As infrastructure and application code become incr...
# general
s
As infrastructure and application code become increasingly distributed without standardization, we are always at risk of a single point of failure with each deployment. It's frustrating to see large corporate entities and organizations bypassing or neglecting staged practices like canary, blue-green, and A/B deployments. In the modern stack, tools, utilities, libraries, and packages often come from different vendors, and vendors are nowadays sharing their public roadmaps and aspects of their code in open-source repositories. Moving forward, we are heading toward a future and a need of time that vendors release strategies and practices should be documented and publicly available, and detailing their plans for consumers, customers, and the community. This transparency will help organizations and engineering teams prepare upfront, fostering a collective approach to minimize risks and optimize outcomes. I believe that major vendors like Microsoft, AWS, and Google should have strategic plans as they did for and continue to push for security "_*artifact attestations and build provenance practices for third-party services"*_. There should be a structured process to validate release practices for third parties. If other vendors do not adhere to release practices, policies should be in place within the infrastructure and operating systems to restrict such third parties from causing disruptive post-mortem situations. I believe some of this portion can equally be true for IDPs and developer portals as some of the infrastructure and services are embedded from different vendors and OSS communities, release strategies and practices need to be unified and security & compliance policies should be in place as we have good tools now available and easy ways to do it. "_Looking for collaborative wisdom & opinions on this topic from this group"._