Module 8 Lesson 5: Security Alerts
·DevOps

Module 8 Lesson 5: Security Alerts

Act phase. Learn how to manage the security findings from your scans and setup alerts so that 'Critical' vulnerabilities are dealt with immediately.

Module 8 Lesson 5: Security Alerts

In Module 5, we learned how to Scan. Now, we learn how to React. A security finding that sits in a log file for a month is useless.

1. The Security Dashboard

Found under Secure -> Security Dashboard.

  • It aggregates every vulnerability across your entire project (or even your whole company!).
  • It sorts them by Severity (Critical, High, Medium, Low).

2. Setting Up Security Triage

When a new bug is found:

  1. The Alert: GitLab sends an email/Slack to the "Security Group."
  2. The Investigation: A developer clicks the vulnerability in the dashboard to see the exact line of code.
  3. The Action: You can click "Create Issue" to automatically start a task to fix the bug.

3. "Secret" Leaks: The Red Alert

If GitLab's Secret Detection finds a private key pushed to a public repo, it can:

  1. Revoke the token automatically (for supported providers like AWS or GitHub).
  2. Email the developer immediately with a "CRITICAL" warning.

4. Why Compliance Fails

Compliance fails when it's treated as a "Quarterly PDF." GitLab turns it into a Continuous Monitor. Every time you merge code, you are auditing your compliance.


Exercise: The Security Drill

  1. Look at your Security Dashboard. Does it currently list any findings?
  2. Find a "Low" or "Informational" finding. Can you see which specific commit introduced it?
  3. Imagine a "Critical" SQL Injection bug is found in Staging. Who should be notified first? (The CEO? The Lead Dev? The Security Engineer?)
  4. Research: What is "GitLab Security Policy"? (Hint: It's a YAML file that forces scans on every project).

Summary

You have completed Module 8: Monitoring and Notifications. You have transformed your pipeline from a "Silent Script" into a "Self-Reporting Machine" that tracks its own speed, success, health, and security.

Next Module: The final audit: Module 9: Security and Compliance.

Subscribe to our newsletter

Get the latest posts delivered right to your inbox.

Subscribe on LinkedIn