SlideShare a Scribd company logo
Innovate faster without
sacrificing security or
quality
Victor Wu - Product Manager, GitLab
Brian Neel - Security Lead, GitLab
● We will be recording this webinar and it will be available online.
● The slides will be sent with the recording via email.
● Please ask Victor and Brian questions!
A few housekeeping items
2
Questions can be
asked at any time by
typing in the
“Questions” tab on
your screen and
pressing send.
The World’s #1
Bug Bounty &
Vulnerability Disclosure
Platform
We connect organizations with the
largest community of trusted hackers
to discover security vulnerabilities
before they can be exploited by
criminals.
How HackerOne Works
Trusted By
Subscribe to our fresh newsletter: www.hackerone.com/zerodaily
8
AGENDA
1. Introduction
2. Speed, Security, and Quality
3. Security across the SDLC
4. Why we work with the community
5. How GitLab leverages HackerOne
6. Q&A
9
DEVELOPMENT DELIVERY
PLAN
Chat
Issue Tracker
Issue Weights
Issue Board
Time Tracking
CODE
Repository Management
Merge Requests
Code Review
Diff Tools
TEST
GitLab CI
Autoscale Runners
Review Apps
DEPLOY
CI/CD Pipelines
Auto or Manual Deploy
Container Registry
Chat Ops
ANALYZE
Contributor Analytics
Release Cycle Analytics
Prometheus Monitoring
End-to-End Software Development Platform
Speed, Security &
Quality
10
Yes, it’s possible!
But it requires finely-tuned
processes and collaboration
across stakeholders.
11
Source: 2016 Global Developer Survey
Innovate faster
without
sacrificing
security
12
● Make smaller changes &
commit often
● Involve collaborators and
approvers sooner
● Code review - “Shift Left”
● Security controls baked into
each stage of your
development process
● Security as a first-class citizen
stakeholder
Security Across the
Software Dev Lifecycle
13
Ship inherently secure code.
14
Security starts with code. Developers should always
have security top of mind when writing code. Code
review is a collaborative process that should begin
early in the development phase.
Depends on your code frameworks and your code
architecture
Expertise and resources
Systems and data
Start the conversation early with diff tools
and merge requests.
15
● Make small, iterative changes
● Keep conversations in context
● Catch bugs or broken code early
Access Control & Approvals
16
Merge request approvals act
as a quality gate to your
master branch.
● Ensure the right experts are
reviewing code before it’s merged
● Encourages cross-functional
conversations to happen at an
earlier stage in development
● Approvers may include a security
stakeholder
Access Control & Approvals
17
Protected branches:
● Prevents pushes from everybody except users
with permission
● Prevents anyone from force pushing to the branch
● Prevents anyone from deleting the branch
● E.g. feature touches sensitive customer data
Continuous Integration
18
Get code into different stages earlier by
integrating code frequently to detect, locate and
fix errors quickly. Making smaller changes leave
teams with less variables to consider when fixing
errors and bugs.
19
● Automatic dynamic scanning with
automatic deployments to test
environments
● Humans test for vulnerabilities
● Security testers
● Business users
Get code into staging or test
environment early.
Why we work with our
community to spot &
prioritize security
issues and bug
bounties
20
21
Security Development Process - Evolution
Idea v1 v2
Internal Security Audit
Development
Timeline
Vulnerability Scan
Penetration Test
Developer Training
Static Analysis
Dynamic Analysis
Bug Bounties
Test Driven Dev.
22
GitLab’s Case
Study #1
Example Report received via HackerOne:
https://hackerone.com/reports/186194
Researcher provides a brief summary of the
vulnerability, proof of concept (not using
production systems), a listing of the vulnerable
code (nice!), and a proposed fix (also nice!).
23
24
GitLab’s Case
Study #2
Example Report received via HackerOne:
https://hackerone.com/reports/215384
This time a researcher found a vulnerability in
the just released subgroups feature of GitLab
9.0.
Report received on March 22nd. 9.0 had just
been released that day.
Our specs, feature tests, internal code reviews,
static, and dynamic analysis tools failed to find
this authorization vulnerability.
25
Get started
26
How you can help your team innovate faster
and maintain quality & security
● Ship inherently secure code
● Build a collaborative culture
● Encourage small, iterative changes and commit often!
● Start code review early in the development process
● Continuously integrate code & automate tests
● Leverage the hacker community to quickly and safely spot security vulnerabilities
Q & A
27
Victor Wu
Product Manager, GitLab
Brian Neel
Security Lead, GitLab
Thank You
28
sales@hackerone.com
luke@hackerone.com

More Related Content

PDF
Bug Bounties and The Path to Secure Software by 451 Research
PDF
DevSecOps at Agile 2019
PDF
DevSecOps for Developers: How To Start
PPTX
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
PDF
Building a DevSecOps Pipeline Around Your Spring Boot Application
PPTX
How to get the best out of DevSecOps - an operations perspective
PDF
Renato Rodrigues - Security in the wild
PDF
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...
Bug Bounties and The Path to Secure Software by 451 Research
DevSecOps at Agile 2019
DevSecOps for Developers: How To Start
#ATAGTR2018 Presentation "Decoding Security in DevSecOps" by Meghashyam Varan...
Building a DevSecOps Pipeline Around Your Spring Boot Application
How to get the best out of DevSecOps - an operations perspective
Renato Rodrigues - Security in the wild
DevSecCon Boston 2018: Building a practical DevSecOps pipeline for free by Je...

What's hot (20)

PDF
DevSecOps: A New Hope for Security in CI/CD
PPTX
DevSecCon London 2017: when good containers go bad by Tim Mackey
PPTX
Elizabeth Lawler - Devops, security, and compliance working in unison
PDF
[DevSecOps Live] DevSecOps: Challenges and Opportunities
PDF
Security as Code: A DevSecOps Approach
PDF
DevOps or DevSecOps
PPTX
IntroSec Con - Building Your Blue Team Arsenal - glitch
PDF
Zero to Ninety in Securing DevOps
PDF
Nick Drage & Fraser Scott - Epic battle devops vs security
PDF
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
PPTX
Matt carroll - "Security patching system packages is fun" said no-one ever
PDF
DevSecCon London 2017: Shift happens ... by Colin Domoney
PPTX
DevSecCon Tel Aviv 2018 - Security learns to sprint by Tanya Janca
PDF
8 Tips for Deploying DevSecOps
PDF
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
PDF
Dev secops. Real experience.
PDF
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
PDF
Integrating DevOps and Security
PDF
Agile Secure Development
DevSecOps: A New Hope for Security in CI/CD
DevSecCon London 2017: when good containers go bad by Tim Mackey
Elizabeth Lawler - Devops, security, and compliance working in unison
[DevSecOps Live] DevSecOps: Challenges and Opportunities
Security as Code: A DevSecOps Approach
DevOps or DevSecOps
IntroSec Con - Building Your Blue Team Arsenal - glitch
Zero to Ninety in Securing DevOps
Nick Drage & Fraser Scott - Epic battle devops vs security
DevSecCon Singapore 2018 - Maginot Line – 6 Common AppSec Anti-Patterns Preve...
Matt carroll - "Security patching system packages is fun" said no-one ever
DevSecCon London 2017: Shift happens ... by Colin Domoney
DevSecCon Tel Aviv 2018 - Security learns to sprint by Tanya Janca
8 Tips for Deploying DevSecOps
DevSecCon Tel Aviv 2018 - Value driven threat modeling by Avi Douglen
Dev secops. Real experience.
DevSecCon London 2017: Threat modeling in a CI environment by Steven Wierckx
Integrating DevOps and Security
Agile Secure Development

Viewers also liked (19)

PDF
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
PDF
Why You Need to Rethink Container Security
PDF
Introduction to Infrastructure as Code & Automation / Introduction to Chef
PDF
Monetising Your Skill
PDF
Practical Approaches to Container Security
PDF
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
PPTX
Understanding container security
PDF
Atomic CLI scan
PDF
Docker London: Container Security
PPTX
Docker Security workshop slides
PDF
Veer's Container Security
PDF
Docker Security: Are Your Containers Tightly Secured to the Ship?
PPTX
AWS Security Architecture - Overview
PPTX
Security best practices for kubernetes deployment
PPTX
Monitoring, Logging and Tracing on Kubernetes
PDF
London HUG 19/5 - Kubernetes and vault
PDF
Docker Security - Secure Container Deployment on Linux
PDF
Container Orchestration Wars
PPTX
Docker Security Overview
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
Why You Need to Rethink Container Security
Introduction to Infrastructure as Code & Automation / Introduction to Chef
Monetising Your Skill
Practical Approaches to Container Security
Open Source Tools for Container Security and Compliance @Docker LA Meetup 2/13
Understanding container security
Atomic CLI scan
Docker London: Container Security
Docker Security workshop slides
Veer's Container Security
Docker Security: Are Your Containers Tightly Secured to the Ship?
AWS Security Architecture - Overview
Security best practices for kubernetes deployment
Monitoring, Logging and Tracing on Kubernetes
London HUG 19/5 - Kubernetes and vault
Docker Security - Secure Container Deployment on Linux
Container Orchestration Wars
Docker Security Overview

Similar to How GitLab and HackerOne help organizations innovate faster without compromising security (20)

PDF
Open source iam value, benefits, and risks
PPTX
Application security meetup k8_s security with zero trust_29072021
PPTX
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
PDF
Create code confidence for better application security
PDF
Hacker-powered Software Development
PDF
AppSec How-To: Achieving Security in DevOps
PDF
Code audition
PDF
Introduction to the proposed EU cyber resilience act (CRA)
PPTX
Making Security Agile
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
PDF
Open Source Security: How to Lay the Groundwork for a Secure Culture
DOCX
Aardwolf Security's Expert Code Review Services
PDF
10 Tips to Keep Your Software a Step Ahead of the Hackers
PDF
AWS live hack: Atlassian + Snyk OSS on AWS
PPTX
A question of trust - understanding Open Source risks
PPTX
Started In Security Now I'm Here
PPTX
Cyber security - It starts with the embedded system
PPTX
Introduction to Web Application Penetration Testing
PDF
React commonest security flaws and remedial measures!
Open source iam value, benefits, and risks
Application security meetup k8_s security with zero trust_29072021
Agile and Continuous Delivery for Audits and Exams - DC Continuous Delivery M...
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Create code confidence for better application security
Hacker-powered Software Development
AppSec How-To: Achieving Security in DevOps
Code audition
Introduction to the proposed EU cyber resilience act (CRA)
Making Security Agile
Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
Aardwolf Security's Expert Code Review Services
10 Tips to Keep Your Software a Step Ahead of the Hackers
AWS live hack: Atlassian + Snyk OSS on AWS
A question of trust - understanding Open Source risks
Started In Security Now I'm Here
Cyber security - It starts with the embedded system
Introduction to Web Application Penetration Testing
React commonest security flaws and remedial measures!

More from HackerOne (17)

PDF
Top 20 Public Bug Bounty Programs
PDF
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
PDF
Federal Trade Commission's Start With Security Guide
PDF
Understanding Information Security Assessment Types
PDF
Everything you Need to Know about The Data Protection Officer Role
PDF
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
PDF
OWASP Top 10 - 2017
PDF
9 Top Bug Bounty Programs
PDF
Voices of Vulnerability Disclosure Policy
PDF
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
PDF
Why Executives Underinvest In Cybersecurity
PDF
Bug Bounty Basics
PDF
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
PDF
HackerOne Presents in China - COO Ning Wang
PPTX
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
PPTX
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
PDF
Meet the hackers powering the world's best bug bounty programs
Top 20 Public Bug Bounty Programs
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
Federal Trade Commission's Start With Security Guide
Understanding Information Security Assessment Types
Everything you Need to Know about The Data Protection Officer Role
The 2018 Hacker Report: Insights on the hacker mindset, who they are, and the...
OWASP Top 10 - 2017
9 Top Bug Bounty Programs
Voices of Vulnerability Disclosure Policy
GDPR Guide: The ICO's 12 Recommended Steps To Take Now
Why Executives Underinvest In Cybersecurity
Bug Bounty Basics
An Invitation to Hack: Wiley Rein and HackerOne Webinar on Vulnerability Disc...
HackerOne Presents in China - COO Ning Wang
Tapping Hackers for Continuous Security: That's Hacker-Powered Security
Bounty Craft: Bug bounty reports how do they work, @sushihack presents at Nu...
Meet the hackers powering the world's best bug bounty programs

Recently uploaded (20)

PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
Funds Management Learning Material for Beg
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
artificial intelligence overview of it and more
PPTX
innovation process that make everything different.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Introduction to Information and Communication Technology
PPTX
Digital Literacy And Online Safety on internet
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
WebRTC in SignalWire - troubleshooting media negotiation
Unit-1 introduction to cyber security discuss about how to secure a system
Funds Management Learning Material for Beg
Decoding a Decade: 10 Years of Applied CTI Discipline
Paper PDF World Game (s) Great Redesign.pdf
Introuction about ICD -10 and ICD-11 PPT.pptx
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
The Internet -By the Numbers, Sri Lanka Edition
artificial intelligence overview of it and more
innovation process that make everything different.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Tenda Login Guide: Access Your Router in 5 Easy Steps
Cloud-Scale Log Monitoring _ Datadog.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Introduction to Information and Communication Technology
Digital Literacy And Online Safety on internet
INTERNET------BASICS-------UPDATED PPT PRESENTATION

How GitLab and HackerOne help organizations innovate faster without compromising security

  • 1. Innovate faster without sacrificing security or quality Victor Wu - Product Manager, GitLab Brian Neel - Security Lead, GitLab
  • 2. ● We will be recording this webinar and it will be available online. ● The slides will be sent with the recording via email. ● Please ask Victor and Brian questions! A few housekeeping items 2 Questions can be asked at any time by typing in the “Questions” tab on your screen and pressing send.
  • 3. The World’s #1 Bug Bounty & Vulnerability Disclosure Platform
  • 4. We connect organizations with the largest community of trusted hackers to discover security vulnerabilities before they can be exploited by criminals.
  • 7. Subscribe to our fresh newsletter: www.hackerone.com/zerodaily
  • 8. 8 AGENDA 1. Introduction 2. Speed, Security, and Quality 3. Security across the SDLC 4. Why we work with the community 5. How GitLab leverages HackerOne 6. Q&A
  • 9. 9 DEVELOPMENT DELIVERY PLAN Chat Issue Tracker Issue Weights Issue Board Time Tracking CODE Repository Management Merge Requests Code Review Diff Tools TEST GitLab CI Autoscale Runners Review Apps DEPLOY CI/CD Pipelines Auto or Manual Deploy Container Registry Chat Ops ANALYZE Contributor Analytics Release Cycle Analytics Prometheus Monitoring End-to-End Software Development Platform
  • 11. But it requires finely-tuned processes and collaboration across stakeholders. 11 Source: 2016 Global Developer Survey
  • 12. Innovate faster without sacrificing security 12 ● Make smaller changes & commit often ● Involve collaborators and approvers sooner ● Code review - “Shift Left” ● Security controls baked into each stage of your development process ● Security as a first-class citizen stakeholder
  • 13. Security Across the Software Dev Lifecycle 13
  • 14. Ship inherently secure code. 14 Security starts with code. Developers should always have security top of mind when writing code. Code review is a collaborative process that should begin early in the development phase. Depends on your code frameworks and your code architecture Expertise and resources Systems and data
  • 15. Start the conversation early with diff tools and merge requests. 15 ● Make small, iterative changes ● Keep conversations in context ● Catch bugs or broken code early
  • 16. Access Control & Approvals 16 Merge request approvals act as a quality gate to your master branch. ● Ensure the right experts are reviewing code before it’s merged ● Encourages cross-functional conversations to happen at an earlier stage in development ● Approvers may include a security stakeholder
  • 17. Access Control & Approvals 17 Protected branches: ● Prevents pushes from everybody except users with permission ● Prevents anyone from force pushing to the branch ● Prevents anyone from deleting the branch ● E.g. feature touches sensitive customer data
  • 18. Continuous Integration 18 Get code into different stages earlier by integrating code frequently to detect, locate and fix errors quickly. Making smaller changes leave teams with less variables to consider when fixing errors and bugs.
  • 19. 19 ● Automatic dynamic scanning with automatic deployments to test environments ● Humans test for vulnerabilities ● Security testers ● Business users Get code into staging or test environment early.
  • 20. Why we work with our community to spot & prioritize security issues and bug bounties 20
  • 21. 21 Security Development Process - Evolution Idea v1 v2 Internal Security Audit Development Timeline Vulnerability Scan Penetration Test Developer Training Static Analysis Dynamic Analysis Bug Bounties Test Driven Dev.
  • 22. 22 GitLab’s Case Study #1 Example Report received via HackerOne: https://hackerone.com/reports/186194 Researcher provides a brief summary of the vulnerability, proof of concept (not using production systems), a listing of the vulnerable code (nice!), and a proposed fix (also nice!).
  • 23. 23
  • 24. 24 GitLab’s Case Study #2 Example Report received via HackerOne: https://hackerone.com/reports/215384 This time a researcher found a vulnerability in the just released subgroups feature of GitLab 9.0. Report received on March 22nd. 9.0 had just been released that day. Our specs, feature tests, internal code reviews, static, and dynamic analysis tools failed to find this authorization vulnerability.
  • 25. 25
  • 26. Get started 26 How you can help your team innovate faster and maintain quality & security ● Ship inherently secure code ● Build a collaborative culture ● Encourage small, iterative changes and commit often! ● Start code review early in the development process ● Continuously integrate code & automate tests ● Leverage the hacker community to quickly and safely spot security vulnerabilities
  • 27. Q & A 27 Victor Wu Product Manager, GitLab Brian Neel Security Lead, GitLab