Infrastructure

GitLab Security & Compliance

Enterprise-grade security with ISO 27001 and TISAX certifications


Your source code, data, and intellectual property are always protected with the highest standards of information security. Our GitLab hosting infrastructure is ISO 27001:2022 and TISAX certified, with a dedicated security team ensuring protection measures are always up to date.

Security Certifications#

ISO 27001:2022#

ISO 27001 is the international standard for information security management systems (ISMS). Our certification demonstrates a systematic approach to managing and protecting sensitive information.

What ISO 27001 covers:

DomainControls
Information Security PoliciesManagement direction and support
Organization of Information SecurityInternal organization, mobile devices, teleworking
Human Resource SecurityPrior to, during, and termination of employment
Asset ManagementResponsibility, classification, media handling
Access ControlBusiness requirements, user access, system access
CryptographyCryptographic controls, key management
Physical SecuritySecure areas, equipment protection
Operations SecurityProcedures, malware, backup, logging, vulnerabilities
Communications SecurityNetwork security, information transfer
System Acquisition & DevelopmentSecurity requirements, development, testing
Supplier RelationshipsSupplier security, service delivery
Incident ManagementResponsibilities, reporting, response, lessons learned
Business ContinuityPlanning, implementation, verification
ComplianceLegal requirements, reviews

TISAX Certification#

TISAX (Trusted Information Security Assessment Exchange) is the automotive industry's information security standard. Our Level 2 (Advanced Protection) certification is mandatory for suppliers to major automotive manufacturers.

TISAX Assessment Objectives:

ObjectiveDescription
Information SecurityProtection of confidential information
Prototype ProtectionPhysical and logical protection of prototypes
Data ProtectionGDPR compliance and privacy

Industries requiring TISAX:

  • Automotive OEMs (VW, BMW, Mercedes, Stellantis)
  • Tier 1 suppliers (Bosch, Continental, ZF, Magna)
  • Engineering service providers
  • Software development for automotive

Infrastructure Security#

Network Architecture#

1
┌─────────────────────────────────────────────────────────────┐
2
│ Internet │
3
└─────────────────────────┬───────────────────────────────────┘
4
5
┌─────▼─────┐
6
│ DDoS │
7
│ Protection│
8
└─────┬─────┘
9
10
┌─────▼─────┐
11
│ WAF / │
12
│ Firewall │
13
└─────┬─────┘
14
15
┌───────────┼───────────┐
16
│ │ │
17
┌─────▼─────┐ ┌───▼───┐ ┌─────▼─────┐
18
│ GitLab │ │GitLab │ │ GitLab │
19
│ Instance A│ │Inst. B│ │ Instance C│
20
└───────────┘ └───────┘ └───────────┘
21
│ │ │
22
└───────────┼───────────┘
23
24
┌─────▼─────┐
25
│ Backup │
26
│ Storage │
27
│(Encrypted)│
28
└───────────┘

Network Security Controls#

ControlImplementation
FirewallDedicated per-instance firewall rules
DDoS ProtectionVolumetric and application-layer protection
Rate LimitingAPI and web request throttling
WAFWeb Application Firewall for common attacks
IDS/IPSIntrusion detection and prevention
Network SegmentationIsolated networks per customer

Encryption Standards#

LayerStandardKey Management
Data at RestAES-256HSM-protected keys
Data in TransitTLS 1.3Automatic certificate rotation
BackupsAES-256Separate backup encryption keys
DatabaseTransparent Data EncryptionPer-instance keys

Access Control#

Authentication Options#

We support enterprise authentication methods:

MethodUse Case
LDAPActive Directory integration
SAML 2.0SSO with Okta, Azure AD, Google Workspace
ADFSMicrosoft federation services
OAuth 2.0GitHub, Google, GitLab.com providers
2FA/MFATOTP, WebAuthn, hardware keys

Role-Based Access Control#

GitLabHost Control Panel supports granular permissions:

RoleCapabilities
OwnerFull administrative access
AdminInstance management, user management
OperatorMonitoring, basic operations
BillingInvoice and payment management
ViewerRead-only dashboard access

Security Monitoring#

24/7 Monitoring#

Our security team provides continuous monitoring:

  • Infrastructure Monitoring: Server health, resource utilization, availability
  • Security Monitoring: Log analysis, threat detection, anomaly detection
  • Application Monitoring: GitLab performance, error rates, response times
  • Compliance Monitoring: Configuration drift, policy violations

Incident Response#

SeverityResponse TimeExamples
P1 - Critical15 minutesService outage, security breach
P2 - High1 hourPerformance degradation, partial outage
P3 - Medium4 hoursNon-critical issues, warnings
P4 - Low24 hoursInformational, minor issues

Security Logging#

All security-relevant events are logged and retained:

  • Authentication attempts (success/failure)
  • Authorization decisions
  • Administrative actions
  • API access
  • File access and modifications
  • Network connections

Log retention: 90 days online, 1 year archived


Vulnerability Management#

Patch Management#

ComponentUpdate Frequency
GitLab ApplicationWithin 24 hours of security release
Operating SystemWeekly security patches
DependenciesContinuous monitoring, prompt updates
InfrastructureScheduled maintenance windows

Security Testing#

Test TypeFrequency
Automated Vulnerability ScanningDaily
Dependency ScanningContinuous
Penetration TestingAnnual (third-party)
Security Code ReviewPer release

Backup Security#

Backup Architecture#

FeatureImplementation
FrequencyNightly incremental, weekly full
EncryptionAES-256 before transfer
StorageOff-site, geographically separated
Retention14 days standard (extended available)
TestingMonthly restore verification
AccessSeparate credentials, audit logged

Disaster Recovery#

MetricTarget
Recovery Point Objective (RPO)24 hours
Recovery Time Objective (RTO)4 hours
Backup VerificationMonthly
DR TestingAnnual

Physical Security#

Data Center Standards#

All hosting locations meet or exceed:

  • Tier III+ data center certification
  • ISO 27001 certified facilities
  • SOC 2 Type II audited

Physical Controls#

ControlImplementation
Perimeter SecurityFencing, barriers, security patrols
Access ControlBiometric + badge + PIN
Surveillance24/7 CCTV with 90-day retention
EnvironmentalFire suppression, flood detection, HVAC
PowerRedundant UPS, diesel generators
NetworkRedundant fiber paths

Compliance Support#

Documentation Available#

DocumentPurpose
ISO 27001 CertificateProof of certification
TISAX CertificateAutomotive industry compliance
Data Processing AgreementGDPR Article 28 compliance
Technical & Organizational MeasuresSecurity controls documentation
Penetration Test SummaryThird-party security assessment
Business Continuity PlanDisaster recovery procedures

Audit Support#

We support customer audits:

  • Questionnaire completion
  • Evidence provision
  • Virtual audit sessions
  • On-site audits (by arrangement)

Getting Started#