Hardened Deployment Workflow
When to Use This Skill
Copy-paste ready deployment workflow templates with comprehensive security hardening. Each example demonstrates OIDC authentication, environment protection, approval gates, zero-downtime deployments, and automated rollback patterns.
Complete Security Patterns
These workflows integrate all security patterns from the hub: OIDC federation (no stored secrets), environment protection with approval gates, SHA-pinned actions, minimal GITHUB_TOKEN permissions, deployment verification, and automated rollback. Use as production templates for secure deployments.
Implementation
See the full implementation guide in the source documentation.
Key Principles
Every deployment workflow in this guide implements these controls:
- OIDC Authentication: Secretless cloud authentication with short-lived tokens
- Environment Protection: Required reviewers and wait timers for production
- Minimal Permissions:
id-token: writefor OIDC,contents: readby default - Approval Gates: Human review before production deployment
- Deployment Verification: Health checks after deployment
- Rollback Automation: Automatic rollback on failure
- Audit Trail: Deployment tracking and change logs
Full Reference
See reference.md for complete documentation.