I have had my fair deal with a variety of weird and over complicated, but secure deployment processes. You don't wish to say it, but sometimes complication makes things secure, no pun intended. Nevertheless, I have found my personal favorite, that I want to share with you guys with examples.