@@ -38,6 +38,70 @@ Build and Deployment:
3838 isImplemented : false
3939 evidence : " "
4040 comments : " "
41+ Canary deployment :
42+ uuid : c4204a32-2545-4424-b524-d1cc52b46abd
43+ description : |-
44+ A *canary deployment* gradually shifts a small fraction of production
45+ traffic to a new artifact version while monitoring service-level
46+ indicators and security signals. If error rates, latency, or security
47+ scanners (such as DAST probes against the canary fleet) report
48+ anomalies, traffic is rolled back automatically before the new
49+ version reaches the broader production population.
50+
51+ Compared to *Blue/Green Deployment*, canary requires only a small
52+ delta in infrastructure cost (commonly 5-10% additional capacity
53+ rather than a doubled environment) but demands more sophisticated
54+ traffic-control infrastructure such as a service mesh, an
55+ application load balancer with weighted routing, or a feature-flag
56+ platform.
57+ risk : |-
58+ A new artifact version can introduce regressions or security
59+ issues. Promoting it to 100% of production traffic in one step
60+ exposes the entire user population to those issues before they
61+ can be detected.
62+ measure : |-
63+ Adopt a canary deployment strategy in which a small percentage of
64+ production traffic (commonly 1-10%) is routed to the new artifact
65+ version for a defined observation window. Promotion to higher
66+ traffic percentages is gated on automated SLI checks (error rate,
67+ latency, saturation) and security checks (DAST, runtime anomaly
68+ detection). Rollback must be automated and triggered by gate
69+ failure without human intervention.
70+ assessment : |
71+ - Canary stage exists in the deployment pipeline with a configured
72+ initial traffic percentage and observation window.
73+ - Automated promotion and rollback gates are defined based on SLIs
74+ and security signals.
75+ - Audit logs of canary deployments and their promotion or rollback
76+ decisions are retained.
77+ difficultyOfImplementation :
78+ knowledge : 3
79+ time : 2
80+ resources : 2
81+ usefulness : 3
82+ level : 4
83+ implementation :
84+ - $ref : src/assets/YAML/default/implementations.yaml#/implementations/canary-deployment
85+ dependsOn :
86+ - 67e1a9aa-9fbf-4ec5-a2de-400f01960c51 # Automated deployment process
87+ references :
88+ samm2 :
89+ - I-SD-A-3
90+ iso27001-2017 :
91+ - 12.1.2 # Change management
92+ - 12.5.1 # Installation of software on operational systems
93+ - 14.2.2 # System change control procedures
94+ - 14.2.9 # System acceptance testing
95+ - 17.2.1 # Availability of information processing facilities
96+ iso27001-2022 :
97+ - 8.14
98+ - 8.19
99+ - 8.29
100+ - 8.31
101+ - 8.32
102+ isImplemented : false
103+ evidence : " "
104+ comments : " "
41105 Defined decommissioning process :
42106 uuid : da4ff665-dcb9-4e93-9d20-48cdedc50fc2
43107 description : |-
0 commit comments