Observation Creation Procedure
Purpose
The Observation Management Program at GitLab is used to identify, track, remediate and provide a risk ratings of identified findings, exceptions or deficiencies for any Tier 3 information system risks that are identified as an output of compliance operations or other mechanisms by team members, such as self-identification of a system specific risk.
This procedure details the creation process for observations.
Scope
Tier 3 risks or observations identified at the information system or business process levels
Roles and Responsibilities
Observation Source | Responsible Team |
---|---|
Security control testing activities (CCM) | Security Compliance |
Business Impact Analysis(BIA) | Security Risk |
External audit activities | Security Compliance |
Gap Assessment Activities | Security Compliance |
Ad-hoc observations | Security Assurance |
Observation Manager | Responsible for being the observation DRI through the observation lifecycle including verifying and fine tuning recommended remediation plans in order to meet legal and regulatory requirements. |
Remediation Owner | Validates observation, confirms assignee, stop date (due date), finalizes remediation plan and conducts remediation activity based on defined remediation SLA’s. |
Managers to Executive Leadership | Responsible for escalation as necessary and resource allocation for remediation activity. |
Procedure
Lifecycle Overview
graph TD; A[Identified] --> B[Validated]; B --> C[In Progress]; B --> D[Stalled]; B --> G[Blocked]; C --> E[Remediated]; E --> F[Remediation Accepted]; B --> H[Risk Accepted];
Observation Workflow Labels
These workflow labels indicate with the observation issue within the lifecycle.
Label | Description |
---|---|
Observation Workflow:: Identified | Initial review to determine validity of observation |
Observation Workflow:: Validated | Remediation owner has been assigned, but remediation has not started |
Observation Workflow:: In Progress | Remediation owner has been assigned and remediation is underway |
Observation Workflow:: Remediated | Remediation owner indicates the remediation step is complete |
Observation Workflow:: Remediation Accepted | Indicated that the observation manager has reviewed remediation and agrees the issue is closed |
Observation Workflow:: Risk Accepted | Observations that no remediation action will be taken and have been risk accepted by the remediation owner. Please tag @madlake in these issues. |
Observation Workflow:: Blocked | Indicated that the observation is blocked - please indicate why in a comment |
Observation Workflow:: Stalled | Indicated that remediation is stalled |
Observation Category Labels
Labels in this set are used to categorize issues for metrics and reporting and cross-team collaboration.
Label | Description |
---|---|
Department::*** | Department that is responsible for remediation |
RiskRating:: High | Risk rating for security compliance observations - High |
RiskRating:: Moderate | Risk rating for security compliance observations - Moderate |
RiskRating::Low | Risk rating for security compliance observations - Low |
RiskRating:: OFI | Risk rating to identify Opportunities for Improvement (OFI) |
ObservationManager::*** | GitLab team member managing the observation through the observation phases. |
Blocked:: Awaiting Remediation Owner Input | This flags indicates the observation manager is waiting for response from the remediation owner. |
Blocked:: Awaiting Observation Manager Input | This flags the issue for the observation manager on the SecAssurance team |
Blocked:: New tool implementation in progress | This flags the issue for pending completion of the new tool |
Upgraded::StORM-Managed | This label will be leverage when the observation has been upgraded to a tier 2 risk and will be managed in the StORM program |
Upgraded::StORM-Shared | This label will be leverage when the observation has been upgraded to a tier 2 risk and remediation is shared by the Security Risk and Security Compliance team |
NIST CSF Function:*** | Identifies observations within the NIST CSF function |
NIST CSF Category:*** | Identifies observations within the NIST CSF category |
seccomp program:*** | Identifies which program or external certification is affected by the observation |
system::*** | Identifies what system is impacted by the observation |
Identifying Observations
Observations can be identified through the following channels:
- Security control testing activities (CCM)
- Business Impact Analysis (BIA) activities
- External audit activities
- Gap assessment activities
- Ad-hoc issues
Assigning Observations
The observation identifier is responsible for opening an observation in the GitLab Observation Project. The observation identifier fills out all necessary observation information, remediation recommendations and submits the observation to the Remediation Owner for validation. The Observation Manager is responsible for managing the observation through the observation lifecycle. This includes linking the observation to the associated control in Hyperproof, validating the observation with the Remediation Owner, tracking all remediation progress and updating the GitLab issue with current information and status updates. Each observation has both a GitLab Issue (for Remediation Owners) and a Hyperproof Issue (for Observation Managers). Each observation will be assigned a risk rating, which should drive the priority of remediation.
Drafting Observation Description Guidance
The Observation description should include the who, what, when, where, why, and how related to the observation. As a review step, if you knew nothing about this observation could you understand the finding, how it was identified, and the effect it has on objectives? Consider leveraging the 4C’s model:
- Condition - current state
- Criteria - desired state based on policy, requirement, control, regulation, etc.
- Cause - root cause of the observation
- Consequence - actual or potential effect on objectives/assets
Risk Ratings
Tier 3 information system risk ratings are based off the formula below.
Risk Rating = Likelihood x Impact
Determining Likelihood
Step 1: Define likelihood based on the below criteria and likelihood table
At GitLab, observations will be rated based on the likelihood the observation has recurring and/or the frequency that the control has seen observations. The criteria used to assess this likelihood can be found in the Likelihood Table below. There are two different definitions for each likelihood rating level, “control observation” and “information system risk (tier 3)”. These definitions delineate the factors that may be considered when thinking of an individual observation from a control perspective and an information system risk perspective. Each should be considered when determining the likelihood of an observation occurring.
- Control Observation: This criteria is utilized to rate observations identified as an output of control testing (e.g. where control testing performed internally by Security Compliance has failed). The assumption of the Likelihood Table is to consider observations individually rather than in aggregate (i.e if 2 similar observations occur against a single test of a sample of 25, the failure rate is 8% and would be scored a 3. The control does not need to be tested multiple times in the current year or prior 9 months with an observation each time to meet the requirement for a score of 3).
- Information System Risk (Tier 3): This criteria is utilized to score the likelihood of an information system being exploited (e.g. insufficient encryption mechanisms for the storage of data within
[System Name]
result in the unintentional exposure/leakage of this information to the public).
Likelihood Table
Qualitative Score | Description | |
---|---|---|
1 | Control Observation: The observation noted is considered to be a one off occurrence for the control as a result of extenuating circumstances. It is unlikely to occur again once remediated. Information System Risk: Theoretically impossible and/or requires significant technical expertise for the risk to be exploited. |
|
2 | Control Observation: The observation was identified as a result of management's oversight on the control and may potentially occur again. This is the only observation associated with the control in the current fiscal year or prior 9 months, whichever is longer. Information System Risk: Even with technical expertise, it is somewhat difficult to exploit the risk. |
|
3 | Control Observation: The control has had multiple observations in the current fiscal year or prior 9 months, whichever is longer. Information System Risk: Minimal expertise is required to exploit the risk. |
|
4 | Control Observation: The control has observations that have persisted and continue to occur year to year AND/OR the observation noted is associated with the design of the control. Information System Risk: The risk can be easily exploited and does not require any technical expertise. |
Determining Impact
Step 2: Define impact based on the below criteria and impact table
In addition to applying a qualitative scoring factor for likelihood, all observations need to be evaluated for the impact they would have on GitLab at the organization level and/or the compliance impact (if applicable). The criteria and qualitative scores for assessing the impact of an observation can be found in the Impact Scoring Table below. The highest rating in any field is the final impact score of the observation so as to approach observations in a more conservative manner (i.e if all fields are rated at a value of 2 except Remediation Effort which is scored a 3, the final impact score would be a 3).
Important Note: Team members who are leveraging the impact scoring criteria below may judgmentally select the impact factors most relevant to them. Internal Audit and Security Compliance utilize all columns when scoring observations identified as part of controls testing because there may be specific impacts to external compliance audit requirements as a result of these findings. Any information system risk identified outside of control testing may utilize the columns that are most relevant.
Impact Scoring Table
Qualitative Score | External Audit Impact | Remediation Effort | Financial Impact | Legal & Regulatory Impact | Stakeholder/ ICOFR (Internal Controls Over Financial Reporting) Impact |
---|---|---|---|---|---|
1 | The observation would not lead to an adverse audit opinion. | The observation was related to extenuating circumstances and requires simple reinforcement of policy/process, no additional management oversight required. | Observation has potential financial impact which results in loss / misstatement of up to $25K. | The observation would not lead to major action by a regulator. | The observation has minimal impact on all stakeholders (internal and external) |
2 | The observation would likely not lead to an adverse audit opinion because it is an isolated occurrence. | The observation has remediation effort that requires oversight/support at the management level. | Observation has potential financial impact which results in loss / misstatement between $25K to $250K. | The observation could lead to minor regulatory action. | The observation impacts internal stakeholders and or could lead to financial misstatements, if not addressed on time. |
3 | The observation is likely to result in an adverse audit opinion if a full sample for remediation testing cannot be provided. | The observation has remediation effort that requires oversight/support at the director level. | Observation has potential financial impact which results in loss / misstatement between $250K to $500K. | The observation could lead to an investigation or regulatory action. | The observation impacts internal and external stakeholders. It requires attention of Executives and Board. |
4 | The observation will result in an adverse audit opinion. | The observation has remediation effort that requires oversight/support at the Executive level. | Observation has potential financial impact which results in loss / misstatement above $ 500K | The observation could directly result in major regulatory action against GitLab. | The observation impacts internal and external stakeholders. It requires attention the of Executives and Board and could impact management assertion in 10Q / 10-K. |
Determining Risk Rating
Step 3: Determine risk rating based on likelihood and impact scores defined in steps 1 and 2
In order to arrive at a final observation risk rating, the likelihood and impact scores of an observation are multiplied together. The final score determined will determine whether or not the observation is a LOW, MODERATE, or HIGH risk observation using the Observation Risk Rating Table
Observation Risk Rating Table
Observation Risk Matrix | ||||
---|---|---|---|---|
Impact Score | ||||
Likelihood | 1 | 2 | 3 | 4 |
1 | 1 | 2 | 3 | 4 |
2 | 2 | 4 | 6 | 8 |
3 | 3 | 6 | 9 | 12 |
4 | 4 | 8 | 12 | 16 |
Observation Risk Thresholds | |
---|---|
LOW | 1 - 3 |
MODERATE | 4 - 9 |
HIGH | 12 - 16 |
Observation Risk Ratings
Tier 3 information system risk ratings are based off the STORM risk rating methodology.
Risk Rating = Likelihood x Impact
An observation’s risk rating is based on a judgmental assessment of both the Likelihood and Impact of the identified observation by the team member that identified and opened the observation. Judgmental elements considered may include:
- frequency of the same control observation
- if the observation will lead to a material weakness or external audit finding
- pervasiveness of the observation across multiple systems
- impact to internal and/or external stakeholders
- expertise to exploit the observation
Observation Remediation
Once all remediation activities have been completed, the Remediation Owner is responsible for tagging the Observation Manager in the observation issue. If there is no Observation Manager assigned, tag @gitlab-com/gl-security/security-assurance/security-compliance
in the observation issue.
It is the responsibility of the Observation Manager to track the milestones, work progress and validation of the remediation activity. The Observation Manager will then validate the remediation activity for completeness, re-test the observation (as applicable) and close the observation issue. If re-testing does not result in a fully effective conclusion, the observation description and remediation recommendations may be updated to reflect the new findings and required remediation tasks.
Root Cause Observation Epics
If multiple observation issues relate to the same root cause or are blocked by the same component of work, these issues will be connected together into an Epic in order to more clearly see how multiple observations issues are connected.
A list of observation Epics can be found here.
Remediation SLA
Observation remediation SLA’s are determined by the risk rating of the individual observation. The following table shows the SLA for each risk rating:
Risk Rating | Remediation SLA | Remediation Goal |
---|---|---|
High | 6 months, or as otherwise defined by the agreed upon remediation plan | 4 weeks |
Moderate | 6-12 months, or as otherwise defined by the agreed upon remediation plan | 6 weeks |
Low | > 12 months, or as otherwise defined by the agreed upon remediation plan | 8 weeks |
Opportunities for Improvement (OFI)
Throughout the course of testing or general monitoring of the GitLab ecosystem, Opportunities for Improvement (OFI) may be identified and documented so that the overall control environment and GitLab’s processes can be improved.
OFI’s do not have defined remediation SLA’s as they are process improvements or suggestions only. The Remediation Goal to communicate the OFI to the appropriate stakeholder is 10 weeks.
What is the difference between an OFI and an Observation?
- Observations are tied to specific testing attributes, GCF controls and/or reflect areas where a third party compliance professional would be of the opinion that a relevant risk wouldn’t be or hasn’t been, mitigated.
- OFIs are not tied to specific testing attributes or GCF controls and are general areas of improvement that may streamline compliance or business activities.
- Observations will always impact control effectiveness ratings
- OFIs will never impact control effectiveness ratings
Criteria for Upgrading Observations To Tier 2 Risks
Criteria and procedures
The observation program is a key input to the StORM program, which manages tier 2 security operational risks. When the following criteria is met, it is an indicator that a larger risk exists and is upgraded to a tier 2 operational risk and therefore included in the StORM program. This criteria is as follows:
- An observation in an entity level control
- When multiple observations share root cause and are grouped in an observation epic. Observation epics are a group of observations spanning multiple systems that have shared root cause and remediation paths.
Security Compliance Workflow
graph TD A[Observation Opened] A --> B{Observation meets<br>criteria for upgrading} B --> C{Yes} B --> |No| G(Follow Observation<br>Management Process) C --> |Observation Epic| E[Tag Risk, apply upgraded label] C --> |ELC| F[Tag Risk, apply upgraded label] F --> H[Risk is managed in <br> StORM program at tier 2 level] E --> I[Work with risk on collaborative remediation<br>for both Tier 2 and Tier 3 issues]
Security Risk Workflow
flowchart TD A[Risk Team is tagged in a risk<br>meeting criteria for upgrading] A --> B{Type of<br>observation} B --> C[ELC] B --> D(Observation Epic) C --> E{Does a Risk<br>already exist?} E --> |Yes| F[Map related Risk,<br>update into risk info if appropriate] E --> |No| H[Follow Risk<br>Runbook for new risks] H --> G(Risk is treated and<br>managed in StORM Program) F --> G D --> J{Does a Risk<br>already exist?} J --> |Yes| K[Map related Risk,<br>update into risk info if appropriate] J --> |No| L[Follow Risk<br>Runbook for new risks] L --> M(Work with SecComp<br>on Remediation) K --> M
Detailed write up:
- Open an observation following the Observation Intake runbook (internal only).
- If the observation meets the criteria for being upgraded, tag the StORM DRI and apply label ~upgraded::storm-managed if an ELC or ~upgraded:storm-shared if added to an observation epic.
- Definitions of labels:
Upgraded::StORM-Managed
: StORM risk managers are solely responsible for tracking remediation activitiesUpgraded::StORM-Shared
: Remediation of the observation and risk is shared by the StORM risk managers and the observation manager. The StORM risk manager may track remediation activities spanning multiple systems via a common initiative, while the observation manager would be responsible for remediation of the specific system. See the collaborative remediation section for more details.
- Definitions of labels:
- When the Security Risk team is tagged, someone on that team will determine if there is a risk represented for the observation meeting the criteria.
- If there is an existing risk, they will map the observation to the risk and leave a comment in the GitLab issues for transparency.
- If there is not an existing risk, they will open a new risk following the StORM Risk Intake runbook (internal only).
- An entity level control, the observation will be entirely managed by the StORM program at the tier 2 risk level, represented by the
Upgraded::StORM-Managed
label. - If the Observation is not an entity level control, Security Compliance will work with Security Risk for collaborative remediation with the remediation owner(s).
Collaborative Remediation
Security Compliance and Security Risk should look for opportunities to remediate via aggregated/common controls. In the event that observations can be remediated via a common control or implementation, activities can be tracked by the Security Risk team. For example, if we have systems that are not meeting password requirements and remediation across multiple systems involves integrating with Okta, this roll-out can be tracked by Security Risk. If remediation is system-specific, remediation activities can be tracked by Security Compliance. Remediation testing will be completed by which ever team is tracking remediation activities using the Security Compliance remediation runbook.
Status Labels
Defined below are status labels that will aide in the process of managing remediation of observations.
Label | Definition |
---|---|
Blocked:: Awaiting Remediation Owner Input |
This flags indicates the observation manager is waiting for response from the remediation owner. |
Blocked:: Awaiting Observation Manager Input |
This flags the issue for the observation manager on the SecAssurance team |
Blocked:: New tool implementation in progress |
This flags the issue for pending completion of the new tool |
Upgraded::StORM-Managed |
This label will be leverage when the observation has been upgraded to a tier 2 risk and will be managed in the StORM program |
Upgraded::StORM-Shared |
This label will be leverage when the observation has been upgraded to a tier 2 risk and remediation is shared by the Security Risk and Security Compliance team |
Metrics and Reporting
The observation management program dogfoods GitLab features for metric and reporting. Please refer to the observation management project’s insight charts and issue boards for metrics for all observations by risk, status, and department.
Exceptions
Exceptions will be created for observations that breach a mutually agreed upon remediation date, breach in SLA or if the Remediation Owner confirms the observation will not be remediated.
Exceptions to this procedure will be tracked as per the Information Security Policy Exception Management Process.
References
Contact & Feedback
If you have any questions or feedback about the observation management process please contact the GitLab Security Assurance Team.
378e2e38
)