<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Survey Finds 5 DevOps Technologies That Are Hard to Manage

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.

Can you relate? Then read on to learn about five hard-to-manage systems in the DevOps technology stack, plus a frictionless access solution to rule them all.

DevOps Technologies That Are Hard to Manage

Our recent survey of DevOps and security professionals found the following technologies to be the most difficult to manage in terms of access (time, cost, complexity).

Tech stacks are always expanding and evolving, and distributed teams that require remote access to infrastructure are becoming the norm. The result? Access management has grown complex and frustrating. And this problem will only increase with time.

Access Challenges are Cumulative

The access challenges that come from adding resources are cumulative. The best tools for the job rarely speak the same language in terms of access and auditing. And they almost never speak the language of people.

Imagine if every time you wanted a grilled cheese you had to enter a secret code on the fridge, use a key to unlock the knife drawer, and say an incantation to turn on the stove. You might be tempted to prop doors and cabinets open to avoid the hassle or just give up on lunch altogether. 

And even if the system is working for you now, eventually you’ll want to upgrade. The knife will need sharpening. The stove will require a change to the latest model (inevitably by a different manufacturer). 

Of course, the improvements are worth it;  better equipment leads to better grilled cheese. Similarly, upgrading your DevOps technology stack increases flexibility for developers. But it also adds complexity that may interfere with productivity if not done right.

The Paradox of Kubernetes Access

Software development thrives on innovation. New DevOps tools are always emerging, and with them come new access challenges.

Consider the paradox of Kubernetes. The container orchestration system is famously complicated, yet only 32% of survey respondents named Kubernetes as an access challenge for their organization.

The explanation stems from the fact that many companies are just beginning to roll the technology out. K8s adoption is on the rise, and we expect more people will report it as a major access challenge in the near future.

Kubernetes is just one example of many. Whatever new technology is on your horizon, you need an access management strategy that can keep pace. That’s why we built StrongDM to seamlessly and securely integrate with every database, environment, protocol, and tool your team needs.

Want to future-proof access for your tech stack? Check out the full report, 2022: The Year of Access. Then schedule a free demo of StrongDM to see how you can upgrade your access management today.

About the Author

, Contributing Writer and Illustrator, has a passion for helping people bring their ideas to life through web and book illustration, writing, and animation. In recent years, her work has focused on researching the context and differentiation of technical products and relaying that understanding through appealing and vibrant language and images. She holds a B.A. in Philosophy from the University of California, Berkeley. To contact Maile, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

CI/CD Security and CI/CD Pipeline Explained
CI/CD Security Explained: Securing CI/CD Pipeline with Access Automation
A continuous integration, continuous delivery pipeline—or CI/CD pipeline—is a process workflow companies use to streamline and automate software development. A CI/CD pipeline automatically builds and tests code changes to detect bugs before the new code is merged and deployed.
Top Cloud Security Issues and Risks to Know
Top Cloud Security Issues and Risks to Be Aware of in 2023
In this article, we look at the top risks and security issues in cloud computing. You'll learn about specific cloud security threats and cloud storage security issues, as well as strategies for managing cloud security effectively. By the end of this article, readers will fully understand the top security issues related to using cloud-based file management tools and services.
SSH into Docker Containers
SSH into Docker Containers [A Step-by-Step Guide]
In this article, we’ll cover a way to run console commands in Docker containers that will allow you to mimic the process of using SSH for the same purpose (and if you really need to, a way to gain true SSH access as well).
30+ DevSecOps Statistics You Should Know
30+ DevSecOps Statistics You Should Know in 2023
In this article, we look at some important DevSecOps statistics that should help you understand any pros and cons of this practice, help you differentiate DevSecOps and DevOps, and give you a better understanding of why DevSecOps is becoming the more popular option.
What is DevOps Security?
What is DevOps Security? Challenges and Best Practices
What are the biggest security challenges facing DevOps, and how can practitioners overcome them? In this article, Good e-Learning and strongDM examine how DevOps engineers can work to guarantee security across their cultures.