...pps continuously meet globally recognized standards for security, availability, confidentiality, processing integrity, and privacy. What Getting SOC-2 Type II Compliance Meant for Us We spent most o...
...or customers, it offers a clear way to identify apps that meet Atlassian’s highest standards for security, scalability, and reliability. And for developers like us, it represents the direction the e...
...ompliance imperative. From data privacy laws to incident response requirements, IT teams and Jira administrators need tools that ensure data security, traceability, and continuity. This guide will show h...
Compass Communique: May 2025 Hello Compass Community, From connecting technical initiatives to business goals, to enhancing security monitoring and component dependencies, we're r...
...pp Security in Jira Cloud As more teams move to Atlassian Cloud, the app ecosystem continues to grow and so does the surface area for risk. Every new plugin or integration is another p...
...o the cloud significantly improves their security posture. In our blog post on Atlassian Cloud security and the shared responsibility model, we explain this in more detail. And Atlassian c...
Hey Trust & Security Community, My name is Georgia and I am a Product Designer at Atlassian! We have recently set up a community group to specifically target product f...
Hello Atlassian community, I am Jolene, a product manager for Audit Log in Cloud. We're currently focused on improving the features of Audit Log in Admin Hub on the cloud and would lo...
Hello Atlassian community, I am Jolene, a product manager for Audit Log in Cloud. We're currently focused on improving the features of Audit Log in Admin Hub on the cloud and would lo...
...elp teams avoid problems related to Jira data security. If you weren’t able to join the webinar online, you can watch the recording: 👉Here’s what was covered: 🔹 How Atlassian is making it e...
Today, Jira is an essential tool for a significant number of companies to manage projects, track issues, and streamline workflows. As Jira continues to be used more and more, its security has never b...
...n highly regulated industries such as healthcare, finance, and government, data security isn’t just a best practice — it’s a necessity. With the growing importance of data privacy, compliance with l...
...ustomers, these reports can take the place of a penetration test report and show that we are actively testing and identifying any security issues that are in our products or services. Our bug bounty p...
...tlassian badge. Runs on Atlassian in brief As you might have heard, Atlassian has a new badge out for apps that meet their highest privacy and security standards—Runs on Atlassian. It m...
...re doing to help drive customer confidence in the Atlassian Marketplace, especially when it comes to security and compliance. Check it out here and have a great Q2!
Hey Atlassian community! I'm Jay Prakash, Senior Product Marketing Manager at Upscale, and I'm excited to share that I'll be at Atlassian Team '25 from 8-10 April 2025 in Anaheim, CA! I’ll be joine...
...tlassian Ecosystem and Marketplace. Updates to the Atlassian Marketplace [coming soon] See trust centers for apps right from the privacy and security tab: Soon we will release a new feature that a...
One of the biggest challenges for admins when it comes to API tokens is the risk of users accidentally exposing them—whether by posting them in a public GitHub repository or sharing them o...
...dmin.atlassian.com. Select your organization if you have more than one. Select Security > Audit log. Search for Third-party app Confluence API request and/or T...
At Refined, security has always been a top priority. We know that protecting your data is critical, and we take that responsibility seriously. That’s why we’re excited to share that we’ve achieved S...
We’re giving admins more control and teams more confidence when it comes to issue security Jira Admins no longer need to add themselves to every security level in order to configure issue security....
At Decadis, security and data protection have always been at the core of what we do. We are proud to announce that we have officially achieved ISO 27001:2022 certification, r...
...arketplace.atlassian.com/apps/1212681/secure-fields-data-security-privacy?hosting=datacenter&tab=overview Long story: When Does Password Sharing Become Necessary? Companies have various IT r...
With the rise of cyber threats, ensuring data protection and operational security is no longer optional—it's a fundamental requirement for business continuity and trust. Failing to meet industry-r...
In just 60 seconds, one phishing link click could jeopardize your entire system. Is your intranet secure enough to withstand the risks? It’s not just phishing that threatens intranet security...
Copied to clipboard
Online forums and learning are now in one easy-to-use experience.
By continuing, you accept the updated Community Terms of Use and acknowledge the Privacy Policy. Your public name, photo, and achievements may be publicly visible and available in search engines.