Operations & Deployment

Deploy anywhere. Prove everything.

First-class support for Docker, Compose, ECS, Nomad, and agentless SSH/WinRM. 100% offline operation with sovereign crypto profiles.

What you operate here

Image scanning

SBOM generation, CVE matching, VEX statement management for every container image.

Reachability filtering

Static, manifest, and runtime analysis to separate exploitable from theoretical risk.

Release promotion

Move images between environments through policy gates with full traceability.

Progressive delivery

A/B testing, canary, blue/green deployments, and instant rollback across targets.

Evidence export

Decision Capsules bundle all inputs, policy, and verdicts for audit and compliance.

Offline operation

Full functionality in air-gapped environments using signed Offline Update Kits.

Non-Kubernetes first

Most CD tools treat non-Kubernetes as an afterthought. Stella treats it as a primary use case.

Docker Host

Direct container deployment to Docker hosts.

Docker Compose

Multi-container application deployment.

AWS ECS

ECS and Fargate task deployments.

HashiCorp Nomad

Nomad job deployments and updates.

SSH (Agentless)

Linux/Unix targets without agents.

WinRM (Agentless)

Windows targets without agents.

Unlimited deployment targets at all pricing tiers

Digest-first versioning

Every release is identified by its content digest, not a mutable tag. This guarantees that what was scanned is what gets deployed, and what gets audited is what actually ran.

Immutable identity

sha256 digests ensure the artifact promoted is byte-identical to the artifact scanned and approved.

Provenance chain

Each promotion records the source digest, policy version, and approval evidence in a signed attestation.

Deployment patterns

A/B testing

Route a percentage of traffic to the new version. Compare metrics before committing.

Canary release

Deploy to a small subset of targets first. Automatic rollback on health-check failure.

Blue/Green

Run old and new versions in parallel. Switch traffic atomically when ready.

Instant rollback

Revert to any previous digest-verified version. Evidence trail preserved for both forward and back.

100% offline operation

Core decisions work without external dependencies. Vulnerability feeds and evidence verification work entirely inside your boundary.

Offline Update Kit

Signed bundle with everything needed for air-gapped operation.

  • Vulnerability feeds from 33+ sources
  • Container images for all components
  • Provenance data and SBOMs
  • Delta updates for efficient transfer

No external egress required

Every operation works inside sovereign networks.

  • Local vulnerability database
  • Offline signature verification
  • Deterministic replay without network
  • No mandatory telemetry (opt-in only, disabled by default)
Terminal
$ stella offline-kit import stella-ouk-2026-01-20.tar.gz --verify
Verifying bundle signature... OK
Importing vulnerability feeds... 33 sources updated
Importing container images... 12 images loaded
Importing provenance data... OK

Offline Kit imported successfully
Knowledge snapshot: 2026-01-20T00:00:00Z
Next update recommended: 2026-01-27

Sovereign crypto profiles

Pluggable cryptographic profiles for regional compliance. Choose your algorithms without changing your workflow.

ProfileAlgorithmsUse Case
DefaultEd25519, ECDSA P-256, SHA-256Standard deployments
FIPS 140-2/3ECDSA P-384, SHA-384US federal / FedRAMP
GOST R 34.10GOST R 34.10-2012, StreebogCIS region compliance
SM2/SM3SM2, SM3Chinese national standards
eIDASRSA-PSS, ECDSA (QES)EU qualified signatures
DilithiumML-DSA (Dilithium)Post-quantum future-proofing

HSM/PKCS#11 integration

Hardware security modules for key storage and signing operations.

Multi-profile signing

Sign the same artifact with multiple algorithms for cross-jurisdiction compliance.

Infrastructure integration

HashiCorp Vault

Secrets injection for deployments.

HashiCorp Consul

Service registry integration.

Container registries

Docker Hub, Harbor, ECR, GCR, ACR.

SCM webhooks

GitHub, GitLab, Bitbucket triggers.

Notifications

Slack, Teams, email, PagerDuty, OpsGenie.

Plugin system

Custom connectors and workflow steps.

Platform Requirements

Supported Operating Systems

  • Ubuntu 20.04, 22.04, 24.04 LTS
  • RHEL/CentOS 8, 9
  • Debian 11, 12
  • Amazon Linux 2, 2023
  • Windows Server 2019, 2022
  • Alpine 3.18+ (containers)

Container Registries

  • Docker Hub
  • AWS ECR (incl. ECR Public)
  • Google Artifact Registry / GCR
  • Azure Container Registry
  • GitHub Container Registry
  • Harbor, Nexus, JFrog Artifactory
  • Any OCI-compliant registry

Scale Guidance

  • Up to 100 environments per instance
  • Up to 1,000 targets per environment
  • 50 concurrent deployments
  • 10,000+ scans/month supported
  • Horizontal scaling via HA mode
  • Federated multi-region available

Contact sales for larger deployments

Minimum Requirements

4 vCPU, 8 GB RAM, 50 GB storage. Docker 20.10+ or Podman 4.0+.

Recommended Production

8 vCPU, 16 GB RAM, 200 GB SSD. PostgreSQL 14+ for HA deployments.

Deployment architecture

Single-node deployment

Docker Compose for evaluation and small teams.

  • 2 vCPU, 2 GiB RAM minimum
  • PostgreSQL 16+, Valkey 8.0+
  • 10 GiB SSD for cache and evidence

High-availability deployment

Horizontal scaling for production workloads.

  • Multi-replica API and workers
  • Kubernetes Helm charts available
  • Dedicated capacity for enterprise

Ready for sovereign deployment?

Start with the install guide or the offline kit.

Sovereign & Air-Gap · Release Orchestration · All features