This procedure is intended to identify the Security Organization’s ownership and approval on categories/topics of external communication.
This procedure applies to external communications associated with the Security organization.
Security Owns and Approves (external communications):
Security shared communications efforts: Corporate Marketing reviews and approves
Security Consult - Corporate Marketing Owned
The normal process involves making information public after an incident is contained and/or a security flaw has been fixed.
NOTE: It is quite possible that an incident will not involve public notification, due to potential confidentiality surrounding the incident. If you are unsure, follow the GitLab SAFE Framework. However if the Security Department feels that the GitLab and security communities at large could benefit, there might be a release of information such as configuration recommendations or new techniques to help secure information. This type of disclosure does not necessarily mandate a specific timeframe or requirements, but still should be performed in a timely manner.
Regardless, any release of external communications, be it a specific issue or incident, will start with a Security Communications issue (internal link). When creating this issue, select the most appropriate template, and if you have any questions bring them up in the GitLab internal Slack channel "#security".
There are typically three communications areas that might warrant a Security Department response:
Remember that it is not unusual for security-related patches to be in the regular GitLab release on the 22nd of each month as the GitLab codebase is updated continuously, but vulnerabilities are addressed in the monthly security release happens roughly one week after the regular GitLab release.
NOTE: If the security incident or issue is considering critical and an emergency patch and release outside the normal release schedule is needed, refer to the Marketing - Emergency Response handbook page.
Exceptions to this procedure will be tracked as per the Information Security Policy Exception Management Process.