Our Manifesto

One of the primary goals of CloudTruth is to allow you to decouple the management of your configuration from its consumption.

Enhance your developer experience by automatically generating perfect, consistent configurations for every deployment.

Today's Cloud Needs Centralized Configuration Management

The rise of microservices, Kubernetes, GitOps, and serverless means configuration is becoming distributed, decentralized, and “pushed to the edge.” It's time to simplify and organize your config data to meet security, reliability, and velocity goals.

Executive Summary

  • Cloud and application configuration is becoming a shared responsibility between DevOps and engineers. This increases speed and innovation.

  • The unfortunate downside is increased configuration complexity, pressures on customization, and organizational and process misalignment.

  • Three approaches to ameliorate this complexity are reviewing existing configuration integrations, cross-team training and awareness, and new solutions to improve visibility across the newly distributed and decentralized world of cloud configuration.

  • A centralized platform gives you a configuration control management plan and helps avoid misconfigurations in application deployment.

What We'll Cover

Containers, Kubernetes, serverless, and infrastructure as code (IaC) techniques are changing how modern cloud systems are configured. Applications and their components are becoming self-contained, with substantial infrastructure configuration embedded inside their source repositories. In addition, system configuration is becoming decentralized and distributed, which substantially increases the difficulty of managing the cross-cutting concerns of security, compliance, and reliability. And when these self-contained components become inconsistent across time – from development to testing to staging to production – the complexity increases.


CloudTuth interviewed five hundred IT professionals across roles ranging from CTO, CIO, VP Eng, DevOps, CISO and SecOps to research.

Cloud Configuration Challenges

Keeping Up with Innovation

As millions of people adjust to working virtually, software-as-a-service (SaaS) applications and the public cloud infrastructure they rely on have expanded overnight to keep up with increased online activity. As a result, application developers are under even more pressure to bring new multi-cloud applications and advanced versions of existing ones to market quickly.

However, application development tools are also advancing quickly. Applications and components are becoming self-contained, with substantial infrastructure configuration embedded inside their source repositories. As a result, there is a more distributed and decentralized definition of the system configuration, which substantially increases the difficulty of managing the cross-cutting concerns of the organization like security, compliance, and reliability. When these self-contained components are inconsistent across time – from development to testing to staging to production – the challenge increases.

The resulting complexity has been an underlying cause of unexpected downtime and security breaches. These days, any organization with a SaaS offering that engages customers via the cloud can recall an incident or close call where the security of their software was made vulnerable or the application experienced unexpected downtime.

This comes at great cost to any business. A 2020 Divvy Cloud study of publicly reported breaches estimated that 21.2 billion records were exposed in 2019 at the cost of $3.18 trillion. As for downtime, we learned last summer that one to five minutes of downtime cost Google upwards of $500,000 (never mind the cost to those who depend on Google), and an hour of downtime cost Amazon nearly $5 million.


of enterprises are moving towards hybrid adoption.


of enterprises are adopting a multicloud strategy.


of network outages and performance issues result from misconfiguration.

Advances in Cloud Tech – Greater Speed but Added Complexity

In short, today’s application developers benefit from an expanding tools ecosystem that enables faster time to market for new features. However, these new conveniences increase the complexity of managing configurations in development, test, staging, and production environments. The impact of this can be seen in three major areas:

Operating in a Fog of Accumulating, Interconnected Cloud Systems

The cloud world includes micro services, third-party systems, server-less computing, and a service mesh to connect it all together. The surface area is huge, and the amount of configuration and security information required to stitch it all together creates an unsustainable cognitive load for your team. Worse, each of these new wonderful services often comes with it’s own bespoke configuration approach, and it’s own management tooling. Now more than ever a configuration control plan to begin cutting through the fog. We don’t live exclusively in the “data center model” anymore: where systems admins and in-house devs built everything for their company. In the “old days”, you had to rely on custom built tooling, and your team had to know how everything worked. Take, for example, Auth0, a SaaS tool that helps companies manage user identity and access controls without needing to build that capability internally. Services like this speed up development time for companies where authenticating users is necessary but not central enough to the business to justify building equivalent functionality in-house. But here’s the catch: services like Auth0 offer a whole host of different configuration settings and customization options in order to address needs across a wide range of different customer applications. To make the most effective use of these tools, those settings need to be managed appropriately. Compared to an in-house solution that is designed and managed for a single specific use case, this adds more complexity. Unchecked, this can slow you down when you think it will speed you up, and really hurt your repair efforts when something goes wrong. The average cloud technology stack subscribes to at least six third-party services, such as Auth0. Multiply that times an increasing number of similar tools in the company’s tech stack, and not only does each of those systems require its own configuration, but the configuration of each system impacts the configurations of other systems. This creates a network effect of exponential complexity. The danger? Any “shared team awareness” across these varied and inter-dependent configurations either dissolves as the development team grows and specializes, or worse, disappears entirely with team change and turnover.Security

Steps to Build Team Visibility + Coordination Around a Single Record of Truth

Of course, wherever possible, cloud customers should decouple systems that have become unnecessarily entangled over time. If component tools can work in isolation, there is less risk of a domino effect of taking down the entire system when a single piece has an issue. A cost-benefit analysis of integration for improved efficiency versus system isolation for minimized failure impact needs to be conducted holistically across the entire cloud ecosystem.

In addition, integrated systems require integrated teams, which is why cloud customers are hiring for diverse skill sets and restructuring teams to encourage cross-functional collaboration and communication. As organizations adapt to new tools and technologies, ensuring that employees at every level and function — from junior developers to middle management to senior leadership — must communicate openly and effectively.

But most importantly, a consolidated view of configurations across all cloud systems – a single record of truth – becomes the glue for teams that now work independently but need to benefit from the learnings of other teams. For simple systems, in-house management tools may be sufficient, but for most scaled-up, tech-savvy companies, a third-party configuration management solution is the missing piece to ensuring that critical systems are always updated and configured properly.

At CloudTruth, we are focused on delivering this single view of truth across the cloud via a SaaS configuration orchestration platform with a central configuration data hub that combines all the cloud ecosystem configuration settings and files in a way that:

  • makes configuration settings understandable to all parts of the organization responsible for application security and support

  • speeds up access control

  • builds confidence in the correct provisioning of new releases

  • makes troubleshooting a matter of minutes rather than hours

  • facilitates audit and compliance

Over time, the analytics and machine learning layer on top of the central configuration database will reveal system tuning best practices (not just individual system settings), automate the prevention of configuration errors, and orchestrate global configuration change implementations.

Consider these three steps to manage these highly customizable cloud ecosystems:

Evaluation and decoupling of unnecessary integrations

Hiring, training and awareness to support cross-team collaboration

Sharing a single consolidated view of configurations across the ecosystem


Today’s development teams should not feel like they must sacrifice innovation and speed for reliability and security. But efficient guardrails are needed to make this happen. While building visibility and coordination across many cloud tools is a big undertaking, CloudTruth is dedicated to this goal. We allow development teams to choose and customize best-of-breed tools while maintaining coordination, operations, and infrastructure leaders to focus on performance evolution rather than fire drills. We enable security professionals to look ahead to future risk prevention rather than catching existing threats in the making.

Last updated

Copyright© 2023 CloudTruth