We have a lot of customers running Octopus Deploy in their PCI compliant environments. We don't claim to be experts in PCI compliance, especially since every situation is slightly different. What we can do is offer some recommendations primarily focused on your use of Octopus Deploy and different models you can achieve with it.
This free e-book is a good starting place when considering how deployment automation can work well in a highly regulated environment: DevOps for Finance - How DevOps will help you surpass the common challenges of financial services software development.
Try Not to Give Up Too Much Automation
Pessimistic approaches to PCI compliance controls will, at first glance, make it more difficult to automate certain activities. One of the main benefits to using Octopus Deploy is end-to-end automation and we recommend not giving that up without spending time to understand why the automation is considered "harmful". Quite often our customers find that leveraging end-to-end automation in Octopus Deploy makes implementing compliance controls and auditing easier. It's often a case of working with your auditor and their concerns on a case-by-case basis.
How Octopus Deploy Can Help with PCI Compliance
PCI Compliance is primarily concerned with implementing "controls" or "practices" which help ensure the safety and security of sensitive information, and the ability to audit that those practices are being enforced and followed. In many ways, full end-to-end automation helps with that since the interaction with your secure systems is tightly controlled: everything is scripted!
- In Octopus Deploy, everything is scripted which leaves less room for human error or uncontrolled activities.
- Octopus Deploy supports authentication with Active Directory and other external identity providers which can be used to enforce multi-factor authentication. Learn about authentication providers.
- You can implement strict, fine-grained, environment-aware security permissions. Learn about managing users and teams.
- Every activity is carefully audited. Learn more about auditing.
- You can control how long you retain data and packages. Learn about Retention Policies.
- You can use any kind of transparent networking security techniques like IPSec tunnels or VPN between your network zones.
- If you are using our Tentacle agent, you can decide whether you want to allow network traffic inbound to your PCI zone from your Octopus Server, or outbound from your PCI zone to your Octopus Server. Learn about Tentacle communication modes.
- You can insert an HTTP proxy server between Octopus Server and any Tentacles or SSH endpoints. This is helpful when you want to have DMZs in your network with controlled entry/exit points. Learn about proxy support.
- If you really cannot use Tentacle or SSH, you can use Offline Package Drops for fully disconnected deployment automation. Learn about the Offline Package Drop deployment target.
- If you require isolated instance of Octopus Server our licensing model is quite flexible. Each license of Octopus Deploy grants you the right to install and configure up to three (3) separate instances of Octopus Server. Learn about managing Isolated Octopus Deploy Servers.
Promoting Releases Across Security Zones
Take a look at our Request for Comments (RFC) on a new set of features we're calling Remote Release Promotions. These features will reduce the friction involved when bridging across multiple Octopus Servers, even across PCI Compliant security zones.
- Learn about Octopus - Tentacle communication to understand how automation instructions are transmitted securely to maintain trust.
- Full support for TLS 1.2 was introduced in Octopus 3.1. We recommend using the latest version of Octopus Deploy whenever possible.
- Learn about security and encryption of sensitive information in Octopus Deploy.
- Learn about how Octopus Deploy handles sensitive variables.
We conduct independent security analysis and penetration testing for Octopus Deploy. Contact our support team for a copy of the most recent report.
Network Security Considerations
Octopus supports a wide range of networking features to help fit into your PCI compliant network design.
- You can use a VPN between your network security zones. A VPN is a transparent network tunnel between two zones, and you can happily use our Tentacle or SSH connections through a VPN tunnel in the same way you can use them on a local network.
- You can use a networking proxy for Tentacle or SSH communication, where the proxy controls and monitors access from your Octopus Server to your workers and deployment targets. Learn about proxy support
- If you are using our Tentacle agent, you can configure it in listening mode (
Octopus Server -> Tentacle) or polling mode (
Tentacle -> Octopus Server) which changes the direction traffic flows through your firewalls. Learn about Tentacle communication modes.
Your security and networking team should be able to help you make these decisions based on how you have decided to design your network for PCI compliance.
Watch this Ask Octopus episode where we discuss compliance.