Engaging the Security Engineer On-Call
The Security Incident Response Team (SIRT) is on-call 24/7/365 to assist with any security incidents. This handbook provides guidance to help identify the scope and severity of a potential security incident, followed by instructions on how to engage the Security Engineer On-Call (SEOC) if needed.
Information about SIRT responsibilities and incident ownership is available in the SIRT On-Call Guide.
Before engaging the SEOC, please review our severity and priority levels to ensure that the incident has been assigned the appropriate level of response.
Note: Additional information on Recovery Time Objective (RTO) and Recovery Point Objective (RPO)is available on the BPC Handbook page
The following items are out of scope for SIRT and should be escalated to the respective teams mentioned below:
- Vulnerability reports and HackerOne: please escalate to Application Security
- Abuse reports and DMCA notices: please escalate to Trust & Safety
- General Customer Inquiries: please escalate to Field Security
- Self-Managed Instances: please escalate to [TBD]
Low Severity Issues
For general Q&A, GitLab Security is available in the
#security channel in GitLab Slack.
For low severity, non-urgent issues, SIRT can be reached by mentioning
@sirt-members in Slack or by opening an issue with
/security in Slack.
Please be advised the SLA for Slack mentions is 6 hours on business days.
If you suspect you’ve received a phishing email and have not engaged with the sender, please see: What to do if you suspect an email is a phishing attack.
If you have engaged a phisher by replying to an email, clicking on a link, have sent and received text messages, or have purchased goods requested by the phisher, please engage the SEOC.
Engage the Security Engineer On-Call
If you have identified a security incident or you need immediate assistance from the SIRT:
- Slack: use the
The Slack command triggers SIRT’s Escalation Workflow and requests you file an incident using a form. This form asks questions about the incident that help the SIRT automatically determine severity and priority. Depending on which labels get assigned, the SEOC will be paged.
Below is the full form:
For more information on how the form is processed and labels are assigned, consult SIRT’s incident classification methodology.
The workflow uses your answers to create a new issue and track the reported incident. Please provide as many details as possible when answering the open questions to aid the SEOC in their investigation of the incident.
If the security incident prevents you from accessing Slack:
- Email: send an email with a brief description of the issue to
The SEOC will engage in the relevant issue within the appropriate SLA. If the SLA is breached, the Security Manager On-Call (SMOC) will be paged. Paging the SEOC via email also creates a new issue to track the incident being reported. You may provide a detailed explanation of the incident directly in the issue.
If paged, the SEOC will typically respond within 15 minutes and may have questions which require synchronous communication from the incident reporter. It is important when paging the SEOC that the incident reporter be prepared and available for this synchronous communication in the initial stage of the incident response.