I'm interested in discussing how many different security tools most companies are using - things like SAST, DAST, SCA, IaC, CSPM, container, threat detection, etc. I'm curious if this number is going up and how security teams are managing these.
Hi Willy,
Atlassian utilizes its array of products and tools to detect and resolve vulnerabilities effectively by employing scanners and a holistic approach whenever possible. This approach not only covers the scanners utilized but also offers a glimpse into our methodology for managing scanner logs and recognizing favorable outcomes.
Vulnerability Identification & Remediation
Atlassian recognizes that, at some level, security vulnerabilities are an inherent part of any software development process. However, we are constantly striving to reduce both the severity of and frequency with which vulnerabilities arise in our products and services. To that end, we have in place a multi-faceted approach to vulnerability management that relies on automated and manual processes. We believe that this is the most effective way to limit the chance of vulnerabilities “slipping through the cracks” and going undetected for an extended period. Below is an an overview of how we manage vulnerabilities in our products and infrastructure and how we’re constantly evolving that approach by incorporating the latest tools, methods, and thinking to ensure our handling of vulnerabilities remains effective into the future.
Continuous Asset Discovery and Attribution
Identifying Vulnerabilities
We use a range of best-of-breed vulnerability detection tools that are run regularly across our products and infrastructure to scan for and identify vulnerabilities automatically. This includes Atlassian Cloud & Server products, Docker application images, internal, mobile, and third-party applications, and our infrastructure on-premises and in our cloud. These tools automatically scan for and identify vulnerabilities that exist and include:
Additional avenues to identify vulnerabilities in combination with automated scanning:
Tracking and Resolving Vulnerabilities
We use an internal ticketing and escalation system to track all vulnerabilities that we’ve discovered and aim to fix. Specifically, regardless of whether a vulnerability is identified through one of our scanning tools or one of the other avenues we have discussed above, a dedicated ticket is created for each vulnerability and is assigned to the relevant product team for resolution. The remediation service-level objectives (SLOs) we have published in our Security Bug Fix Policy are tracked for each vulnerability.
Our security team oversees this process and works with product and infrastructure teams to ensure the accuracy of vulnerabilities and answer remediation questions. Once a fix for a vulnerability is developed, it is tested thoroughly and then, in the case of our cloud products, incorporated into our CI/CD pipeline for deployment. For server and data center products, fixes are rolled into a new release and deployed with other fixes regularly per our standard release cadence. Vulnerability tickets from scanning tools are automatically closed when subsequent re-scans do not find the vulnerability. Product, infrastructure, or security team members close vulnerability tickets from manual findings when the fix has been made available to customers.
Preventing vulnerabilities during the development process
Container Image Scans – Atlassian deploys most of its applications using Docker container images. Docker containers provide a packaged, self-contained environment consisting of relevant system libraries, tools, configuration settings, and any other dependencies required so that our products are able to run regardless of individual machine configuration parameters. The container effectively provides a layer of abstraction, decoupling the software code from the underlying infrastructure so that our products can work without issue across different machines. While containers offer great benefits for our developers and customers in terms of deploying code that can be used in various environments, they can be a source of security vulnerabilities if the contents of the images consist of out-of-date or otherwise insecure libraries or components.
To address this, Atlassian integrates an event-driven container security scanning process that monitors deployments made through our Micros deployment platform for any containers deployed into our production environments. Additionally, developers are able to integrate a scanning process into our CI/CD pipeline for any containers that are deployed into our development environments. We use the Snyk Container engine for this purpose. Snyk provides a set of tools that undertakes a deep inspection of any container images that are deployed by our developers. This includes a detailed analysis of those images to identify their various components and determine which have known vulnerabilities.
Open source dependencies
While finding and fixing vulnerabilities in our code is essential, our products and services also rely on numerous third-party libraries. It is, therefore, equally critical that we are aware of what libraries we're using and that they're up to date with the latest security bug fixes. We use a tool called Snyk to assist us with this. Snyk provides a scanner that can identify dependencies in any of our software builds and compare these libraries to a database of known security vulnerabilities.
Any identified vulnerabilities are then automatically raised via a formal Jira ticket with the relevant product team, in accordance with the vulnerability management process we described earlier on this page.
In the Atlassian spirit of OCNB values, I hope the above helps give you some high-level insight into how we use the tools and helps you make your company's security posture more secure.
Atlassian’s internal vulnerability scanning and remediation process indeed looks holistic. You said you create a dedicated ticket for each vulnerability identified by any of the scanners in place and assign it to the relevant product team for resolution. BTW, how do you handle duplicates coming from different scanners e.g. same CVEs reported by different scanners like SCA, End-point vuln scanners.
As you may also appreciate, adding business context like criticality of the applications, network exposure, and data classification to findings helps in prioritization of the findings. Adding threat intel on exploitability of the vulnerabilities gives valuable insights into the prioritization as well. These are typically handled well by recent innovations such as Application Security Posture Management (ASPM) that can aggregate, contextualize, and prioritize the findings across the tools. AppSOC is one such ASPM platform that is integrated with Security in Jira. This is a powerful combination that can reduce or prevent developer burnout when dealing with vulnerability remediation.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Does Atlassian publish a shared security model per product so customers know what their responsibilities are?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi @jeff warren , Atlassian offers a PDF whitepaper regarding the shared responsibility model for the cloud.
See: Shared Responsibility - Cloud
Here is also a helpful page that compares Datacenter to Cloud.
See: Datacenter to Cloud Feature Comparison
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
As far as I know, only one platform comes close to unifying tools like SAST, DAST, SCA, etc.
In the environments I see there are individual tools for each... one for SAST and code quality, one for DAST (if they do it at all), one for SCA, etc. Some of them try to integrate the separate findings in a SIEM, with mixed results.
From what I observe, the total number of tools is staying fairly steady and companies are prioritizing which tools they want to spend money on. Nobody wants to spend money on the staff to be dedicated to learning and managing a new product.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Do U mean security tools or security vendors that provide a stack of tools eg. Msft, crowd strike or PAN?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
I think both are interesting questions. If you consolidate on one big vendor, in theory all their tools play nicely together (although often, they're acquired from startups and integrations are works-in-progress...). But if you're a larger organization, and different teams use different best-of-breed security tools from multiple vendors, it gets hard to demand that everyone switch to a single vendor...
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
@Willy Leichter i'm interested in this topic too. In my opinion, especially in areas of SaaS security, SaaS security posture management (SSPM) tools that claims to provide insights to the blackbox "SaaS". Wondering if companies are already adopting it? What are the various considerations for adopting?
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Ride on the chat, i'm curious what are the security products or tools Enterprise are using to address the current gaps that native Atlassian Cloud does not offer? (Example DLP, i understand there are some 3rd party Marketplace Apps are used to address the gap in DLP and also understand DLP is in the Atlassian roadmap come 2025.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.