where individual modules are combined and tested as a group.

Intelligent Automation

Use of AI and machine learning to automate complex business processes and decisions.

Interactive Application Security Testing (IAST)

Security testing tool that combines static and dynamic testing methods to detect vulnerabilities in running applications.

Internal Developer Platform (IDP)

Set of tools and practices that improve developer experience and productivity within an organization.

Internal Threat Intelligence

Process of gathering, analyzing, and disseminating information about potential internal security threats.

Inventory Hoarding

Excessive accumulation of IT resources, often in cloud environments, leading to waste and inefficiency.

Ionic

Open-source SDK for developing hybrid mobile applications using web technologies.