DOE CODE Hosting Security DOE CODE Security Hosting

Implementation of account management best practices, use of advanced cyber security tools, and application of intelligence data offers visitors a trusted source of DOE CODE and projects.
DOE CODE Hosting Security

Implementation of account management best practices, use of advanced cyber security tools, and application of intelligence data offers visitors a trusted source of DOE CODE and projects.

Gitlab Security
GITLAB SECURITY

  • OSTI limits registrations to known/trusted entities to reduce attack surface and offers multi-factor authentication to meet modern federal compliance requirements.
  • Native GitLab features give owners granular control of their project and project contributors while providing enhanced reporting and Software Bill of Material (SBOM) generation capabilities for hosted works.

GITLAB SECURITY

  • OSTI limits registrations to known/trusted entities to reduce attack surface and offers multi-factor authentication to meet modern federal compliance requirements.
  • Native GitLab features give owners granular control of their project and project contributors while providing enhanced reporting and Software Bill of Material (SBOM) generation capabilities for hosted works.
Software Sandboxing
Software Sandboxing

  • Executable code is safely detonated by a software suite in a FEDRMAP compliant isolated environment to identify behavioral threats.

Software Sandboxing

  • Executable code is safely detonated by a software suite in a FEDRMAP compliant isolated environment to identify behavioral threats.
Intelligence Data
Intelligence Data

  • Daily intelligence processing includes newly-identified malicious files and adversary tactics from open-source and USG threat feeds.

Intelligence Data

  • Daily intelligence processing includes newly-identified malicious files and adversary tactics from open-source and USG threat feeds.
File Scans
File Scans

  • Endpoint protection software scans raw source code and executable code for known signatures and common coding vulnerabilities.
  • Searches on files are supported to identify undesirable content, such as copyright issues and file types.

File Scans

  • Endpoint protection software scans raw source code and executable code for known signatures and common coding vulnerabilities.
  • Searches on files are supported to identify undesirable content, such as copyright issues and file types.