Software Audit Glossary

Clear definitions of key terms in software auditing, security, infrastructure, and technology management. A reference guide for CEOs, CIOs, CTOs, and investors who need to understand the real state of their technology.

Technical Debt

Technical debt is the accumulated cost of shortcuts, suboptimal decisions, and deferred maintenance in software development. Like financial debt, it generates interest: the longer it is ignored, the more expensive it becomes to fix. It shows up as duplicated code, fragile architecture, outdated dependencies, and a lack of automated tests.

Business impact

Every week that technical debt is not addressed exponentially increases the cost of any future change. Companies with high technical debt dedicate up to 70% of their IT budget to maintenance instead of innovation.

Related service:Source Code Audit

Technology Due Diligence

Technology due diligence is the process of thoroughly evaluating a company's technology assets before an investment, acquisition, or merger (M&A). It includes analysis of the source code, architecture, infrastructure, security, scalability, and technical team to determine the real value and risks of the technology asset.

Business impact

Without technology due diligence, investors can overvalue assets with obsolete code, critical vulnerabilities, or non-scalable architectures. The average cost of an undetected security breach exceeds 4 million euros.

Legacy Software

Legacy software (or a legacy system) is an application or IT system that is still in use but was built with obsolete technologies, frameworks, or design patterns. It often lacks up-to-date documentation and automated tests, and may depend on software versions that are no longer supported by the vendor.

Business impact

Maintaining legacy software is typically between 3 and 10 times more expensive than maintaining modern software. It also limits the company's ability to integrate new technologies, hire talent, and respond to market changes.

Related service:Modernization Assessment

Code Review

A code review is the systematic process of examining source code written by other developers to identify errors, security vulnerabilities, performance issues, and deviations from best practices. It can be performed manually by experts or through automated, AI-powered tools.

Business impact

Companies that implement systematic code reviews reduce production defects by between 60% and 90%, lowering correction costs and improving customer trust.

Related service:Source Code Audit

Software Vulnerability

A software vulnerability is a weakness in the code, configuration, or architecture of a system that can be exploited by attackers to gain unauthorized access, steal data, disrupt services, or compromise the integrity of the system. Vulnerabilities are classified by their severity (critical, high, medium, low) and their attack vector.

Business impact

The average time to detect a security breach is 287 days. The average cost of a data breach reaches 4.45 million euros according to IBM Security. Early detection through auditing reduces these costs by more than 50%.

Related service:Risk Audit

Scalability

Scalability is the ability of a software system or infrastructure to handle a growing volume of work, users, or data without degrading performance. We distinguish between horizontal scalability (adding more servers) and vertical scalability (increasing the resources of an existing server). A scalable architecture is essential for growing companies.

Business impact

A system that does not scale directly limits business growth. When a demand spike exceeds the system's capacity, service outages occur, generating loss of revenue and reputation.

Related service:Infrastructure Audit

Refactoring

Refactoring is the process of restructuring existing code without changing its external behavior. Its goal is to improve the readability, maintainability, performance, and security of the code, reducing complexity and eliminating duplication. It is an essential practice to keep technical debt under control.

Business impact

Regular refactoring reduces the cost of future development by up to 40% and significantly lowers the error rate in production.

Related service:Source Code Audit

CI/CD (Continuous Integration and Continuous Deployment)

CI/CD (Continuous Integration / Continuous Deployment) is a set of software engineering practices that automate the build, testing, and deployment of code. Continuous integration merges changes frequently, while continuous deployment automates the release to production. Together, they enable faster software delivery with fewer errors.

Business impact

Teams with mature CI/CD deploy code up to 200 times more frequently than those without it, with a failure rate 3 times lower and a recovery time 24 times faster.

Related service:Project Assessment

Microservices Architecture

Microservices architecture is a software design pattern where an application is built as a set of small, independent, separately deployable services. Each microservice handles a specific business function and communicates with the others through APIs. It is the modern alternative to monolithic architectures.

Business impact

Microservices allow large teams to work independently, scale specific components, and deploy updates without affecting the rest of the system. However, they introduce operational complexity that requires mature infrastructure and teams.

Related service:Infrastructure Audit

SLA (Service Level Agreement)

An SLA (Service Level Agreement) is a contract between a service provider and its customer that defines the minimum service quality levels: availability (uptime), response time, incident resolution time, and penalties for non-compliance. It is essential in cloud services, hosting, and outsourced software development.

Business impact

Poorly defined or unmonitored SLAs generate misaligned expectations and contractual conflicts. A 99.9% vs 99.99% uptime can mean the difference between 8 hours and 52 minutes of downtime per year.

Related service:Infrastructure Audit

GDPR (General Data Protection Regulation)

The GDPR (General Data Protection Regulation) is the European regulation on the protection of personal data, which establishes strict obligations on how companies collect, store, process, and share data of EU citizens. It includes requirements for consent, the right to be forgotten, data portability, and breach notification.

Business impact

Fines for GDPR non-compliance can reach 20 million euros or 4% of annual global revenue. Beyond fines, the reputational damage from a data breach can be irreversible.

Related service:Risk Audit

Technology Roadmap

A technology roadmap is a strategic plan that defines the evolution of a company's technology over the medium and long term (typically 1-5 years). It includes the prioritization of initiatives, key milestones, dependencies, resource estimation, and alignment with business objectives. A good roadmap balances the resolution of technical debt with innovation.

Business impact

Companies without a technology roadmap make reactive decisions that multiply costs and create architectural inconsistencies. A clear roadmap makes it possible to justify investments, align teams, and anticipate hiring needs.

Related service:Benchmarking and Roadmap

Automated Testing

Automated tests are code scripts that automatically verify that software is working correctly. They include unit tests (individual components), integration tests (interaction between components), end-to-end tests (complete flows), and performance tests. They are essential to maintain software quality as it grows.

Business impact

Projects without automated testing suffer up to 10 times more production defects. The cost of fixing a bug in production is between 30 and 100 times higher than detecting it during development.

Related service:Project Assessment

API (Application Programming Interface)

An API (Application Programming Interface) is a set of rules and specifications that allows different software systems to communicate with each other. Modern APIs (REST, GraphQL) make it possible to integrate external services, connect mobile applications with back ends, and build scalable technology ecosystems.

Business impact

Poorly designed or insecure APIs are one of the most common attack vectors. A well-designed API enables quick integrations with partners and third-party services, accelerating time-to-market.

Related service:Source Code Audit

Observability

Observability is the ability to understand the internal state of a software system from its external signals: logs (records), metrics (numbers), and traces (the path of a request). An observable system makes it possible to diagnose problems quickly, identify bottlenecks, and anticipate failures before they affect users.

Business impact

Companies with high observability resolve incidents up to 10 times faster. A lack of observability turns every problem into a costly investigation that paralyzes teams.

Related service:Infrastructure Audit

Do you have doubts about the state of your technology?

In 30 minutes, our team explains exactly what state your software is in and what steps to take next. No cost and no commitment.

Request a Free Diagnosis