Link to home
Join the waitlist
DevOps Glossary
From agile to automation to analytics, unpack the toolbox of modern
DevOps terminology.
SIEM
Security Information and Event Management; provides real-time analysis of security alerts.
SIEM
SIEM Environment
Infrastructure and configuration supporting a Security Information and Event Management system for comprehensive security monitoring.
SIEM Environment
SIEM Solutions
Software products providing security information and event management capabilities.
SIEM Solutions
SIEM Tools
Software used for collecting, analyzing, and reporting on log data for security purposes.
SIEM Tools
SIEM-log
Log data specifically collected, analyzed, and managed within a Security Information and Event Management system for security monitoring.
SIEM-log
SLA (Service Level Agreement)
Contract between a service provider and customer defining expected service levels.
SLA (Service Level Agreement)
SOAR
Security Orchestration, Automation and Response; platforms that enable organizations to collect security data and perform security operations.
SOAR
SOC
Security Operations Center; centralized unit dealing with security issues on an organizational and technical level.
SOC
SQL Injection
Code injection technique used to attack data-driven applications by inserting malicious SQL statements into application queries.
SQL Injection
SQLi
Abbreviation for SQL Injection, a code injection technique used to attack data-driven applications by inserting malicious SQL statements.
SQLi
SSL Certificate
Digital document that authenticates a website's identity and enables encrypted connections between servers and browsers, ensuring secure data transmission.
SSL Certificate
SSL Certificate Chain
Series of certificates needed to verify the authenticity of a website's SSL certificate.
SSL Certificate Chain
SSL Certificate Expiry
Date when an SSL certificate is no longer valid and needs to be renewed to maintain secure connections.
SSL Certificate Expiry
SSL/TLS Handshake
Process by which a client and server establish a secure encrypted connection, crucial for secure data transmission over the internet.
SSL/TLS Handshake
SaltStack
Python-based, open-source configuration management software and remote execution engine.
SaltStack
Sanity Testing
Subset of regression testing to verify that code changes don't impact critical functionalities.
Sanity Testing
Scalability
Ability of a system, network, or process to handle a growing amount of work or its potential to be enlarged.
Scalability
Scaled Agile Framework (SAFe)
Set of organization and workflow patterns for implementing agile practices at enterprise scale.
Scaled Agile Framework (SAFe)
Schatten-IT
German term for "Shadow IT"; IT systems deployed outside of the organization's formal IT department.
Schatten-IT
Scrubbing Center
Facility used to filter malicious traffic from a network, often used in DDoS mitigation.
Scrubbing Center
Scrum
Agile framework for project management emphasizing iterative progress, team collaboration, and flexibility.
Scrum
SecOps
Practice of integrating security processes with IT operations, aiming to reduce vulnerabilities and improve overall system security.
SecOps
Secure SDLC
Software Development Life Cycle that integrates security at every stage of the development process.
Secure SDLC
Security Analytics
Use of data collection, aggregation, and analysis tools for security monitoring and threat detection.
Security Analytics
Security Champions
Individuals within development teams who act as the first point of contact for security-related matters.
Security Champions
Previous
Next