Security in the Atlassian Cloud

Why the cloud and security complement each other

Asset 30 Cloud Migration

 

Into the cloud without headaches

Security is ingrained into the core of Atlassian Cloud products, infrastructure, and processes, ensuring your data is always safeguarded.

We employ encryption and implement management controls to protect your data both during transmission and while at rest. We enforce additional security measures such as SAML SSO, mandatory two-factor authentication, and SCIM to enhance protection.

Protect your data and your business

Atlassian Cloud Enterprise meets the requirements of EBA, BaFin, and GDPR (DSGVO) to protect your business-critical products. 

gdpr

GDPR (DSGVO)

General Data Protection Regulation

EBA

EBA

European Banking Authority

bafin

BaFin

Federal Financial Supervisory Authority

More topics on security in the cloud with Atlassian

Is the cloud secure at all? You can find everything about security in the Atlassian Cloud here:

Our free whitepaper on security in the cloud


Download our free whitepaper on "Security in the Cloud" now and learn what makes the Atlassian Cloud so secure and why companies from the financial sector in particular can benefit from it.

 

Jetzt kostenlos runterladen!

Frame (2)

What makes the Atlassian Cloud so secure?

cloud safety

 

Atlassian's approach to cloud security starts at the network architecture level. Controls are implemented at every level of the cloud environment and a zero-trust security strategy is used to access the enterprise network, protecting systems and services.

route-1

 

All customer data is hosted on the Amazon Web Services platform with redundancies at multiple levels. As another control measure, Atlassian provides data residency options, the ability to tie product data to specific geographic regions.

It also encrypts customer data at rest and in transit, and continues to invest in advanced controls such as bring-your-own-key (BYOK) encryption

log in

 

Using Atlassian's built-in controls, IT administrators can implement enterprise-grade authentication protocols such as SAML single sign-on and multi-level authentication. Administrators can also customize authentication policies for different sets of users and automate user provisioning or revocation. This mitigates the risk of unauthorized access and allows enforcement of mobile security controls and support for mobile device and mobile app management (MDM/MAM).

global safety

 

Data protection features are built into all Atlassian products. In addition, Atlassian's Risk and Compliance team continuously ensures that all cloud products comply with industry-specific regulations in addition to global standards such as SOC, ISO, DSGVO.

anti virus laptop

 

Atlassian provides comprehensive security testing and vulnerability management programs to prevent threats. In addition, with Atlassian Access, customers benefit from enterprise audit logs that provide detailed insights into administrator activities, such as changes to users, groups and permissions within the organization. This makes it easier to identify suspicious activity.

You want to move to the cloud safely?

Contact us now and let us advise you on the introduction and migration to the cloud without any obligation!

 

Contact us!

More cloud topics that might interest you

More cloud topics that might interest you

You want to learn more about Atlassian and its solutions?

We are experts in the field of Atlassian and would be happy to advise you on your questions and concerns in a free initial consultation. We look forward to talking to you!

 

 

Alex-3

Alexander Post

Principal Solutions Advocate

Contact our experts and we will get back to you as soon as possible. See you soon!