<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon

Survey Finds 5 DevOps Technologies That Are Hard to Manage

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.

Can you relate? Then read on to learn about five hard-to-manage systems in the DevOps technology stack, plus a frustration-free access solution to rule them all.

DevOps Technologies That Are Hard to Manage

Our recent survey of DevOps and security professionals found the following technologies to be the most difficult to manage in terms of access (time, cost, complexity).

Tech stacks are always expanding and evolving, and distributed teams that require remote access to infrastructure are becoming the norm. The result? Access management has grown complex and frustrating. And this problem will only increase with time.

Access Challenges are Cumulative

The access challenges that come from adding resources are cumulative. The best tools for the job rarely speak the same language in terms of access and auditing. And they almost never speak the language of people.

Imagine if every time you wanted a grilled cheese you had to enter a secret code on the fridge, use a key to unlock the knife drawer, and say an incantation to turn on the stove. You might be tempted to prop doors and cabinets open to avoid the hassle or just give up on lunch altogether. 

And even if the system is working for you now, eventually you’ll want to upgrade. The knife will need sharpening. The stove will require a change to the latest model (inevitably by a different manufacturer). 

Of course, the improvements are worth it;  better equipment leads to better grilled cheese. Similarly, upgrading your DevOps technology stack increases flexibility for developers. But it also adds complexity that may interfere with productivity if not done right.

The Paradox of Kubernetes Access

Software development thrives on innovation. New DevOps tools are always emerging, and with them come new access challenges.

Consider the paradox of Kubernetes. The container orchestration system is famously complicated, yet only 32% of survey respondents named Kubernetes as an access challenge for their organization.

The explanation stems from the fact that many companies are just beginning to roll the technology out. K8s adoption is on the rise, and we expect more people will report it as a major access challenge in the near future.

Kubernetes is just one example of many. Whatever new technology is on your horizon, you need an access management strategy that can keep pace. That’s why we built StrongDM to seamlessly and securely integrate with every database, environment, protocol, and tool your team needs.


Want to future-proof access for your tech stack? Check out the full report, 2022: The Year of Access. Then schedule a free demo of StrongDM to see how you can upgrade your access management today.


About the Author

, Contributing Writer and Illustrator, has a passion for helping people bring their ideas to life through web and book illustration, writing, and animation. In recent years, her work has focused on researching the context and differentiation of technical products and relaying that understanding through appealing and vibrant language and images. She holds a B.A. in Philosophy from the University of California, Berkeley. To contact Maile, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

How to List Users in Linux (9 Methods with Examples)
How to List Users in Linux (9 Methods with Examples)
Need to keep tabs on who has access to your organization’s Linux system? This guide explores nine methods, with examples, that can help you quickly list users.
SCP Command in Linux: 10 Essential Examples
SCP Command in Linux: 10 Essential Examples
Discover 10 ways to leverage the SCP command in Linux. Learn how to incorporate options for specific file transfers and how to deal with common errors.
How To Use SSH to Connect to a Remote Server (Windows, Linux & Mac)
How To Use SSH to Connect to a Remote Server (Windows, Linux & Mac)
Secure Shell (SSH) is one of the most effective ways to access and manage remote systems. This technology encrypts communications between the client and the server, enhancing system security and preventing unauthorized access. Another important benefit of SSH is its simplicity. This technology is relatively easy to use with various tools and clients, as we will demonstrate below. Plus, you can also use SSH for file transfers, running commands, and even tunneling. This guide explains how to use SSH to connect to remote servers across Windows, Linux, and MacOS environments.
How to Create Users in Linux with useradd (Step-by-Step)
How to Create Users in Linux with useradd (Step-by-Step)
Setting permissions, revoking access, and performing other user management duties in Linux can improve your system's security and organization, ensuring users can access the resources they need when they need to. The useradd command lets you create, modify, and check user accounts, helping you handle multi-user environments across various Linux distributions.
How to Change Password in Linux: A Step-by-Step Guide
How to Change User or Root Password in Linux (Command Guide)
Explore our in-depth guide on how to change and edit passwords in Linux using various commands and tools. Also, learn some advanced Linux password management techniques.