閉じる

アトラシアンのセキュリティ

Security is built into the fabric of our Cloud products, infrastructure, and processes, so you can rest assured that your data is safeguarded.

 
雲のアイコン

Cloud product security

Security is built into the fabric of our Cloud products. We employ numerous controls to safeguard your data including encryption in transit across our cloud services, external vulnerability research such as our Bug Bounty program, and more.

shield with checkmark icon

Security operations and best practices

Our dedicated security team approaches security holistically with a common controls framework. Security threats are prevented using our Atlassian Trust Management System (ATMS), secure software development practices, and industry-accepted operational practices.

security radar icon

Platform and network security

We perform rigorous security testing including threat-modeling, automated scanning, and third-party audits. If an incident occurs, we resolve the issue quickly using our security incident response practices and keep you informed with real-time system status.

organized node icon

Availability and continuity

We maintain high levels of availability with multiple geographically diverse data centers and robust Disaster Recovery and Business Continuity programs. Physical access to our data centers is strictly controlled with comprehensive security measures by our data center hosting partners.

Key security offerings

Check mark

Data encryption in transit

Check mark

SAML-based SSO with all major portals

Check mark

User provisioning (SCIM)

Check mark

Enforced two-factor authentication (2FA)

Check mark

Password policy controls

Our partners

We work with industry leaders in the identity provider space to help you streamline user provisioning and access management. 

okta logo
Microsoft Azure logo
Onelogin logo
Bitium logo
Centrify logo
Clipboard with list

Fast track your vendor security assessment

Transparency is key to our security philosophy. That’s why we partner with the Cloud Security Alliance (CSA) to make our Consensus Assessment Initiative Questionnaire (CAIQ) publicly available.

2 factor authentication

Centralize your
security controls

Enforce your security policies seamlessly across our cloud products. Atlassian Access provides company-wide visibility and centralized security and user management controls across your Atlassian cloud products.

2 factor authentication

Centralize your security controls

Enforce your security policies seamlessly across our cloud products. Atlassian Access provides company-wide visibility and centralized security and user management controls across your Atlassian cloud products.

Bullhorn

Stay updated with security advisories

アトラシアンでは、セキュリティバグが発見されたときにお客様が行動を起こせるように、アドバイザリーを発行しています。セキュリティアドバイザリーの発行時期および重大度レベルの判定方法についてお読みください。

Headshot of Adrian Ludwig

Meet Atlassian's CISO

Find out how our CISO, Adrian Ludwig, approaches security and what his team is working on this year and beyond.

Our compliance certifications

SOC logo               Payment Card Industries Data Security Standard logo               ISO 27001 logo               ISO 27018 logo               Cloud Security Alliance logo               Privacy Shield フレームワークのロゴ               GDPR のロゴ


bugcrowd logo

アトラシアンのバグ報奨金

アトラシアンは Bugcrowd とパートナーシップを結んで、独自の報償金付き脆弱性調査を実施することにより、当社製品のセキュリティを一層強化しています。脆弱性が見つかった場合は、バグ報奨金プログラムを通じて、当社セキュリティチームに問題を報告してください。


アナウンスの警笛

The latest in Atlassian security

Admin guide

Cloud security best practices

Talk

How Atlassian manages risk and compliance

ブログ投稿

Behind the scenes of our security incident management process

Whitepaper

Why security is a shared responsibility

ブログ投稿

Why we're letting 60,000 Bugcrowd security researchers ethically hack us

ブログ投稿

Atlassian urges changes to Australia's Assistance and Access Act


Get more visibility into our cloud platform roadmap. Learn more


We're here and ready to answer all of your questions about Atlassian security