Search

Blog posts

Octopus Deploy is now a CVE Numbering Authority (CNA)

Octopus Deploy is now a CVE Numbering Authority (CNA). We can assign CVE IDs to vulnerabilities within our scope, so customers can confirm their installations are secure.

Outage on octopus.com - report and learnings

Public incident report and our learnings about the octopus.com DNS disruption from January 25 – 26, 2023.

Introducing Octopus security advisories

Updating the way we keep our customers informed about product security

Octopus January Release 2018.1

What's new in Octopus 2018.1

Octopus Deploy's response to Log4j

Learn how Octopus Deploy responded to the Log4j vulnerability (CVE-2021-44228).

Octopus Deploy's response to the OpenSSL vulnerability

Important information regarding CVE-2022-3786 for Octopus Deploy.

Introducing long-term Support for Octopus Server

In Q4 2018 we will be shipping our first release of Octopus Server with long-term support.

Introducing our first release with long-term support - Octopus Server 2018.10 LTS

Octopus Server 2018.10 LTS is the first release with six months of long-term support. We recommend this release for most self-hosted customers.

Implementing DevSecOps to respond to vulnerabilities

As part of our series about Runbooks, learn how to configure your CI/CD pipeline to quickly identify and respond to vulnerabilities.

Smoke testing your infrastructure with runbooks

Learn how to use runbooks to perform high level smoke tests against your applications and infrastructure.

Configuring Jenkins in Azure and deploying with Octopus

Learn how to configure a Jenkins instance in Azure and deploy with Octopus.

Managing AWS costs with Instance Scheduler

Learn how to deploy and configure the Instance Scheduler to shutdown unused AWS resources.

At the helm with Bob Walker

A series where we chat to people at Octopus about their role, what they’re working on to improve the product, and more. Hear from Bob Walker, our Technical Director of Customer Success.

Creating AMI mappings for CloudFormation

As part of our Runbooks series, learn how to create region AMI mappings for use with CloudFormation templates.

Calculating DORA metrics with Runbooks

Learn how to measure the performance of your deployments using the DORA metrics and a custom runbook.

Mixing Keys in Tomcat

Learn how to configure Tomcat to support both RSA and ECDSA certificates on a single HTTPS port.

Generating instance types lists for CloudFormation

As part of our series on Runbooks, learn how to generate a list of available instance types to include in CloudFormation templates.

Creating an EC2 Octopus Worker with CloudFormation

Learn how to deploy an EC2 configured as an Octopus Worker via a CloudFormation template.

Octopus December Release 4.1

This month's release of Octopus expands support for Java with Maven feeds and certificate deployments to WildFly and Tomcat.
Loading...

Documentation

Spectre (Speculative Execution Side-Channel Vulnerabilities), Meltdown, and Octopus Deploy

How the Spectre (speculative execution side-channel vulnerabilities) and meltdown vulnerabilities impact Octopus Deploy

Common security vulnerabilities and exploits

This section describes how Octopus Deploy prevents attackers from leveraging common vulnerabilities and exploits.

SHA1 "Shattered" collision and Octopus Deploy

How the SHA1 "Shattered" Collision impacts Octopus Deploy

Cross-Site Scripting (XSS) and Octopus Deploy

Octopus Server actively prevents Cross-Site Scripting (XSS) using a number of preventative measures.

ZipBombs and Octopus Deploy

Octopus Server actively prevents ZipBomb-based denial-of-service attacks using a number of preventative measures.

Security

Security considerations for Octopus Administrators.

Cross-Site Request Forgery (CSRF) and Octopus Deploy

Octopus Server actively prevents Cross-Site Request Forgery (CSRF) using anti-forgery tokens.

Troubleshooting authentication problems

A guide for troubleshooting authentication problems in Octopus Deploy.

Hardening Windows

With Octopus Deploy you can harden your Windows machines with a runbook as part of a routine operations task.

Amazon S3 Create Bucket

Create a new bucket in Amazon S3.

Register SSH target

An example script to register an SSH target using the REST API.

Can't find what you are looking for? You can also search our support forum.