Created Dec 2, 2020, Last active Mar 27, 2026
On March 22, identity and access management company Okta disclosed the account compromise of a third-party customer support engineer that occurred in January 2022. LAPSUS$ claimed responsibility for ...
A customer who is migrating to Cloud is asking for confirmation that Personal Identifiable Information (PII) and user data (e.g. issue titles, summary, attachment filenames, project names, etc.) are ...
We've concerns over anyone being able to set up an API integration. We would like to see information that documents what kind of levels of access there are, if they can be managed (I believe they ca...
What is data anonymization? By definition, data anonymization is information sanitization for privacy protection. It is the process of removing personally identifiable information from data sets ...
When customers entrust you with their personal information, like their credit card numbers, addresses for delivery, names, IP addresses… it is because they trust you to handle and protect their data....
...rofile Opsgenie Security Profile Statuspage Security Profile Trello Security Profile In true Atlassian spirit, we believe that opening as many channels for our customers t...
GDPR stands for General Data Protection Regulation. It is a privacy and security regulation, and it is considered one of the toughest in the world. GDPR came into effect in May 2018, impacting organi...
ISO/IEC 27001 Certification Update Overview The International Organization for Standardization (ISO) is an independent, non-governmental international organization with a me...
...psgenie Security Profile Statuspage Security Profile Trello Security Profile In true Atlassian spirit we believe that opening as many channels for our customers to self serve is a more s...
If you'd rather skip straight to the technical details, here's the blog post explaining how it all works. This post is the high-level story of how this technique was found, in which the story makes...
...ettings.json to set openUIOnStartupDisabled to true. (This can be done without root access.) When Docker Desktop starts, our malware will be running in a shell like this. root@docker-desktop:/# ls A...
Atlassian maintains submissions to the Cloud Security Alliance (CSA) STAR Registry for our major Cloud Services. The STAR Registry hosts the Consensus Assessment Initiative Questionnaire (CAIQ), whic...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for ‘penetration reports’ or similar - basically a report from a third-party that...
Hi there, I use atlassian jira/confluence to stay in practice (Germany). Today I've got an e-mail from an unknown person (don't have any contacts to (?) Mexico - sure we're working on the www inter...
Hello guys, I am using the Confluence but i do not know which email has the Global Permissions. Since the administrator created the trial and set up everything but now the roles somehow changed with...
G’day everyone and happy 2022! My name is Filiberto Selvas and I’m a Principal Product Manager focused on data management and compliance in highly regulated industries ! At Atlassian, we unde...
Overview System and Organization Controls (SOC) Reports are independent third-party examination reports that provide detailed information and assurance about controls in place at service organizati...
After the discovery of the vulnerability of version 1.2.17 of Log4j when is Atlassian intending to add the latest version of Log4j as part of the standard on premise installation?
On December 9, Atlassian became aware of the vulnerability CVE-2021-44228 - Log4j. Impact on Cloud Products This vulnerability has been mitigated for all Atlassian cloud products previously ...
Hi everyone! Thanks to all who joined us for our webinar on Privacy, security, and compliance in Atlassian Cloud. If you missed it or weren’t able to catch the whole thing, you can view t...
hi, since the official statement about log4j is pretty brief (not to say lame), i'm looking for answers here. The vulnerability has been disclosed 4 days ago and still Confluence does not give any up...
Atlassian’s 2020 reporting consisted of 8 SOC 2 reports individually attesting compliance for our cloud products. With each weighing-in at ~90 pages, we saw duplication of content, effort, inconsiste...
Hello everyone, How you guys are mitigating Security Vulnerability CVE-2021-42574? I am still unable to understand the risk, impact and mitigation done by Atlassian. Is there any other workaround th...
Hey there! If you’re looking for more tips and best practices for protecting your data and using Atlassian products securely and you’re part of the public sector, check out the Atlassian Governmen...
Hello! We know that security and data management are top priorities for you, so they remain a top priority for us. We’ve heard from many of you that BYOK (bring your own key) encryption is an importa...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard