Red Team

What Are You Looking For?

  • Is this the Red Team? / Is the activity I’m seeing part of a Red Team operation?” Did you find something potentially malicious and you think it might be us? 👉 Is this the Red Team?
  • I have some attacker related ideas that could be quite interesting!” 👉 Contact us
  • Do you do penetration testing?” 👉 No. 😄 We don’t do vulnerability enumeration. See Services we offer
  • I want to upskill in Red Teaming” 👉 See resources, Club Red
  • Can you hack me?” 👉 GitLab team members can sign up to our laptop opt-in programme
  • Can you help us with an incident? Does this look like hacker stuff in these logs?” 👉 Contact us
  • Can you help find bugs in GitLab the product?” 👉 You’re better off asking Security Research

Contact Us

General Information

Vision

To continuously strengthen GitLab’s defenses against evolving real-world threats while leading the offensive security industry through transparency, collaboration, and technical excellence.

Mission

We emulate real-world adversaries to increase GitLab’s threat resilience (our ability to prevent, detect, and respond to cyber attacks). By conducting well-planned exercises in a safe and controlled manner, we give teams across GitLab the chance to practice and improve their defensive capabilities.

We achieve this by:

  • Working with Threat Intelligence to identify and emulate the most relevant threats
  • Partnering with teams across GitLab to translate security observations into actionable improvements
  • Collaborating openly with industry peers to share security practices

While our work requires us to think and act like adversaries, we remain firmly grounded in the GitLab values. We intentionally bring transparency and collaboration to Red Teaming, conducting all operations thoughtfully and safely to achieve the best possible results for our organization.

The Team

The Red Team is part of the Security Operations department. See the GitLab organizational chart in Workday and meet our team members.

Further details about Red Team roles can be found in the job family description.

Services We Offer

In everything we do, we follow our rules of engagement (RoE).

Stealth Operations

Our primary service. Stealth operations are typically 3-9 months in length and are focused on emulation of relevant threats to GitLab. We work closely with Threat Intelligence to identify an adversary that might pose a security risk to GitLab. Using tools we’ve developed similar to those of the adversary, we carry out the attack on GitLab’s systems. We use stealth, testing the defenses realistically and without introducing unnecessary risk. Read more…

Opportunistic Attacks

These are short (a few days), more spontaneous attacks against GitLab systems when a potential initial access vector comes to our attention. Depending on what we find, we can either raise an incident ourselves, or continue as attackers would until discovery. We’re looking to formalise this to a framework for discovering initial access more efficiently and iteratively. Read more…

Purple Teaming

Purple Team represents a collaborative exercise between the Red Team and Blue Team (our defensive teams, usually SIRT or Signals Engineering). These can be:

Read more…

Research

Understanding emerging technologies and tools helps us anticipate adversaries’ evolving tactics. It also means we can more effectively emulate those attackers.

Formalized operations and opportunistic attacks both require extensive research, and we factor that in when planning these activities. Outside of that context, the Red Team may conduct research with an intent to provide helpful information to others in the security industry and the wider GitLab community.

Examples include:

  • social engineering techniques
  • stealth and defense evasion techniques
  • AI for offensive security
  • tools such as enumeration/scanning tools, command and control (C2) frameworks
  • malware found in the wild

We publish tech notes that summarize some of our research as part of responsible disclosure. Explore our list of tech notes, blogs and other research and public Git repository of some past tooling and techniques.

How We Operate

The Red Team operates under a predefined set of rules of engagement. These rules provide guidelines for determining scope, the values we employ during our engagements, how we collaborate as a security team, and how we escalate vulnerabilities and exploits we discover during those engagements.

We also track results via metrics which are available internally, including MITRE heatmap to ensure coverage of relevant attacker activity.

Read more…

Additional Resources/Further Reading

GitLab Resources

External Resources

Is This The Red Team?

GitLab team members: See something potentially suspicious and want to check in with us? We won’t answer this question. Read more about why in Is This the Red Team?

All suspicious activity should be treated as potentially malicious and acted upon accordingly.

Last modified February 4, 2025: Red Team Handbook rewrite (89325fb5)