You've been invited into the Kudos (beta program) private group. Chat with others in the program, or give feedback to Atlassian.
View groupCreated Dec 2, 2020, Last active Feb 17, 2021
At Atlassian, we are well aware of the importance of the data that you, our customers, store in our products. We aim to give you insight on all our products, but we’d like to start with Confluence an...
Securing Third Party Apps Atlassian leads by example with a thriving Marketplace ecosystem that enable our customers to unleash the potential of every team. As such, we are responsi...
A crowdsourced approach A bug bounty program is one of the most powerful post-production tools you can implement to help detect vulnerabilities in your applications and services. Crowd...
SOC 2 Overview SOC Reports are independent third-party examination reports that provide detailed information and assurance about controls in place at service organizations. Refer to the AICPA fo...
What is it? When considering the term “risk,” most people usually associate it with “What could go wrong?”. While generally true and rooted in evolutionary cognitive bias, this is only part of t...
Atlassian Rules For Security Testing Of Cloud Products Atlassian customers may carry out security assessments against their Atlassian Cloud Products (as defined below) without prior approval. The t...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for a copy of a recent ‘penetration reports’ or similar - basically a report from...
Hallo All Good People:) thx for place inside group . I started lern this everything, sooo i didnt know yet what currently i want to do here . My steps now is Planning. Merry Christmas for Everyone.
We recently published a blog on CASBs. We cover the basics of how CASBs enhance security for cloud apps and how the fit into the broader IT and security landscape, but there is so much more t...
In today's data-driven world, people are increasingly concerned about possible data breaches and the theft of important information. In order to protect its citizens, the EU Parliament adopted the&nb...
We’ve heard from many of you - our customers - that you want more details about how we manage your data in our cloud. In many cases, the customers I personally hear from want to make sure that their ...
We have re-certified for Payment Card Industries (PCI) for all of our major products. Specifically, we achieved certification for Jira, Confluence, Bitbucket and :LearnDot: as they use t...
The majority of Atlassian’s business runs on Amazon Web Services (AWS). Due to the large scale of our infrastructure, we allow for teams to manage their own changes without a centralised review . At...
As an Atlassian Partner, we deal with customers who have a variety of applications, running at different versions, deployed in a variety of environments. The combination of factors means that they ar...
Not only are new and emerging privacy regulations ambiguous, but they are also without precedent. Maintaining compliance can be incredibly challenging. That’s why we were excited to announce data r...
Our very own Brianna Malcolmson presented at the Women in Security 2019 Conference in Melbourne last week. She presented on strategies for effective red-teaming. Her slides and the video are no...
Recently we have seen huge growth in data encryption and related policies in industry. Two of the most important driving factor in this are, Cloud services GDPR and related compliance Encryption...
Why is it important to have a standard for evaluating cloud vendors? Having a standard, repeatable cloud vendor security evaluation checklist not only streamlines the process and makes it easier to...
I wanted to highlight two posts by @Karolina Lasoń [Deviniti] on Jira Service Desk permissions. In her two-part guide, she covers: How to configure project role, user group, and...
Hello everyone, I wanted to share a blog that I recently wrote on ways to combat cloud security threats. Check it out and let me know what you think! How do you address cloud security threa...
Hello everyone! I've followed the changes and upcoming of Atlassian over the past 3 years. All the changes are super exciting. The business I work for is in the Medical Claims industry (one line of ...
My customers are worrying about sensitive data being emailed via comments. Are those details being sent encrypted as well? From Jira comments to user's email inbox?
When you use Atlassian cloud products, you trust us with your data. We take this responsibility seriously, which is why we've invested heavily in processes, privacy safeguards, and stringen...
We have invested heavily in making encryption available for our cloud products because we believe that it is a best practice for all cloud SaaS providers to offer this additional layer of protection ...
As your company adopts more and more SaaS tools to solve for specific business problems, new challenges arise. It is more difficult to keeping your company data secure across a growing number of...
Copied to clipboard