Application Security

Application Security home page

Last updated: May 8, 2025

Application Security Mission

The Product Application Security team works with GitLab engineers and product teams to anticipate and prevent the introduction of vulnerabilities during design and development, ensuring delivery of high quality software GitLab customers can trust. We also identify, assess, and respond to security vulnerabilities discovered in GitLab products and services that are reported through Coordinated Vulnerability Disclosure practices.

Value Proposition

We provide operational application of DevSecOps practices, data insights and security consultation so that GitLab engineers can easily deliver high quality secure products and services to customers while maintaining feature capabilities and velocity to market.

Scope & Responsibilities

Primary Areas of Ownership

We organize our work into five pillars that emphasize Developer UX in the context of traditional DevSecOps programs. We call this the Secure Developer eXperience, or SDX.

SDX: Learn security training, governance, policy, documentation, and standards.

SDX: Design threat modeling, feature design guidance and consultation, and design reviews.

SDX: Code static analysis, software component analysis and supply chain security, use of approved tools and methodologies in development, deprecation of unsafe functions, etc.

SDX: Verify dynamic analysis testing, penetration testing, remediation of critical vulnerabilities, and final security review prior to release.

SDX: Maintain establishment of an incident response plan, managing coordinated vulnerability disclosure, bug bounty programs, and critical product security incident response management release and post-release operations.

The Application Security sub-department includes two teams, the Secure Design & Development Team and the Product Security Incident Response Team (PSIRT).

The Application Security team partners with several other teams across the Security Division to deliver end-to-end security solutions that work for GitLab engineers.

Shared Accountabilities

These strategic security programs have multiple stakeholders across the Security Division.

Supply Chain Security: Application Security’s accountability is shared by both SD&D and PSIRT. Additional Product Security teams involved in Supply Chain Security include SPA, Vulnerability Management, and InfraSec.

Dogfooding: Application Security’s accountability is to use GitLab security products in our work and be participants in providing actionable Customer Zero feedback to the SPA team, who is the Dogfooding DRI for Product Security.

Vulnerability Management / Tech Debt: The Application Security Team’s accountability is shared by both SD&D and PSIRT. The Vulnerability Management team is DRI for Vuln Mgmt tooling development and implementation

Secure by design: The Secure Design and Development Team’s accountability is feature focused, assessing threats through Threat Modeling (SDX: Design) and feature design reviews. The SPA team is DRI for Threat Modeling strategy company-wide, while AppSec is a participant stakeholder in this strategy.

Security Response: Application Security’s accountability for Product Security Response is partially shared by both SD&D and PSIRT. SD&D currently helps with security release rotations. During FY26 this will transition to the PSIRT. PSIRT triages and technically assesses critical and exploitable vulnerabilities, determines company and customer risk, and coordinates external communications regarding these issues. PSIRT has several partners across the company including:

  • SecOps is DRI for Incident Command and Threat Detection (IOCs, TTPs)
  • SPA (Research) is a key partner for exploitability POC development
  • PR/Comms
  • Legal
  • Delivery

Out of Scope

SBOM production Container Scanning Customer Escalations regarding security scanner findings Compliance

Contacting us

Team members can reach the AppSec team by:

FY26 Primary Focus Areas

In FY26, our key focus areas are:

Organizational Upleveling:

  • Establish PSIRT
  • Expand Security Design & Development Services at scale

Support Company and Division Priorities:

  • Authorization & Authentication
  • AI Security & Safety
  • Supply Chain security
  • Customer Zero

In the near future, we will expand upon these priorities and publish a high-level team-wide roadmap.

FY26 Metrics

Application Security is rebuilding our operational business health metrics in FY26. These metrics are in addition to Key Risk Indicators, project-level metrics, or sub-team specific metrics. For many of these, metrics instrumentation and reporting mechanisms are still forthcoming. As the team matures, these metrics will evolve and be shared on this page.

Useful resources for AppSec engineers

PTO

Team members that are taking PTO for 5 days or more must both discuss time off with their manager prior to scheduling to ensure visibility and adequate team operational coverage and create a PTO coverage issue to organize their coverage during their time off. The PTO coverage issue should :

  • List any potential requests that could come to the team while on PTO
  • The team member taking PTO should organize their work accordingly and ensure the PTO coverage issue contains the context required to handle the work
  • Assign primary and secondary responsible team members

AppSec team members should add any important information related to the work they are covering for the person on PTO and AppSec manager(s) should add any important announcement to see upon their return.

Roles & Responsibilities

Please see the Application Security Job Family page.

The list above is not exhaustive and is subject to be modified as our processes keep evolving.

Application Security KPIs & Other Metrics in Sisense

  • For Embedded KPIs which you filter by section, stage, or group, please see this page.

Stable Counterparts

Please see the Application Security Stable Counterparts page.

Application Security Reviews

Please see the Application Security Reviews page.

RCAs for Critical Vulnerabilities

Please see the Root Cause Analysis for Critical Vulnerabilities page

Application Security Engineer Runbooks

Please see the Application Security Engineer Runbooks page index

Meeting Recordings

The following recordings are available internally only:

Backlog reviews

When necessary a backlog review can be initiated, please see the Vulnerability Management Page for more details.

GitLab Secure Tools coverage

As part of our dogfooding effort, the Secure Tools are set up on many different GitLab projects (see our policies). This list is too dynamic to be included in this page, and is now maintained in the GitLab AppSec Inventory.

Projects without the expected configurations can be found in the inventory violations list (internal link).

GitLab Inventory

Learn more about the GitLab AppSec Inventory.

Responding to customer scan review requests

Please see the Responding to customers security scanners review requests page

Reproducible Vulnerabilities

Learn how to identify or remediate security issues using real examples with GitLab’s Reproducible Vulnerabilities.

Reproducible Builds

Learn how GitLab is implementing Reproducible Builds for our build processes.

Milestone Planning

The GitLab Application Security team plans work based around Milestones, see this page for a description of that process

Application Security Automation and Monitoring

Learn more about the automation initiatives that the Application Security team uses on the Application Security Automation and Monitoring page

Review and Updates

This charter will be reviewed quarterly to ensure alignment with company and divisional priorities, the GitLab Security product roadmap, and relevant business and operational changes. Updates may occur more frequently as business operations evolve.

Next scheduled review: June 30, 2025


Application Security - Async Communication
Overview As the Application Security team spans too many different time zones to have a reasonable …
Application Security - Automation and Monitoring
Monitoring The Application Security team uses a number of automation initiatives to help secure …
Application Security - Dogfooding and Product Feature Requests
Overview This page describes the usage of a label to indicate a specific issue or epic is a priority …
Application Security Metrics
TBD
Application Security Review Process
This page details the application security review process for appsec engineers. The purpose of …
Application Security Runbooks
Note for New team members Whenever you are on a rotation (HackerOne or Triage Rotation or doing your …
Application Security Stable Counterparts
The overall goal of Application Security Stable Counterparts is to help integrate security themes …
Application Vulnerability Management Procedure
Purpose This procedure applies to vulnerabilities identified in GitLab the product or its dependency …
GitLab Application Security Inventory
The AppSec Inventory is a private GitLab project to identify and track all projects, components, and dependencies that matter for AppSec
Milestone Planning
Learn how the GitLab Application Security team does Milestone Planning
Reproducible Builds
Learn how GitLab is implementing Reproducible Builds for our build processes
Reproducible Vulnerabilities
Learn about GitLab, its security processes, and its historical security vulnerabilities
Responding to customers security scanners review requests
We scan our own product using our security scanners. Our Engineering teams are remediating …
Threat Modeling
The threat modeling process, and the framework used by the GitLab Security Team.