GitLab Feature Proposal - Bidirectional IP-based Repository Access Control
Proposal
Currently, GitLab SaaS offers IP-based access restrictions that can limit access TO specific repositories FROM certain IP addresses. However, in enterprise and financial environments, there's a critical security need to prevent data exfiltration by controlling repository access in both directions.
Proposed Feature: Bidirectional IP-based Repository Access Control
This feature would extend the current IP-based access control to work bidirectionally:
- Current Functionality (Inbound Control)
- Restrict access TO specific repositories FROM certain IPs
- Configure allowed IP ranges for accessing enterprise repositories
- New Functionality (Outbound Control)
- Restrict access FROM certain IPs TO only specific repositories/groups
- Block all other repository access from those IPs
- Prevent unauthorized repository cloning from corporate networks
- Implementation Details
- Add new group-level setting: "Restrict outbound repository access"
- Allow administrators to specify allowed repository patterns/groups
- Block git operations to unauthorized repositories from restricted IPs
- Provide audit logs for attempted unauthorized access
- Security Benefits
- Prevents source code exfiltration
- Enhances enterprise security controls
- Supports compliance requirements
- Reduces risk of intellectual property theft
- Configuration Example
group_settings:
restricted_ips:
- range: "10.0.0.0/8"
allowed_repositories:
- "company-group/*"
- "approved-external-group/*"