Gitlab hero border pattern left svg Gitlab hero border pattern right svg

GitLab SOC2 Security Compliance

What is SOC2?

SOC2 is a security control report developed by the American Institute of Certified Public Accountants (AICPA) based on the Statement on Standards for Attestation Engagements no. 18 (SSAE 18).

For additional information on SOC2, feel free to check out our Compliance Unfiltered SOC2 video!

What are the different types of SOC reports?

Why is GitLab pursuing SOC2 certification?

SOC2 is becoming an industry standard for validating that a baseline of security program maturity is in place within an organization.

Customer benefits:

GitLab benefits:

Is GitLab SOC2 compliant?

Not yet, but GitLab has a target date for its first SOC2 examination in 2020.

What are we doing to become SOC2 compliant?

GitLab has started the process of establishing security controls, rolling out those controls, and testing those controls but this is a lengthy process.

What's the difference between SOC2 controls and the GCF?

The GitLab Control Framework (GCF) is an overarching set of security controls that satisfy many underlying compliance requirements (e.g. SOC2, ISO, GLBA, etc.).

SOC2 is a subset of the requirements that the GCF satisfies.

What are the major milestones for the SOC2 project?

  1. Establish a set of security controls
    • Completed in FY20 Q1
  2. Perform a gap analysis of these security controls
    • Completed in FY20 Q2
  3. Remediate these security controls
    • This is in progress and expect to finish in FY21
  4. Test these security controls
    • This is in progress and expect to finish in FY21
  5. Start our evidence collection period
  6. Work with a CPA firm to complete a SOC2 audit

What will be the scope of our SOC2 examination?

GitLab's SOC2 report will cover the people, process, and technology that make up The exact inventory of systems that comprise this scope are still being developed but any system that is connected to systems/services that operate is likely to be included in the scope of this audit.

Additional information about the systems involved in our upcoming SOC2 examination can be found at our SOC2 Description of System page.

When are we going to be compliant?

External audit targets:

Why is it going to take that long?

  1. We don't want to roll out controls specific to SOC2 only to go back to our teams next year with controls specific to ISO. Instead we are taking a longer-term view of our compliance needs and created a comprehensive security control framework that will allow us to gather security control evidence and work with teams in a more efficient manner.
  2. SOC2 Type 2 reports require 6 months worth of operating security controls in order to validate the effectiveness of the controls. If we want to be audited for a SOC2 Type 2 report on 2020-07-01 we need to have all controls designed, remediated, tested, and producing audit-ready evidence as of 2020-01-01.

How will this SOC2 project impact other teams at GitLab?

Creating security controls from scratch is a difficult process. Each GitLab team-member is iterating on processes, developing new features, reconfiguring systems, etc. every day. Security controls require a certain amount of stability in order to generate effective evidence we can present to external auditors. Combine this with the collaborative approach the security compliance team is trying to take and it makes this process especially challenging. The security compliance team doesn't want to go out to GitLab teams with archaic requirements that have been around for 10 years just because auditors are used to those requirements and the evidence to expect from each. Instead, we want collaborate with GitLab teams and innovate ways to gather evidence and be flexible in the requirements we are establishing in order to create an industry-leading security compliance program. Since GitLab creates new and innovative software, this process is really challenging since the security compliance team don't have deep technical expertise in all areas of the company. Instead we have to parter with GitLab teams to come up with the best way to approach each security control and generate meaningful evidence we can use in an audit.

TL;DR: There's just no way to establish a security program that is external-audit-ready without adding a certain amount of friction for our teams. Please know that we take this extra friction seriously and work hard to minimize that friction as much as possible.

Who is responsible for the SOC2 project?

Where can I submit feedback for this SOC2 project?

Please add a comment to this feedback issue.

You can also contact the security compliance team if there's any way we can help.