ZSCALER AND GITLAB DEPLOYMENT GUIDE
8©2024 Zscaler, Inc. All rights reserved.
Zscaler and GitLab Introduction
Overviews of the Zscaler and GitLab applications are described in this section.
ZPC Overview
Zscaler Posture Control (ZPC) is a multi-tenant soware-as-a-service (SaaS) platform that detects and responds to cloud
security risks and helps businesses adopt the digital transformation journey towards the cloud faster. The service enables
your organization to correlate across multiple security engines to prioritize hidden risks caused by misconfigurations,
threats, and vulnerabilities, and achieve continuous security, compliance, and governance.
ZPC offers data protection, high availability, and resiliency for all imported, stored, and exported data types. ZPC leverages
cloud service provider APIs to connect to your hybrid, multi-cloud environments and collect real-time configuration
metadata for your cloud infrastructure, such as web servers, databases, and virtual machines. ZPC evaluates the metadata
and offers visibility into your security, compliance, and risk posture.
ZPC helps detect cloud security risks in the development lifecycle, as well as threats like ransomware aacks, account
takeover, privilege escalation once the business applications are deployed in the cloud infrastructure across Amazon Web
Services (AWS), Microso Azure, and Google Cloud Platform (GCP).
ZPC is part of Zscaler Cloud Protection, a comprehensive multi-cloud security platform covering misconfigurations,
entitlements, exposed aack surfaces, lateral threat movement, and data loss.
ZPC comprises functionality previously covered by several point products, including:
• Cloud Security Posture Management (CSPM): Ensure cloud resources have proper configurations for authentication,
data encryption, internet connectivity, and more for compliance and a strong security posture.
• Cloud Infrastructure Entitlement Management (CIEM): Identify and remediate excessive permissions that humans
and machines have by using machine learning analysis for increased visibility into access policies, resource policies,
actions, and roles.
• Security and Compliance: Benchmark and validate public cloud configurations against best practices standards and
compliance frameworks to report misconfigurations, policy violations, and automate remediation.
• Infrastructure-as-Code (IaC) Security: Monitor your IaC infrastructure and implement security controls to address
any misconfigurations or security issues before deployment and thereby ensure the code is secure and compliant
with standard security policies.
• Vulnerability Management: Monitor and detect any known vulnerabilities and security weaknesses in the cloud
infrastructure and take immediate action to protect networks from potential threats.
If you are using this guide to implement a solution at a government agency, some of the content might be
different for your deployment. Efforts are made throughout the guide to note where government agencies might
need different parameters or input. If you have questions, contact your Zscaler Account team.