Harness offers robust features for security and compliance, including strong authentication, role-based access control, audit trails, approval stages, and policy-as-code governance, ensuring organizations meet stringent security standards.
At Harness, we’re not only busy building a software delivery platform for the world’s software developers, we are also our own customer and continue to “dogfood” our products by using them internally.
While this allows us to have a world class engineering organization with modern software development capabilities, it also means that WE rely on the platform to be built with robust security features in order for our company to meet the same security and compliance requirements (SOC, ISO, etc) that apply to the vast majority of our customers.
Harness’ own Governance, Risk, and Compliance team (GRC) is responsible for partnering with the broader engineering organization to identify, design, and implement the required controls within our Harness Platform accounts, in order to maintain a robust security environment and meet our compliance requirements.
Here are the top 5 Harness Platform features we use extensively at Harness to enhance our security & compliance posture:
The Harness Platform supports the configuration of strong authentication requirements which is a key control in many compliance frameworks. Customers can leverage the following mechanisms to authenticate users1:
If Local Authentication is used, administrators can configure additional password parameters such as Password Strength, Expiration, Lockout Policy, and Two Factor Authentication to comply with organization policies.
The Harness Platform can also restrict email domains, manage IP allowlists, and enforce session inactivity timeouts to further enhance security around access and session management.
1https://developer.harness.io/docs/platform/authentication/authentication-overview
Protecting sensitive data is essential for a strong infosec posture. Therefore, the Harness Platform can be configured to control who has access to certain resources and what actions they can perform. Authorized users should only be able to perform actions that are associated with their role within an organization. Leveraging Role-Based Access Controls addresses the fundamental principles of security such as least privilege and the need for accountability.
The Harness Platform allows organizations to design an RBAC model2 with a hierarchical structure that can scope access to resources as broadly or as narrowly as required.
Additionally, custom roles and attribute-based access controls (ABAC) can be further leveraged to design even more limited fine-grained permissions across resources and actions.
The Harness Platform is also compatible with the open standard protocol System for Cross-Domain Identity Management (SCIM) for automating user provisioning and deprovisioning, supporting requirements for formal user registration, de-registration, role assignment, or change of access rights. Currently SCIM integration is supported with Okta, Microsoft Entra, and OneLogin.
2https://developer.harness.io/docs/category/access-control-1
The Harness Platform has a built-in audit trail3 that displays records for events that change the setup of a platform account.
The audit trail shows the date and time (Time), user who made the change (User), action taken (Action), resource affected (Resource), corresponding organization (Organization), corresponding project (Project), corresponding module (Module), and an event summary that shows the change via YAML.
Various filters can also be used to parse through the audit trail and focus on captured events within a specific time period for review such as unauthorized access or configuration changes.
Additionally, detailed pipeline execution histories are also captured, further tracking what was executed, when the execution took place, and who initiated the action. These executions can also be filtered similar to the Audit Trail for more detailed parsing and investigation.
At Harness, we use the audit trail and execution history internally when reviewing new user creation dates to support our external audit requests, as well as to validate when new releases are deployed to production to remediate pending library vulnerabilities.
3https://developer.harness.io/docs/platform/governance/audit-trail/
In addition to ensuring only authorized users can perform certain actions, implementing Approval Stages4 in key pipelines can also provide additional authorization and notification controls within a pipeline execution. This helps to ensure that activities impacting critical systems and environments are appropriate.
A specific “Approvers” user group can be configured within the platform and assigned to the pipelines that require this step, allowing additional coverage or multiple approvals to be required for the stage to pass. Harness also prevents the user that initiated the pipeline from being able to approve this step in the process, which further enforces the principle of separation of duties.
Leveraging key configurable controls further strengthens the accountability of the change management process as well as the integrity of the environments and systems being impacted.
4https://developer.harness.io/docs/category/approvals-1
Related Compliance Standards and Framework
Harness Platform governance is a Policy-as-Code5 approach based on the Open Policy Agent (OPA), an open-source policy engine that enables the definition and enforcement of policies across the platform. Users can define rules and constraints that can be applied to processes throughout the software delivery process, as well as specific entities.
Policies can be written and tested in the built-in policy editor and can be saved individually or with other policies as a Policy Set.
Policies and Policy Sets can be used to enforce compliance requirements and automated controls such as approval steps, restricting forbidden activities, enforcing deployment freezes, or blocking builds or deployments if Critical or High Vulnerabilities are identified during a scan within a pipeline.
Policy-as-Code governance within the Harness Platform can help Security and Compliance teams ensure automated and configurable controls continue to operate efficiently and effectively, reduce the risk of manual errors occurring, and enhance the security of development teams within their processes.
5https://developer.harness.io/docs/category/policy-as-code
Related Compliance Standards and Framework
Harness recognizes that achieving a robust and secure software delivery process demands a platform tailored to both the unique business needs of a company, and the stringent security and compliance standards those companies need to uphold. As we continue to build and expand on our modern software delivery platform, incorporating advanced enterprise security features to satisfy both Harness’ and our customer’s security and compliance requirements will remain an essential component of our platform.
Interested in learning more about how your organization can leverage the security features offered within the Harness Platform? Please request your demo today.
Have additional security or privacy questions or concerns? Email us at trust@harness.io.