@@ -36,6 +36,8 @@ The scope of this control is broad by design. Asset inventories are the source o
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Inventory Management control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/761).
@@ -54,6 +54,7 @@ Based on the above, GitLab business continuity plan will have team and departmen
## Additional control information and project tracking
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Business Continuity Plan issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/774) .
@@ -48,6 +48,8 @@ All parts of the business continuity plan should be tested. All teams and servic
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Continuity Testing control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/776).
@@ -41,6 +41,8 @@ This control is a subset of the Business Continuity control. Business Impact Ana
## Additional control information and project tracking
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Business Impact Analysis control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/777).
@@ -55,6 +55,8 @@ Backup configuration Documentation should include:
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Backup Configuration control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/778).
@@ -43,6 +43,8 @@ Examples of evidence an auditor might request to satisfy this control:
* Sample or documentation of the new user account creation process for critical accounts and systems showing no default password can be used and users must set a strong and unique password
* Non-confidential samples of Terraform and Chef configs showing default passwords aren't used for GitLab.com infrastructure
@@ -41,6 +41,8 @@ Examples of evidence an auditor might request to satisfy this control:
* Evidence that PostgreSQL database access above data reader is limited to [Database Reliability Engineers](/job-families/engineering/database-reliability-engineer/)
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Terms of Service control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/793).
@@ -37,6 +37,8 @@ This control applies to any system or service where user accounts can be provisi
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Logical Access De-Provisioning control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/806).
@@ -39,6 +39,8 @@ An exception to the policy to define the types of services approved for shared a
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Shared Logical Accounts control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/810).
@@ -38,6 +38,8 @@ An unique identifier (UID) is a numeric or alphanumeric string that is associate
## Additional control information and project tracking
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Unique Identifiers control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/812).
@@ -40,6 +40,8 @@ As the GitLab system supports the ability to restrict modification without the `
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Source Code Security control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/823).
@@ -40,6 +40,8 @@ Identity access management systems should enforce SSH or MFA for connections to
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Remote Connections control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/823).
@@ -39,6 +39,8 @@ Examples of evidence an auditor might request to satisfy this control:
* Documentation or some form of record demonstrating access to a keystore or server containing the private key to a keystore is only provisioned to GitLabbers where there is a clear need for access
* A copy of Google Cloud users with access to production KMS, Data Bags, and servers storing private keys to either
@@ -39,6 +39,8 @@ Security incidents should have a defined process and support the ability to be t
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Incident response control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/841).
@@ -39,6 +39,8 @@ Control should be designed to ensure we don't default to "allow all" traffic and
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Network Policy Enforcement Points control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/847).
@@ -39,6 +39,8 @@ Pre-production environments should be logically segregated from their production
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Network Segmentation control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/1013).
@@ -43,6 +43,8 @@ The scope of the background check performed is at the discretion of the Company.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Background Checks control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/860).
@@ -39,6 +39,8 @@ A process to evaluate the performance of team-members.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Performance Management control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/861).
@@ -35,6 +35,8 @@ The most common form of system documentation is network and data flow diagrams.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [System Documentation control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/873).
@@ -41,6 +41,8 @@ Create process to have policies and standards reviewed and updated on a recurrin
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Policy and Standard Review control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/875).
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Information Security Program Content control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/877).
@@ -45,6 +45,8 @@ The scope is to ensure GitLab security team understand their roles & responsibil
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Security Roles and Responsibilities control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/885).
@@ -27,6 +27,8 @@ This control is not applicable to GitLab since there are no facilities and no co
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Secured Facility control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/890).
@@ -35,6 +35,8 @@ This control is not applicable to GitLab's SaaS product since managed hosting is
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Provisioning Physical Access control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/892).
@@ -27,6 +27,8 @@ This control is not applicable since GitLab has no datacenters or facilities.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [De-provisioning Physical Access control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/893).
@@ -27,6 +27,8 @@ This control is not applicable since GitLab has no facilities.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Periodic Review of Physical Access control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/894).
@@ -27,6 +27,8 @@ This control is not applicable since GitLab has no facilities.
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Physical Access Role Permission Authorization control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/895).
@@ -53,6 +53,8 @@ Server configuration standards should have logging information enabled for each
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Audit Logging control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/904).
@@ -51,6 +51,8 @@ Audit log repositories should be secure (hardening best practices) and include t
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the [Audit Logging control issue](https://gitlab.com/gitlab-com/gl-security/compliance/compliance/issues/905).