Defining a deployment process ensures that there are established criteria in terms of functionalities, security, compliance, and performance, and that the artifacts meet them.
Risk: Deployment of insecure or malfunctioning artifacts.
A documented inventory of components in production exists (gathered manually or automatically). For example a manually created document with applications in production. In a kubernetes cluster, namespaces can be automatically gathered and documented, e.g. in a JSON in a S3 bucket/git repository, dependency track.
Risk: An organization is unaware of components like applications in production. Not knowing existing applications in production leads to not assessing it.
A clear decommissioning process ensures the removal of unused applications from the `Inventory of production components` and if implemented from `Inventory of production artifacts`.
Risk: Unused applications are not maintained and may contain vulnerabilities. Once exploited they can be used to attack other applications or to perform lateral movements within the organization.
Set configuration parameters via environment variables stored using specific platform functionalities or secrets management systems (e.g. Kubernetes secrets or Hashicorp Vault).
Risk: Unauthorized access to secrets stored in source code or in artifacts (e.g. container images) through process listing (e.g. ps -ef).
A documented inventory of artifacts in production like container images exists (gathered manually or automatically).
Risk: In case a vulnerability of severity high or critical exists, it needs to be known where an artifacts (e.g. container image) with that vulnerability is deployed.
Encryption ensures confidentiality of credentials e.g. from unauthorized access on the file system. Also, the usage of a credential management system can help protect credentials.
Risk: Parameters are often used to set credentials, for example by starting containers or applications; these parameters can often be seen by any one listing running processes on the target system.
A documented inventory of dependencies used in artifacts like container images and containers exists.
Risk: Delayed identification of components and their vulnerabilities in production. In case a vulnerability is known by the organization, it needs to be known where an artifacts with that vulnerability is deployed with which dependencies.
A deployment without downtime is performed*.
Risk: While a deployment is performed, the application can not be reached.
Building an artifact once and deploying it to different environments means that only tested artifacts are allowed to reach the production environment.
Risk: Building of an artifact for different environments means that an untested artifact might reach the production environment.
Usage of environment independent configuration parameter, called static feature toggles, mitigates the risk of accidentally enabling insecure features in production.
Risk: Using environment variables to enable or disable features can lead to a situation where a feature is accidentally enabled in the production environment.
Using a blue/green deployment strategy increases application availability and reduces deployment risk by simplifying the rollback process if a deployment fails.
Risk: A new artifact's version can have unknown defects.