Individual user or administrator use of service accounts for O/S, applications, and databases is prohibited.
Preventing interactive login via a service accounts by individual users and administrators reduces the risk of unauthorized access to systems and data. In many cases, service accounts are set up with highly privileged access and therefore, this control aims to prevent the hijacking of that access by individuals who otherwise would not have it. All service accounts should be set by default to
do not allow login and monitoring should be in place to alert in the event an account is set to allow interactive login.
This control applies to all systems within our production environment. The production environment includes all endpoints and cloud assets used in hosting GitLab.com and its subdomains. This may include third-party systems that support the business of GitLab.com.
All service accounts should be set by default to
do not allow interactive login
Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Remote Connections control issue.