Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Best practices for securing JIRA cloud instance from intrusion

Sandeep Gaddam
June 4, 2018

Is there a best practices document from JIRA regarding securing jira cloud instance? To be specific i want to protect my instance from intrusion and want to setup the instance accordingly.

1 answer

0 votes
Nic Brough -Adaptavist-
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Champions.
June 4, 2018

As an end user of the service, all you can do is make sure you do not give access to anyone you don't want using it.  Control who you give access to and be careful with your permission schemes, making sure you only grant the right access, and be very wary of giving access to "anyone" (which allows people access without logging in)

Atlassisan handle the server-side aspects of security.

Sandeep Gaddam
June 4, 2018

@Nic Brough -Adaptavist- Thanks for the reply. Is there a way to have additional protection in case some one gets/hacks password of a genuine user and intrudes into the system from that.

Nic Brough -Adaptavist-
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Champions.
June 4, 2018

Depends.   What do you want from "additonal protection"?

Sandeep Gaddam
June 4, 2018

2FA or IP whitelisting or any other intrusion detection/prevention measures.

Nic Brough -Adaptavist-
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Champions.
June 5, 2018

You can do 2FA if you move Cloud authentication to an external user directory that supports SAML. 

Cloud runs on https, and that's about all of the rest I can tell you without specific guidance on what you're thinking.

Whitelisting and the IDS I've done before, etc - mostly not implemented and you don't get the access you would need to add them yourself.

Suggest an answer

Log in or Sign up to answer