Commit bf49e16d authored by Jamie Dicken's avatar Jamie Dicken 💬
Browse files

Restructuring handbook pages to reflect Security Platforms & Architecture team

parent d6a797da
Loading
Loading
Loading
Loading
+3 −3
Original line number Diff line number Diff line
@@ -569,10 +569,10 @@
/content/handbook/security/product-security/infrastructure-security/ @jacobjernigan
/content/handbook/security/product-security/data-security/ @jacobjernigan @boconnor @jcamgl
/content/handbook/security/product-security/application-security/ @juliedavila
/content/handbook/security/product-security/security-architecture/ @plafoucriere @jdicken
/content/handbook/security/product-security/security-research/ @estrike @jdicken
/content/handbook/security/product-security/product-security-engineering/ @jdicken @maggiemartin
/content/handbook/security/product-security/security-platforms-architecture/ @jdicken
/content/handbook/security/product-security/security-platforms-architecture/security-architecture/ @jdicken @plafoucriere 
/content/handbook/security/product-security/security-platforms-architecture/security-research/ @jdicken
/content/handbook/security/product-security/security-platforms-architecture/product-security-engineering/ @jdicken @maggiemartin
/content/handbook/security/security-assurance/ @tdilbeck @corey-oas @jlongo_gitlab @cynthiamiller
/content/handbook/security/security-operations/ @mcoons @cmoberly @rdickson1 @nslaughter @mjozenazemian
/content/handbook/security/security-operations/security-logging/ @mcoons
+1 −1
Original line number Diff line number Diff line
@@ -109,7 +109,7 @@ For any infrastructure services related to business operations and our tech stac

New SaaS applications should go through the [Procurement Process](/handbook/finance/procurement/) and are managed by the respective department's [system owners](/handbook/business-technology/#cross-department-system-owners).

Self-hosted application infrastructure is determined on a case-by-case basis and is architected in collaboration with [IT Infrastructure](/handbook/business-technology/it/engineering/infrastructure/), [Security Architecture](/handbook/security/product-security/security-architecture/), [Infrastructure Security](/handbook/security/product-security/infrastructure-security/), [Application Security](/handbook/security/product-security/application-security/), and [3rd Party Risk](/handbook/security/security-assurance/security-risk/third-party-risk-management/). Please tag `@jeffersonmartin` in an issue for preliminary guidance on new services. If you do not have an issue yet, please create one in the [IT Infrastructure issue tracker](https://gitlab.com/gitlab-com/business-technology/engineering/infrastructure/issue-tracker/-/issues).
Self-hosted application infrastructure is determined on a case-by-case basis and is architected in collaboration with [IT Infrastructure](/handbook/business-technology/it/engineering/infrastructure/), [Security Architecture](/handbook/security/product-security/security-platforms-architecture/security-architecture/), [Infrastructure Security](/handbook/security/product-security/infrastructure-security/), [Application Security](/handbook/security/product-security/application-security/), and [3rd Party Risk](/handbook/security/security-assurance/security-risk/third-party-risk-management/). Please tag `@jeffersonmartin` in an issue for preliminary guidance on new services. If you do not have an issue yet, please create one in the [IT Infrastructure issue tracker](https://gitlab.com/gitlab-com/business-technology/engineering/infrastructure/issue-tracker/-/issues).

#### Accessing your AWS Account

+1 −1
Original line number Diff line number Diff line
@@ -3,4 +3,4 @@ title: "Practices"
---

- [*Scalability*](scalability/)
- [*Security Architecture Principles*](/handbook/security/product-security/security-architecture/#security-architecture-principles)
- [*Security Architecture Principles*](/handbook/security/product-security/security-platforms-architecture/security-architecture/#security-architecture-principles)
+1 −1
Original line number Diff line number Diff line
@@ -579,7 +579,7 @@ The company will cover all work-related travel expenses. This includes lodging a

### VPN Subscription

- Please read [Why We Don't Have A Corporate VPN](/handbook/security/product-security/security-architecture/zero-trust/#why-we-dont-have-a-corporate-vpn), and check out our [Personal VPN](/handbook/tools-and-tips/personal-vpn/) page regarding usage at GitLab.
- Please read [Why We Don't Have A Corporate VPN](/handbook/security/product-security/security-platforms-architecture/security-architecture/zero-trust/#why-we-dont-have-a-corporate-vpn), and check out our [Personal VPN](/handbook/tools-and-tips/personal-vpn/) page regarding usage at GitLab.
- Policy is set at $150 per year.
- Yearly subscription can be submitted in one claim.
- Monthly subscriptions to be submitted monthly.
+1 −3
Original line number Diff line number Diff line
@@ -69,9 +69,7 @@ To reflect this, we have structured the Security Division around four key tenets
        <ul>
            <li><a href="product-security/application-security/">Application Security</a></li>
            <li><a href="product-security/infrastructure-security/">Infrastructure Security</a></li>
            <li><a href="product-security/product-security-engineering/">Product Security Engineering</a></li>
            <li><a href="product-security/security-architecture/">Security Architecture</a></li>
            <li><a href="product-security/security-research/">Security Research</a></li>
            <li><a href="product-security/security-platforms-architecture/">Security Platforms and Architecture</a></li>
            <li><a href="product-security/vulnerability-management/">Vulnerability Management</a></li>
            <li><a href="product-security/data-security/">Data Security</a></li>
            <li><a href="security-operations/security-logging/">Security Logging</a></li>
Loading