You can configure the following GitLab features to help ensure that your GitLab instance meets common compliance standards. Click a feature name for further documentation.
GitLab’s security features may also help you meet relevant compliance standards.
|Restrict SSH Keys|
Control the technology and key length of SSH keys used to access GitLab
|Granular user roles and flexible permissions|
Manage access and permissions with five different user roles and settings for external users. Set permissions according to people’s role, rather than either read or write access to a repository. Don’t share the source code with people that only need access to the issue tracker.
|Enforce TOS acceptance|
Enforce your users accepting new terms of service by blocking GitLab traffic.
|Email all users of a project, group, or entire server|
An admin can email groups of users based on project or group membership, or email everyone using the GitLab instance. This is great for scheduled maintenance or upgrades.
|Omnibus package supports log forwarding|
Forward your logs to a central system.
|Lock project membership to group|
Group owners can prevent new members from being added to projects within a group.
|LDAP group sync|
GitLab Enterprise Edition gives admins the ability to automatically sync groups and manage SSH keys, permissions, and authentication, so you can focus on building your product, not configuring your tools.
|LDAP group sync filters|
GitLab Enterprise Edition Premium gives more flexibility to synchronize with LDAP based on filters, meaning you can leverage LDAP attributes to map GitLab permissions.
To maintain the integrity of your code, GitLab Enterprise Edition Premium gives admins the ability to view any modifications made within the GitLab server in an advanced audit log system, so you can control, analyze and track every change.
Auditor users are users who are given read-only access to all projects, groups, and other resources on the GitLab instance.