Linear Hardening Guide
Issue tracking platform hardening for Linear including SAML SSO, workspace access, and team permissions
Overview
Linear is a modern issue tracking and project management platform designed for software teams. As a platform managing development workflows and project data, Linear security configurations directly impact operational security and intellectual property protection.
Intended Audience
- Security engineers managing engineering tools
- IT administrators configuring Linear
- Engineering managers managing workspaces
- GRC professionals assessing development security
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Linear security including SAML SSO, workspace access, team permissions, and integration security.
Table of Contents
- Authentication & SSO
- Access Controls
- Integration Security
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for Linear users.
Prerequisites
- Linear workspace admin access
- Enterprise tier
- SAML 2.0 compatible IdP
ClickOps Implementation
Step 1: Access SSO Settings
- Navigate to: Settings → Security → SAML SSO
- Enable SAML SSO
Step 2: Configure SAML
- Configure IdP settings:
- SSO URL
- Entity ID
- Certificate
- Download Linear metadata for IdP
- Configure attribute mapping
Step 3: Test and Enforce
- Test SSO authentication
- Enable SSO enforcement
- Configure admin fallback
Time to Complete: ~1-2 hours
1.2 Enforce Two-Factor Authentication
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require 2FA for all Linear users.
ClickOps Implementation
Step 1: Enable 2FA Requirement
- Navigate to: Settings → Security
- Enable Require two-factor authentication
- All members must configure 2FA
Step 2: Configure via IdP
- Enable MFA in identity provider
- Use phishing-resistant methods for admins
- All SSO users subject to IdP MFA
1.3 Configure Allowed Domains
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Restrict sign-up to approved email domains.
ClickOps Implementation
Step 1: Configure Allowed Domains
- Navigate to: Settings → Security
- Configure allowed email domains
- Block public email providers
2. Access Controls
2.1 Configure Team Permissions
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement least privilege using Linear teams.
ClickOps Implementation
Step 1: Create Teams
- Navigate to: Settings → Teams
- Create teams by function
- Configure team visibility
Step 2: Configure Member Roles
- Review workspace roles:
- Admin
- Member
- Guest
- Assign minimum necessary role
- Regular access reviews
2.2 Configure Project Visibility
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Control project and issue visibility.
ClickOps Implementation
Step 1: Configure Team Privacy
- Set team visibility settings
- Control cross-team access
- Restrict sensitive projects
Step 2: Configure Issue Access
- Review default visibility
- Restrict sensitive issues
- Audit access patterns
2.3 Limit Admin Access
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Minimize and protect administrator accounts.
ClickOps Implementation
Step 1: Inventory Admins
- Review workspace admins
- Document admin access
- Identify unnecessary privileges
Step 2: Apply Restrictions
- Limit admin to 2-3 users
- Require 2FA/SSO for admins
- Monitor admin activity
3. Integration Security
3.1 Configure Integration Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Control third-party integrations.
ClickOps Implementation
Step 1: Review Integrations
- Navigate to: Settings → Integrations
- Review all integrations
- Remove unused integrations
Step 2: Configure Permissions
- Review integration scopes
- Limit data access
- Audit integration usage
3.2 Configure API Tokens
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Secure API token management.
ClickOps Implementation
Step 1: Review API Tokens
- Navigate to user settings
- Review personal API tokens
- Document token purposes
Step 2: Secure Tokens
- Store tokens securely
- Rotate tokens regularly
- Revoke unused tokens
4. Monitoring & Compliance
4.1 Configure Audit Logs
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor activity logs.
ClickOps Implementation
Step 1: Access Activity
- Review workspace activity
- Monitor key events
- Document for compliance
Step 2: Monitor Events
- User authentication
- Permission changes
- Integration modifications
- Data exports
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Linear Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/2FA | 1.1 |
| CC6.2 | Team permissions | 2.1 |
| CC7.2 | Audit logs | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | Linear Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | 2FA | 1.2 |
| AC-6 | Team permissions | 2.1 |
| AU-2 | Audit logs | 4.1 |
Appendix A: References
Official Linear Documentation:
API & Developer Resources:
Compliance Frameworks:
- SOC 2 Type II, GDPR, HIPAA (Enterprise plan with BAA) – via Linear Trust Center
Security Incidents:
- No major public security breaches identified as of this writing.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, teams, and integrations | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide