Atlassian primarily relies on our Atlassian Bug Bounty Program and our own internal testing by our Security Engineers to test and identify security issues or vulnerabilities in our Products and Services. However, on occasion, we do work with expert security testing companies to test targeted portions of our environment based on new development, change in features or functionality, or broad changes in platform or Product architecture.
We have published our thinking regarding the differences in penetration tests versus vulnerability assessments versus a bug bounty program on our Approach to Security Testing page on our Trust Center.
Over the past year, we have utilized specialist security consultancies for a number of targeted assessment, which we have posted for you to review. You can review each of the Letters of Assessment from our consultancies to review scope, dates performed, and methodology used. We do not, however, post any results or vulnerabilities identified as a result of each assessment. For many customers, these reports can take the place of a penetration test report, and shows that we are actively identifying and managing security issues that may be present in our products or services.
Any security vulnerabilities identified in the tests are tracked in our internal Jira as they come through testing process and are closed according to the SLA timelines noted on our Security Bug Fix Policy.
New Letters of Assessment (LoA) include :
Letter of Assessment for Micros PaaS (2020-03)
Letter of Assessment for Application Migration Framework (2020-09)
Letter of Assessment for Confluence Page External Share Feature (2020-10)
Letter of Assessment for Confluence Cloud Freemium Permission Security (2020-10)
Letter of Assessment for Project Otter (2020-12)
Letter of Assessment for Hosted Account Management Service API (2021-02)
Csaba Peter
0 comments