Created Dec 2, 2020, Last active Jun 17, 2025
Gathering data is one of the leading resources that benefit businesses in analyzing their customers' needs, which helps improve their products to fit and satisfy the marketplace. Yet, it triggers a m...
The California Consumer Privacy Act CCPA was established as a law by the state legislator on June 28, 2018, to protect the consumer’s privacy throughout the golden state. CCPA went int...
Hello, We are a small business who have been using Jira Server with 25 licenses. Our team size is increasing and we need additional licenses, but can't move to the cloud yet due to security reasons. ...
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23529
We maintain an always-on bug bounty to identify and triage issues in our products and services. Many customers ask us for ‘penetration reports’ or similar - basically a report from a third party that...
Hello, We are currently conducted financial statements audit by accounting firm. Our auditors have required the SOC1 Type2 report of all significant service organizations including Atlassian....
January 4, 2023 Overview The Health Insurance Portability and Accountability Act (HIPAA) is a federal law developed by the U.S. Department of Health and Human Services and was established in 1996...
January 4th 2023 Overview The International Organization for Standardization (ISO) is an independent, non-governmental international organization with a membership of 167 national stand...
Wo kann ich als Admin in den Account-Einstellungen aller Nutzer für die angeschlossenen APPs/AddOns einstellen, dass die jeweiligen Anbieter keinen Zugriff auf das Nutzerkonto haben? Wenn ich den RE...
...roviding cybersecurity guidance in order to help reduce the risk of harm resulting from cybersecurity incidents to public and private sector networks in the UK. To view our latest guidance to N...
Atlassian primarily relies on our Atlassian Bug Bounty Program and our own internal testing by our Security Engineers to test and identify security issues or vulnerabilities in our Products and Servi...
Overview System and Organization Controls (SOC) Reports are independent third-party examination reports that provide detailed information and assurance about controls in place at service organizati...
What a year 2022 has been! As we have seen the world open up again, our connectedness has grown more. Here at Atlassian, we value togetherness and community, and are proud and honoured we can continu...
@sparsh.kulshrestha @Dan Hranj I think we are missing the big picture here. If what Cloudsek is claiming is true, then it means that cookies were stolen via malware infections on endpoint computers....
On December 7, 2022 (UTC), Atlassian's security team opened an investigation into unauthorized access of a customer's Cloud account. On December 8, we concluded that the bad actor used session tokens...
Hi, I came across one of the Scurity Issues/Vulnerability https://cloudsek.com/security-flaw-in-atlassian-products-jira-confluencetrello-bitbucket-affecting-multiple-compa...
...orror stories of admins misconfiguring a Jira board or Confluence space and giving permissions to the public internet. With the new permissions logs, you’ll be able to know what happened and trace back t...
I've seen the talks and pages about how Atlassian uses Jira and Confluence to manage their own risk and compliance program. I want to implement this at my company. Are the "blueprints" for how...
I just started our company on Trello to manage our workflow. The roll out went so well that Sales department has created a board also. What I have noticed is that I created a private board for myself...
Atlassian’s Trust team now have now completed an updated response for the Higher Education Cloud Vendor Assessment Toolkit (HECVAT) version 3.03 for our Cloud products. What is HECVAT? The HECVAT...
Atlassian has published a list of sub-processors here: https://www.atlassian.com/legal/sub-processors . However this list of sub-processors seems not complete. When you use Conflucence, Jira,...
...or now folks! In our next update, you’ll hear from our new senior leader for our global public sector product strategy, Joe Elgabalawi. Kind regards, Dave Meyer Head of Product, Enterprise C...
Hi all, I wanted to highlight this trust and security-related survey opportunity. It was posted in the Jira Cloud Admins group but it is open to any product (not just Jira) in any...
Hi everyone, My name is Fili and I’m a Principal Product Manager on Enterprise Trust. I’m here to announce the launch of data residency in Germany 🎉! We're thrilled to expand our data re...
Tracking working hours is not new in the workforce; it has been around since time cards and clocks were the only technology available. Some companies follow this technique to keep track of working ho...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.