Opportunistic Attacks
Opportunistic attacks are short (ideally a few days at most) more spontaneous initiatives than Stealth Operations. They can be done at any time, from any source IP address, and against any GitLab-managed asset without prior approval or notification.
Benefits include:
- They give GitLab more opportunities to practice detecting and responding to realistic threats in a controlled environment, allowing faster iteration on our defensive capabilities and investigation skills.
- They allow us to quickly demonstrate the impact of security concerns.
- They allow us to quickly act on this intelligence and demonstrate the impact of the security concern.
If vulnerabilities are discovered, we exploit them and work to safely demonstrate maximum impact. This may involve establishing persistence, escalating privileges, and other common attack techniques.
When immediate action is required, we follow the standard process for reporting an incident. For vulnerabilities that appear wide-spread or recurring, we create an issue inside the Vulnerability Management issue tracker to implement automated scanning capabilities.
We list examples of opportunistic attack techniques inside our rules of engagement.
Club Red
Club Red is our program that allows GitLab team members to help us discover and develop initial access vectors and optionally, collaborate with us to carry them out.
Occasionally team members reach out with a cool hack idea, often based on knowledge they have. Club Red aims to provide a way for them to collaborate with us develop their idea for a greater overall security result for GitLab.
If you are an internal GitLab team member with an interesting idea, please contact us.
89325fb5
)