Secure your installation
DETAILS: Tier: Free, Premium, Ultimate Offering: SaaS, self-managed
This section covers some general information and recommendations regarding the platform.
- How passwords and OAuth tokens are stored.
- How passwords for users created through integrated authentication are generated.
- How we manage the CRIME vulnerability.
- Secrets for third-party integrations should be rotated regularly.
The Hardening Guide contains additional general recommendations that can be implemented for hardening an install.
- Review authentication options.
- Configure password length limits.
- Restrict SSH key technologies and require minimum key lengths.
- Restrict account creation with sign up restrictions.
- Send email confirmation on sign-up
- Enforce two-factor authentication to require users to enable two-factor authentication.
- Restrict logins from multiple IPs.
- How to reset a user password.
- How to unlock a locked user.
- Information exclusivity.
- Protecting and removing user file uploads.
- Proxying linked images for user privacy.
Platform Usage & Settings
- Review GitLab token type and usages.
- How to configure rate limits improve security and availability.
- How to filter outbound webhook requests.
- How to configure import and export limits and timeouts.
- Review Runner security considerations and recommendations.
- Review CI/CD variables security considerations.
- Review pipeline security for usage and protection of secrets in CI/CD Pipelines.
Self-managed GitLab customers and administrators are responsible for the security of their underlying hosts, and for keeping GitLab itself up to date. It is important to regularly patch GitLab, patch your operating system and its software, and harden your hosts in accordance with vendor guidance.
- Review the log types and contents produced by GitLab.
- Review Runner job logs information.
- How to use correlation ID to trace logs.
- Logging configuration and access.
- How to configure Audit Event Streaming.
- Providing assistance to GitLab.com customers during customer-based security incidents.