Application Security

Application Security home page

Last updated: May 27, 2025

Application Security Mission

The Product Application Security subdepartment works with GitLab engineers and product teams to anticipate and prevent the introduction of vulnerabilities during design and development, ensuring delivery of high quality software GitLab customers can trust. We also identify, assess, and respond to security vulnerabilities discovered in GitLab products and services that are reported through Coordinated Vulnerability Disclosure practices.

Value Proposition

The Application Security subdepartment provides operational application of DevSecOps engineering and methodology, as well as data insights and security consultation that enables GitLab engineers to easily deliver high quality secure products and services to customers, while maintaining feature capabilities and velocity to market.

Scope & Responsibilities

We organize our work into five pillars that emphasize Developer UX in the context of traditional DevSecOps programs. We call this the Secure Developer eXperience, or SDX.

  • SDX: Learn: security training, governance, policy, documentation, and standards.
  • SDX: Design: threat modeling, feature design guidance and consultation, and design reviews.
  • SDX: Code: static analysis, software component analysis and supply chain security, use of approved tools and methodologies in development, deprecation of unsafe functions, etc.
  • SDX: Verify: dynamic analysis testing, penetration testing, remediation of critical vulnerabilities, and final security reviews prior to release.
  • SDX: Maintain: establishment of an incident response plan, managing Coordinated Vulnerability Disclosure, bug bounty program administration, and critical product security incident response release and post-release operations.

The Application Security sub-department includes two teams, the Secure Design & Development Team and the Product Security Incident Response Team (PSIRT).

Shared Accountabilities & Collaborations

The Application Security team partners with several other teams across the Security Division to deliver end-to-end security solutions that work for GitLab engineers. The following strategic security programs have multiple stakeholders across the Security Division and company.

Supply Chain Security

Application Security’s accountability is shared by both SD&D and PSIRT. Additional Product Security teams involved in Supply Chain Security include Security Platforms & Architecture, Vulnerability Management, and Infrastructure Security.

Dogfooding

Application Security’s accountability is to use GitLab security products in our work and be participants in providing actionable Customer Zero feedback through the Security Platforms & Architecture team, who is the Dogfooding DRI for Product Security.

Vulnerability Management

The Application Security Team’s accountability is shared by both SD&D and PSIRT. The Vulnerability Management is DRI for Vuln Management tooling development and implementation.

Secure by design

The Secure Design and Development Team’s accountability is feature focused, assessing threats through Threat Modeling and feature design reviews. (SDX: Design). The Security Platforms & Architecture team is DRI for Threat Modeling strategy company-wide, while AppSec is a critical stakeholder in this strategy.

Security Response

The Product Security Incident Response Team’s accountability is to triage and technically assesses critical and exploitable vulnerabilities, determine company and customer risk, and coordinate external communications regarding these issues. PSIRT has several partners across the company including:

Out of Scope

Appliction Security Organization

Learn more how our team work is organized on this specific page. You will find how we plan our work and our main repositories used in our daily work.

Contacting us

Team members can reach the AppSec team by:

FY26 Primary Focus Areas

In FY26, our key focus areas are:

Organizational Upleveling:

Support Company and Division Priorities:

  • Authorization & Authentication
  • AI Security & Safety
  • Supply Chain security
  • Security Interlock

FY26 Metrics

Application Security is rebuilding our operational business health metrics in FY26. These metrics are in addition to Key Risk Indicators, project-level metrics, or sub-team specific metrics. For many of these, metrics instrumentation and reporting mechanisms are still forthcoming. As the team matures, these metrics will evolve and be shared on this page.

Useful resources for AppSec engineers

PTO

Team members that are taking PTO for 5 days or more must both discuss time off with their manager prior to scheduling to ensure visibility and adequate team operational coverage and create a PTO coverage issue to organize their coverage during their time off. The PTO coverage issue should:

  • List any potential requests that could come to the team while on PTO
  • The team member taking PTO should organize their work accordingly and ensure the PTO coverage issue contains the context required to handle the work
  • Assign primary and secondary responsible team members

AppSec team members should add any important information related to the work they are covering for the person on PTO and AppSec manager(s) should add any important announcement to see upon their return.

Roles & Responsibilities

Please see the Application Security Job Family page.

The list above is not exhaustive and is subject to be modified as our processes keep evolving.

Stable Counterparts

Please see the Application Security Stable Counterparts page.

Application Security Reviews

Please see the Application Security Reviews page.

RCAs for Critical Vulnerabilities

Please see the Root Cause Analysis for Critical Vulnerabilities page

Application Security Engineer Runbooks

Please see the Application Security Engineer Runbooks page index

Meeting Recordings

The following recordings are available internally only:

Backlog reviews

When necessary a backlog review can be initiated, please see the Vulnerability Management Page for more details.

GitLab Secure Tools coverage

As part of our dogfooding effort, the Secure Tools are set up on many different GitLab projects (see our policies). This list is too dynamic to be included in this page, and is now maintained in the GitLab AppSec Inventory.

Projects without the expected configurations can be found in the inventory violations list (internal link).

GitLab Inventory

Learn more about the GitLab AppSec Inventory.

Responding to customer scan review requests

Please see the Responding to customers security scanners review requests page.

Reproducible Vulnerabilities

Learn how to identify or remediate security issues using real examples with GitLab’s Reproducible Vulnerabilities.

Reproducible Builds

Learn how GitLab is implementing Reproducible Builds for our build processes.

Application Security Automation and Monitoring

Learn more about the automation initiatives that the Application Security team uses on the Application Security Automation and Monitoring page

Content Review and Updates

This charter will be reviewed quarterly to ensure alignment with company and divisional priorities, the GitLab Security product roadmap, and relevant business and operational changes. Updates may occur more frequently as business operations evolve.

Next scheduled review: June 30, 2025


Application Security - Async Communication
Overview As the Application Security team spans too many different time zones to have a reasonable …
Application Security - Automation and Monitoring
Monitoring The Application Security team uses a number of automation initiatives to help secure …
Application Security - Dogfooding and Product Feature Requests
Overview This page describes the usage of a label to indicate a specific issue or epic is a priority …
Application Security Metrics
TBD
Application Security Operations
Application Security Team Operations home page
Application Security Review Process
This page details the application security review process for appsec engineers. The purpose of …
Application Security Runbooks
Note for New team members Whenever you are on a rotation (HackerOne or Triage Rotation or doing your …
Application Security Stable Counterparts
The overall goal of Application Security Stable Counterparts is to help integrate security themes …
Application Security Team Organization
Application Security page on how the team is organized
Application Vulnerability Management Procedure
Purpose This procedure applies to vulnerabilities identified in GitLab the product or its dependency …
GitLab Application Security Inventory
The AppSec Inventory is a private GitLab project to identify and track all projects, components, and dependencies that matter for AppSec
Milestone Planning
Learn how the GitLab Application Security team does Milestone Planning
Product Security Incident Response Team (PSIRT) Services Overview
Product Security Incident Response Team (PSIRT) Services Overview
Reproducible Builds
Learn how GitLab is implementing Reproducible Builds for our build processes
Reproducible Vulnerabilities
Learn about GitLab, its security processes, and its historical security vulnerabilities
Responding to customers security scanners review requests
We scan our own product using our security scanners. Our Engineering teams are remediating …
Secure Design & Development Team Services Overview
Secure Design & Development Team Services Overview
Threat Modeling
The threat modeling process, and the framework used by the GitLab Security Team.