Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Kind of Cloud

Partner Bank
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
July 1, 2020

Dear Sirs from Altassian,

due to our offical regulations we need the information which kind of cloud-service-modell and cloud-deployment-model  is used in connection with Jira and Confluence Tool.

Are this public/private/hybrid- or Community-Clouds ?

Thanks in Advance!

Best Regards !

M. Reisinger / Partner Bank AG

mre@partnerbank.at

 

1 answer

0 votes
Earl McCutcheon
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
July 14, 2020

Hello @Partner Bank ,

This information and much more security and compliance related information covered in detail in our Trust center security and compliance documentation that can be found at atlassian.com/trust, as for the direct question about cloud infrastructure this can be located at:

We host all of our cloud applications with our cloud hosting partners, AWS and NTT. Thier data centers have been designed and optimized to host applications, have multiple levels of redundancy built in, and run on a separate front-end hardware node on which application data is stored.

With an additional note on the server zones and  access control under the network section:

We implement controls at each layer of the stack, dividing our infrastructure by zones, environments, and services.

Zone restrictions include limiting office, data center, and platform network traffic. Environment separation limits production and development connectivity. Services must be explicitly authorized to communicate with other services through an authentication whitelist.

We control access to our sensitive networks through the use of virtual private cloud (VPC) routing, firewall rules, and software defined networking. All connectivity is encrypted by default.

Staff connectivity requires device certificates, multi-factor authentication, and use of proxies for sensitive network access. Access to customer data requires explicit review and approval.

We've also implemented intrusion detection and prevention systems in both our office and production networks to identify potential security issues.

But please do review the information in our trust center and I hope this info gets you on the right track.

Regards,
Earl

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
CLOUD
PRODUCT PLAN
FREE
PERMISSIONS LEVEL
Product Admin
TAGS
AUG Leaders

Atlassian Community Events