84 lines
5.6 KiB
Markdown
84 lines
5.6 KiB
Markdown
---
|
|
type: reference, howto
|
|
stage: Secure
|
|
group: Static Analysis
|
|
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
|
|
---
|
|
|
|
# Security configuration **(FREE)**
|
|
|
|
> - [Introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/20711) in GitLab 12.6.
|
|
> - SAST configuration was [enabled](https://gitlab.com/groups/gitlab-org/-/epics/3659) in 13.3 and [improved](https://gitlab.com/gitlab-org/gitlab/-/issues/232862) in 13.4.
|
|
> - DAST Profiles feature was [introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/40474) in 13.4.
|
|
> - A simplified version was made [available in all tiers](https://gitlab.com/gitlab-org/gitlab/-/issues/294076) in GitLab 13.10.
|
|
> - [Redesigned](https://gitlab.com/gitlab-org/gitlab/-/issues/326926) in 14.2.
|
|
|
|
The **Security configuration** page lists the following for the security testing and compliance tools:
|
|
|
|
- Name, description, and a documentation link.
|
|
- Whether or not it is available.
|
|
- A configuration button or a link to its configuration guide.
|
|
|
|
To determine the status of each security control, GitLab checks for a [CI/CD pipeline](../../../ci/pipelines/index.md)
|
|
in the most recent commit on the default branch.
|
|
|
|
If GitLab finds a CI/CD pipeline, then it inspects each job in the `.gitlab-ci.yml` file.
|
|
|
|
- If a job defines an [`artifacts:reports` keyword](../../../ci/yaml/artifacts_reports.md)
|
|
for a security scanner, then GitLab considers the security scanner enabled and shows the **Enabled** status.
|
|
- If no jobs define an `artifacts:reports` keyword for a security scanner, then GitLab considers
|
|
the security scanner disabled and shows the **Not enabled** status.
|
|
|
|
If GitLab does not find a CI/CD pipeline, then it considers all security scanners disabled and shows the **Not enabled** status.
|
|
|
|
Failed pipelines and jobs are included in this process. If a scanner is configured but the job fails,
|
|
that scanner is still considered enabled. This process also determines the scanners and statuses
|
|
returned through the [API](../../../api/graphql/reference/index.md#securityscanners).
|
|
|
|
If the latest pipeline uses [Auto DevOps](../../../topics/autodevops/index.md),
|
|
all security features are configured by default.
|
|
|
|
To view a project's security configuration:
|
|
|
|
1. On the top bar, select **Main menu > Projects** and find your project.
|
|
1. On the left sidebar, select **Security and Compliance > Security configuration**.
|
|
|
|
Select **Configuration history** to see the `.gitlab-ci.yml` file's history.
|
|
|
|
## Security testing
|
|
|
|
You can configure the following security controls:
|
|
|
|
- [Static Application Security Testing](../sast/index.md) (SAST)
|
|
- Select **Enable SAST** to configure SAST for the current project.
|
|
For more details, read [Configure SAST in the UI](../sast/index.md#configure-sast-in-the-ui).
|
|
- [Dynamic Application Security Testing](../dast/index.md) (DAST)
|
|
- Select **Enable DAST** to configure DAST for the current project.
|
|
- Select **Manage scans** to manage the saved DAST scans, site profiles, and scanner profiles.
|
|
For more details, read [DAST on-demand scans](../dast/proxy-based.md#on-demand-scans).
|
|
- [Dependency Scanning](../dependency_scanning/index.md)
|
|
- Select **Configure with a merge request** to create a merge request with the changes required to
|
|
enable Dependency Scanning. For more details, see [Enable Dependency Scanning via an automatic merge request](../dependency_scanning/index.md#enable-dependency-scanning-via-an-automatic-merge-request).
|
|
- [Container Scanning](../container_scanning/index.md)
|
|
- Select **Configure with a merge request** to create a merge request with the changes required to
|
|
enable Container Scanning. For more details, see
|
|
[Enable Container Scanning through an automatic merge request](../container_scanning/index.md#enable-container-scanning-through-an-automatic-merge-request).
|
|
- [Operational Container Scanning](../../clusters/agent/vulnerabilities.md)
|
|
- Can be configured by adding a configuration block to your agent configuration. For more details, read [Operational Container Scanning](../../clusters/agent/vulnerabilities.md#enable-operational-container-scanning).
|
|
- [Secret Detection](../secret_detection/index.md)
|
|
- Select **Configure with a merge request** to create a merge request with the changes required to
|
|
enable Secret Detection. For more details, read [Use an automatically configured merge request](../secret_detection/index.md#use-an-automatically-configured-merge-request).
|
|
- [API Fuzzing](../api_fuzzing/index.md)
|
|
- Select **Enable API Fuzzing** to use API Fuzzing for the current project. For more details, read [API Fuzzing](../../../user/application_security/api_fuzzing/index.md#enable-web-api-fuzzing).
|
|
- [Coverage Fuzzing](../coverage_fuzzing/index.md)
|
|
- Can be configured with `.gitlab-ci.yml`. For more details, read [Coverage Fuzzing](../../../user/application_security/coverage_fuzzing/index.md#enable-coverage-guided-fuzz-testing).
|
|
|
|
## Compliance **(ULTIMATE)**
|
|
|
|
You can configure the following security controls:
|
|
|
|
- [License Compliance](../../../user/compliance/license_compliance/index.md)
|
|
- Can be configured with `.gitlab-ci.yml`. For more details, read [License Compliance](../../../user/compliance/license_compliance/index.md#enable-license-compliance).
|
|
|
|
- [Security Training](../../../user/application_security/vulnerabilities/index.md#enable-security-training-for-vulnerabilities)
|
|
- Enable **Security training** for the current project. For more details, read [security training](../../../user/application_security/vulnerabilities/index.md#enable-security-training-for-vulnerabilities).
|