GitLab Security Compliance Controls

Security controls are a way to state our company’s position on a variety of security topics. It’s not enough to simply say “We encrypt data” since our customers and teams will naturally want to know “what data do we encrypt?” and “how do we encrypt that data?”. When all of our established security controls are operating effectively this creates a security program greater than the sum of its parts. It demonstrates to our stakeholders that GitLab has a mature and comprehensive security program that will provide assurance that data within GitLab is reasonably protected.

GitLab Control Framework (GCF)

We have tried to take a comprehensive approach to our immediate and future security compliance needs. Older and larger companies tend to treat each security compliance requirement individually which results in independent security compliance teams going out to internal teams with multiple overlapping requests. For example, at such a company you might have one database engineer that is asked to provide evidence of how a particular database is encrypted based on SOC2 requirements, then again for ISO requirements, then again for FedRAMP requirements. This approach can be visualized as follows:

graph TD;
    SOC2_Requirement1-->Team1;
    SOC2_Requirement1-->Team2;
    SOC2_Requirement2-->Team1;
    SOC2_Requirement2-->Team2;
    FedRAMP_Requirement1-->Team1;
    ISO_Requirement1-->Team2;

Given our efficiency value here at GitLab we wanted to create a set of security controls that would address multiple underlying requirements with a single security control which would allow us to make fewer requests of our internal teams and efficiently collect all evidence we would need for a variety of audits at once. This approach can be visualized as follows:

graph TD;
    SOC2_Requirement1-->GCF;
    SOC2_Requirement2-->GCF;
    FedRAMP_Requirement1-->GCF;
    ISO_Requirement1-->GCF;
    GCF-->Team1;
    GCF-->Team2;

As our security compliance goals and requirements have evolved so have our requirements and constraints related to our security control framework. Our GCF is currently based on NIST SP 800-53.

Security Control Lifecycle

The lifecycle of our security controls can be found at this handbook page. As part of the security control lifecycle, all GCF security controls are reviewed and tested at a minimum on an annual basis or as required by regulation.

GCF security controls are assessed at the entity level or the system level depending upon the nature of the control.

GCF security controls assessed at system level are based upon the system’s critical system tiering. Dependent upon the system’s tier, a subset of GCF controls are evaluated based upon overall risk and impact to the organization. This is broken out as follows:

Tier GCF Control Scope ZenGRC Link
Tier 0 Entity Entity-Level Controls Link
Tier 1 Mission Critical All “In-Scope” System-Level Controls Link
Tier 2 Business Critical Subset of System-Level Controls Link

Note that to arrive at all controls that are Tier 1 you must filter for all controls with Tier 1 OR Tier 2 designation (since all Tier 2 controls also are included in Tier 1). The filters above have accounted for this nuance and can be confirmed by selecting “Filter” in the top right of ZenGRC and confirming filters being applied.

Control Ownership

Control Owner - Ensures that the design of the control and the control activities operate effectively and is responsible for remediation of any control activities that are required to bring that control into a state of audit-readiness.

Process Owner - Supports the operation of the control and carries out the process designed by the control owner. The process owner is most likely to be interviewed by an auditor to determine whether or not the process is operating as intended.

Security Control Changes

The GitLab Security Compliance team is responsible for ensuring the consistency of the documentation of the security controls listed below. While normally we welcome any GitLab team member to make edits to handbook pages, please be aware that even small changes to the wording of any of these controls impacts how they satisfy the requirements for the security frameworks they map to. Because of this, we ask any changes that need to be made to this page and the underlying guidance pages to start with a message in the #sec-assurance slack channel. The compliance team will then engage with you and make any appropriate changes to these handbook pages.

GitLab IT General Controls (ITGCs)

ITGCs are a subset of the GCF controls. Please refer to GitLab SOX ITGC Compliance (internal only) for details.

Security System Intake

To assess newly acquired/developed systems that enable security controls OR are/may be in scope for compliance programs for potential inclusion into our GitLab Control Framework (GCF) and compliance programs (e.g., Security Compliance Program and SOX Program).

1. System identification

Our goal is to identify systems that enable security controls (e.g., access management system) OR systems that are (or may be) subject to regulatory (e.g., SOX) or compliance requirements (SOC2) as early as possible. As we develop new features/systems and engage with third parties for services, we assess the use of the system and whether or not it meets the criteria described above. Existing systems can also be ingested into the Security Compliance Intake process. Examples of these could include systems whose functionality has expanded to support security controls or instances where our understanding of a security control has improved resulting in the identification of a previously uncredited supporting system.

If the system meets the criteria, we open up a new Security Compliance Intake Issue.

2. Creating Security Compliance Intake Issue

Security Compliance Intake Issue asks the author to include details related to the system including:

  • System overview
  • Implemented security controls or impacted regulatory or compliance program
  • Link to TPRM reviews or Production Readiness reviews
  • Critical System Tier (CST)
  • Key Contact Details
  • Deployment model and implementation status
  • Data classification
  • Regulatory scope (supported by Security Compliance and Internal Audit) The author of the issue completes as much of the issue as they can and assigns it to the Security Risk team for completion/triage (if the issue is not originally created by the Security Risk team).

3. Security Compliance workflow

Once the Security Compliance Intake issue is populated, Security Risk assigns the issue to the Security Compliance team to complete the following tasks to incorporate the system into our Security Compliance Program:

  • Notify stakeholders and system owners of upcoming testing requirements
  • Incorporate testing requirements (driven by CST and regulatory/compliance requirements) and recommendations into the fiscal year audit schedule
  • Determine when user access reviews for the new system need to start and communicate to compliance teams

List of NIST 800-53 controls by family (Used by Commercial and Dedicated teams beginning FY24 Q1)

Detailed sub-controls are included in the various control family pages

For full control descriptions where they have yet to be completed OR where full details of the control are required, please visit the corresponding control page on the official NIST page

Note: In some instances, GitLab has created custom controls for the GCF which expand upon the NIST framework. GitLab has applied the NIST naming convention to these controls for ease of control family grouping. If you cannot find corresponding NIST control guidance for a GCF control on the official NIST page, it’s likely a custom control. Please reach out to #sec-assurance in Slack for any questions regarding any controls.

Access Control (AC)

Access Control (AC)

This control family contains controls that cover access to systems, networks, and devices. Controls provide guidance on the implementation of access policies, account management, and topics like user privileges; aiming to lower the risk of unapproved access to a range of systems, devices, or networks.

Control Title Description
AC-1 Policy and Procedures Develop, document, and disseminate an access control policy and procedures that address the controls in the Access Control (AC) family implemented within GitLab Inc. and its associcated in-scope systems.
AC-2 Account Management v2 Develop and document processes for defining, authorizing, monitoring, and modifying user access to GitLab’s systems.
AC-2(3) Account Management - Disable Accounts v2 To be completed.
AC-3 Access Enforcement Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
AC-3(7) Access Enforcement - Role-based Access Control To be completed.
AC-4 Information Flow Enforcement Enforce approved authorizations for controlling the flow of information within and between GitLab’s systems.
AC-6(5) Least Privilege - Privileged Accounts Restrict privileged access to appropriate individuals while adhering to the principle of least privilege when determining who receives privileged access.
AC-6(7) Least Privilege - Review of User Privileges v2 Perform an access review of all account privileges to ensure principle of least privilege is adhered to for all accounts.
AC-7(2) Unsuccessful Logon Attempts - Purge or Wipe Mobile Device To be completed.
AC-17 Remote Access v2 Establish requirements and authorization controls before allowing remote access connections to GitLab’s systems.
AC-17(2) Remote Access - Protection of Confidentiality and Integrity Using Encryption To be completed.
AC-18 Wireless Access Establish requirements and authorization controls before allowing wireless network connections to GitLab’s systems.
AC-18(1) Wireless Access - Authentication and Encryption To be completed.
AC-19 Access Control for Mobile Devices Establish requirements and authorization controls before allowing mobile device connections to GitLab’s systems.
AC-19(5) Access Control for Mobile Devices - Full Device or Container-based Encryption To be completed.
AC-21 Information Sharing Develop, document, and disseminate information classification and sharing guidance for users.
AC-22 Publicly Accessible Content Implement a process to remove nonpublic information and to review and approve content prior to opening such content to the public.
Awareness & Training (AT)

Awareness & Training (AT)

This control family helps to ensure users of information systems are adequately trained to identify threats. A particular focus is improving awareness of different operational risks and threats to privacy or system security. Requirements around the creation of training policy, records, and feedback helps to fine-tune the organization’s approach to cybersecurity training.

Control Title Description
AT-1 Policy and Procedures Develop, document, and disseminate a training policy and procedures that address the controls in the Awareness and Training (AT) family implemented within GitLab Inc.
AT-2 Literacy Training and Awareness Provide security and privacy literacy training to team members and incorporate lessons learned from internal or external security incidents or breaches.
AT-2(2) Literacy Training and Awareness - Insider Threat To be completed.
AT-3 Role-based Training Provide role-based security and privacy training to appropriate team members and incorporate lessons learned from internal or external security incidents or breaches where appropriate.
AT-4 Training Records Document and monitor security and privacy training activities and retain associated training records.
Audit and Accountability (AU)

Audit and Accountability (AU)

This control family provides guidance on procedures for event logging and auditing. Controls cover the baseline content of audit records, the capacity of log storage, and the process for monitoring and reviewing logs. Log audits are an important part of identifying the cause of breaches or system issues, and are a tool for accountability.

Control Title Description
AU-1 Policy and Procedures Establishment of audit and accountability policy and procedures that address the controls in the AU family implemented within systems and organizations.
AU-2 Event Logging v2 Identify events for logging that are relevant to the security of systems and the privacy of individuals and implement a program to support GitLab’s event logging requirements.
AU-3 Content of Audit Records v2 Audit record content that may be necessary to support the auditing function of event outcomes including indicators of event success or failure and event-specific results, such as system security and privacy posture after the even occurred.
AU-6(4) Audit Record Review, Analysis, and Reporting - Central Review and Analysis To be completed.
AU-6(5) Audit Record Review, Analysis, and Reporting - Integrated Analysis of Audit Records To be completed.
AU-11 Audit Record Retention v2 Retaining audit records for organization-defined time period consistent with records retention policy to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.
Assessment, Authorization, and Monitoring (CA)

Assessment, Authorization, and Monitoring (CA)

This control family focuses on the continuous monitoring and improvement of security and privacy controls. It covers the creation of an assessment plan and the delegation of the team to carry out control assessment. Controls also cover the creation of a plan of action and milestones (POAM), an integral document for identifying and fixing vulnerabilities or weaknesses.

Control Title Description
CA-1 Policy and Procedures Establishment of assessment, authorization, and monitoring policy and procedures that address the controls in the CA family implemented within systems and organizations.
CA-2 Control Assessments Selection of assessors with the required skills and technical expertise to develop effective assessment plans to determine the accuracy and completeness of whether the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting requirements.
CA-2(1) Control Assessments - Independent Assessors To be completed.
CA-2(2) Control Assessments - Specialized Assessments To be completed.
CA-2(3) Control Assessments - Leveraging Results from External Organizations To be completed.
CA-3 Information Exchange System information exchange requirements between two or more systems.
CA-7 Continuous Monitoring Continuous monitoring facilitating ongoing awareness of the system security and privacy posture to support organizational risk management decisions.
CA-7(1) Continuous Monitoring - Independent Assessment To be completed.
CA-7(3) Continuous Monitoring - Trend Analyses To be completed.
CA-8 Penetration Testing Specialized testing to identify vulnerabilities that could be exploited by adversaries.
CA-8(1) Penetration Testing - Independent Penetration Testing Agent or Team To be completed.
CA-9 Internal System Connections Connections between organizational systems and separate constituent system components.
Configuration Management (CM)

Configuration Management (CM)

This control family focuses on the configuration of software and devices on the network. Controls cover the creation of a configuration policy, the creation of a baseline configuration of the system, and the management of unauthorized configuration or devices. Configuration controls lower the risk of unauthorized hardware or software being installed on the system, or vulnerabilities caused by changes to settings.

Control Title Description
CM-1 Policy and Procedures Establishment of configuration management policy and procedures that address the controls in the CM family implemented within systems and organizations.
CM-2 Baseline Configuration v2 Documented, formally reviewed, and agreed-upon specifications for systems or configuration items within those systems.
CM-3 Configuration Change Control v2 Systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades and modifications.
CM-4 Impact Analyses Analysis of changes to determine potential security and privacy impacts prior to change implementation.
CM-5 Access Restrictions for Change v2 Physical and logical access restrictions associated with changes to the system only by qualified and authorized individuals for purposes of initiating changes.
CM-6 Configuration Settings v2 Parameters that can be changed in the hardware, software, or firmware components that affect the security and privacy posture or functionality of the system.
CM-6(1) Configuration Settings - Automated Management, Application, and Verification To be completed.
CM-7(1) Least Functionality - Periodic Review To be completed.
CM-8 System Component Inventory Inventory for effective accountability of system components.
CM-8(3) System Component Inventory - Automated Unauthorized Component Detection To be completed.
CM-9 Configuration Management Plan v2 Established to satisfy the requirements in configuration management policies while being tailored to individual systems defining processes and procedures for how configuration management is used to support system development life cycle activities.
CM-10 Software Usage Restrictions Software license tracking in accordance with contract agreements and copyright laws.
CM-10(1) Software Usage Restrictions - Open-source Software To be completed.
CM-11 User-installed Software Established policies governing the permitted and prohibited actions regarding software installation by users.
CM-11(2) User-installed Software - Software Installation with Privileged Status To be completed.
Contingency Planning (CP)

Contingency Planning (CP)

This control family prepares organizations for system failures and breaches. Controls cover the planning for alternative processing or storage sites and the creation of system backups to help mitigate system downtime. Other controls focus on contingency planning, including training and plan testing. This family of controls is important for mitigating the damage from a system outage or network breach, establishing clear plans to restore normal operation.

Control Title Description
CP-1 Policy and Procedures Establishment of contingency planning policy and procedures that address the controls in the CP family implemented within systems and organizations.
CP-2 Contingency Plan v2 Achieving continuity of operations for organizational mission and business functions to address system restoration and implementation of alternative mission or business processes when systems are compromised or breached.
CP-2(2) Contingency Plan - Capacity Planning To be completed.
CP-3 Contingency Training Assignment of roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training.
CP-4 Contingency Plan Testing v2 To determine the effectiveness of the plans and identify potential weaknesses.
CP-6 Alternate Storage Site The maintainence of duplicate copies of information and data and processing capability if the primary storage site is not available.
CP-7 Alternate Processing Site Geographically distinct processing sites providing processing capability if the primary processing site is not available.
CP-9 System Backup v2 Mechanisms employeed to protect the integrity of system-level and user-level information.
CP-9(1) System Backup - Testing for Reliability and Integrity To be completed.
CP-9(6) System Backup - Redundant Secondary System To be completed.
CP-10 System Recovery and Reconstitution v2 The execution of contingency plan activities for recovery and reconstitution of the system to a known state within an organziation-defined time period consist with recovery time and recovery point objectives after a disruption, compromise, or failure.
Identification and Authentication (IA)

Identification and Authentication (IA)

This control family controls the reliable identification of users and devices. Different controls focus on different elements of safe user or device authentication. Controls strengthen user management policies, lowering the risk of unauthorized access to the system.

Control Title Description
IA-1 Policy and Procedures Establishment of identification and authentication policy and procedures that address the controls in the IA family implemented within systems and organizations.
IA-2 Identification and Authentication (organizational Users) To uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.
IA-2(1) Identification and Authentication (organizational Users) - Multi-factor Authentication to Privileged Accounts v2 To be completed.
IA-5 Authenticator Management v2 To manage system authenticators.
IA-5(1) Authenticator Management - Password-based Authentication To be completed.
IA-5(6) Authenticator Management - Protection of Authenticators To be completed.
Incident Response (IR)

Incident Response (IR)

This control family controls all aspects of responding to a serious incident. This includes training and planning for potential incidents, as well as plans for actively monitoring and responding to incidents as they occur. Enhanced controls cover specific types of incidents that distinct organizations might face. Incidents may include data breaches, breakdowns in the supply chain, public relations damage, or malicious code in the system.

Control Title Description
IR-1 Policy and Procedures Establishment of incident response policy and procedures that address the controls in the IR family implemented within systems and organizations.
IR-2 Incident Response Training Training associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training.
IR-3 Incident Response Testing The testing of incident response capabilities to determine their effectiveness and identify potential weaknesses or deficiencies.
IR-4 Incident Handling To implement incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.
IR-5 Incident Monitoring To track and document incidents.
IR-6 Incident Reporting The requirement for personnel to report suspected incidents.
IR-8 Incident Response Plan v2 To develop and implement a coordinated approach for incident response capability.
IR-9(2) Information Spillage Response - Training To be completed.
IR-9(3) Information Spillage Response - Post-spill Operations To be completed.
IR-9(4) Information Spillage Response - Exposure to Unauthorized Personnel To be completed.
Maintenance (MA)

Maintenance (MA)

This control family deals with all elements of system maintenance, including software updates, logging, and inspection tools. It covers the need for timely maintenance to lower the risk of operational outages, and outlines policy and the management of maintenance personnel.

Control Title Description
MA-1 Policy and Procedures Establishment of maintenance policy and procedures that address the controls in the MA family implemented within systems and organizations.
Media Protection (MP)

Media Protection (MP)

This control family covers the use, storage and safe destruction of media and files helping to lower the risk of information breaches and leaks.

Control Title Description
MP-1 Policy and Procedures Establishment of media protection policy and procedures that address the controls in the MP family implemented within systems and organizations.
MP-2 Media Access Restrict access to organization-defined types of digital and/or non-digital media to an organization-defined personnel or roles.
MP-3 Media Marking To mark system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and exempt organization-defined types of system media from marking if the media remain within organization-defined controlled areas.
MP-5 Media Transport To protect and control organization-defined types of system media during transport outside of controlled areas using organization-defined controls.
MP-5(3) Media Transport - Custodians To be completed.
MP-6 Media Sanitization To sanitize all digital and non-digital system media subject to disposal or reuse, whether or not the media is considered removable.
MP-6(2) Media Sanitization - Equipment Testing To be completed.
MP-6(8) Media Sanitization - Remote Purging or Wiping of Information To be completed.
MP-7 Media Use To restrict or prohibit the use of organization-defined types of system media on organization-defined systems or system components and prohibit the use of portable storage devices in organizational systems when such devices have no identifiable owner.
Physical and Environmental Protection (PE)

Physical and Environmental Protection (PE)

This control family covers physical access to devices and facilities, and the mitigation of threats to facilities. Controls cover policies for physical access to system controls, including monitoring access and visitors, as well as the monitoring of devices and assets. Other controls cover responses to physical threats, such as emergency lighting or power and the relocation to alternative facilities.

Control Title Description
PE-1 Policy and Procedures Establishment of physical and environmental protection policy and procedures that address the controls in the PE family implemented within systems and organizations.
Planning (PL)

Planning (PL)

This control family covers privacy and system security plans (SSPs), including system architecture, management processes, and the setting of baseline system settings.

Control Title Description
PL-1 Policy and Procedures Establishment of planning policy and procedures that address the controls in the PL family implemented within systems and organizations.
PL-2 System Security and Privacy Plans Scoped to the system and system components within the defined authorization boundary and contain an overview of the security and privacy requirements for the system and the controls selected to satisfy the requirements.
PL-4 Rules of Behavior To establish and provide to individuals requiring access to the system, the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy.
PL-4(1) Rules of Behavior - Social Media and External Site/application Usage Restrictions To be completed.
PL-8 Security and Privacy Architectures To be consistent with the organization-wide security and privacy architectures, which are integral to and developed as part of the enterprise architecture.
PL-10 Baseline Selection Predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest.
Program Management (PM)

Program Management (PM)

This control family covers all elements of the management of an information system, including a variety of processes, programs, and plans. This includes an information security program plan, risk management strategy, and critical infrastructure plan.

Control Title Description
PM-1 Information Security Program Plan Establishment of a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
PM-2 Information Security Program Leadership Role To appoint a senior agency information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.
PM-2(1) Information Security Program Leadership Role - Board of Directors Oversight and Communication To be completed.
PM-3 Information Security and Privacy Resources To include the resources needed to implement the information security and privacy programs in capital planning and investment requests and document all exceptions to this requirement.
PM-4 Plan of Action and Milestones Process Developed with an organization-wide perspective, prioritizing risk response actions and ensuring consistency with the goals and objectives of the organizations.
PM-6 Measures of Performance To develop, monitor, and report on the results of information security and privacy measures of performance.
PM-8 Critical Infrastructure Plan To address information security and privacy issues in the development, documentation, and updating of a critical infrastructure and key resources protection plan.
PM-9 Risk Management Strategy To establish an expression of the security and privacy risk tolerance for the organization, security and privacy risk mitigation strategies, acceptable risk assessment methodologies, a process for evaluating security and privacy risk across the organization with respect to the organization’s risk tolerance, and approaches for monitoring risk over time.
PM-9(1) Risk Management Strategy - Fraud Considerations To be completed.
PM-9(2) Risk Management Strategy - Significant Change Considerations To be completed.
PM-10 Authorization Process To manage the security and privacy state of organizational systems and the environments in which those systems operate through authorization processes.
PM-11 Mission and Business Process Definition To define organizational mission and business processes with consideration for information security and privacy and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
PM-15 Security and Privacy Groups and Associations To establish ongoing contact with security and privacy groups and associations in an environment of rapidly changing technologies and threats.
PM-18 Privacy Program Plan To develop and disseminate a formal document that provides an overview of an organization’s privacy program.
PM-20 Dissemination of Privacy Program Information To maintain a central resource webpage on the organization’s principal public website that serves as a central source of information about the organization’s privacy program.
PM-20(1) Dissemination of Privacy Program Information - Privacy Policies on Websites, Applications, and Digital Services To be completed.
PM-21 Accounting of Disclosures To develop and maintain an accurate accounting of disclosures of personally identifiable information.
PM-22 Personally Identifiable Information Quality Management Steps that organizations take to confirm the accuracy and relevance of personally identifiable information throughout the information life cycle.
PM-25 Minimization of Personally Identifiable Information Used in Testing, Training, and Research Develop, document and implement policies and procedures to address the use of personally identifiable information for internal testing, training, and research.
PM-26 Complaint Management To implement a process for receiving and responding to complaints, concerns, or questions from individuals about the organizational security and privacy practices.
PM-28 Risk Framing To identify the assumptions, constraints, risk tolerance, priorities, and trade-offs when conducted at the organization level and in consultation with stakeholders throughout the organization including mission, business, and system owners.
PM-29 Risk Management Program Leadership Roles Senior accountable official for risk management leads the risk executive (function) in organization-wide risk management activities.
PM-30 Supply Chain Risk Management Strategy To develop an organization-wide strategy for managing supply chain risks associated with the development, acquisition, maintenance, and disposal of systems, system components, and system services.
Personnel Security (PS)

Personnel Security (PS)

This control family covers different policies and procedures around the management of personnel. This includes the process for terminating personnel contracts and the relative risk of each position to information security.

Control Title Description
PS-1 Policy and Procedures Establishment of personnel security policy and procedures that address the controls in the PS family implemented within systems and organizations.
PS-2 Position Risk Designation To establish the foundation of an effective and consistent suitability and personnel security program.
PS-3 Personnel Screening To screen individuals prior to authorizing access to the systems.
PS-3(1) Personnel Screening - Classified Information To be completed.
PS-3(3) Personnel Screening - Information Requiring Special Protective Measures To be completed.
PS-4 Personnel Termination Termination of individual employment.
PS-5 Personnel Transfer Permanent reassignments or transfers of individuals or of such extended duration as to make the actions warranted.
PS-6 Access Agreements Signed access agreements with acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational systems to which access is authorized.
PS-6(2) Access Agreements - Classified Information Requiring Special Protection To be completed.
PS-7 External Personnel Security To establish personnel security requirements, including security roles and responsibilities for external providers.
PS-8 Personnel Sanctions To employ a formal sanctions process for individuals failing to comply with established information security and privacy policies and procedures.
PS-9 Position Descriptions To establish specification of security and privacy roles in individual organizational position descriptions to facilitate clarity in understanding the security or privacy responsibilities associated with the roles and the role-based security and privacy training requirements for the roles.
Personally Identifiable Information (PII) Processing and Transparency (PT)

Personally Identifiable Information (PII) Processing and Transparency (PT)

This control family helps to safeguard sensitive data, focusing on consent and privacy. Organizations can lower the risk of data breaches by properly managing personally identifiable information.

Control Title Description
PT-1 Policy and Procedures Establishment of personally identifiable information processing and transparency policy and procedures that address the controls in the PT family implemented within systems and organizations.
PT-3 Personally Identifiable Information Processing Purposes To identify and document the purpose for processing providing organizations with a basis for understanding why personally identifiable information may be processed.
PT-9 Physical Copies To restrict, control, and track the creation and destruction of physical documents containing personally identifiable information.
Risk Assessment (RA)

Risk Assessment (RA)

This control family focuses on the assessment of system vulnerabilities and relevant risk. Controls cover the development of risk response procedures, and the use of vulnerability monitoring tools and processes.

Control Title Description
RA-1 Policy and Procedures Establishment of risk assessment policy and procedures that address the controls in the RA family implemented within systems and organizations.
RA-2 Security Categorization To describe the potential adverse impacts or negative consequences to organizational operations, organizational assets, and individuals if organizational information and systems are compromised through a loss of confidentiality, integrity, or availability.
RA-3 Risk Assessment To consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation.
RA-5 Vulnerability Monitoring and Scanning v2 To mnitor and scan for vulnerabilities in the system and hosted applications when new vulnerabilities potentially affecting the system are identified and reported.
RA-7 Risk Response To respond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.
RA-7(1) Risk Response - Insurance Considerations To be completed.
RA-8 Privacy Impact Assessments An analysis of how personally identifiable information is handled to ensure that handling conforms to applicable privacy requirements, determine the privacy risks associated with an information system or activity, and evaluate ways to mitigate privacy risks.
RA-9 Criticality Analysis To identify critical system components and functions by performing a criticality analysis.
System and Services Acquisition (SA)

System and Services Acquisition (SA)

This control family includes the allocation of resources and the creation of system development life cycles. Controls help organizations create a safe acquisition process for new systems and devices, safeguarding the integrity of the wider system and data. Controls also cover the development and testing process for new systems, including developer training and security processes.

Control Title Description
SA-1 Policy and Procedures Develop, document, and disseminate system and services acquisition policy and procedures that address the controls in the Service Acquisition (SA) control family implemented within GitLab Inc. and it’s associated in-scope systems and services.
SA-2 Allocation of Resources Allocate required resources to protect information security and privacy requirements related to system and services acquisition and sustainment as part of the business planning and capital planning and investment process.
SA-3 System Development Life Cycle Establish a system development life cycle to support the successful development, implementation, and operation of GitLab’s systems.
SA-4 Acquisition Process Establish an acquisition process covering security and privacy requirements to support system, system component and system service acquisitions and implementations.
SA-4(1) Acquisition Process - Functional Properties of Controls To be completed.
SA-4(2) Acquisition Process - Design and Implementation Information for Controls To be completed.
SA-4(8) Acquisition Process - Continuous Monitoring Plan for Controls To be completed.
SA-4(9) Acquisition Process - Functions, Ports, Protocols, and Services in Use To be completed.
SA-4(10) Acquisition Process - Use of Approved PIV Products To be completed.
SA-8 Security and Privacy Engineering Principles v2 Develop and implement systems security and privacy engineering principles in the specification, design, development, implementation, and modification of system and system components.
SA-9(1) External System Services - Risk Assessments and Organizational Approvals To be completed.
SA-9(2) External System Services - Identification of Functions, Ports, Protocols, and Services To be completed.
SA-9(3) External System Services - Establish and Maintain Trust Relationship with Providers To be completed.
SA-9(4) External System Services - Consistent Interests of Consumers and Providers To be completed.
SA-9(5) External System Services - Processing, Storage, and Service Location To be completed.
SA-15 Development Process, Standards, and Tools Establish a development process that supports GitLab’s change management program and addresses GitLab’s security and privacy requirements.
SA-21 Developer Screening Establish and implement access controls and screening criteria for external developers performing work on acquired systems and services.
System and Communications Protection (SC)

System and Communications Protection (SC)

This control family covers the protection of system boundaries and the safe management of collaborative devices. Controls provide in-depth guidance on set-up and ongoing management of systems, including access, partitions, and usage restrictions.

Control Title Description
SC-1 Policy and Procedures Establishment of system and communications protection policy and procedures that address the controls in the SC family implemented within systems and organizations.
SC-5 Denial-of-service Protection To protect against or limit the effects of denial-of-service events.
SC-7 Boundary Protection v2 To monitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system.
SC-7(5) Boundary Protection - Deny by Default — Allow by Exception To be completed.
SC-7(9) Boundary Protection - Restrict Threatening Outgoing Communications Traffic To be completed.
SC-7(10) Boundary Protection - Prevent Exfiltration To be completed.
SC-7(12) Boundary Protection - Host-based Protection To be completed.
SC-8 Transmission Confidentiality and Integrity v2 To protect the confidentiality and integrity of transmitted information.
SC-12 Cryptographic Key Establishment and Management To establish and manage cryptographic keys when cryptography is employed within the system.
SC-18 Mobile Code Develop and implement a program to define acceptable and unacceptable mobile code and mobile code technologies, and authorize, monitor, and control the use of mobile code within GitLab’s systems.
SC-18(1) Mobile Code - Identify Unacceptable Code and Take Corrective Actions To be completed.
SC-18(2) Mobile Code - Acquisition, Development, and Use To be completed.
SC-28 Protection of Information at Rest v2 To protect the confidentiality and/or integrity of information at rest.
SC-28(3) Protection of Information at Rest - Cryptographic Keys To be completed.
System and Information Integrity (SI)

System and Information Integrity (SI)

This control family focuses on maintaining the integrity of the information system. Controls cover topics like protection from malicious code and spam, and procedures for ongoing system-wide monitoring.

Control Title Description
SI-1 Policy and Procedures Establishment of system and information integrity policy and procedures that address the controls in the SI family implemented within systems and organizations.
SI-2 Flaw Remediation v2 To identify, report, and correct system flaws.
SI-3 Malicious Code Protection v2 To implement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
SI-4 System Monitoring v2 Internal and external monitoring of systems to detect attacks and indicators of potential attacks.
SI-4(23) System Monitoring - Host-based Devices v2 To be completed.
SI-5 Security Alerts, Advisories, and Directives To receive system security alerts, advisories, and directives from organization-defined external organizations] on an ongoing basis.
SI-12 Information Management and Retention To manage and retain information within the system and information output from the system to cover the full life cycle of information, in some cases extending beyond system disposal in accordance with applicable laws, executive orders, directives, regulations, policies, standards, guidelines and operational requirements.
SI-12(1) Information Management and Retention - Limit Personally Identifiable Information Elements To be completed.
SI-12(3) Information Management and Retention - Information Disposal To be completed.
SI-13 Predictable Failure Prevention To determine mean time to failure (MTTF) to address potential failures of system components that provide security capabilities.
SI-18 Personally Identifiable Information Quality Operations To confirm the accuracy and relevance of personally identifiable information throughout the information life cycle.
SI-18(4) Personally Identifiable Information Quality Operations - Individual Requests To be completed.
Supply Chain Risk Management (SR)

Supply Chain Risk Management (SR)

This control family covers policies and procedures to counter risks in the supply chain. This includes processes to assess and manage suppliers, and the inspection of supply chain systems and components.

Control Title Description
SR-1 Policy and Procedures Establishment of supply chain risk management policy and procedures that address the controls in the SR family implemented within systems and organizations.
SR-2 Supply Chain Risk Management Plan To develop a plan for managing supply chain risks associated with the dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers that present an increasing level of risk to an organization.
SR-2(1) Supply Chain Risk Management Plan - Establish SCRM Team To be completed.
SR-3 Supply Chain Controls and Processes To establish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of organization-defined system or system component in coordination with organization-defined supply chain personnel.
SR-3(3) Supply Chain Controls and Processes - Sub-tier Flow Down To be completed.
SR-3(4) Supply Chain Controls and Processes - Termination of Vendor and Business Partner Relationships To be completed.
SR-3(5) Supply Chain Controls and Processes - Confidentiality Commitments To be completed.
SR-3(6) Supply Chain Controls and Processes - Cloud Services - Shared Roles and Responsibilities Agreements To be completed.
SR-3(7) Supply Chain Controls and Processes - Cloud Services - Special Contractual Considerations To be completed.
SR-3(8) SOC Report CUEC Review Review of Service Provider CUECs to ensure adequate coverage of identified control areas passed onto the end user.
SR-4 Provenance To document, monitor, and maintain valid provenance of the systems, system components, and associated data.
SR-5 Acquisition Strategies, Tools, and Methods To employ acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks of organization-defined acquisition strategies, contract tools, and procurement methods.
SR-6 Supplier Assessments and Reviews To assess and review the supply chain-related risks associated with suppliers or contractors and the system, system component, or system service they provide.
SR-6(1) Supplier Assessments and Reviews - Testing and Analysis To be completed.
SR-8 Notification Agreements To establish agreements and procedures with entities involved in the supply chain for the system, system component, or system service.
SR-9 Tamper Resistance and Detection To implement a tamper protection program for the system, system component, or system service.
SR-9(1) Tamper Resistance and Detection - Multiple Stages of System Development Life Cycle To be completed.
SR-12 Component Disposal To dispose of organization-defined data, documentation, tools, or system components.

References

Return to the Security Compliance