Software Supply Chain Security Sub-department
The Software Supply Chain Security sub-department teams are the engineering teams in the Software Supply Chain Security Stage of the product.
Vision
To support GitLab’s product vision through alignment with the Software Supply Chain Security stage product direction.
SSCS Charter
Software Supply Chain Security (SSCS) Stage Team Charter
Our Mission
Protect GitLab customers from supply chain attacks while maintaining developer velocity.
We secure the entire software development lifecycle - from code commit to production deployment - by ensuring every artifact is verified, every access is authorized, and every risk is visible.
What We Do
SSCS secures three critical surfaces:
1. Build & Pipeline Security
- Ensuring artifacts are verifiably built from trusted source code
- SLSA compliance and artifact attestation
- Runner security and isolation
- Secrets management
- Pipeline integrity
2. Identity & Access Management
- Controlling who can do what across the platform
- Authentication (how users prove identity)
- Authorization (what authenticated users can do)
- Zero-trust architecture
3. Compliance & Policy
- Making security measurable and auditable
- Security policies as code
- Compliance evidence generation
- Audit trails and visibility
How Our Priorities Align with GitLab Executive Priorities
We maintain a 30% capacity buffer for unplanned cross-functional work that supports company-level priorities. This allows us to respond to company-level priorities such as:
- GitLab Duo & AI - Anything blocking DAP or AI security
- Protocells - Authentication/authorization foundations for Cells architecture
Our Top 3 Priorities
Priority 1: Build a strong security foundation for AuthN/AuthZ
Objective: Reduce security incidents Why it matters: Every incident erodes customer trust and drains engineering capacity.
What we’re doing:
- Authentication consolidation (CYCP)
- Token security improvements
- Critical auditing gaps
Priority 2: Engineering Excellence
Objective: Become a high-performing, predictable engineering organization Why it matters: We can’t deliver strategic value if we’re drowning in firefighting and support escalations.
What we’re doing:
- Reduce support escalation rate from 30% to <15%
- Improve delivery confidence (currently 60-70% → 85%+)
Priority 3: Supply Chain Leadership
Objective: Establish GitLab as the most trusted supply chain security platform Why it matters: Supply chain attacks are increasing YoY. Customers like GovTech and enterprises demand verifiable security.
What we’re doing:
- SLSA Level 3 compliance
- Runner identity and verification
- End-to-end artifacts and containers attestation
- Supply chain visibility dashboard
How Our Top 3 Priorities Enable Strategic Cross-Functional Work
Our priorities aren’t just about internal SSCS goals—they’re designed to enable the strategic cross-functional work that supports company objectives.
Priority 1: Build a strong foundation → Enables Platform Capabilities
Code Yellow/Purple (CYCP) authentication consolidation and security architecture enables:
- Workload Identity federation
- OAuth for ProtoCells - Authentication foundation that ProtoCells depends on
- Fine grained access controls for customers
- Agentic authentication built on secure machine identities
Priority 2: Engineering Excellence → Creates Capacity for Unplanned Work
Reducing support burden, improving delivery confidence, protecting capacity for quality enables:
- Faster response time - Can pivot to urgent requests without breaking commitments
- Higher quality - Strategic work doesn’t create technical debt that haunts us
- Better estimation - Know true capacity available for unplanned work
- Sustainable pace - Team doesn’t burn out from constant context switching
Priority 3: Supply Chain Leadership → Differentiates in Enterprise Deals
SLSA compliance, runner security, artifacts attestation, threat analysis, advanced compliance features enables:
- Enterprise credibility - SLSA certification enables deals that fund strategic work
- Compliance foundation - Security architecture that DAP and ProtoCells inherit
AI Security: Our Newest Frontier
Why AI Security Matters
AI features (GitLab Duo, AI agents, code generation) are fundamentally changing our security model:
- AI agents act on behalf of users - requiring composite identity
- AI generates code and modifies repositories - requiring attribution and auditability
- AI accesses customer data - requiring privacy and compliance controls
- AI crosses organizational boundaries - requiring robust authorization
The challenge: We’re securing AI features while simultaneously building the platform capabilities they need. This creates unavoidable dependencies and unplanned work.
How We Work
Resource Allocation Model
- 70% - Planned work
- 30% - Unplanned work
Unplanned work is not the exception—it’s part of the job. Cross-functional dependencies, urgent customer needs, security issues, and tech debt from re-orgs consume 30% of capacity in typical milestones. We budget for this reality rather than pretending it doesn’t exist.
Managing Unplanned Work
The 30% unplanned budget includes:
- Cross-functional dependencies (Protocells, Dedicated, DAP, etc.)
- Security incidents and vulnerability fixes
- Customer escalations and support
- Tech debt from re-orgs and domain transfers
- Infrastructure issues requiring urgent attention
Visibility & Accountability
Unplanned Work Log (updated weekly):
- What unplanned work arrived
- Capacity consumed (eng-weeks)
- What got delayed as a result
- Link to the relevant request
This visibility creates accountability and helps justify pushback on future requests.
Groups
Product Documentation Links
All Team Members
Authentication
| Name | Role |
|---|---|
Adil Farrukh
|
Engineering Manager, Software Supply Chain Security:Authentication |
Aleksei Lipniagov
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Andrew Evans
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Bogdan Denkovych
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Daniele Bracciani
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Eduardo Sanz-Garcia
|
Senior Frontend Engineer, Software Supply Chain Security:Authentication |
Hakeem Abdul-Razak
|
Associate Backend Engineer, Software Supply Chain Security:Authentication |
Imre Farkas
|
Staff Backend Engineer, Software Supply Chain Security:Authentication |
Matthias Käppler
|
Staff Backend Engineer, Software Supply Chain Security:Authentication |
Shilpa Kundapur
|
Staff Backend Engineer, Software Supply Chain Security:Authentication |
Smriti Garg
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Aboobacker MK
|
Senior Backend Engineer, Software Supply Chain Security:Authentication |
Authorization
| Name | Role |
|---|---|
Ajay Thomas
|
Engineering Manager, Software Supply Chain Security:Authorization |
Ayush Billore
|
Backend Engineer, Software Supply Chain Security:Authorization |
Alex Buijs
|
Senior Fullstack Engineer, Software Supply Chain Security:Authorization |
Daniel Tian
|
Senior Frontend Engineer, Software Supply Chain Security:Authorization |
Diane Russel
|
Backend Engineer, Software Supply Chain Security:Authorization |
Eugie Limpin
|
Senior Fullstack Engineer, Software Supply Chain Security:Authorization |
Hinam Mehra
|
Senior Fullstack Engineer, Software Supply Chain Security:Authorization |
Ian Anderson
|
Staff Backend Engineer, Software Supply Chain Security:Authorization |
Jay Swain
|
Senior Backend Engineer, Software Supply Chain Security:Authorization |
Matthew MacRae-Bovell
|
Backend Engineer, Software Supply Chain Security:Authorization |
Mo Khan
|
Senior Backend Engineer, Software Supply Chain Security:Authorization |
Compliance
| Name | Role |
|---|---|
Nathan Rosandich
|
Engineering Manager, Software Supply Chain Security:Compliance |
Andrew Jung
|
Backend Engineer, Software Supply Chain Security:Compliance |
Harsimar Sandhu
|
Senior Backend Engineer, Software Supply Chain Security:Compliance |
Hitesh Raghuvanshi
|
Senior Backend Engineer, Software Supply Chain Security:Compliance |
Huzaifa Iftikhar
|
Senior Backend Engineer, Software Supply Chain Security:Compliance |
Illya Klymov
|
Staff Frontend Engineer, Software Supply Chain Security:Compliance |
Jean van der Walt
|
Staff Backend Engineer, Software Supply Chain Security:Compliance |
Sam Figueroa
|
Fullstack Engineer, Software Supply Chain Security:Compliance |
Scott Hampton
|
Senior Frontend Engineer, Software Supply Chain Security:Compliance |
Pipeline Security
| Name | Role |
|---|---|
Ken McDonald
|
Engineering Manager, Software Supply Chain Security:Pipeline Security |
Aaron Huntsman
|
Senior Backend Engineer, Software Supply Chain Security:Pipeline Security |
Ahmad Hussein
|
Fullstack Engineer, Software Supply Chain Security:Pipeline Security |
Alex Scheel
|
Staff Backend Engineer, Software Supply Chain Security:Pipeline Security |
Dmytro Biryukov
|
Senior Backend Engineer, Software Supply Chain Security:Pipeline Security |
Erick Bajao
|
Senior Backend Engineer, Software Supply Chain Security:Pipeline Security |
Fabien Catteau
|
Staff Backend Engineer, Software Supply Chain Security:Pipeline Security |
Jayakrishnan Mallissery
|
Backend Engineer, Software Supply Chain Security:Pipeline Security |
Mireya Andres
|
Senior Frontend Engineer, Software Supply Chain Security:Pipeline Security |
Shabini Rajadas
|
Backend Engineer, Software Supply Chain Security:Pipeline Security |
Sam Joan Roque-Worcel
|
Senior Backend Engineer, Software Supply Chain Security:Pipeline Security |
Stable Counterparts
The following members of other functional teams are our stable counterparts:
| Name | Role |
|---|---|
Adil Farrukh
|
Engineering Manager, Software Supply Chain Security:Authentication |
Ajay Thomas
|
Engineering Manager, Software Supply Chain Security:Authorization |
Camellia X. Yang
|
Senior Product Designer Software Supply Chain Security:Compliance and Security Risk Management:Security Policies |
Jocelyn Eillis
|
Senior Product Manager, Software Supply Chain Security:Pipeline Security |
Joe Randazzo
|
Product Manager, Software Supply Chain Security:Authorization |
Ken McDonald
|
Engineering Manager, Software Supply Chain Security:Pipeline Security |
Ian Khor
|
Product Manager, Software Supply Chain Security:Compliance |
Nathan Rosandich
|
Engineering Manager, Software Supply Chain Security:Compliance |
Software Supply Chain Security staff meeting
The Software Supply Chain Security stage engineering department leaders meet weekly to discuss stage and group topics in the Software Supply Chain Security staff meeting. This meeting is open to all team members and is published on the Software Supply Chain Security stage calendar.
Meetings have an agenda and are async-first, where the aim is to resolve discussions async and leave time in the meeting to deep dive into topics that require more discussion.
We use the Software Supply Chain Security Sub-department Board to better organize our discussions.
Weekly updates
The Software Supply Chain Security development teams provide weekly status updates using an issue template and CI scheduled job. As priorities change, engineering managers update the template to include areas of interest such as priorities, opportunities, risks, and security and availability concerns. The updates are GitLab internal.
Quarterly review updates
Every quarter, an engineering manager for each group in the Software Supply Chain Security Sub-department prepares the quarterly review update using the issue template and records approximately 5 minutes to summarize the last quarter from the engineering perspective and present a high-level plan for the group for the next one to respond to quarterly Product strategy and explain our goals for next quarter.
We aim to foster collaboration and communication between engineering managers in the Software Supply Chain Security Sub-department, align groups on product priorities for the next quarter, and celebrate our successes together.
Quarterly review update template can be found here).
PTO
We follow the Engineering process for taking time off and GitLab team members Guide to Time Off.
Engineering Leadership - PTO or unavailable
Team members should contact any Software Supply Chain Security Engineering Manager by mentioning in #sd_sscs_engineering or #sscs-development-people-leaders if they need management support for a problem that arises, such as a production incident or feature change lock, when their direct manager is not available. The Software Supply Chain Security manager can provide guidance and coordination to ensure that the team member receives the appropriate help.
Some people management tasks, including Workday and Navan Expense, may require for escalation or delegation.
Skills
Because we have a wide range of domains to cover, it requires a lot of different expertise and skills:
| Technology skills | Areas of interest |
|---|---|
| Ruby on Rails | Backend development |
| Go | Backend development |
| Vue, Vuex | Frontend development |
| GraphQL | Various |
| SQL (PostgreSQL) | Various |
| Docker/Kubernetes | Threat Detection |
| New Auth Architecture (GATE) Learning Hub | New Auth/CYCP |
| New Auth Claude Expert | New Auth Design |
Everyone can contribute
At GitLab our goal is that everyone can contribute. This applies to GitLab team members and the wider community through community contributions. We welcome contributions to any and all features, but recognize that first time contributors may prefer to start with smaller features. To support this we maintain a list of quick wins that may be more suitable for first time contributors, and contributors new to the domains in Software Supply Chain Security.
If the contributor needs an EE license, we can point towards the Contributing to the GitLab Enterprise Edition (EE) section on the Community contributors workflows page.
Testing
During the planning phase of a milestone, the EM for each group will create a new issue using the template in epic, for any major new features and tag Software Engineer in Test from Software Supply Chain Security. SETs from Test Engineering and EMs can periodically review/discuss the list of open issues, and add appropriate priority labels.
The intent of shifting left and testing at the right level is that teams are responsible for testing and to have engineers doing the feature coverage reviews and adding specs or E2E test as needed. The reason for including the SET is to give oversight across the groups and provide guidance/support. If the SET has capacity then they can contribute as needed, using the priority labels, but this is not the expectation.
Links and resources
- Stage links
- Discussions and issues are located at
gitlab-org/software-supply-chain-security - General Slack #s_software-supply-chain-security
- Social channel #sec-section-social
- Engineering Slack #sd_sscs_engineering
- Software Supply Chain Security Shared Calendar (Calendar ID
gitlab.com_ed6207uel78de0j1849vjjnb3k@group.calendar.google.com) - GitLab Managers:
@gitlab-org/software-supply-chain-security/managers
- Discussions and issues are located at
AI and Learning Resources
- New Auth Expert Claude Project - AI expert for getting answers and information about the New Auth and Code Purple initiative, design, and progress
- Note: Access to this project requires organizational Claude access. Team members need to be part of the GitLab organization in Claude to access this project.
Example Prompts for New Auth Expert
Architecture & Design
- “What is the GATE architecture and its L0/L1/L2 layers?”
- “Explain the difference between TS (Topology Service) and IAM services”
- “What are the key architectural decisions made for Code Purple?”
- “Show me the 3-level architecture design”
Timeline & Deliverables
- “What’s the delivery timeline for Code Yellow vs Code Purple?”
- “What are the Q2/Q3 FY27 deliverables?”
- “When will GATE be in production?”
- “What’s the roadmap for token consolidation?”
Token & Permissions
- “What’s the plan for granular Personal Access Token (PAT) permissions?”
- “How will OAuth token permissions work?”
- “Explain Workload Identity Federation timeline”
- “What are the requirements for CI/CD job tokens?”
Implementation Status
- “What POCs are currently in progress?”
- “Which features are in scope vs out of scope for Code Purple?”
- “What are the current blockers?”
- “Show me the latest weekly status notes”
Dependencies & Infrastructure
- “What infrastructure dependencies exist for GATE deployment?”
- “How does this relate to the Cells architecture?”
- “What database operations are needed?”
- “What’s required for self-managed vs GitLab.com deployment?”
Service Accounts & Machine Identity
- “How are service accounts being consolidated?”
- “What’s the plan for machine identities?”
- “When will service accounts be available on Free tier?”
Specific Issues & Epics
- “Find GitLab issues related to granular PAT permissions”
- “What epics are tracking Code Purple delivery?”
- “Show me recent discussions about token scopes”
Quick Status Checks
- “What’s the latest Code Purple status?”
- “Are there any blockers this week?”
- “What was decided in the most recent sync meeting?”
Technical Documentation Links
Authentication Group
Authorization Group
Compliance Group
Software Supply Chain Security Tier 2 On Call
Software Supply Chain Security:Pipeline Security Group
ccb9df9d)
Adil Farrukh
Aleksei Lipniagov
Andrew Evans
Bogdan Denkovych
Daniele Bracciani
Eduardo Sanz-Garcia
Hakeem Abdul-Razak
Imre Farkas
Matthias Käppler
Shilpa Kundapur
Smriti Garg
Aboobacker MK
Ajay Thomas
Ayush Billore
Alex Buijs
Daniel Tian
Diane Russel
Eugie Limpin
Hinam Mehra
Jay Swain
Matthew MacRae-Bovell
Mo Khan
Nathan Rosandich
Andrew Jung
Harsimar Sandhu
Hitesh Raghuvanshi
Huzaifa Iftikhar
Illya Klymov
Jean van der Walt
Sam Figueroa
Scott Hampton
Ken McDonald
Aaron Huntsman
Ahmad Hussein
Dmytro Biryukov
Erick Bajao
Fabien Catteau
Jayakrishnan Mallissery
Mireya Andres
Shabini Rajadas
Sam Joan Roque-Worcel
Camellia X. Yang
Jocelyn Eillis
Joe Randazzo
Ian Khor