Secure computing resource deployment within a computing environment is facilitated by receiving a request to deploy a computing resource in the computing environment, and obtaining a homomorphically-encrypted data set. The homomorphically-encrypted data set includes configuration-related data for a desired configuration of the computing resource to be deployed in the computing environment. The process further includes using the homomorphically-encrypted data set in configuring for deployment the computing resource, where the computing resource is configured for deployment with the desired configuration without decrypting the homomorphically-encrypted data set.