Skip to content

Integrate GitLab with BoostSecurity


BoostSecurity provides an integration with GitLab that will enable you to inventory your GitLab repositories, conveniently provision security scanners onto those repositories, and visualize GitLab data in the Boost dashboard, rewarding you complete visibility into your organization's GitLab activity.


Prerequisites


To install the BoostSecurity GitLab integration, prepare the following:

  • Create a GitLab Access Token with the api scope selected. This access token can be:

    In all cases, the token must have the api scope enabled.

    • It advised that a protected, non-human GitLab account (such as a service account or bot user) be used to generate the token. Using a token tied to an individual's personal account increases the risk of the integration breaking if that user is offboarded or removed due to internal changes.

    • The entity that the Access Token is assigned to will need to have Owner permissions for the repositories that are associated with the GitLab groups that are being ingested into Boost.

  • Create a boost repository within your organization's SCM, which should contain a README.md file. To do this, go to your GitLab organization where you installed BoostSecurity and create a new boost project that contains a Readme file.

    GitLab Boost Repo


Install the BoostSecurity GitLab Integration


  1. Navigate to the Integrations page.

  2. Click the Install button that is on the GitLab Integration Card underneath the Available section.

    GitLab Integration Card

  3. A modal will appear, requesting the GitLab Access Token. Provide the Access Token and click Next.

    Installation

  4. Select the GitLab Group you are interested ingesting repositories for into Boost. It is advised that the root group is selected, as that will ingest all subgroups into Boost at once. Once a group is selected, click Complete

    Group

Once the installation completes, the BoostSecurity GitLab integration is successfully installed. Continue your BoostSecurity journey, by installing Zero Touch Provisioining.


Edit an installed BoostSecurity GitLab Integration


In the event an adjustment needs to be made to an installed GitLab Integration, the following instructions are provided:

  1. Navigate to the Integrations page.

  2. Click on the GitLab Integration Card underneath the Installed section.

    GitLab Installed Integration Card

  3. Click the Configuration tab.

    GitLab Installed Integration Card Drawer Overview

  4. Click the pencil icon associated with the GitLab Integration you wish to edit.

    GitLab Installed Integration Card Drawer Configuration

  5. Provide an Access Token that has the api scope and click Update.

    GitLab Installed Integration Card Drawer Configuration


Zero Touch Provisioning for GitLab


  1. Go to the Integrations page, select your GitLab integration and click on the configuration tab.

  2. On the ZTP column, you will notice that the status is set to Not Set. Click on the menu next to the status and select Enable.

    GitLab Enable ZTP

  3. The ZTP wizard configures your GitLab organization's boost repository, where the GitLab pipeline definition (.gitlab-ci.yml) is located.

    Configure boost repo

  4. Select the boost repository on your organization from the dropdown as shown above and click the Next button.

  5. Authorize the BoostSecurity.io CI provisioning on all organizations. Click on the Authorize button at the bottom of the page.

    Authorize

  6. The pipeline configuration is complete following a successful CI pipeline setup!

    Note

    By clicking the Enable Boost Recommended Scanners button, Boost will provision multiple scanners for every repository it has access to. These scanners will then request new scans to be conducted for each of those repositories. Please note that this process would have a financial impact on your services, so ensure that this is the correct course of action before proceeding.

    If you are connecting to a large collection of repos, you may want to enable scanning in a more targeted manner.

Zero Touch Provisioning is now enabled!!!


Next Steps


It is recommended to enable default scanner protection for your GitLab organization, and then proceed to build your first custom policy, where you would define specific actions for security events identified by configured scanners.