Application Security
Last updated: May 8, 2025
Application Security Mission
The Product Application Security team works with GitLab engineers and product teams to anticipate and prevent the introduction of vulnerabilities during design and development, ensuring delivery of high quality software GitLab customers can trust. We also identify, assess, and respond to security vulnerabilities discovered in GitLab products and services that are reported through Coordinated Vulnerability Disclosure practices.
Value Proposition
We provide operational application of DevSecOps practices, data insights and security consultation so that GitLab engineers can easily deliver high quality secure products and services to customers while maintaining feature capabilities and velocity to market.
Scope & Responsibilities
Primary Areas of Ownership
We organize our work into five pillars that emphasize Developer UX in the context of traditional DevSecOps programs. We call this the Secure Developer eXperience, or SDX.
SDX: Learn security training, governance, policy, documentation, and standards.
SDX: Design threat modeling, feature design guidance and consultation, and design reviews.
SDX: Code static analysis, software component analysis and supply chain security, use of approved tools and methodologies in development, deprecation of unsafe functions, etc.
SDX: Verify dynamic analysis testing, penetration testing, remediation of critical vulnerabilities, and final security review prior to release.
SDX: Maintain establishment of an incident response plan, managing coordinated vulnerability disclosure, bug bounty programs, and critical product security incident response management release and post-release operations.
The Application Security sub-department includes two teams, the Secure Design & Development Team and the Product Security Incident Response Team (PSIRT).
The Application Security team partners with several other teams across the Security Division to deliver end-to-end security solutions that work for GitLab engineers.
Shared Accountabilities
These strategic security programs have multiple stakeholders across the Security Division.
Supply Chain Security: Application Security’s accountability is shared by both SD&D and PSIRT. Additional Product Security teams involved in Supply Chain Security include SPA, Vulnerability Management, and InfraSec.
Dogfooding: Application Security’s accountability is to use GitLab security products in our work and be participants in providing actionable Customer Zero feedback to the SPA team, who is the Dogfooding DRI for Product Security.
Vulnerability Management / Tech Debt: The Application Security Team’s accountability is shared by both SD&D and PSIRT. The Vulnerability Management team is DRI for Vuln Mgmt tooling development and implementation
Secure by design: The Secure Design and Development Team’s accountability is feature focused, assessing threats through Threat Modeling (SDX: Design) and feature design reviews. The SPA team is DRI for Threat Modeling strategy company-wide, while AppSec is a participant stakeholder in this strategy.
Security Response: Application Security’s accountability for Product Security Response is partially shared by both SD&D and PSIRT. SD&D currently helps with security release rotations. During FY26 this will transition to the PSIRT. PSIRT triages and technically assesses critical and exploitable vulnerabilities, determines company and customer risk, and coordinates external communications regarding these issues. PSIRT has several partners across the company including:
- SecOps is DRI for Incident Command and Threat Detection (IOCs, TTPs)
- SPA (Research) is a key partner for exploitability POC development
- PR/Comms
- Legal
- Delivery
Out of Scope
SBOM production Container Scanning Customer Escalations regarding security scanner findings Compliance
Contacting us
Team members can reach the AppSec team by:
- Finding your Stable Counterpart on the Product sections, stages, groups, and categories page
- Mentioning
@gitlab-com/gl-security/product-security/appsec
on GitLab - Submit an issue in the AppSec Team repository
- Asking in
#sec-appsec
or mentioning@appsec-team
on Slack - For cross team collaboration improvement opportunities, use this template for collaboration improvement opportunities
FY26 Primary Focus Areas
In FY26, our key focus areas are:
Organizational Upleveling:
- Establish PSIRT
- Expand Security Design & Development Services at scale
Support Company and Division Priorities:
- Authorization & Authentication
- AI Security & Safety
- Supply Chain security
- Customer Zero
In the near future, we will expand upon these priorities and publish a high-level team-wide roadmap.
FY26 Metrics
Application Security is rebuilding our operational business health metrics in FY26. These metrics are in addition to Key Risk Indicators, project-level metrics, or sub-team specific metrics. For many of these, metrics instrumentation and reporting mechanisms are still forthcoming. As the team matures, these metrics will evolve and be shared on this page.
Useful resources for AppSec engineers
PTO
Team members that are taking PTO for 5 days or more must both discuss time off with their manager prior to scheduling to ensure visibility and adequate team operational coverage and create a PTO coverage issue to organize their coverage during their time off. The PTO coverage issue should :
- List any potential requests that could come to the team while on PTO
- The team member taking PTO should organize their work accordingly and ensure the PTO coverage issue contains the context required to handle the work
- Assign primary and secondary responsible team members
AppSec team members should add any important information related to the work they are covering for the person on PTO and AppSec manager(s) should add any important announcement to see upon their return.
Roles & Responsibilities
Please see the Application Security Job Family page.
Helpful Quicklinks
- The AppSec private group that contains other private subgroups and projects
- The
appsec-lab
group on Staging. This has an Ultimate license. - Bug bounty council search
- Upcoming patch release
- GitLab Project Security dashboard
- Security issue board that tracks ongoing issues (hackerone and others)
- The latest releases
- Overview of a project member permissions
- The DevOps stages and their different groups. This page contains information on the development teams, their areas of focus, and their team members as well as the AppSec stable counterparts. It is used to assign issues to the stable counterparts.
- The product features listed by groups that own them
- List of merged security issues in
gitlab-org
. Note: It can include results from the security mirrorgitlab-org/security/
.
The list above is not exhaustive and is subject to be modified as our processes keep evolving.
Application Security KPIs & Other Metrics in Sisense
- For Embedded KPIs which you filter by section, stage, or group, please see this page.
Stable Counterparts
Please see the Application Security Stable Counterparts page.
Application Security Reviews
Please see the Application Security Reviews page.
RCAs for Critical Vulnerabilities
Please see the Root Cause Analysis for Critical Vulnerabilities page
Application Security Engineer Runbooks
Please see the Application Security Engineer Runbooks page index
Meeting Recordings
The following recordings are available internally only:
Backlog reviews
When necessary a backlog review can be initiated, please see the Vulnerability Management Page for more details.
GitLab Secure Tools coverage
As part of our dogfooding effort, the Secure Tools are set up on many different GitLab projects (see our policies). This list is too dynamic to be included in this page, and is now maintained in the GitLab AppSec Inventory.
Projects without the expected configurations can be found in the inventory violations list (internal link).
GitLab Inventory
Learn more about the GitLab AppSec Inventory.
Responding to customer scan review requests
Please see the Responding to customers security scanners review requests page
Reproducible Vulnerabilities
Learn how to identify or remediate security issues using real examples with GitLab’s Reproducible Vulnerabilities.
Reproducible Builds
Learn how GitLab is implementing Reproducible Builds for our build processes.
Milestone Planning
The GitLab Application Security team plans work based around Milestones, see this page for a description of that process
Application Security Automation and Monitoring
Learn more about the automation initiatives that the Application Security team uses on the Application Security Automation and Monitoring page
Review and Updates
This charter will be reviewed quarterly to ensure alignment with company and divisional priorities, the GitLab Security product roadmap, and relevant business and operational changes. Updates may occur more frequently as business operations evolve.
Next scheduled review: June 30, 2025
Application Security - Automation and Monitoring
Application Security - Dogfooding and Product Feature Requests
Application Security Review Process
Application Security Runbooks
Application Security Stable Counterparts
Application Vulnerability Management Procedure
GitLab Application Security Inventory
Milestone Planning
Reproducible Builds
Reproducible Vulnerabilities
Responding to customers security scanners review requests
Threat Modeling
4104b65a
)