We're excited to announce the availability of Dike on the Atlassian Marketplace — a Forge-native app that brings automated SOC2 compliance monitoring directly into Jira, without the $7,500–$100,000+/year price tag of traditional compliance platforms.
Development teams pursuing SOC2 certification face a difficult trade-off. Dedicated compliance platforms like Vanta or Drata are powerful — but expensive, require vendor security reviews of their own, and send your GitHub data to external servers. The manual alternative — spreadsheets, screenshots, and audit panic — doesn't scale.
Dike takes a different approach: what if compliance checks ran where your team already works?
Dike connects your GitHub repositories to your Jira project and continuously monitors for SOC2 compliance violations. When a violation is detected, it automatically creates a Jira issue with full context — commit SHA, author, timestamp, PR details — so your team can investigate and resolve it in their normal workflow.
No new platform to learn. No external logins. No data leaving Atlassian.
Dike ships with five compliance checks covering the most critical SOC2 controls for development teams:
1. Direct Commits to Main (High severity) Detects commits pushed directly to protected branches without a pull request — one of the first things SOC2 auditors look for. Supports CC6.1, CC6.6, CC7.1, CC8.1.
2. PRs Merged Without Approvals (High severity) Catches pull requests merged without the required number of code review approvals, ensuring separation of duties. Supports CC6.1, CC6.6, CC8.1.
3. PRs Merged with Failing CI/CD Checks (High severity) Flags PRs merged despite failing build or test pipelines — preventing untested code from reaching production. Supports CC6.8, CC7.1, CC7.2.
4. Commits Without Jira Issue Reference (Medium severity) Ensures every commit links back to an authorized Jira issue, creating a complete audit trail. Supports CC6.1, CC7.1, CC7.2.
5. PRs Without Jira Issue Reference (Medium severity) Verifies that pull requests are traceable to approved work items — the last gate before code reaches production. Supports CC6.1, CC6.6, CC8.1.
All rules are fully configurable: trigger conditions, severity levels, branch patterns, and file exclusions can all be adjusted to match your organization's workflow.
When you connect Dike to your GitHub repositories, it immediately scans 365 days of historical commits and pull requests — giving you instant visibility into your compliance posture, not just from today forward. Violations are filterable by severity, type, repository, or date using standard Jira JQL. Compliance dashboards can be built using native Jira gadgets, and violation data can be exported as audit evidence for SOC2 reviewers.
| Dike | V / D / S | |
|---|---|---|
| Annual cost | Free (paid tier ~$1,200/yr) | $7,500 – $100,000+ |
| Data location | Stays inside Atlassian (Forge) | External servers |
| Separate platform? | No — lives in Jira | Yes — another login |
| Setup time | ~15 minutes | Days to weeks |
| Vendor security review | Not required | Required |
| SOC2 posture | Inherits Atlassian's controls | Must prove separately |
"The irony of using an external compliance platform is that the platform itself becomes another vendor in your compliance scope. Dike doesn't — it runs inside Atlassian's already-compliant infrastructure."
Dike is purpose-built for teams that:
Dike is available now on the Atlassian Marketplace as a now free app for Jira Cloud.
A paid tier with continuous monitoring, audit reports, and multi-project support is planned at approximately $5–10/user/month — still a fraction of the cost of standalone compliance platforms.
Install Dike (now is Free):
Dike - automated SOC2compliance
We'd love to hear from the Atlassian Community:
Drop your comment/feedback below or contact with us directly.
Greetings
Bartek from Orbiscend OU
Bartek Szajkowski _ Orbiscend OU
0 comments