Home / Companies / Octopus Deploy / Blog / Post Details
Content Deep Dive

Why you should track vulnerabilities after deployment

Blog post from Octopus Deploy

Post Details
Company
Date Published
Author
Andrew Corrigan
Word Count
767
Language
English
Hacker News Points
-
Summary

Addressing vulnerabilities is a critical aspect of software development that extends beyond the deployment phase, as evidenced by high-profile cases emphasizing the need for proactive risk management. Vulnerabilities typically emerge post-deployment, as testing may not detect all issues, and undetected vulnerabilities only become exploitable once deployed. To mitigate risks, it is crucial for developers to actively track and resolve vulnerabilities post-deployment to protect user data, company reputation, and prevent potential downtime. Furthermore, the short sprints of DevOps processes can help manage vulnerabilities by making it easier to identify and rectify issues. Effective vulnerability management involves regular patching and updating of tools and infrastructure, staying informed about industry security news, and using vulnerability scanners to identify known issues in code and infrastructure. The article underscores the importance of shared responsibility models, such as Amazon's, which delineate security responsibilities between service providers and customers.