Security in the Atlassian Cloud
Why the cloud and security complement each other
- Home
- Atlassian Cloud
- Cloud Migration
- Security
Into the cloud without headaches
Security is ingrained into the core of Atlassian Cloud products, infrastructure, and processes, ensuring your data is always safeguarded.
We employ encryption and implement management controls to protect your data both during transmission and while at rest. We enforce additional security measures such as SAML SSO, mandatory two-factor authentication, and SCIM to enhance protection.
Protect your data and your business
Atlassian Cloud Enterprise meets the requirements of EBA, BaFin, and GDPR (DSGVO) to protect your business-critical products.
GDPR (DSGVO)
General Data Protection Regulation
EBA
European Banking Authority
BaFin
Federal Financial Supervisory Authority
More topics on security in the cloud with Atlassian
Is the cloud secure at all? You can find everything about security in the Atlassian Cloud here:Our free whitepaper on security in the cloud
Download our free whitepaper on "Security in the Cloud" now and learn what makes the Atlassian Cloud so secure and why companies from the financial sector in particular can benefit from it.
What makes the Atlassian Cloud so secure?
Atlassian's approach to cloud security starts at the network architecture level. Controls are implemented at every level of the cloud environment and a zero-trust security strategy is used to access the enterprise network, protecting systems and services.
All customer data is hosted on the Amazon Web Services platform with redundancies at multiple levels. As another control measure, Atlassian provides data residency options, the ability to tie product data to specific geographic regions.
It also encrypts customer data at rest and in transit, and continues to invest in advanced controls such as bring-your-own-key (BYOK) encryption
Using Atlassian's built-in controls, IT administrators can implement enterprise-grade authentication protocols such as SAML single sign-on and multi-level authentication. Administrators can also customize authentication policies for different sets of users and automate user provisioning or revocation. This mitigates the risk of unauthorized access and allows enforcement of mobile security controls and support for mobile device and mobile app management (MDM/MAM).
Data protection features are built into all Atlassian products. In addition, Atlassian's Risk and Compliance team continuously ensures that all cloud products comply with industry-specific regulations in addition to global standards such as SOC, ISO, DSGVO.
Atlassian provides comprehensive security testing and vulnerability management programs to prevent threats. In addition, with Atlassian Access, customers benefit from enterprise audit logs that provide detailed insights into administrator activities, such as changes to users, groups and permissions within the organization. This makes it easier to identify suspicious activity.
You want to move to the cloud safely?
Contact us now and let us advise you on the introduction and migration to the cloud without any obligation!
More cloud topics that might interest you
More cloud topics that might interest you
- Home
- Atlassian Cloud
- Cloud Migration
- Security
Alexander Post
Principal Solutions Advocate
Contact our experts and we will get back to you as soon as possible. See you soon!