debian-mirror-gitlab/doc/user/application_security/get-started-security.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

47 lines
3.8 KiB
Markdown
Raw Normal View History

2022-08-27 11:52:29 +05:30
---
stage: DevSecOps
group: Technical writing
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2022-08-27 11:52:29 +05:30
---
# Get started with GitLab application security **(ULTIMATE)**
2022-10-11 01:57:18 +05:30
<i class="fa fa-youtube-play youtube" aria-hidden="true"></i>
For an overview, see [Adopting GitLab application security](https://www.youtube.com/watch?v=5QlxkiKR04k).
2022-08-27 11:52:29 +05:30
2023-04-23 21:23:45 +05:30
The following steps help you get the most from GitLab application security tools. These steps are a recommended order of operations. You can choose to implement capabilities in a different order or omit features that do not apply to your specific needs.
2022-10-11 01:57:18 +05:30
1. Enable [Secret Detection](secret_detection/index.md) and [Dependency Scanning](dependency_scanning/index.md)
to identify any leaked secrets and vulnerable packages in your codebase.
2022-11-25 23:54:43 +05:30
- For all security scanners, enable them by updating your [`.gitlab-ci.yml`](../../ci/yaml/gitlab_ci_yaml.md) directly on your `default` branch. This creates a baseline scan of your `default` branch, which is necessary for
2022-10-11 01:57:18 +05:30
feature branch scans to be compared against. This allows [merge requests](../project/merge_requests/index.md)
2023-04-23 21:23:45 +05:30
to display only newly-introduced vulnerabilities. Otherwise, merge requests display every
2022-10-11 01:57:18 +05:30
vulnerability in the branch, regardless of whether it was introduced by a change in the branch.
- If you are after simplicity, enable only Secret Detection first. It only has one analyzer,
no build requirements, and relatively simple findings: is this a secret or not?
- It is good practice to enable Dependency Scanning early so you can start identifying existing
2022-08-27 11:52:29 +05:30
vulnerable packages in your codebase.
1. Let your team get comfortable with [vulnerability reports](vulnerability_report/index.md) and
establish a vulnerability triage workflow.
1. Consider creating [labels](../project/labels.md) and [issue boards](../project/issue_board.md) to
help manage issues created from vulnerabilities. Issue boards allow all stakeholders to have a
2022-10-11 01:57:18 +05:30
common view of all issues and track remediation progress.
2023-04-23 21:23:45 +05:30
1. Enforce scheduled security scanning jobs by using a [scan execution policy](policies/scan-execution-policies.md).
- These scheduled jobs run independently from any other security scans you may have defined in a compliance framework pipeline or in the project's `.gitlab-ci.yml` file.
- Running regular dependency and [container scans](container_scanning/index.md) surface newly-discovered vulnerabilities that already exist in your repository.
2022-10-11 01:57:18 +05:30
- Scheduled scans are most useful for projects or important branches with low development activity where pipeline scans are infrequent.
2022-08-27 11:52:29 +05:30
1. Create a [scan result policy](policies/index.md) to limit new vulnerabilities from being merged
2022-10-11 01:57:18 +05:30
into your `default` branch.
2022-08-27 11:52:29 +05:30
1. Monitor the [Security Dashboard](security_dashboard/index.md) trends to gauge success in
remediating existing vulnerabilities and preventing the introduction of new ones.
1. Enable other scan types such as [SAST](sast/index.md), [DAST](dast/index.md),
[Fuzz testing](coverage_fuzzing/index.md), or [Container Scanning](container_scanning/index.md).
2023-04-23 21:23:45 +05:30
1. Use [Compliance Pipelines](../group/compliance_frameworks.md#compliance-pipelines)
2022-08-27 11:52:29 +05:30
or [Scan Execution Policies](policies/scan-execution-policies.md) to enforce required scan types
and ensure separation of duties between security and engineering.
1. Consider enabling [Review Apps](../../development/testing_guide/review_apps.md) to allow for DAST
and [Web API fuzzing](api_fuzzing/index.md) on ephemeral test environments.
1. Enable [operational container scanning](../../user/clusters/agent/vulnerabilities.md) to scan
container images in your production cluster for security vulnerabilities.