Link to home
Join the waitlist
DevOps Glossary
From agile to automation to analytics, unpack the toolbox of modern
DevOps terminology.
Infrastructure Drift
Unplanned changes to infrastructure over time, deviating from the desired state.
Infrastructure Drift
Infrastructure Management (IM)
Process of managing essential operation components, such as policies, processes, equipment, data, human resources, and external contacts.
Infrastructure Management (IM)
Infrastructure Metrics
Measurements used to assess the performance, health, and efficiency of IT infrastructure components.
Infrastructure Metrics
Infrastructure Monitoring
Process of collecting and analyzing data from infrastructure to ensure optimal performance.
Infrastructure Monitoring
Infrastructure Resilience
Ability of IT infrastructure to withstand and recover from disruptions and disasters.
Infrastructure Resilience
Infrastructure as Code (IaC)
Managing and provisioning infrastructure through code instead of manual processes. Enables version control, automation, and consistent environments.
Infrastructure as Code (IaC)
Infrastructure as Code (IaC) Framework
Set of tools and practices for managing infrastructure through machine-readable definition files.
Infrastructure as Code (IaC) Framework
Infrastructure as Data
Approach to infrastructure management where the desired state is described as data, not procedural code.
Infrastructure as Data
Infrastructure as Software
Treating infrastructure configuration and management as a software development problem.
Infrastructure as Software
Infrastructure on Demand
Ability to provision and de-provision infrastructure resources as needed, often in cloud environments.
Infrastructure on Demand
Infrastructure-as-a-Service (IaaS)
Cloud computing model providing virtualized computing resources over the internet. Users can rent servers, storage, networks, and operating systems.
Infrastructure-as-a-Service (IaaS)
Ingress Controller
Kubernetes resource managing external access to services in a cluster, typically HTTP.
Ingress Controller
Injection
Security vulnerability where untrusted data is sent to an interpreter as part of a command or query.
Injection
Inner Loop vs Outer Loop
Inner loop is local development cycle; outer loop involves CI/CD processes for team collaboration and deployment.
Inner Loop vs Outer Loop
Insecure Deserialization
Security vulnerability occurring when untrusted data is used to abuse the logic of an application.
Insecure Deserialization
Insecure Direct Object Reference (IDOR)
Security flaw allowing attackers to bypass authorization and access resources directly by modifying the value of a parameter.
Insecure Direct Object Reference (IDOR)
Instance
Single copy of a running computer program, often referring to a virtual server in cloud computing.
Instance
Insufficient Logging & Monitoring
Security weakness where systems lack adequate logging and real-time monitoring, hindering threat detection and forensics.
Insufficient Logging & Monitoring
Integration Testing
Phase in software testing where individual modules are combined and tested as a group.
Integration Testing
Intelligent Automation
Use of AI and machine learning to automate complex business processes and decisions.
Intelligent Automation
Interactive Application Security Testing (IAST)
Security testing tool that combines static and dynamic testing methods to detect vulnerabilities in running applications.
Interactive Application Security Testing (IAST)
Internal Developer Platform (IDP)
Set of tools and practices that improve developer experience and productivity within an organization.
Internal Developer Platform (IDP)
Internal Threat Intelligence
Process of gathering, analyzing, and disseminating information about potential internal security threats.
Internal Threat Intelligence
Inventory Hoarding
Excessive accumulation of IT resources, often in cloud environments, leading to waste and inefficiency.
Inventory Hoarding
Ionic
Open-source SDK for developing hybrid mobile applications using web technologies.
Ionic
Previous
Next