Do you take care of your own Octopus? We do too! We still have our own Octopus Server, as a pet for deploying most of the things we build. Just like us, most of you probably have your own pet Octopus - but how safe and secure is your Octopus?
We recently shipped Octopus Cloud alpha where we learned, and re-learned, a bunch of lessons about making Octopus safe and secure. In this post, I'll show you how to give your Octopus a security check-up.
Don't want to take care of your own Octopus anymore? Perhaps you should sign up for Octopus Cloud today?
Want the full picture? Here is our in-depth guide to hardening Octopus.
Safely Exposing Your Octopus Server
For Octopus Server to do useful things, you need to expose it to your users, your infrastructure, and possibly external services. If you are exposing your Octopus Server to the public internet or 3rd parties, you should absolutely use HTTPS over SSL. With built-in support for Let's Encrypt, there is no excuse to expose your Octopus Server over HTTP in the clear.
Learn about safely exposing your Octopus Server.
Also, do you know Octopus works natively with Proxy Servers?
Safely Doing Work on Your Octopus Server
Your deployment process will normally deal with packages and execute scripts. Quite often those packages are pushed to a Tentacle or SSH deployment target, and your scripts will execute on those machines. However, many deployments don't need a Tentacle or SSH target - like deployments to cloud services or similar. In this case, it would be annoying if you had to set up a Tentacle or SSH target just to push a package to an API or run a script but you don't care where that script runs.
3.0 we introduced the concept of a worker which can deal with packages and execute scripts without the need to install and configure a Tentacle or SSH target. By default Octopus Server using the built-in worker runs under the same security context as the Octopus Server. This is very convenient when you are getting up and running, but it isn't necessarily the best way to keep running long-term.
We recommend every Octopus Server be configured to use the built-in worker as a different user, or use external workers.
Learn about workers.
Hardening Your Host Operating System
How secure is the host operating system for your Octopus Server? If you aren't sure, here are some tips!
Hardening Your Network
Do you allow unfettered network access in and out of your Octopus Server? Octopus actually uses a small number of well-defined network protocols. We also provide some tips which will prevent attackers from using your Octopus Server as a vector into your network.
Learn about hardening your network.
Are you running the latest version of Octopus Server? Generally speaking, the latest available version of Octopus Server will be the most secure. You should consider a strategy for keeping your Octopus Server updated. We follow a responsible disclosure policy so it is possible for you to be aware of any known issues which affect the security and integrity of your Octopus Server.
Octopus is built with security as a first-class concern - but you still have some work to do to keep your Octopus safe and secure. This blog post has a few hints and tips. If you want to give your Octopus a full checkup, use our in-depth guide to hardening Octopus.
If you don't want to take care of your own Octopus, perhaps you should sign up for Octopus Cloud today?
Octopus Deploy is used by thousands of developers across the globe, from small companies to large enterprises. Find out if it meets your deployment automation needs by taking advantage of our free 30-day trial. You can spin up an instance with just a few clicks!