Deploy fixes for a security vulnerability
When responding to a security incident, you should review any code changes in private before deploying them, so that you don’t accidentally disclose the vulnerability.
To do this, push branches to the AWS CodeCommit backup of the repository, rather than the normal repository on GitHub.
This repository should be up to date as of the previous release, but will be missing any unreleased commits that are on GitHub master. This is fine as you don’t want to deploy these.
Ensure nobody else deploys the app until you’ve confirmed the vulnerability is fixed.
Review the pull request on AWS CodeCommit.
Create a release tag manually in git. This should follow the standard format
release_X. Tag the branch directly instead of merging it.
Don’t use the release app. Go directly to the
Deploy_AppJenkins job, and check
Ensure the vulnerability is fixed.
Push the branch and tag to GitHub.
Merge the branch into master.
Record the missing deployment in the Release app.
More about Deployment
- Block apps from being deployed
- Deploy an application to GOV.UK
- Deploy AWS infrastructure with Terraform
- Deploy Puppet
- Deploy when GitHub is unavailable
- Fall back to the static mirrors
- Handle encrypted hieradata
- Monitor your app during deployment
- Restart an application
- Run a rake task
- Set up Heroku review apps for pull requests
- Switch an app off temporarily