RISK BASTION

Your score measures maturity,
Bastion enhances safety.

Maturity and deployment safety are different questions. The Concordance Framework answers the first. Risk Bastion answers the second — by evaluating 11 gate standards that can't be averaged away.

See the DemoView Methodology →

Maturity and deployment safety are different questions.

A team can be highly mature — strong reviews, good documentation, clean CI — and still ship every release as an all-or-nothing event with no rollback. Risk Bastion is specifically built to surface that gap.

💥
All-or-nothing deploys
Without feature flags or canary releases, every change ships to 100% of users simultaneously. Bastion ensures your release process has a dial — not just an on/off switch.
🔓
Ungated merges
CI that runs but doesn't block is decoration. Bastion ensures tests are actually required to pass before a change can merge — making the pipeline a real gate, not a report.
🔄
No rollback path
Every production system will have a bad deploy eventually. Bastion ensures you have an automated recovery path — so recovery is measured in minutes, not hours.
📉
Invisible failure rate
If you can't link deploys to incidents, you can't measure or improve your change failure rate. Bastion ensures that connection exists so improvement is measurable.

Four ratings. One honest answer about deployment safety.

Bastion produces a single rating per team — not a score to interpret, but a classification that tells you whether your blast radius is managed. It reads the same scan data as the rest of Concordance, but refuses to average critical gate properties into an overall number.

Uncontained
Any critical gate scores 1, or two or more critical gates are failing. Bastion flags this immediately — a single bad deploy reaches every user with no circuit breaker in place.
Broad
One critical gate is failing, or three or more major gates are below threshold. Bastion surfaces this before it becomes a production incident.
Moderate
One or two major gates are failing. Blast radius is partially managed. Bastion shows exactly which gates to close to reach Healthy.
Healthy
All gate standards score 3 or above. Bastion confirms your deployment safety controls are in place — bad changes can be caught, contained, and reversed.

11 gate standards. Evaluated as gates, not averages.

These 11 standards already exist in the Concordance Framework. Bastion applies a different instrument to them: a single critical gate at 1 sets the rating to Uncontained, regardless of everything else. That's not a contradiction of the framework — it's a more honest reading of it for deployment safety specifically.

IDStandardPhaseSeverityWithout this gate…
Deployment Safety
4.2CI GatingTestingCriticalTests exist but don't block merges — broken code reaches production unimpeded.
5.4Release ApprovalReleaseCriticalNo formal sign-off. Any contributor can ship to production without a designated reviewer.
5.7Rollback CapabilityReleaseCriticalNo automated recovery path. A bad deploy stays bad until someone manually intervenes.
5.8Feature FlaggingReleaseCriticalEvery release is all-or-nothing. A bug at 0.1% traffic becomes a bug at 100% — instantly.
Change Quality
3.1Branch ProtectionDevelopmentMajorDirect pushes to main are possible. A single bad commit skips review entirely.
3.5Approval RigorDevelopmentMajorSingle reviewer or high rubber-stamp rate. One pair of eyes misses what two would catch.
3.9Secrets ManagementDevelopmentMajorNo secret scanning. Credentials can be committed and exposed without detection.
4.4Test ReliabilityTestingMajorTests don't run on PRs. Changes merge without automated validation at the code review stage.
4.5Test CategorizationTestingMajorUnit tests only. Component contract mismatches are invisible until they fail in production.
Recovery
6.1Incident ResponseOperationsMajorNo structured response process. Ad-hoc recovery is slower and costlier every time.
6.7Change Failure TrackingOperationsMajorChange failures aren't linked to releases. MTTR is unknown. Improvement is unmeasurable.
Full methodology and rating algorithm →

From scan to risk rating in minutes

1
Scan
Connect your GitHub, GitLab, or Bitbucket repos. Concordance scans CI configuration, branch protection rules, workflow definitions, and release patterns automatically.
2
Rate
Each team receives a Bastion rating — Uncontained, Broad, Moderate, or Healthy — based on which gate standards are failing and how severe the gaps are.
3
Explain
Every failing gate shows a blast radius description: what goes wrong when this gap exists, and exactly how to fix it — with effort estimates and step-by-step instructions.
4
Move
Each fix is tagged with which lenses it improves — SDLC score, Signal compliance controls, and Bastion rating — so one action delivers three measurable payoffs.

Same fix. Three lenses move.

Because Bastion reads the same 50 standards as the rest of Concordance, fixing a gate standard doesn't just improve your Bastion rating — it also moves your SDLC score and, in many cases, your Signal compliance coverage. One engineering action, three measurable payoffs.

SDLC ↑Overall maturity score improves
Signal ↑SOC2 / ISO control coverage moves
Bastion ↓Risk rating improves toward Healthy

Know your blast radius now.

Connect your repos and Concordance will compute your Bastion rating, identify your failing gates, and give you a prioritized resolution plan — using scan data you already have.

Get Started FreeSee Risk Bastion DemoMethodology
Powered by the Concordance Framework — same scan data, evaluated as gates not averages.