<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Want to master Kubernetes access control? 🚀 Join our upcoming webinar!

Search
Close icon
Search bar icon

Survey Finds 5 DevOps Technologies That Are Hard to Manage

StrongDM manages and audits access to infrastructure.
  • Role-based, attribute-based, & just-in-time access to infrastructure
  • Connect any person or service to any infrastructure, anywhere
  • Logging like you've never seen

DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.

Can you relate? Then read on to learn about five hard-to-manage systems in the DevOps technology stack, plus a frustration-free access solution to rule them all.

DevOps Technologies That Are Hard to Manage

Our recent survey of DevOps and security professionals found the following technologies to be the most difficult to manage in terms of access (time, cost, complexity).

Tech stacks are always expanding and evolving, and distributed teams that require remote access to infrastructure are becoming the norm. The result? Access management has grown complex and frustrating. And this problem will only increase with time.

Access Challenges are Cumulative

The access challenges that come from adding resources are cumulative. The best tools for the job rarely speak the same language in terms of access and auditing. And they almost never speak the language of people.

Imagine if every time you wanted a grilled cheese you had to enter a secret code on the fridge, use a key to unlock the knife drawer, and say an incantation to turn on the stove. You might be tempted to prop doors and cabinets open to avoid the hassle or just give up on lunch altogether. 

And even if the system is working for you now, eventually you’ll want to upgrade. The knife will need sharpening. The stove will require a change to the latest model (inevitably by a different manufacturer). 

Of course, the improvements are worth it;  better equipment leads to better grilled cheese. Similarly, upgrading your DevOps technology stack increases flexibility for developers. But it also adds complexity that may interfere with productivity if not done right.

The Paradox of Kubernetes Access

Software development thrives on innovation. New DevOps tools are always emerging, and with them come new access challenges.

Consider the paradox of Kubernetes. The container orchestration system is famously complicated, yet only 32% of survey respondents named Kubernetes as an access challenge for their organization.

The explanation stems from the fact that many companies are just beginning to roll the technology out. K8s adoption is on the rise, and we expect more people will report it as a major access challenge in the near future.

Kubernetes is just one example of many. Whatever new technology is on your horizon, you need an access management strategy that can keep pace. That’s why we built StrongDM to seamlessly and securely integrate with every database, environment, protocol, and tool your team needs.


Want to future-proof access for your tech stack? Check out the full report, 2022: The Year of Access. Then schedule a free demo of StrongDM to see how you can upgrade your access management today.


About the Author

, Contributing Writer and Illustrator, has a passion for helping people bring their ideas to life through web and book illustration, writing, and animation. In recent years, her work has focused on researching the context and differentiation of technical products and relaying that understanding through appealing and vibrant language and images. She holds a B.A. in Philosophy from the University of California, Berkeley. To contact Maile, visit her on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

What Are Microservices in Kubernetes? Architecture, Example & More
What Are Microservices in Kubernetes? Architecture, Example & More
Microservices make applications more scalable and resilient, and Kubernetes is the backbone that keeps them running smoothly. By orchestrating containers, handling service discovery, and automating scaling, Kubernetes simplifies microservices management—but it also introduces complexity. This guide covers key principles, deployment strategies, and security best practices to help you navigate microservices in Kubernetes. Plus, see a modern way of simplifying access and security, so your teams can build faster—without compromising control. Let’s dive in.
How to Create a Cron Job in Linux: Set Up, Examples & More
How to Create a Cron Job in Linux: Set Up, Examples & More
Managing routine Linux tasks like backups and service restarts can be overwhelming. Cron jobs automate these processes, keeping your system running smoothly with minimal effort. This guide covers how to set up, use, and secure cron jobs for seamless automation.
Linux Privilege Escalation: Techniques, Prevention & More
Linux Privilege Escalation: Techniques, Prevention & More
Curious about how Linux privilege escalation attacks occur? Our in-depth article explores the top techniques and methods that attackers use and how you can prevent them.
What Is Kubernetes Observability? Best Practices, Tools & More
Kubernetes observability is the practice of monitoring and analyzing a Kubernetes environment through metrics, logs, and traces to gain visibility into system performance and health. It enables teams to detect and resolve issues proactively, optimize resource utilization, and maintain cluster reliability through real-time insights and automated monitoring tools.
What Is Kubernetes Ingress? Guide to K8s Traffic Management
What Is Kubernetes Ingress? Guide to K8s Traffic Management
This article breaks down Kubernetes Ingress, explaining how it manages external access to services, routing configurations, and best practices. You’ll learn how Ingress differs from Load Balancers, how controllers enforce routing rules, and how to choose the right setup for your needs.