Our internal roadmap shows our current and planned projects and the currently defined components of work for each.
Our Trust Center, shows our current state of industry compliance, our commitment to retaining the trust of our customers, and the direction GitLab is headed in terms of security compliance.
GitLab has adopted an umbrella control framework that provides compliance with a number of industry compliance requirements and best practices. For information about how we developed this framework and a list of all of our security controls, please see the security controls handbook page.
The GCF is mapped to the requirements for achieving a SOC2 certification, for more information please see our SOC2 page
The following are the directly responsible individuals (DRIs) for the different components of building and implementing the GCF.
The Security Compliance team is responsible for completing the activities which continually assess the design and operating effectiveness of the controls established by the GCF.
The purpose of a gap analysis is to identify gaps between GCF controls and documented GitLab process. Gap analysis project work is done in a private project due to the sensitive nature of the assessment findings. The project will have an issue for every GCF control in scope for the gap analysis. GitLab's first gap analysis can serve as an example for how future gap analyses can be organized and executed.
The remediation phase fills the gaps identified during the gap analysis and get each in-scope control into a state of audit readiness.
A control is considered to be remediated if:
Trust in an important part of the work everyone does at GitLab and the security compliance team trusts that other teams in the organization will make a good faith effort to meet these deadlines, we also ask for trust that the deadlines involved in remediating security controls are not arbitrary and reflect the many competing security needs of the organization.
GitLab's first remediation project can serve as an example for how future remediation efforts can be organized and executed.
Controls which have been remediated should be tested to see whether the process documented in the GitLab handbook, runbooks, and other sources are followed.
The Security Compliance team will occassionally perform group peer reviews on one or more controls per review. The purpose of these reviews is to leverage the experience and perspective of the entire team to dig deep into past, current, and future work on or operation of a given control. The date of a control's most recent review is documented in the GCF Remediation Status sheet.
**Note: If you have an urgent request and you're not getting a response from the above team tags, the security compliance manager (@jburrows001) has their cell phone number in their slack profile. **