Deployment protection with environment protection rules, required reviewers, wait timers, and approval gates for production deployments.
Adds deployment protection rules to GitHub Actions workflows. Claude will use this when creating production deployment workflows to configure environment-specific approval gates, wait timers, and branch restrictions that prevent unauthorized deployments.
/plugin marketplace add adaptive-enforcement-lab/claude-skills/plugin install secure@ael-skillsThis skill inherits all available tools. When active, it can use any tool Claude has access to.
examples.mdreference.mdscripts/example-1.mermaidscripts/example-2.yamlscripts/example-3.yamlscripts/example-4.yamlscripts/example-5.yamlscripts/example-6.yamlEnvironments add approval gates, wait timers, and deployment controls to GitHub Actions workflows. Production deployments should never execute without human review.
The Risk
Workflows without environment protection can deploy malicious code to production in seconds. A compromised PR or workflow modification can push backdoors, exfiltrate data, or take down services before security teams detect the breach.
See the full implementation guide in the source documentation.
GitHub Environments provide deployment protection through approval gates, wait timers, branch policies, and deployment tracking.
flowchart TD
A["Workflow Executes"] --> B{"Environment<br/>Configured?"}
B -->|No Environment| C["Immediate Execution"]
B -->|Environment Set| D{"Protection Rules"}
C --> C1["No Review"]
C --> C2["No Wait Timer"]
C --> C3["No Branch Policy"]
C --> C4["Risk: HIGH"]
D --> E{"Required<br/>Reviewers?"}
E -->|Yes| F["Wait for Approval"]
E -->|No| G{"Wait Timer?"}
F --> H["Reviewer Approves"]
H --> G
G -->|Yes| I["Wait N Minutes"]
G -->|No| J{"Branch<br/>Policy?"}
I --> J
J -->|Yes| K["Verify Branch"]
J -->|No| L["Deploy"]
K -->|Allowed| L
K -->|Denied| M["Deployment Failed"]
L --> N["Deployment Tracked"]
C4 --> O["Immediate Risk"]
%% Ghostty Hardcore Theme
style A fill:#66d9ef,color:#1b1d1e
style B fill:#e6db74,color:#1b1d1e
style C fill:#f92572,color:#1b1d1e
style D fill:#a6e22e,color:#1b1d1e
style E fill:#e6db74,color:#1b1d1e
style F fill:#fd971e,color:#1b1d1e
style H fill:#a6e22e,color:#1b1d1e
style L fill:#a6e22e,color:#1b1d1e
style M fill:#f92572,color:#1b1d1e
style C4 fill:#f92572,color:#1b1d1e
Environments support four protection mechanisms.
Require manual approval from designated reviewers before deployment.
Configuration: Settings → Environments → Environment name → Required reviewers
Reviewers: Up to 6 users or teams
Use Case: Production deployments, security-sensitive operations
Example:
name: Production Deploy
on:
push:
branches: [main]
permissions:
contents: read
id-token: write
jobs:
deploy:
runs-on: ubuntu-latest
environment: production
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- name: Deploy to production
run: ./scripts/deploy.sh production
Protection Behavior:
Delay deployment execution for a fixed period. Gives security teams time to detect malicious deployments.
Configuration: Settings → Environments → Environment name → Wait timer
Duration: 0-43200 minutes (up to 30 days)
Use Case: Detect malicious commits before production deployment, compliance requirements
Example Production Pattern:
name: Production Deploy with Wait Timer
on:
push:
branches: [main]
permissions:
contents: read
id-token: write
jobs:
deploy:
runs-on: ubuntu-latest
environment:
name: production
url: https://app.example.com
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- run: ./scripts/deploy.sh production
Configure wait timer in Settings → Environments → production → Wait timer: 15 minutes.
Recommended Wait Times:
| Environment | Wait Time | Rationale |
|---|---|---|
| Development | 0 minutes | Fast feedback |
| Staging | 5 minutes | Brief security scan window |
| Production | 15-30 minutes | Security team review, monitoring alerts |
| Critical Infrastructure | 60 minutes | Extended review, compliance validation |
Restrict deployments to specific branches or tags.
Configuration: Settings → Environments → Environment name → Deployment branches
Policy Types:
Example Branch Policy Configuration:
Pattern: main, release/*, hotfix/*
Use Case: Production environment only deploys from main, release, or hotfix branches
Workflow:
name: Multi-Environment Deploy
on:
push:
branches: [main, 'release/**', 'hotfix/**']
permissions:
contents: read
id-token: write
jobs:
deploy-production:
runs-on: ubuntu-latest
environment: production
if: github.ref == 'refs/heads/main'
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- run: ./scripts/deploy.sh production
deploy-staging:
runs-on: ubuntu-latest
environment: staging
if: startsWith(github.ref, 'refs/heads/release/')
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- run: ./scripts/deploy.sh staging
Recommended Policies:
| Environment | Policy | Branches/Tags |
|---|---|---|
| Development | All branches | Any branch |
| Staging | Selected branches | main, release/*, develop |
| Production | Protected branches only | main (with protection rules) |
| Hotfix | Selected branches | main, hotfix/* |
Store deployment credentials scoped to specific environments.
Configuration: Settings → Environments → Environment name → Environment secrets
Scope: Only available to workflows using the environment
Use Case: Separate production and staging credentials, minimize secret exposure
Example:
name: Multi-Environment Deploy
on:
workflow_dispatch:
inputs:
environment:
required: true
type: choice
options:
- staging
- production
permissions:
contents: read
id-token: write
jobs:
deploy:
runs-on: ubuntu-latest
environment: ${{ github.event.inputs.environment }}
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- run: ./scripts/deploy.sh ${{ github.event.inputs.environment }}
Environment secrets WIF_PROVIDER and WIF_SERVICE_ACCOUNT are scoped to staging and production environments with different values.
Combine protection rules for defense-in-depth.
Protection: Required reviewers + Wait timer + Branch policy
Configuration:
main)Workflow:
name: Production Triple Gate
on:
push:
branches: [main]
permissions:
contents: read
id-token: write
jobs:
security-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: aquasecurity/trivy-action@84384bd6e777ef152729993b8145ea352e9dd3ef # 0.17.0
with:
scan-type: 'fs'
format: 'sarif'
output: 'trivy-results.sarif'
- uses: github/codeql-action/upload-sarif@cdcdbb579706841c47f7063dda365e292e5cad7a # v2.13.4
with:
sarif_file: 'trivy-results.sarif'
deploy:
runs-on: ubuntu-latest
needs: security-scan
environment:
name: production
url: https://app.example.com
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: google-github-actions/auth@55bd3a7c6e2ae7cf1877fd1ccb9d54c0503c457c # v2.1.2
with:
workload_identity_provider: ${{ secrets.WIF_PROVIDER }}
service_account: ${{ secrets.WIF_SERVICE_ACCOUNT }}
- name: Deploy to production
run: ./scripts/deploy.sh production
- name: Notify deployment
if: always()
run: |
curl -X POST https://slack.com/api/chat.postMessage \
-H "Authorization: Bearer ${{ secrets.SLACK_BOT_TOKEN }}" \
-d "channel=deployments" \
-d "text=Production deployment ${{ job.status }} for ${{ github.sha }}"
Protection Flow:
See reference.md for additional techniques and detailed examples.
See examples.md for code examples.
See reference.md for complete documentation.