According to an Atlassian survey, 94 percent of businesses noticed an improvement in security after moving to the cloud from on-premise. Security is a common concern for organizations considering a cloud migration - and though it should hold high priority, you can rest assured that Atlassian takes the security of your information seriously.
The question to ask is no longer, "How secure is Cloud?". Rather, it has to do with how your organization has adapted to Cloud. Here's an interesting statement from the Gartner article, "Is the Cloud Secure?" stating:
"Through 2024, the majority of enterprises will continue to struggle with appropriately measuring cloud security risks."
Don't be one of them. Save your business on costs and other potential organizational threats with protection from Atlassian Cloud Security.
Why Atlassian Cloud Security Is Like No Other
Atlassian's Security Philosophy
Of course, a company supporting your organization's workspace should be devoted to protecting it. While others may say it, Atlassian proves it. Atlassian follows a security approach consisting of a common theme - to overachieve expectations and needs customers have for security. Check out the highlights of Atlassian's security philosophy below:
- Meet all customer requirements for cloud security and exceed requirements for industry security standards and certifications
- Being open and transparent about our programs, processes, and metrics.
This includes sharing our journey and encouraging other cloud providers to
do the same, and setting new standards for customers
- Identifying present and future security threats to Atlassian and its
customers, and limiting the impact and duration of security incidents
Zero Trust Security
Atlassian Cloud Security follows a framework called "Zero Trust." With the elevated interest of remote work, mobile devices replacing PCs and the castle-and-moat structure gradually vanishing, it is much more complex yet all more important to streamline security today. Atlassian defines Zero Trust as "a framework in which an organization forgoes one large perimeter in favor of protection at every endpoint and for every user within a company." With security checkpoints for each user and tool, this limits any potential hacker in what they can obtain because Atlassian believes in relying on more than a single log-in.
The Asset database and device posture assessment are two forms of authentication that the Zero Trust model uses to ensure the right devices - and only the right devices - can access your systems. Atlassian also encourages health checks to be made every so often. Duo, SSO platforms, mobile device management and more can all provide transparency into which devices are being used.
This feature of Atlassian security is especially significant because it protects your organization in a way that limits attackers from what they can access, should they somehow find a way to obtain a team member's credentials. For instance, if a member of the IT team has been attacked, if access permissions and restrictions are set in place based on that member's team responsibilities, the attacker will not be able to obtain any confidential information from which this IT team member has no access to. Though the goal is to keep attackers away altogether, this limits them from damaging the entire organization just because they have one user's credentials.
This security feature is one Atlassian introduced in recent years. We covered its introduction on our Atlassian Insights video, "Introduction to Atlassian Access." Access provides enterprise-level security to your organization's Atlassian Cloud products in addition to centralized administration. Here are a few of Atlassian Access's most helpful features:
- SAML single sign-on (SSO)
- User lifecycle management
- Active Directory sync
- Organization audit log
- Organization insights
- API token controls
- Enforced 2SV
- Authentication policies
- Security integrations (CASB)
Another recent layer Atlassian added to Cloud security is an organization. This feature serves as an administrative control and security measure for corporate admins. All Atlassian accounts and products are manageable by an organization admin, and admins can apply SSO, automated user provisioning and other features listed under Atlassian Access to the infrastructure.
If there is anything Atlassian takes seriously with Cloud and the protection of your organization, it's security. Register for our LIVE discussion on Atlassian Cloud Security with Ijeoma Ekeh, an Atlassian Solutions Engineer, by clicking the button below!
On top of that, there are many more benefits to Atlassian Cloud! Watch our latest on-demand webinar on Atlassian Cloud Enterprise, where we share its features, scaling capabilities, and more.