Skip to content

Integrate GitLab with BoostSecurity


BoostSecurity provides an integration with GitLab that will enable you to inventory your GitLab repositories, conveniently provision security scanners onto those repositories, and visualize GitLab data in the Boost dashboard, rewarding you complete visibility into your organization's GitLab activity.


Prerequisites


To install the BoostSecurity GitLab integration, prepare the following:

  • Create a GitLab Personal Access Token with the api scope selected.

    • It is advised that a protected, non-human GitLab account entity is assigned to this Personal Access Token. Otherwise, the connection between Boost and GitLab can be severed if the associated entity's account is removed during standard offboarding or change management procedures.
    • The entity that the Personal Access Token is assigned to will need to have Owner permissions for the repositories that are associated with the GitLab groups that are being ingested into Boost.
  • Create a boost repository within your organization's SCM, which should contain a README.md file. To do this, go to your GitLab organization where you installed BoostSecurity and create a new boost project that contains a Readme file.

    GitLab Boost Repo


Install the BoostSecurity GitLab Integration


  1. Navigate to the Integrations page.

  2. Click the Install button that is on the GitLab Integration Card underneath the Available section.

    GitLab Integration Card

  3. A modal will appear, requesting the GitLab Personal Access Token. Provide the Personal Access Token and click Next.

    Installation

  4. Select the GitLab Group you are interested ingesting repositories for into Boost. It is advised that the root group is selected, as that will ingest all subgroups into Boost at once. Once a group is selected, click Complete

    Group

Once the installation completes, the BoostSecurity GitLab integration is successfully installed. Continue your BoostSecurity journey, by installing Zero Touch Provisioining.


Edit an installed BoostSecurity GitLab Integration


In the event an adjustment needs to be made to an installed GitLab Integration, the following instructions are provided:

  1. Navigate to the Integrations page.

  2. Click on the GitLab Integration Card underneath the Installed section.

    GitLab Installed Integration Card

  3. Click the Configuration tab.

    GitLab Installed Integration Card Drawer Overview

  4. Click the pencil icon associated with the GitLab Integration you wish to edit.

    GitLab Installed Integration Card Drawer Configuration

  5. Provide a Personal Access Token that has the api scope and click Update.

    GitLab Installed Integration Card Drawer Configuration


Zero Touch Provisioning for GitLab


  1. Go to the Integrations page, select your GitLab integration and click on the configuration tab.

  2. On the ZTP column, you will notice that the status is set to Not Set. Click on the menu next to the status and select Enable.

    GitLab Enable ZTP

  3. The ZTP wizard configures your GitLab organization's boost repository, where the GitLab pipeline definition (.gitlab-ci.yml) is located.

    Configure boost repo

  4. Select the boost repository on your organization from the dropdown as shown above and click the Next button.

  5. Authorize the BoostSecurity.io CI provisioning on all organizations. Click on the Authorize button at the bottom of the page.

    Authorize

  6. The pipeline configuration is complete following a successful CI pipeline setup!

    Note

    By clicking the Enable Boost Recommended Scanners button, Boost will provision multiple scanners for every repository it has access to. These scanners will then request new scans to be conducted for each of those repositories. Please note that this process would have a financial impact on your services, so ensure that this is the correct course of action before proceeding.

    If you are connecting to a large collection of repos, you may want to enable scanning in a more targeted manner.

Zero Touch Provisioning is now enabled!!!


Next Steps


It is recommended to enable default scanner protection for your GitLab organization, and then proceed to build your first custom policy, where you would define specific actions for security events identified by configured scanners.