Overview
Hey Atlassian Community! I’m @Kevin Wang, a Senior Trust Analyst at Atlassian. I partner with customers to navigate complex security and compliance challenges, particularly as they evaluate Atlassian Cloud or prepare for a migration.
Across those conversations, three themes consistently come up:
How Atlassian protects data
How Atlassian keeps data isolated in a multi‑tenant cloud
How Atlassian governs access to data.
To help you assess these topics in depth, we’ve published a new Data Protection, Isolation, and Access guidance paper, and we invite all customers to download this paper through the Atlassian Customer Trust Portal.
This paper which details our approach across the Atlassian platform and apps, broken down into the three above focus areas:
1. Data protection
First, data you store in Atlassian Cloud is encrypted in transit and at rest by default, with securely managed cryptographic keys, and Customer Managed Keys available as an add-on feature for customers needing additional control and cryptographic isolation. We also design for resilience and data loss prevention through backups and recovery testing, protections across endpoints and networks, logging and monitoring, and data deletion processes.
2. Data isolation
Next, we deep‑dive into how Atlassian isolates your data in our multi‑tenant cloud environment. We describe how tenant context is created at provisioning and enforced by the Tenant Context Service (TCS) from the cloud edge through to backend services, ensuring every request is authenticated and scoped to the correct tenant. Our architecture is designed for least privilege, and we segment shared VPC networks with tightly controlled ingress and egress to limit connectivity across boundaries, backed by ongoing testing and review under our security program.
3. Data access
Finally, we cover data access: authorized users on trusted devices can access only the data they need, and only for the time required. Multi-factor authentication (MFA) is enforced everywhere, and privileged roles are tightly scoped and undergo regular access reviews. Atlassian support access is granted by your admins via the Customer Consent Checker in a support ticket and revoked manually or within 24 hours after ticket closure.
Across all three themes, we highlight additional controls available to customers as part of Atlassian’s shared responsibility model. In addition to our secure platform foundation, Atlassian Guard, our advanced security add-on, addresses customer’s unique security and compliance needs with enhanced capabilities. Guard delivers protection, detection, and response capabilities - including data classification, detection rules, and greater audit visibility.
How do I access this paper?
This guidance paper is available to customers in the Trust Guidance Documents folder on the Atlassian Customer Trust Portal.
You can also refer to our community post for an overview of Atlassian’s Trust Portal, including available content, access instructions, and how to leverage its capabilities to support your security assessments.
How can this information help me?
This guidance paper complements other Trust Portal resources, such as our Rovo Security Whitepaper, and is intended to build on the content in our Trust Center to support your broader evaluation of Atlassian Cloud.
Practically, we suggest using this guidance to:
Accelerate your due diligence and security assessments, with deeper, technical insight into our trust posture.
Map the described controls to your internal policies, standards, and control frameworks.
Use the architecture diagrams to explain Atlassian Cloud’s model to your stakeholders or auditors.
What’s next?
For deeper insight into each of the topics we summarize on this page, we invite you to access our guidance paper directly via the Atlassian Customer Trust Portal.
Additionally, the Trust team is continuously expanding and updating our guidance documentation to address emerging customer security themes, and you can subscribe to receive notification of new releases via the Trust Portal.
We also want to make sure our documentation continues to address the questions that are top of mind for you, so we’d really value any feedback—questions, suggestions, or comments—in the thread below!
Kevin Wang
3 comments