Security Policy Bulk Clone Jira Cloud
Purpose and Scope
The purpose of this policy is to ensure the Confidentiality, Integrity, and Availability (CIA) of information managed within Atlassian Jira Cloud, which is a key component of our organization’s project management and issue tracking systems. This policy applies to all employees, contractors, and third-party users who access Jira Cloud, including associated data, workflows, and integrated applications.
This policy covers:
- All users with Jira Cloud accounts under the organization’s domain.
- All projects, issues, attachments, and metadata stored in Jira Cloud.
- All devices and networks used to access Jira Cloud.
Roles and Responsibilities
- IT Security Team: Responsible for configuring Jira Cloud security settings, managing access controls, monitoring logs, and responding to security incidents.
- Project Managers: Ensure team members follow this policy and manage permissions within project spaces.
- All Users: Responsible for using Jira Cloud securely in accordance with this policy, including protecting login credentials and reporting suspicious activity.
Policy Guidelines
- Access Control:
- Access to Jira Cloud must be granted based on role-based access control (RBAC) and the principle of least privilege.
- Multi-Factor Authentication (MFA) is required for all accounts.
- Password Management:
- Users must follow the organization’s Password Policy. Passwords must be at least 12 characters, contain alphanumeric and special characters, and be changed every 90 days.
- Acceptable Use:
- Jira Cloud must only be used for work-related project and issue tracking.
- Users must not store personal, unencrypted sensitive data (e.g., PII, PHI) in Jira issues or attachments unless explicitly permitted.
- Data Handling:
- Issue types and workflows must be configured to handle sensitive data according to the Data Classification Policy.
- Integrations:
- Only approved apps and integrations from the Atlassian Marketplace may be installed.
Incident Response
- All users must report any suspected security incidents involving Jira Cloud (e.g., unauthorized access, phishing, data leakage) immediately to the IT Security Team.
- The Incident Response Plan includes:
- Identification: Use audit logs and monitoring tools.
- Containment: Disable compromised accounts or integrations.
- Eradication: Remove malicious apps or affected content.
- Recovery: Restore Jira data from backups if needed.
- Lessons Learned: Document incident outcomes and update controls.
Review and Update
- This policy will be reviewed annually or upon significant changes in Atlassian Cloud offerings, security requirements, or regulatory obligations.
- Updates must be approved by the CISO and communicated to all Jira users.
Risk Management
- Jira Cloud usage will be included in the organization’s Information Security Risk Assessment, conducted annually.
- Identified risks (e.g., excessive permissions, outdated apps) will be prioritized and mitigated through technical controls or training.
Examples of Security Sub-Policies (Jira Cloud Specific)
- Acceptable Use Policy:
- Users may not share Jira access credentials or use shared accounts.
- Password Management Policy:
- Jira accounts must be secured with passwords managed via SSO and comply with enterprise requirements.
- Data Classification Policy:
- Tickets must be labeled according to data sensitivity (Public, Internal, Confidential).
- Data Backup and Recovery Policy:
- Jira Cloud data is backed up daily using Atlassian’s managed services; restore tests are conducted quarterly.
- Incident Response Policy:
- Jira audit logs and admin activity are reviewed after each incident.
- Acceptable Encryption and Key Management Policy:
- Jira data is encrypted at rest and in transit using AES-256; encryption keys are managed by Atlassian Cloud infrastructure.
- Personnel Security Policy:
- Jira access is provisioned/deprovisioned through automated onboarding/offboarding with background checks verified for admins.
- Clean Desk Policy:
- Jira must not be left open on unlocked screens; physical notes with ticket numbers must be secured.
Importance of this Policy
- Risk Management: Minimizes potential security vulnerabilities in Jira Cloud usage.
- Compliance: Supports adherence to data protection regulations (e.g., GDPR, HIPAA).
- Employee Education: Sets clear expectations for secure usage of Jira Cloud.
- Legal Protection: Provides documented standards in case of legal scrutiny.
- Improved Security Posture: Promotes a consistent, secure configuration of Jira Cloud across teams.