feat: add Canary deployment activity to Deployment dimension#76
Merged
wurstbrot merged 1 commit intodevsecopsmaturitymodel:mainfrom Apr 27, 2026
Conversation
DSOMM defines Blue/Green Deployment (Level 5) and Rolling update on deployment (Level 3) as standalone activities, but Canary - the third standard progressive-delivery strategy - is only mentioned in passing inside another activity's description. This PR adds Canary deployment as a standalone Level 4 activity, sitting between Rolling and Blue/Green on the risk/cost trade-off curve. Schema, references (SAMM2 / ISO 27001:2017 / ISO 27001:2022), and dependsOn structure follow the patterns of the adjacent activities.
wurstbrot
approved these changes
Apr 27, 2026
Contributor
|
thank you! |
Contributor
Author
|
Thank you for the fast review, @wurstbrot really appreciate it. A bit of background since I'm new to the project: I'm a Technical Architect at Broadridge Financial Solutions (DCOE), where I lead the integration platform powering Wealth InFocus. Outside of that, I've published two open-source frameworks that overlap with DSOMM:
If you're open to it, I'd like to propose two further contributions:
Happy to scope either one as a separate small PR or draft a short proposal first whichever fits the project's review preferences. Either way, I'm planning sustained contribution to DSOMM going forward. Sincerely, Venkata Pavan Kumar Gummadi |
wurstbrot
pushed a commit
that referenced
this pull request
Apr 27, 2026
The implementation key in implementations.yaml was misspelled as 'blue-green-deploymen' (missing trailing 't'). Renames the key to 'blue-green-deployment' and updates the corresponding $ref in BuildAndDeployment/Deployment.yaml. The implementation UUID (4fb3d95c-07c0-4cbb-b396-5054aba751c2) is unchanged, so this is a label-only fix with no semantic impact on existing data files or downstream consumers that look up by UUID. Noted as out-of-scope in PR #76 and is now followed up here as a separate focused PR.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Adds a top-level Canary deployment activity under
Build and Deployment > Deployment, alongside the existing Blue/Green Deployment and Rolling update on deployment activities.Motivation
DSOMM's Deployment sub-dimension currently defines two of the three industry-standard progressive-delivery strategies as standalone activities:
Canary deployment — gradually shifting a small fraction of production traffic to a new artifact version while monitoring SLIs and security signals — is an established and widely adopted strategy used by regulated industries to reduce blast radius. Today the term appears in DSOMM only as a passing mention inside another activity's description text. There is no standalone activity, no UUID, no references, and no implementation reference for it.
This PR closes that gap.
Why Level 4
The new activity is placed at Level 4 to sit between Rolling (Level 3) and Blue/Green (Level 5):
Canary requires more sophisticated traffic-control infrastructure than Rolling but does not require the duplicated-environment overhead of Blue/Green, which matches the Level 4 maturity bracket ("very high adoption of security practices") in DSOMM's progression definition.
Changes
src/assets/YAML/default/BuildAndDeployment/Deployment.yaml: newCanary deploymentactivity (uuid,description,risk,measure,assessment,difficultyOfImplementation,usefulness,level,implementation,dependsOn,referencesfor SAMM2 / ISO 27001:2017 / ISO 27001:2022).src/assets/YAML/default/implementations.yaml: newcanary-deploymentimplementation reference with a public URL to Martin Fowler's canonical write-up.Schema conformance
dsomm-schema-build-and-deployment.jsonare present:uuid,risk,measure,difficultyOfImplementation,usefulness,level,implementation,references,isImplemented,evidence,comments.dependsOnreferences the Automated deployment process activity (uuid67e1a9aa-9fbf-4ec5-a2de-400f01960c51), matching the Rolling-update entry.Validation
yaml.safe_loadafter applying both edits.Out of scope (intentional)
The existing typo
blue-green-deploymen(missing trailing "t") inimplementations.yamlis preserved as-is to keep this PR focused. Happy to open a separate PR for that if useful.References