Published on: September 6, 2023
9 min read
As a strategic partner, GitLab's software security features can help support your ISO 27001 compliance.

As a single, all-inclusive platform, managing your DevSecOps lifecycle with GitLab is easy. GitLab’s platform enables developers to build better software faster. But the effectiveness of GitLab extends beyond DevSecOps. In October of 2022, the International Organization for Standardization released the latest edition of the ISO 27001 standard. ISO/IEC 27001:2022 includes several changes from its previous edition, including the addition of Annex A controls focused on secure coding and configuration management. At GitLab, we leverage our platform to support many aspects of our security compliance program, a concept we internally call dogfooding. An overview of the compliance and assurance credentials that we maintain can be found on our Trust Center page. Let’s review the primary functions you can leverage to support your ISO 27001 compliance journey.
| Control ID | Control Description | | ---- | ---- | | 5.3 Segregation of duties | Conflicting duties and conflicting areas of responsibility shall be segregated. | | 5.15 Access control | Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements. | | 5.16 Identity management | The full lifecycle of identities shall be managed. | | 8.2 Privileged access rights | The allocation and use of privileged access rights shall be restricted and managed.| | 8.4 Access to source code | Read and write access to source code, development tools, and software libraries shall be appropriately managed. | With GitLab, you can assign users a role when you add them to a project or group. A user’s role determines the actions they can take within your GitLab instance. The following roles are available for assignment:
Scoped Labels| Control ID | Control Description | | ---- | ---- |
| 8.8 Management of technical vulnerabilities | Information about technical vulnerabilities of information systems in use shall be obtained, the organization’s exposure to such vulnerabilities shall be evaluated and appropriate measures shall be taken. |
| 8.9 Configuration management | Configurations, including security configurations, of hardware, software, services and networks shall be established, documented, implemented, monitored, and reviewed. |
| 8.25 Secure development lifecycle | Rules for the secure development of software and systems shall be established and applied. |
| 8.26 Application security requirements | Information security requirements shall be identified, specified, and approved when developing or acquiring applications. |
| 8.27 Secure system architecture and engineering principles | Principles for engineering secure systems shall be established, documented, maintained, and applied to any information system development activities |
With GitLab, you can store your hardware and software configurations, maintain version control, update your configurations via merge requests, and leverage GitLab’s CI/CD pipelines to push those configurations to your applications and infrastructure. GitLab enables organizations to implement GitOps through a single platform.
GitLab’s infrastructure-as-code scanning functionality enables you to scan your IaC configuration files for known vulnerabilities. GitLab’s IaC scanning supports a variety of IaC configuration files and languages making it adaptable to different tech stacks.
For compliance professionals, GitLab enables you to implement automation through compliance frameworks and compliance pipelines. These features enable users to identify critical projects that have certain compliance requirements and push configurations to those projects via pipelines. They enable consistent enforcement of controls, thereby supporting your security posture and facilitating adherence to your organization’s internal and external compliance requirements.
For Ultimate customers, GitLab’s Compliance Center provides a centralized view of a group’s compliance posture, such as the different compliance frameworks being applied to the projects in the group. You can even see how well you comply with the GitLab Standard.
| Control ID | Control Description | | ---- | ---- |
| 8.15 Logging | Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected, and analyzed. |
| 8.16 Monitoring activities Control | Networks, systems, and applications shall be monitored for anomalous behavior and appropriate actions taken to evaluate potential information security incidents. |
With GitLab, you can use audit events to track important events, including who performed the related action and when. Audit events cover a broad range of categories, including:
Example of an audit event
{: .note.text-center}
For Ultimate customers, audit event streaming can be enabled. Audit event streaming enables users to set a streaming destination for a top-level group or instance to receive all audit events about the group, subgroups, and projects, as structured JSON.
Code quality findings
{: .note.text-center}
Leaked secrets is one of the leading catalysts of security breaches. GitLab’s Secret Detection scans your repository to help prevent your secrets from being exposed.
GitLab’s Policies feature enables users to implement scan execution and scan result policies based on configured logic. These policies combine the scanning capabilities in the Secure stage with merge request approvals to further enforce compliance requirements.
Together, GitLab’s Secure features create a foundation for a secure software development lifecycle program and enable you to implement secure coding principles in accordance with your organization’s requirements.
Protected branches settings within GitLab
{: .note.text-center}
Merge requests (MR) are a core component of the software development lifecycle. GitLab users can configure their MRs so that they must be approved before they can be merged. MR approvals allow users to set the minimum number of required approvals before work can merge into a project. Some examples of rules you can create include:As a comprehensive DevSecOps platform, GitLab supports a broad range of requirements. ISO added additional controls around secure coding and configuration management in the 2022 edition of the ISO standard. This demonstrates that certifying bodies have an increased focus on software security as a whole. As a strategic partner, GitLab can help support your ISO 27001 compliance journey and help you develop better software faster. To learn more about these features, see our library of tutorials.