GitLab restricts the use of shared and group authentication credentials. Authentication credentials for shared and group accounts are reset quarterly.
Adding restrictions to the use of shared accounts help protect against malicious activity and stolen accounts. Shared accounts are more likely to be compromised because the account credentials are shared with multiple people and it's often not feasible to use multi-factor authentication. While shared accounts sometimes must be used, this control aims to limit account sharing to only those cases where it's necessary and no good alternatives exist, and to add safeguards to when they are used.
This control applies to all systems within our production environment. The production environment includes all endpoints and cloud assets used in hosting GitLab.com and its subdomains. This may include third-party systems that support the business of GitLab.com.
An exception to the policy to define the types of services approved for shared accounts and a process for the lifecycle of the access and a mechanism to alert the appropriate teams that authentication credentials must be reset (e.g., email alerts, an issue, calendar event, etc).
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Shared Logical Accounts control issue.