Created Dec 2, 2020, Last active Apr 29, 2024
Hello I am researching the best way to design GRC structures using Jira and confluence. Any pointers to guidance would be appreciated
I was very fortunate to attend ISACA’s Sydney Chapter - International Women's Day conference here in Sydney recently. I was very honoured to represent Atlassian at this event (unfortunately I did not...
...ackground and experience, I'd gained experience across both private and public sectors. I have worked alongside top management to improve business performance by designing intelligent ways to achieve d...
At Atlassian, we are well aware of the importance of the data that you, our customers, store in our products. We aim to give you insight on all our products, but we’d like to start with Confluence an...
Securing Third Party Apps Atlassian leads by example with a thriving Marketplace ecosystem that enable our customers to unleash the potential of every team. As such, we are responsible ...
A crowdsourced approach A bug bounty program is one of the most powerful post-production tools you can implement to help detect vulnerabilities in your applications and services. Crowd...
SOC 2 Overview SOC Reports are independent third-party examination reports that provide detailed information and assurance about controls in place at service organizations. Refer to the AICPA for...
What is it? When considering the term “risk,” most people usually associate it with “What could go wrong?”. While generally true and rooted in evolutionary cognitive bias, this is only part of t...
...ur bug bounty program, but please note: automated scanner findings will not be accepted. Once submitted, you must first request permission from us before disclosing an issue publicly. Results o...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for a copy of a recent ‘penetration reports’ or similar - basically a report from...
We recently published a blog on CASBs. We cover the basics of how CASBs enhance security for cloud apps and how the fit into the broader IT and security landscape, but there is so much more t...
In today's data-driven world, people are increasingly concerned about possible data breaches and the theft of important information. In order to protect its citizens, the EU Parliament adopted the&nb...
We’ve heard from many of you - our customers - that you want more details about how we manage your data in our cloud. In many cases, the customers I personally hear from want to make sure that their ...
We have re-certified for Payment Card Industries (PCI) for all of our major products. Specifically, we achieved certification for Jira, Confluence, Bitbucket and :LearnDot: as they use t...
...arget is missed, we help the team readjust. The most widely known example are S3 buckets that are publicly available and can be accessed by anyone. Countless companies have been caught off guard by a...
...f this issue. To address this, we wanted to find a single source of truth for public vulnerabilities that we could subscribe to. Our initial idea was to set up a Filter Subscription in JAC, however t...
Not only are new and emerging privacy regulations ambiguous, but they are also without precedent. Maintaining compliance can be incredibly challenging. That’s why we were excited to announce data r...
...ot public yet, but we will share the link when it is available. In her own words : "I’m so grateful for the opportunity to speak and share my philosophy on how to create an impactful r...
Recently we have seen huge growth in data encryption and related policies in industry. Two of the most important driving factor in this are, Cloud services GDPR and related compliance Encryption...
Why is it important to have a standard for evaluating cloud vendors? Having a standard, repeatable cloud vendor security evaluation checklist not only streamlines the process and makes it easier to...
I wanted to highlight two posts by @Karolina Lasoń [Deviniti] on Jira Service Desk permissions. In her two-part guide, she covers: How to configure project role, user group, and...
Reading the GDPR changes in Jira 7. There is a point mentioning that Some of the related entities will not work properly with inactive users and will need to be transferred to a differ...
Hello everyone, I wanted to share a blog that I recently wrote on ways to combat cloud security threats. Check it out and let me know what you think! How do you address cloud security threa...
Hello everyone! I've followed the changes and upcoming of Atlassian over the past 3 years. All the changes are super exciting. The business I work for is in the Medical Claims industry (one line of ...
My customers are worrying about sensitive data being emailed via comments. Are those details being sent encrypted as well? From Jira comments to user's email inbox?
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard