Secure tools help your team follow and enforce security best practices effortlessly as part of the DevOps cycle. The Secure UX team’s goal is to provide the best experience in taking pre-emptive security measures before deploying your code, while the Defend UX team’s goal is to provide the best experience in keeping your application safe after your code is in production. See the Defend and Secure UX page for more about our team and how our two teams work together.
We have different user types we consider in our experience design effort. Even when a user has the same title, their responsibilities may vary by organization size, department, org structure, and role. Here are some of the people we are serving:
Generally, developers are the users of the vulnerability reports in the MR/pipeline while security professionals are the users of the Security Dashboards.
|SAST||When committing changes to my project, I want to be made aware if I am adding risk through vulnerable code, so that I know my changes can be merged without increasing the risk of my project.||view issue||view issue||D|
|License Compliance||When new licenses are added to a project I want to be aware so I can commit work that is compliant with my organization's rules.||view issue||view epic||D|
|License Compliance||When my organization has license compliance rules to follow I want to be able to apply policies so that I can ensure any new code merged in a project is in compliance.||view issue||view issue||F|
|License Compliance||When a merge request is disallowed, I want to know why, so I can resolve the issue and proceed with the MR.||view issue||C|
|License Compliance||When new vulnerabilities are detected in a merge request, I want to disallow the merge request, so the team can review the vulnerabilities to resolve or decide on the next steps.||view issue||D|
|Dependency Scanning||When my dependencies have reported vulnerabilities, I want to learn more about the vulnerability cause and implications, so I can make an informed decision on taking action on how to proceed.||view issue|
|Dependency Scanning||When my organization has a compliance policy with dependencies, I want to be aware if I’m breaking a company policy, so I can make sure my project dependencies are in compliance with my org compliance.||view issue|
|Dependency Scanning||When dependencies are out-of-date, I want to be made aware so I can update them to reduce potential security vulnerabilities and avoid the potentially high cost of larger updates.||view epic|
|Dependency Scanning||When I need to audit 3rd party licenses and dependencies, I want to be able to provide inventory of licenses and dependencies for the auditor, so I can have them on record for auditing purposes and be able to share them with auditors and customers.||view issue|
|Dependency Scanning||When I want to see how dependencies are related, I want to view them grouped by file, so I can access the information faster.||…|
|Shared||When I use the GitLab security feature for the first time, I want to configure all necessary features, so that the security team can start using them for GitLab projects.||view issue||view issue||C|
|Shared||When reviewing vulnerabilities for multiple projects, I want to see them all in one location, so that I can prioritize my efforts to resolve or tirage them while seeing the larger picture.||view issue||view issue||D|
|Shared||When I want to configure my security tools, I want to be able to configure them to address my own business risk policies, so that I can be assured my company is monitoring risk based on our business risk policies.||view issue|
We've divided the Secure stage into dedicated experience groups to align with a similar split undertaken by our engineering and PM counterparts.
|Static Analysis||SAST, Secret Detection||Becka Lippert|
|Dynamic Analysis||DAST||Annabel Dunstone Gray|
|Fuzz Testing||Fuzz Testing||Camellia Yang|
Compliance & Auditing
|Composition Analysis||Dependency Scanning, Container Scanning, License Compliance||Kyle Mann|
|Vulnerability Management||Vulnerability Management||Andy Volpe|
The Secure & Defend UX teams work closely together and have shared coverage in the following areas:
This segmentation gives us a better opportunity to:
Read more about how we've created these dedicated experience groups here.
Our Secure and Defend UX YouTube channel includes UX Scorecard walkthroughs, UX reviews, group feedback sessions, team meetings, and more.