Access Management Policy

Purpose

This policy is intended to outline the access management controls implemented by GitLab.

Scope

These controls apply to information and information processing systems at the application and operating system layers, including networks and network services.

Roles & Responsibilities

Role Responsibility
Security Assurance Responsible for implementing and executing this policy
Business or System Owners Alignment to this policy and any related standards
Security Assurance Management (Code Owners) Responsible for approving significant changes and exceptions to this policy
Team Members Responsible for adhering to the requirements of this policy

Policy

Access requests and reviews

Access requests are opened for all new or changing access. (AC-2)

Access requests are approved prior to making access changes. (AC-2)

Access requests and reviews are documented. (AC-2, AC-6(7))

An exception process exists for access requests.

Access revocation

Access is deprovisioned upon cessation of employment. (AC-2(3))

Job transfers

Access is deprovisioned or provisioned upon job transfer, as appropriate for the transfer. (AC-2, AC-2(3))

Access reviews

Access reviews are performed to confirm existing access. (AC-6(7))

Access Management Standard

For further details on GitLab’s access management processes, please review the Access Management Standard in the Internal Handbook.

Exceptions

Exceptions to this policy will be tracked as per the Security and Technology Policy Exception Management Process.

Last modified August 16, 2024: Replace aliases with redirects (af33af46)