๐บ๏ธ Diagram Index
- GitLab Pipeline Control Plane
- Security Quality Gates Flow
- Runner Isolation and Trust Boundaries
- Protected Environments and Approvals
- GitLab Components and Includes
- Release Evidence Chain
- DefectDojo and ASPM Overview
- DefectDojo Integration Flow
assets/diagrams/asoc-aspm-evolution.svgโ evolution from orchestration-first ASOC to posture-first ASPMassets/diagrams/product-security-director-metrics.svgโ three-bucket leadership dashboard viewassets/diagrams/zap-dast-flow.svgโ ZAP DAST flowassets/diagrams/linux-express-audit-flow.svgโ Linux express audit flowassets/diagrams/cloud-attack-chain-overview.svgโ cross-cloud attack chain overviewassets/diagrams/aws-cloud-attack-chain.svgโ AWS provider-specific attack chainassets/diagrams/azure-cloud-attack-chain.svgโ Azure provider-specific attack chainassets/diagrams/gcp-cloud-attack-chain.svgโ GCP provider-specific attack chainassets/diagrams/k8s-runtime-investigation-flow.svgโ runtime investigation workflow for Kubernetes and containers
New diagrams in v2.1
assets/diagrams/detection-engineering-flow.svgโ how threat modeling becomes logs, detections, and playbooksassets/diagrams/secure-architecture-patterns-overview.svgโ tenant, service, admin, and cloud-plane trust boundariesassets/diagrams/workload-federation-and-platform-access.svgโ pipeline to federation to cloud-role flowassets/diagrams/frontend-trust-boundary.svgโ browser, frontend, BFF, and service trust pathassets/diagrams/business-logic-abuse-surface.svgโ common business-workflow abuse surfaces
v2.2 diagrams
assets/diagrams/frontend-auth-patterns.svg- browser, BFF, API, IdP, and third-party trust mapassets/diagrams/business-logic-abuse-lifecycle.svg- incentive-to-loss abuse flowassets/diagrams/third-party-integration-trust-boundaries.svg- source, pipeline, runner, and artifact trust pathassets/diagrams/stack-review-lifecycle.svg- design-to-observe review loopassets/diagrams/learning-labs-feedback-loop.svg- read, practice, debrief, improve
v2.3 diagrams
assets/diagrams/senior-engineer-decision-loop.svg- advanced design-to-detection-to-scale loopassets/diagrams/product-security-operating-model.svg- intake, ownership, decision, and evidence flowassets/diagrams/security-program-roadmap.svg- staged capability roadmap for Product Security programs
v2.4 diagrams
assets/diagrams/leadership-review-cadence.svg- evidence-to-engineering-to-executive-to-board narrative flowassets/diagrams/board-narrative-waterfall.svg- board story structure from direction to asks
v2.5 diagrams
assets/diagrams/newcomer-ramp-up-map.svg- a simple map from beginner confusion to guided paths, glossary, reviews, and labsassets/diagrams/review-checklist-loop.svg- read, review, decide, record, and improve loop for newcomer-friendly checklistsassets/diagrams/mobile-api-compliance-automation-labs-map.svg- map connecting mobile labs, API conformance, compliance learning, and containment automation.BSIMM and SAMM Comparison โ high-level visual on how to use BSIMM and OWASP SAMM together.
v4.5 diagrams
assets/diagrams/devopssec-control-loop.svg- control loop for shift-left checks, protected deployment, and runtime feedbackassets/diagrams/webapp-review-trust-zones.svg- browser, edge, identity, and data/integration review mapassets/diagrams/security-automation-controller-trust-map.svg- AWX / Jenkins / Rundeck as privileged control planes
v4.6 diagrams
assets/diagrams/browser-session-trust-zones.svg- browser, identity/BFF, API, and data trust map for session and authorization reviewassets/diagrams/csp-third-party-trust-flow.svg- how CSP, SRI, and script ownership fit into frontend trust decisionsassets/diagrams/graphql-abuse-controls.svg- schema, resolver, operation-cost, and detection control map for GraphQL