Close

Security at Atlassian

Security is built into the fabric of our Cloud products, infrastructure, and processes, so you can rest assured that your data is safeguarded.

 
cloud icon

Cloud product security

Security is built into the fabric of our Cloud products. We employ numerous controls to safeguard your data including encryption in transit and at rest across our cloud services, external vulnerability research such as our Bug Bounty program, and more.

shield with checkmark icon

Security operations and best practices

Our dedicated security team approaches security holistically with a common controls framework. Security threats are prevented using our Atlassian Trust Management System (ATMS), secure software development practices, and industry-accepted operational practices.

security radar icon

Platform and network security

We perform rigorous security testing including threat-modeling, automated scanning, and third-party audits. If an incident occurs, we resolve the issue quickly using our security incident response practices and keep you informed with real-time system status.

organized node icon

Availability and continuity

We maintain high levels of availability with multiple geographically diverse data centers and robust Disaster Recovery and Business Continuity programs. Physical access to our data centers is strictly controlled with comprehensive security measures by our data center hosting partners.


Key security offerings

Here’s a look at some of our most significant and highly-requested security features.

Check mark

Data encryption in transit

Check mark

Data encryption at rest

Check mark

SAML-based SSO with all major portals

Check mark

User provisioning (SCIM)

Check mark

Enforced two-factor authentication (2FA)


Get more visibility into our cloud platform roadmap

We're committed to providing visibility into our upcoming security, compliance, privacy, and reliability releases wherever possible.

Cloud platform roadmap (Track, Plan, and Support)

Our partners

We work with industry leaders in the identity provider space to help you streamline user provisioning and access management.

okta logo
Microsoft Azure logo
Onelogin logo
Bitium logo
idaptive logo
Clipboard with list

Fast track your vendor security assessment

Transparency is key to our security philosophy. That’s why we partner with the Cloud Security Alliance (CSA) to make our Consensus Assessment Initiative Questionnaire (CAIQ) publicly available.

2 factor authentication

Centralize your security controls

Enforce your security policies seamlessly across our cloud products. Atlassian Access provides company-wide visibility and centralized security and user management controls across your Atlassian cloud products.

Bugcrowd logo

Atlassian Bug Bounty

We've partnered with Bugcrowd to add an additional layer of security to our products by rewarding unique vulnerability research. If you've found a vulnerability, disclose the issue to our security team through our bug bounty program. 

Bullhorn

Stay updated with security advisories

We issue advisories when security bugs are discovered so that you can take action. Learn more about when we publish security advisories and how we determine severity levels.

Headshot of Adrian Ludwig

Meet Atlassian's CISO

Find out how our CISO, Adrian Ludwig, approaches security and what his team is working on this year and beyond.

Our compliance certifications

We certify with industry-accepted standards so you can verify that your company and customer data remain secure and compliant.

PCI DSS Compliant logo

PCI DSS

Soc logo

SOC

Information Security Management System Certified logo

ISO 27001

Information Security Management System Certified logo

ISO 27018

Cloud Security Alliance logo

CSA

Privacy Shield Framwork logo

Privacy Shield

GDPR logo

GDPR

VPAT logo

VPAT


The latest in Atlassian security

Whitepaper

Atlassian’s Cloud Security Overview

Admin Guide

Cloud security best practices

Talk

DevOps vs. Compliance: A Guide to Having it All

Blog Post

Behind the scenes of our security incident management process

Whitepaper

Why security is a shared responsibility

Blog post

Why we're letting 60,000 Bugcrowd security researchers ethically hack us


We’re here and ready to answer all of your questions.

Trust & Security Community

Join the Trust & Security group on the Atlassian Community to hear directly from our Security team and share information, tips, and best practices for using Atlassian products in a secure and reliable way.

Atlassian Support

Reach out to one of our highly-trained support engineers to get answers to your most specific security questions. You may find the answers to many of your questions on our pre-filled security questionnaires.