Prevent Token Expiration in GitLab Organization
Type: Rule
ID: gitlab-org-token-about-to-expire
Source: v2/rules/gitlab/org/expiring-tokens.yaml
Rego Source: expiring-tokens.rego
Labels: Gitlab, Organization
Verify no GitLab organization tokens are about to expire.
This rule requires Gitlab Organization Discovery Evidence. See here for more details.
Signed Evidence for this rule IS NOT required by default but is recommended.
Rule requires evaluation with a target. Without one, it will be disabled unless the --all-evidence
flag is provided.
Usage example
uses: gitlab/org/expiring-tokens@v2
with:
exiring_in_days: 30
Mitigation
Ensure that no GitLab organization tokens are about to expire to prevent service disruption.
Description
This rule ensures that no GitLab organization tokens are about to expire. It performs the following steps:
- Checks the settings of the GitLab organization.
- Verifies that no tokens are about to expire.
Evidence Requirements:
- Evidence must be provided by the Scribe Platform's CLI tool through scanning GitLab organization resources.
Evidence Requirements
Field | Value |
---|---|
signed | False |
content_body_type | generic |
target_type | data |
predicate_type | http://scribesecurity.com/evidence/discovery/v0.1 |
asset_platform | gitlab |
asset_type | organization |
asset_name | Template value (see below) |
Template Value (see here for more details)
{{- if eq .Context.asset_type "organization" -}}
{{- on_target .Context.asset_name -}}
{{- else -}}
{{- on_target nil -}}
{{- end -}}
Input Definitions
Parameter | Type | Required | Description |
---|---|---|---|
exiring_in_days | number | False | Number of days before a token expires. |