Created Dec 2, 2020, Last active today
We use Service Management Datacenter for HIPAA compliant Ticketing. Atlassian documentation is silent on HIPAA, and with the EOL announcement, we need to address the following or find a new sol...
Can we trust Atlassian products to be in core of our business processes. We asked this question yourselves a few years ago when we started to use Atlassian products and answer was yes. Yesterday our...
What are Personal Data? As the term indicates, personal data are any information related to an identified or identifiable person. In article 1 (1)(2) of GDPR, the regulation sets rules on protectin...
What is GDPR? The GDPR is an EU law adopted in 2018 to protect the personal data of EU citizens. It ensures that businesses process and secure the personal data (name, address, phone number, or IP ...
A summary of the zero-day Spring4Shell vulnerability is shown here: https://securityboulevard.com/2022/03/spring4shell-zero-day-attack-what-you-need-to-know/
Atlassian’s Trust team now has a completed response for the Higher Education Cloud Vendor Assessment Toolkit (HECVAT) for our Cloud products. What is HECVAT? The HECVAT is a structured q...
Hi team, As I'm using Jira application, while updating timesheet, having issues with reloading, While updating a timesheet for a task it redirects and showing empty, every time ...
Regarding the "spring4shell" vulnerability in https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/ . Does anyone know that this vulnerability affect...
Hi Seems to be that new threat is out and would it peril Atlassian products server/dc also? https://www.bleepingcomputer.com/news/security/new-spring-java-framework-zero-day-allows-remote-code-exec...
Today, I find that "spring2shell" volnerabilities in https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/ . Does anyone know that this volnerabilities affect Atlassian products such lik...
Hi there Trust and Security group members! I’m part of the Data Center marketing team here at Atlassian and wanted to be sure you all knew about our new Data Center community group. Just as this Trus...
On March 22, identity and access management company Okta disclosed the account compromise of a third-party customer support engineer that occurred in January 2022. LAPSUS$ claimed responsibility for ...
A customer who is migrating to Cloud is asking for confirmation that Personal Identifiable Information (PII) and user data (e.g. issue titles, summary, attachment filenames, project names, etc.) are ...
We've concerns over anyone being able to set up an API integration. We would like to see information that documents what kind of levels of access there are, if they can be managed (I believe they ca...
What is data anonymization? By definition, data anonymization is information sanitization for privacy protection. It is the process of removing personally identifiable information from data sets ...
When customers entrust you with their personal information, like their credit card numbers, addresses for delivery, names, IP addresses… it is because they trust you to handle and protect their data....
...rofile Opsgenie Security Profile Statuspage Security Profile Trello Security Profile In true Atlassian spirit, we believe that opening as many channels for our customers t...
GDPR stands for General Data Protection Regulation. It is a privacy and security regulation, and it is considered one of the toughest in the world. GDPR came into effect in May 2018, impacting organi...
ISO/IEC 27001 Certification Update Overview The International Organization for Standardization (ISO) is an independent, non-governmental international organization with a me...
...psgenie Security Profile Statuspage Security Profile Trello Security Profile In true Atlassian spirit we believe that opening as many channels for our customers to self serve is a more s...
If you'd rather skip straight to the technical details, here's the blog post explaining how it all works. This post is the high-level story of how this technique was found, in which the story makes...
...ettings.json to set openUIOnStartupDisabled to true. (This can be done without root access.) When Docker Desktop starts, our malware will be running in a shell like this. root@docker-desktop:/# ls A...
Atlassian maintains submissions to the Cloud Security Alliance (CSA) STAR Registry for our major Cloud Services. The STAR Registry hosts the Consensus Assessment Initiative Questionnaire (CAIQ), whic...
We maintain an always on bug bounty to identify and triage issues in our products and services. Many customers ask us for ‘penetration reports’ or similar - basically a report from a third-party that...
Hi there, I use atlassian jira/confluence to stay in practice (Germany). Today I've got an e-mail from an unknown person (don't have any contacts to (?) Mexico - sure we're working on the www inter...
The Trust & Security community group is Atlassian's go-to space for all things Security, Compliance, Privacy and more. This group is to share information, tips, and best practices for protecting your data and using Atlassian products in a secure and reliable way.
Copied to clipboard