Bulk Triage Phase
When first adopting GitLab Secure
- Prioritize projects according to exposure risk: High/Medium/Low based on business impact and network exposure. Start with the high-priority projects and move down. Approach each project one at a time for initial bulk triage
- For one project at a time, ensure that scan execution policies have been applied to the project and have run successfully on the default branch
- Filter the Vulnerability Report for
- Project: The project under examination
- Status: Needs triage
- Severity: Critical
- If necessary because of the size of the results list, a scanner in the following order:
- Secret detection
- Dependency scanning
- Container scanning
- SAST + SAST-IaC
- API security testing
- DAST browser-based scanning
- Fuzz (both kinds)
- Starting at the top of the search results, open each vulnerability
- Read the vulnerability page thoroughly
- Click through to the links as necessary to understand the vulnerability
- If needed and available, click "Explain this vulnerability with AI" for more information
- Decide how to handle this vulnerability
- Execute the decision by choosing a Status in the top right corner
- Add a comment to the vulnerability explaining the decision
- If the status is Confirmed, create and assign a Jira issue
- Continue through the remaining vulnerabilities in the search results, performing the previous step for each
- If you filtered by scanner, update the filter to the next scanner and repeat
- Complete triage of all the Critical vulnerabilities in one project before moving to the next project
- Complete triage of all vulnerabilities in the following order shown in the table below
- While triaging vulnerabilities, when trends appear, consider adjusting the scan execution policies by referencing the GitLab documentation. If different projects and/or groups seem to require different policies, consider creating separate scan execution policies and linking them appropriately
- All the scanners have variables to customize
- Secret detection and SAST have
RULESET_GIT_REFERENCE
variables - DAST browser-based scanning and API scanning have site profiles
Proposed order for vulnerability bulk triage
High risk projects | Medium risk projects | Low risk projects | |
---|---|---|---|
Critical vulnerabilities | 1 | 2 | 4 |
High severity vulns | 3 | 5 | 7 |
Medium severity vulns | 6 | 8 | 10 |
Low severity vulns | 9 | 11 | 12 |
- Perform initial application risk assessments
- Prioritize applications
- Set non-intrusive scanners
- Establish guardrails with exceptions
- Monitor and adjust