Note: This is a one-way outbound integration. Findings created or updated in Plerion will appear in GitLab merge requests and scans, but changes made directly in GitLab will not sync back to Plerion.
Steps to integrate GitLab with Plerion
1
On the Plerion dashboard, go to Settings > Integrations

2
Find GitLab and click the + button

3
Click on Install

4
Select the namespaces to monitor and click Install
5
After installation, you will be redirected to the Plerion platform

Configuring your GitLab integration
Once installed, you can configure the GitLab integration to match your workflows. These settings control when and how scans run, how findings are handled, and what rules apply.Integration status
Controls whether Plerion Code Security is active.- Default: Enabled
- When disabled: Pauses all scanning activities, including scheduled and merge request scans
- Recommendation: Keep enabled unless there is a specific need to pause

Scheduled scans
Runs automatic daily scans of your main branches.- Default: Enabled
- Purpose: Continuous monitoring of production-ready code
- Key points:
- Runs without manual input
- Identifies risks in stable branches
- Helps with long-term security posture

Merge request scanning
Scans code in new and updated merge requests.- Default: Enabled
- What it does:
- Scans only changes introduced in the merge request
- Posts findings as comments directly in GitLab
- Integrates with GitLab status checks to block insecure merges
- Supported file types: YAML, Terraform, JSON, and other IaC files
- Why it matters: Prevents vulnerabilities from being merged, encourages secure development practices, and builds developer awareness

Tolerance for blocking merge requests
Controls when merge requests are blocked based on severity.- Default: Do not block merge requests
- Options:
- Only block for critical findings
- Block for high and critical findings
- Block for medium and above findings
- Block for any finding
- Do not block merge requests
- Best use: Choose based on your team’s security posture, development velocity, and compliance requirements

Profile
Defines which detection rules are used during scans.- Default: Organization’s default profile
- Options: Use an existing profile or create a new one
- Where to manage: Detection Settings in Plerion
- Best use: Align profiles with coding standards, risk appetite, and compliance needs

Best practices
- Keep the integration enabled for continuous coverage
- Use scheduled scans to monitor long-term branches
- Enable merge request scanning to prevent insecure code from merging
- Set merge request blocking tolerance based on your risk tolerance
- Select a detection profile that matches your organization’s security requirements