Skip to main content

Compliance Controls

Plumber allows defining controls for GitLab projects, covering both CI/CD configuration and project settings. When a control is not respected, an issue is created.

CI/CD Container Images

ControlProblemImpact
Containers images must come from authorized sources ISSUE-101Verifies that container images used to run your CI/CD pipelines come from authorized and trusted sources.Helps mitigate security risks introduced by the use of malicious, compromised, or vulnerable images.
Container images must not use forbidden tags ISSUE-102Verifies that container images used to run your CI/CD pipelines rely on authorized tags.Helps mitigate both security and functional risks introduced by the use of unverified, outdated, or compromised image versions.
Container images must be pinned by digest ISSUE-103Verifies that container images are referenced by their SHA256 digest rather than a mutable tag.Prevents supply chain attacks where a tag is overwritten with a compromised image, guaranteeing exact image content in every pipeline run.

CI/CD Variables

ControlProblemImpact
CI/CD variables must be protected ISSUE-201Verifies that CI/CD variables used in a project have the protected field enabled.Ensures sensitive values are restricted to protected branches or tags, reducing unauthorized exposure.
CI/CD variables must be masked ISSUE-202Verifies that CI/CD variables used in a project have the masked field enabled.Prevents variable values from being exposed in pipeline logs, reducing the risk of leaks.
Pipeline must not enable debug trace ISSUE-203Verifies that CI_DEBUG_TRACE and CI_DEBUG_SERVICES are not enabled in the pipeline configuration.Prevents exposure of all CI/CD variable values in job logs, including secrets and tokens.
Pipeline must not use unsafe variable expansion ISSUE-204Detects user-controlled CI variables expanded in shell re-interpretation contexts (eval, sh -c, bash -c, source).Prevents command injection via crafted branch names, MR titles, or commit messages (OWASP CICD-SEC-1).

CI/CD Secrets

ControlProblemImpact
Pipeline configuration must not contain secrets ISSUE-301Uses Gitleaks to verify that both merged and unmerged CI/CD configurations don’t have leaked secrets.Prevents exposure of API keys, passwords, or tokens that could lead to unauthorized access.

Pipeline Composition

ControlProblemImpact
Pipelines must include templates ISSUE-405 ISSUE-406Verifies that the projects contain specific templates. This control can also allow overriding certain variables in the included templates.Ensures pipelines comply with required security and compliance practices.
Pipelines must include components ISSUE-408 ISSUE-409Verifies that the projects contain specific GitLab components. This control can also allow overriding certain variables in the included components.Ensures pipelines integrate mandatory security and compliance steps.
Pipeline must include required phases ISSUE-407Verifies that the CI/CD pipeline includes a group of job types.Ensures completeness and compliance of the pipeline execution flow.
Pipeline must not contain hardcoded jobs ISSUE-401Verifies that no hardcoded job is used in CI/CD pipelines.Improves maintainability and ensures compliance with best practices.
Pipeline must not override template jobs ISSUE-402Verifies that no job coming from an included template is overridden in the project CI/CD configuration.Prevents inconsistent or insecure pipeline configurations caused by job overrides.
Pipeline must not use forbidden ref in includes ISSUE-404Verifies that the included refs are using specified tags.Prevents reliance on insecure or non-compliant references.
Pipeline must use only up-to-date includes ISSUE-403Verifies that the included pipelines are up-to-date compared to their source.Reduces risks from outdated or vulnerable templates.
Security jobs must not be weakened ISSUE-410Detects security scanning jobs (SAST, Secret Detection, Container Scanning, etc.) weakened by allow_failure: true, rules: overrides with when: never / when: manual, or when: manual at job level.Prevents silently neutralized security scans that give a false sense of compliance (OWASP CICD-SEC-4).
Pipeline must not execute unverified scripts ISSUE-411Detects jobs that download and immediately execute scripts from the internet (curl | bash, wget | sh, download-then-execute) without integrity verification.Prevents supply chain attacks where a compromised URL serves a modified script that exfiltrates secrets (OWASP CICD-SEC-3, CICD-SEC-8).

Access and Authorization

ControlProblemImpact
Branch must be protected ISSUE-501 ISSUE-505Verifies that the project configuration respects the protection, push, merge and owner approval on included branch names.Prevents unauthorized modifications and enforces branch protection standards.
MR approval rules must have at least N approval required ISSUE-502Verifies that the project merge request approval rules that cover all protected branches have a minimum number of approval requirements.Prevents unreviewed code from being merged, reducing security risks.
MR approval settings must be compliant ISSUE-503Verifies that MR approval settings are properly configured.Ensures compliance with review and security requirements.
An MR approval rule must be defined to cover all protected branches ISSUE-504Verifies that the protected branches have at least one approval rule.Ensures protected branches cannot bypass review processes.
MR settings must be compliant ISSUE-506Verifies that the project’s merge request settings are correct in terms of merge method, resolving differences, squashing, etc.Reduces risk of unauthorized or insecure code changes.
Number of project members must respect a quota ISSUE-507Verifies that the project configuration respects the owner, maintainer and developer quotas.Prevents uncontrolled access that could weaken project security.
Number of group members must respect a quota ISSUE-508Verifies that the group configuration respects the owner, maintainer and developer quotas.Prevents uncontrolled access at group level, strengthening governance.

Security Source

ControlProblemImpact
Project must have a security policy source ISSUE-601Verifies if the projects have a specific project as their source of security policy.Ensures compliance with security policy and reduces risk of unmanaged vulnerabilities.