Surface security policy violations details (Diff view)
<!-- The first section "Release notes" is required if you want to have your release post blog MR auto generated. Currently in BETA, details on the **release post item generator** can be found in the handbook: https://about.gitlab.com/handbook/marketing/blog/release-posts/#release-post-item-generator and this video: https://www.youtube.com/watch?v=rfn9ebgTwKg. The next four sections: "Problem to solve", "Intended users", "User experience goal", and "Proposal", are strongly recommended in your first draft, while the rest of the sections can be filled out during the problem validation or breakdown phase. However, keep in mind that providing complete and relevant information early helps our product team validate the problem and start working on a solution. --> ### Release notes <!-- What is the problem and solution you're proposing? This content sets the overall vision for the feature and serves as the release notes that will populate in various places, including the [release post blog](https://about.gitlab.com/releases/categories/releases/) and [Gitlab project releases](https://gitlab.com/gitlab-org/gitlab/-/releases). " --> ### Problem to solve <!-- What problem do we solve? Try to define the who/what/why of the opportunity as a user story. For example, "As a (who), I want (what), so I can (why/value)." --> As security and compliance teams enable scan result policies, policy violations impact the ability for engineering teams to complete their work and merge their MRs. Scan result policies identify risk in an MR and require approvals by particular reviewers, such as security and compliance professionals who may need to validate the change will not introduce a significant vulnerability or a license compliance issue into production applications. This is all good and well, but the rules governing these controls can be varied, and the results can at times require time and attention from security, compliance, and engineering to understand the violation, understand the results that cause the violation, and then assess the impact and how to action the violation moving forward. This could result in approving the MR in spite of the violation, creating an issue to follow-up and address a vulnerability within an SLA, or it could be discovered that a result is a false positive or not relevant in the context of the particular repo/project. To state the problem succinctly, **it's often not evident to users of security policies today what violation is requiring action from them, if the violation itself is accurate or expected, and what exactly caused the violation**. What caused a violation can also vary. Here are a few potential scenarios that can cause a violation: - (Happy path) A policy rule may have been violated, such as when an MR attempts to introduce code that has a critical security finding from a SAST scanner. - (Not so happy path) Misconfiguration of a policy, such as scanners not matching between source and target branches and requiring approval due to an artifact not being available to evaluate. - (Not so happy path) Similar to above, an invalid rules may be created where the approvers required to review a violation don't have access to the project. This can lead to the MR being blocked and a potential vulnerability may be present, but the policy rules are invalid as they don't have eligible approvers to review the MR due to access issues. - (Not so happy path) A bug/error in security policies or the UX resulting in policies failing closed and requiring approval. Some of the states above may be "expected" from our end, but I've labeled the not so happy path items as this is not the desired result from users. The desired state is to have policies detect vulnerabilities and only when necessary create a blocking state, requiring review/approval from necessary parties. Why is this important? Understanding the dynamics of security policies, how findings are compared, and the resulting approval states builds confidence for users that when a violation occurs, the logic aligns with their expectations. By providing more clarity around which policy rules were violated, what caused the violation, and by making the logic more explicit, it will make cross-functional teams much more efficient in validating the findings are accurate, that they align with their expectations, and they can more more swiftly to take action. Without violations, security policies can feel more like a black box, leaving customers hopeful that the results will be what they expect, without giving them tools to better understand or troubleshoot behaviors. Or, in the case of system/product errors, it's more difficult to deduce and raise meaningful support tickets to get bugs address by GitLab. ### Intended users <!-- Who will use this feature? If known, include any of the following: types of users (e.g. Developer), personas, or specific company roles (e.g. Release Manager). It's okay to write "Unknown" and fill this field in later. Personas are described at https://about.gitlab.com/handbook/marketing/product-marketing/roles-personas/ 1. [Parker, Product Manager](/handbook/product/personas/#parker-product-manager) 1. [Delaney, Development Team Lead](/handbook/product/personas/#delaney-development-team-lead) 1. [Presley, Product Designer](/handbook/product/personas/#presley-product-designer) 1. [Sasha, Software Developer](/handbook/product/personas/#sasha-software-developer) 1. [Priyanka, Platform Engineer](/handbook/product/personas/#priyanka-platform-engineer) 1. [Janell, Enablement Advocate](/handbook/product/personas/#janell-enablement-advocate) 1. [Sidney, Systems Administrator](/handbook/product/personas/#sidney-systems-administrator) 1. [Rachel, Release Manager](/handbook/product/personas/#rachel-release-manager) 1. [Simone, Software Engineer in Test](/handbook/product/personas/#simone-software-engineer-in-test) 1. [Allison, Application Ops](/handbook/product/personas/#allison-application-ops) 1. [Ingrid, Infrastructure Operator](/handbook/product/personas/#ingrid-infrastructure-operator) 1. [Dakota, Application Development Director](/handbook/product/personas/#dakota-application-development-director) 1. [Amy, Application Security Engineer](/handbook/product/personas/#amy-application-security-engineer) 1. [Isaac, Infrastructure Security Engineer](/handbook/product/personas/#isaac-infrastructure-security-engineer) 1. [Alex, Security Operations Engineer](/handbook/product/personas/#alex-security-operations-engineer) 1. [Cameron, Compliance Manager](/handbook/product/personas/#cameron-compliance-manager) --> 1. [Amy, Application Security Engineer](/handbook/product/personas/#amy-application-security-engineer) 1. [Isaac, Infrastructure Security Engineer](/handbook/product/personas/#isaac-infrastructure-security-engineer) 1. [Alex, Security Operations Engineer](/handbook/product/personas/#alex-security-operations-engineer) 1. [Sasha, Software Developer](/handbook/product/personas/#sasha-software-developer) ### User experience goal <!-- What is the single user experience workflow this problem addresses? For example, "The user should be able to use the UI/API/.gitlab-ci.yml with GitLab to <perform a specific task>" https://about.gitlab.com/handbook/product/ux/ux-research-training/user-story-mapping/ --> 1. Violations and details related to any violations should be evident in merge requests for all personas to clearly understand which violation(s) occurred, what caused each violation, and potentially (nice-to-have) the confidence in the violation. 2. For developers, violations should also be consumable via the IDE. In a [cross-functional UX effort between Create and Sec](https://gitlab.com/gitlab-org/gitlab/-/issues/389441/), a few designs were proposed for displaying security violations: | MR - Changes tab | MR - Policy details | | ------ | ------ | | ![image](/uploads/b7cc8eee2c02978d48dbbcc9e7f82193/image.png) | ![image](/uploads/405c3cb81be0c7a372efb364dbe43fa1/image.png) | | MR - Policy drawer | MR - Filter to only policy violations | | ------ | ------ | | ![image](/uploads/fa2716c91fb34103a789cdd79068a812/image.png) | ![image](/uploads/07b493a6f3db61155b066bf59a5c377e/image.png) | ### Proposal <!-- How are we going to solve the problem? Try to include the user journey! https://about.gitlab.com/handbook/journeys/#user-journey --> 1. Create a list of policy violations within a given MR 2. Display policy violations in the MR changes tab 3. Allow users to open the policy drawer within the MR to view more details 4. Allow users to filter all findings in an MR to only findings that violated a security policy 5. Provide a path for users to trace back a violation to the policy it violated, including the policy rules/details to gather more context 6. [Not currently in design] We may need a generic way to display violations that are not tied to a specific finding. This may be when there's a misconfiguration or an invalid rule. 7. [Not currently in design] We could display log related detail that helps show how the evaluation logic determined the results and flagged a finding as a violation. For example, a way to trace back to the pipelines that ran the scanners that were compared. ### Further details <!-- Include use cases, benefits, goals, or any other details that will help us understand the problem better. --> * A related epic discusses a plan to [Display Security Policy Errors](https://gitlab.com/groups/gitlab-org/-/epics/6770). This epic contrasts from simply displaying errors, as violations are expected and proper working behavior, but the detail available today explaining why a violation occurred is lacking. Errors, on the other hand, relate primarily to scanners not running when a scan execution policy is enabled, and gives security teams visibility into related failures. There could be some overlap in some cases between these two epics which we can further delineate as we break down the issues. ### Permissions and Security <!-- What permissions are required to perform the described actions? Are they consistent with the existing permissions as documented for users, groups, and projects as appropriate? Is the proposed behavior consistent between the UI, API, and other access methods (e.g. email replies)? Consider adding checkboxes and expectations of users with certain levels of membership https://docs.gitlab.com/ee/user/permissions.html * [ ] Add expected impact to members with no access (0) * [ ] Add expected impact to Guest (10) members * [ ] Add expected impact to Reporter (20) members * [ ] Add expected impact to Developer (30) members * [ ] Add expected impact to Maintainer (40) members * [ ] Add expected impact to Owner (50) members Please consider performing a threat model for the code changes that are introduced as part of this feature. To get started, refer to our Threat Modeling handbook page https://about.gitlab.com/handbook/security/threat_modeling/#threat-modeling. Don't hesitate to reach out to the Application Security Team (`@gitlab-com/gl-security/appsec`) to discuss any security concerns. --> ### Documentation <!-- See the Feature Change Documentation Workflow https://docs.gitlab.com/ee/development/documentation/workflow.html#for-a-product-change * Add all known Documentation Requirements in this section. See https://docs.gitlab.com/ee/development/documentation/workflow.html * If this feature requires changing permissions, update the permissions document. See https://docs.gitlab.com/ee/user/permissions.html --> ### Availability & Testing <!-- This section needs to be retained and filled in during the workflow planning breakdown phase of this feature proposal, if not earlier. What risks does this change pose to our availability? How might it affect the quality of the product? What additional test coverage or changes to tests will be needed? Will it require cross-browser testing? Please list the test areas (unit, integration and end-to-end) that needs to be added or updated to ensure that this feature will work as intended. Please use the list below as guidance. * Unit test changes * Integration test changes * End-to-end test change See the Quality Engineering quad planning and test planning processes and reach out to your counterpart Software Engineer in Test for assistance. Quad Planning: https://about.gitlab.com/handbook/engineering/quality/quality-engineering/quad-planning Test Planning: https://about.gitlab.com/handbook/engineering/quality/quality-engineering/test-engineering/#test-planning --> ### Available Tier <!-- This section should be used for setting the appropriate tier that this feature will belong to. Pricing can be found here: https://about.gitlab.com/pricing/ * Free * Premium/Silver * Ultimate/Gold --> ~"GitLab Ultimate" ### Feature Usage Metrics <!-- How are you going to track usage of this feature? Think about user behavior and their interaction with the product. What indicates someone is getting value from it? Create tracking issue using the Snowplow event tracking template. See https://gitlab.com/gitlab-org/gitlab/-/blob/master/.gitlab/issue_templates/Snowplow%20event%20tracking.md --> * \# of MAU that open the policy drawer within an MR * \# of MAU that filter findings by security policy violations ### What does success look like, and how can we measure that? <!-- Define both the success metrics and acceptance criteria. Note that success metrics indicate the desired business outcomes, while acceptance criteria indicate when the solution is working correctly. If there is no way to measure success, link to an issue that will implement a way to measure this. Create tracking issue using the Snowplow event tracking template. See https://gitlab.com/gitlab-org/gitlab/-/blob/master/.gitlab/issue_templates/Snowplow%20event%20tracking.md --> Primarily, our priority is to improve adoption of security policies. Gaining clarity about the behavior of policies, being able to utilize them more efficiently, and building trust in the policies working as intended will ease adoption and make it easier to successfully complete POC/POVs. A secondary success metric would be reducing the time it takes to complete a POV for security policies. A third success metric would be retention. This capability could make security policies much stickier as it builds confidence in the behavior due to the fact that it would be more observable. And the ability to more easily detect issues and raise bug requests will tighten our feedback loop and continue improving accuracy and align with customer expectations. ### What is the type of buyer? <!-- What is the buyer persona for this feature? See https://about.gitlab.com/handbook/marketing/product-marketing/roles-personas/buyer-persona/ In which enterprise tier should this feature go? See https://about.gitlab.com/handbook/product/pricing/#three-tiers --> CISO, Security Directors ### Is this a cross-stage feature? <!-- Communicate if this change will affect multiple Stage Groups or product areas. We recommend always start with the assumption that a feature request will have an impact into another Group. Loop in the most relevant PM and Product Designer from that Group to provide strategic support to help align the Group's broader plan and vision, as well as to avoid UX and technical debt. https://about.gitlab.com/handbook/product/#cross-stage-features --> Yes, this feature would cut across the merge request experience in ~"devops::create" ~"group::code review". ### What is the competitive advantage or differentiation for this feature? Security policies are differentiators in that they offer a single pane view for creating and managing security/compliance controls across the DevSecOps lifecycle through GitLab's single application. While we offer a single application that is tested together, we also have many integrated solutions within the platform. Security policies help to create a streamlined workflow for the security and compliance persona, while ensuring separation of duties as well as separation of concerns across the cross-functional teams. By introducing violation details, we can bring more insight into the behaviors for security/compliance teams and developers, making them more efficient in resolving vulnerabilities and managing enforcement of policies, and make it easier to self-service when issues do arise. ### Risks * This is a cross-stage effort, which often results in slower development, as more time and effort is required for collaboration across stages, aligning priorities, and allowing teams to propose changes into other team's codebases (which then require their time to review). This can extend a small 1 milestone effort into 3+ milestones. To mitigate this, we can work to start with the smallest possible MVCs with the largest value to offer. * In addition to the above, making changes to the merge request experience can have a major impact on existing customers. We'd have to increase the level of testing and quality before releasing, as we can't afford to negatively impact the performance or UX. ### Links / references <!-- Label reminders - you should have one of each of the following labels. Use the following resources to find the appropriate labels: - Use only one tier label choosing the lowest tier this is intended for - https://gitlab.com/gitlab-org/gitlab/-/labels - https://about.gitlab.com/handbook/product/categories/features/ --> <!-- triage-serverless v3 PLEASE DO NOT REMOVE THIS SECTION --> *This page may contain information related to upcoming products, features and functionality. It is important to note that the information presented is for informational purposes only, so please do not rely on the information for purchasing or planning purposes. Just like with all projects, the items mentioned on the page are subject to change or delay, and the development, release, and timing of any products, features, or functionality remain at the sole discretion of GitLab Inc.* <!-- triage-serverless v3 PLEASE DO NOT REMOVE THIS SECTION -->
epic