Encrypting Configuration Files During Octopus Deployment During a security assessment we were asked to encrypt the configuration files, mainly the files which contains