DevOps Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

Cloud Infrastructure Security

Measures and controls to protect data, applications, and infrastructure associated with cloud computing.

Cloud Management

Control and oversight of cloud computing resources, often through automated tools.

Cloud Migration

Process of moving data, applications, or other business elements from an on-premises environment to the cloud.

Cloud Native Computing Foundation (CNCF)

Organization promoting cloud native technologies and practices to shape the evolution of cloud computing.

Cloud Native DevOps

Practices combining cloud native technologies with DevOps principles for faster, more flexible software delivery.

Cloud Orchestration

Arrangement and coordination of automated tasks resulting in a consolidated process or workflow.

Cloud Security Alliance (CSA)

Organization that defines best practices to help ensure a secure cloud computing environment.

Cloud Security Monitoring

Continuous monitoring of cloud-based assets and services to detect security threats and vulnerabilities.

Cloud Security Posture Management

Continuous monitoring of cloud infrastructure to identify misconfigurations and compliance risks.

Cloud-native

Designed to take full advantage of cloud computing frameworks, beyond simple rehosting in the cloud.

Cloud-native Security

Security practices and tools designed specifically for cloud-native applications and infrastructure.

CloudWatch

Amazon Web Services' monitoring and observability service for cloud resources and applications.

Code All Your Resources

Practice of managing all aspects of infrastructure and operations through code, enabling version control and automation.

Code Dependencies

External libraries, modules, or packages that a software project relies on to function properly.

Code Injection

Security vulnerability where an attacker inserts malicious code into a vulnerable application.

Code Promotion

Process of moving code through various stages of development, testing, and deployment.

Code Signing

Process of digitally signing executables and scripts to confirm the software author and guarantee it hasn't been altered.

Code-first Workflow

Development approach where code is written before database schemas or other structures are defined.

Coding Standards

Set of guidelines for programming style and practices within a project or organization.

Cognitive Load

Mental effort required to learn new information or complete tasks, important in user experience design and learning theory.

Collectd

System statistics collection daemon that collects, transfers, and stores performance data of computers and network equipment.

Common Vulnerabilities and Exposures (CVE)

List of publicly disclosed cybersecurity vulnerabilities, providing a standardized identifier for known issues.

Common Weakness Enumeration (CWE)

Comprehensive list of common software and hardware weakness types, serving as a common language for describing security vulnerabilities.

Complex-Adaptive System (CAS)

System of interconnected components that can adapt and self-organize in response to changes.

Complex-Adaptive Systems

Systems of interconnected components that can adapt and evolve in response to changes in their environment.