Phase 1 — Agent & Command Foundation: - Rewrite cs-project-manager agent (55→515 lines, 4 workflows, 6 skill integrations) - Expand cs-product-manager agent (408→684 lines, orchestrates all 8 product skills) - Add 7 slash commands: /rice, /okr, /persona, /user-story, /sprint-health, /project-health, /retro Phase 2 — Script Gap Closure (2,779 lines): - jira-expert: jql_query_builder.py (22 patterns), workflow_validator.py - confluence-expert: space_structure_generator.py, content_audit_analyzer.py - atlassian-admin: permission_audit_tool.py - atlassian-templates: template_scaffolder.py (Confluence XHTML generation) Phase 3 — Reference & Asset Enrichment: - 9 product references (competitive-teardown, landing-page-generator, saas-scaffolder) - 6 PM references (confluence-expert, atlassian-admin, atlassian-templates) - 7 product assets (templates for PRD, RICE, sprint, stories, OKR, research, design system) - 1 PM asset (permission_scheme_template.json) Phase 4 — New Agents: - cs-agile-product-owner, cs-product-strategist, cs-ux-researcher Phase 5 — Integration & Polish: - Related Skills cross-references in 8 SKILL.md files - Updated product-team/CLAUDE.md (5→8 skills, 6→9 tools, 4 agents, 5 commands) - Updated project-management/CLAUDE.md (0→12 scripts, 3 commands) - Regenerated docs site (177 pages), updated homepage and getting-started Quality audit: 31 files reviewed, 29 PASS, 2 fixed (copy-frameworks.md, governance-framework.md) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
215 lines
7.7 KiB
Markdown
215 lines
7.7 KiB
Markdown
# Atlassian Cloud Security Hardening Guide
|
|
|
|
## Overview
|
|
|
|
This guide provides a comprehensive security hardening checklist for Atlassian Cloud products (Jira, Confluence, Bitbucket). It covers identity management, access controls, data protection, and monitoring practices aligned with enterprise security standards.
|
|
|
|
## Identity & Authentication
|
|
|
|
### SSO / SAML Setup
|
|
|
|
**Implementation Steps:**
|
|
1. Verify your domain in Atlassian Admin (admin.atlassian.com)
|
|
2. Claim all company email accounts
|
|
3. Configure SAML SSO with your identity provider (Okta, Azure AD, Google Workspace)
|
|
4. Set authentication policy to enforce SSO for all managed accounts
|
|
5. Test with a pilot group before full rollout
|
|
6. Disable password-based login for managed accounts
|
|
|
|
**Configuration Checklist:**
|
|
- [ ] Domain verified and accounts claimed
|
|
- [ ] SAML IdP configured with correct entity ID and SSO URL
|
|
- [ ] Attribute mapping: email, displayName, groups
|
|
- [ ] Single Logout (SLO) configured
|
|
- [ ] Authentication policy enforcing SSO
|
|
- [ ] Fallback access configured for emergency admin accounts
|
|
- [ ] SCIM provisioning enabled for automatic user sync
|
|
|
|
### Two-Factor Authentication (2FA)
|
|
|
|
**Enforcement Policy:**
|
|
- [ ] 2FA required for all managed accounts
|
|
- [ ] Enforce via authentication policy (not just recommended)
|
|
- [ ] Hardware security keys (FIDO2/WebAuthn) preferred for admin accounts
|
|
- [ ] TOTP (authenticator app) as minimum for all users
|
|
- [ ] SMS-based 2FA disabled (SIM swap vulnerability)
|
|
- [ ] Recovery codes generated and stored securely
|
|
|
|
### Session Management
|
|
- [ ] Session timeout set to 8 hours of inactivity (maximum)
|
|
- [ ] Absolute session timeout: 24 hours
|
|
- [ ] Require re-authentication for sensitive operations
|
|
- [ ] Monitor concurrent sessions per user
|
|
- [ ] Enforce session termination on password change
|
|
|
|
## Access Controls
|
|
|
|
### IP Allowlisting
|
|
|
|
**Configuration:**
|
|
- [ ] Enable IP allowlisting for organization
|
|
- [ ] Add corporate office IP ranges
|
|
- [ ] Add VPN exit node IP addresses
|
|
- [ ] Add CI/CD server IPs for API access
|
|
- [ ] Test access from all approved locations
|
|
- [ ] Document approved IP ranges with justification
|
|
- [ ] Review IP allowlist quarterly
|
|
|
|
**Exceptions:**
|
|
- Mobile access may require VPN or MDM solution
|
|
- Remote workers need VPN or conditional access policies
|
|
- API integrations need stable IP ranges
|
|
|
|
### API Token Management
|
|
|
|
**Policies:**
|
|
- [ ] Inventory all API tokens in use
|
|
- [ ] Set maximum token lifetime (90 days recommended)
|
|
- [ ] Require token rotation on schedule
|
|
- [ ] Use service accounts for integrations (not personal tokens)
|
|
- [ ] Monitor API token usage patterns
|
|
- [ ] Revoke tokens immediately on employee departure
|
|
- [ ] Document purpose and owner for each token
|
|
|
|
**Best Practices:**
|
|
- Use OAuth 2.0 (3LO) for user-context integrations
|
|
- Use API tokens only for service-to-service
|
|
- Store tokens in secrets management (never in code)
|
|
- Implement least-privilege scopes for OAuth apps
|
|
|
|
### Permission Model
|
|
- [ ] Review global permissions quarterly
|
|
- [ ] Use groups for permission assignment (not individual users)
|
|
- [ ] Implement role-based access for Jira projects
|
|
- [ ] Restrict Confluence space admin to designated owners
|
|
- [ ] Limit Jira system admin to 2-3 people
|
|
- [ ] Audit "anyone" or "logged in users" permissions
|
|
- [ ] Remove direct user permissions where groups exist
|
|
|
|
## Audit & Monitoring
|
|
|
|
### Audit Log Configuration
|
|
|
|
**What to Monitor:**
|
|
- User authentication events (login, logout, failed attempts)
|
|
- Permission changes (project, space, global)
|
|
- User account changes (creation, deactivation, group changes)
|
|
- API token creation and revocation
|
|
- App installations and updates
|
|
- Data export operations
|
|
- Admin configuration changes
|
|
|
|
**Setup Steps:**
|
|
- [ ] Enable organization audit log
|
|
- [ ] Configure audit log retention (minimum 1 year)
|
|
- [ ] Set up automated export to SIEM (Splunk, Datadog, etc.)
|
|
- [ ] Create alerts for suspicious patterns
|
|
- [ ] Schedule monthly audit log review
|
|
- [ ] Document incident response procedures for alerts
|
|
|
|
### Alerting Rules
|
|
|
|
**Critical Alerts (Immediate Response):**
|
|
- Multiple failed login attempts (>5 in 10 minutes)
|
|
- Admin permission grants to unexpected users
|
|
- API token created by non-service accounts
|
|
- Bulk data export or deletion
|
|
- New third-party app installed with broad permissions
|
|
|
|
**Warning Alerts (Same-Day Review):**
|
|
- New admin users added
|
|
- Permission scheme changes
|
|
- Authentication policy modifications
|
|
- IP allowlist changes
|
|
- User deactivation (verify it is expected)
|
|
|
|
## Data Protection
|
|
|
|
### Data Residency
|
|
- [ ] Configure data residency realm (US, EU, AU, etc.)
|
|
- [ ] Verify product data pinned to selected region
|
|
- [ ] Document data residency for compliance audits
|
|
- [ ] Review data residency coverage (some metadata may be global)
|
|
- [ ] Monitor for new residency options from Atlassian
|
|
|
|
### Encryption
|
|
- [ ] Verify encryption at rest (AES-256, managed by Atlassian)
|
|
- [ ] Verify encryption in transit (TLS 1.2+)
|
|
- [ ] Review Atlassian's encryption key management practices
|
|
- [ ] Consider BYOK (Bring Your Own Key) for Atlassian Guard Premium
|
|
|
|
### Data Loss Prevention
|
|
- [ ] Configure content restrictions for sensitive pages/issues
|
|
- [ ] Implement classification labels (public, internal, confidential)
|
|
- [ ] Restrict file attachment types if needed
|
|
- [ ] Monitor bulk exports and downloads
|
|
- [ ] Set up DLP rules for sensitive data patterns (PII, credentials)
|
|
|
|
## Mobile Device Management
|
|
|
|
### Mobile Access Controls
|
|
- [ ] Require MDM enrollment for mobile Atlassian apps
|
|
- [ ] Enforce device encryption
|
|
- [ ] Require screen lock with biometrics or PIN
|
|
- [ ] Enable remote wipe capability
|
|
- [ ] Block rooted/jailbroken devices
|
|
- [ ] Restrict copy/paste to managed apps
|
|
- [ ] Set app-level PIN for Atlassian apps
|
|
|
|
### Mobile Policies
|
|
- [ ] Define approved mobile devices/OS versions
|
|
- [ ] Enforce automatic app updates
|
|
- [ ] Configure offline data access limits
|
|
- [ ] Set maximum offline cache duration
|
|
- [ ] Review mobile access logs monthly
|
|
|
|
## Third-Party App Security
|
|
|
|
### App Review Process
|
|
- [ ] Maintain approved app list (whitelist)
|
|
- [ ] Review app permissions before installation
|
|
- [ ] Verify app is Atlassian Marketplace certified
|
|
- [ ] Check app vendor security certifications
|
|
- [ ] Assess data access scope (read-only vs read-write)
|
|
- [ ] Review app privacy policy
|
|
- [ ] Document app owner and business justification
|
|
|
|
### App Governance
|
|
- [ ] Audit installed apps quarterly
|
|
- [ ] Remove unused apps (no usage in 90 days)
|
|
- [ ] Monitor app permission changes
|
|
- [ ] Restrict app installation to admins only
|
|
- [ ] Review Atlassian Guard app access policies
|
|
- [ ] Set up alerts for new app installations
|
|
|
|
## Compliance Documentation
|
|
|
|
### Required Documentation
|
|
- [ ] Security policy for Atlassian Cloud usage
|
|
- [ ] Access control matrix (roles, permissions, justification)
|
|
- [ ] Incident response plan for Atlassian security events
|
|
- [ ] Data classification policy applied to Atlassian content
|
|
- [ ] Third-party app risk assessments
|
|
- [ ] Annual security review report
|
|
|
|
### Compliance Frameworks
|
|
- **SOC 2:** Map Atlassian controls to Trust Service Criteria
|
|
- **ISO 27001:** Align with Annex A controls for cloud services
|
|
- **GDPR:** Configure data residency, right to deletion, DPAs
|
|
- **HIPAA:** Review BAA availability, encryption, access controls
|
|
|
|
## Hardening Schedule
|
|
|
|
| Task | Frequency | Owner |
|
|
|------|-----------|-------|
|
|
| Permission audit | Quarterly | IT Admin |
|
|
| API token rotation | Every 90 days | Integration owners |
|
|
| App review | Quarterly | IT Admin |
|
|
| Audit log review | Monthly | Security team |
|
|
| IP allowlist review | Quarterly | IT Admin |
|
|
| Authentication policy review | Semi-annually | Security team |
|
|
| Full security assessment | Annually | Security team |
|
|
| User access review | Quarterly | Managers + IT Admin |
|
|
| Data residency verification | Annually | Compliance |
|
|
| Mobile device audit | Quarterly | IT Admin |
|