Please check gitlab-tutorial

Skip to content

Secure your application

GitLab can check your applications for security vulnerabilities.

Getting started
Overview of how features fit together.
Application security
Scanning, vulnerabilities, compliance, customization, reporting.
Security configuration
Configuration, testing, compliance, scanning, enablement.
Container Scanning
Image vulnerability scanning, configuration, customization, reporting.
Dependency Scanning
Vulnerabilities, remediation, configuration, analyzers, reports.
Comparison
Dependency Scanning compared to Container Scanning.
Dependency List
vulnerabilities, licenses, filtering, exporting.
Continuous Vulnerability Scanning
Scanning, dependencies, advisories, background jobs.
Static Application Security Testing
Scanning, configuration, analyzers, vulnerabilities, reporting, customization, integration.
Infrastructure as Code (IaC) Scanning
Vulnerability detection, configuration analysis, pipeline integration.
Secret detection
Detection, prevention, monitoring, storage, revocation, reporting.
Dynamic Application Security Testing (DAST)
Automated penetration testing, vulnerability detection, web application scanning, security assessment, CI/CD integration.
API Security
Protection, analysis, testing, scanning, discovery.
Web API Fuzz Testing
Testing, security, vulnerabilities, automation, errors.
Coverage-guided fuzz testing
Coverage-guided fuzzing, random inputs, unexpected behavior.
Security Dashboard
Security dashboards, vulnerability trends, project ratings, metrics.
Offline environments
Offline security scanning, resolving vulnerabilities.
Vulnerability Report
Filtering, grouping, exporting, manual addition.
Vulnerability Page
Vulnerability details, status, resolution, linking issues.
Vulnerability severity levels
Classification, impact, prioritization, risk assessment.
GitLab Advisory Database
Security advisories, vulnerabilities, dependencies, database, updates.
CVE ID requests
Vulnerability tracking, security disclosure.
Policies
Security policies, enforcement, compliance, approvals, scans.
Security scanner integration
Reporting, vulnerabilities, remediations, tracking.