Skip to content

Secure Deployments

[TBD]

Outcome

  • Infrastructure deployments are reproducible and automated
  • IaC is used for infrastructure provisioning
  • State files are stored securely and encrypted
  • Any secret or sensitive data is not hardcoded in deployment scripts or IaC files
  • OIDC or short-lived credentials are used for authentication in deployment pipelines
  • Deployment pipelines have least privilege access to resources they manage
  • Approval processes are in place for deployments to sensitive environments (e.g., production)
  • Deployment pipelines are monitored and logged for auditing purposes

Metrics

  • [TBD]

Tools & Resources

Further Reading