Role:Organization admin Atlassian Cloud:Jira, Confluence, and Jira Service Management customers with Enterprise plan Atlassian Government Cloud:Not available
Bring Your Own Key (BYOK) encryption lets you encrypt app data for Jira, Confluence, or Jira Service Management with keys hosted in your external AWS account. Data managed with encryption
Benefits of BYOK encryption
BYOK encryption gives you:
Added security for sensitive data. By hosting your own encryption keys, you manage and control the keys at all times.
Increased control over access to data. Revoking access to the keys suspends access to all your apps. With the ability to revoke access to encryption keys at any time, you can reduce risk of unauthorized access.
Visibility into account activity across your AWS infrastructure. Record activity and access audit logs using AWS CloudTrail.
BYOK encryption vs Atlassian-managed encryption
If you don’t use BYOK encryption, your data is encrypted using Atlassian-managed keys.
BYOK encryption
The keys are provisioned and managed in the customers’ own AWS accounts.
Atlassian-managed encryption
Atlassian generates keys in an Atlassian-owned AWS account, and the keys are shared among customers.
Next, contact your Enterprise account representative and provide us with information such as your AWS account ID, where you want to host your app data, and the apps you want to encrypt using BYOK. We’ll set up BYOK encryption for you and add BYOK-encrypted apps to your Enterprise plan. Learn how to set up BYOK encryption
',metadata:{id:"dyFjaGJmZa6WQ84OA84SU",type:"sitewideMetadata",publisher:"Atlassian",language:"en-US",license:'Except where otherwise noted, content in this space is licensed under a Creative Commons Attribution 2.5 Australia License.',logo:"https://images.ctfassets.net/zsv3d0ugroxu/4usk6GCfTOCSKCwCQykYIu/34d7ed0904d9a0274fb906f86f51e1e1/Atlassian-vertical-blue-onecolor-rgb.svg",brand:"Atlassian",legalName:"Atlassian Corporation Plc",owns:"Jira Software,Jira Service Management,Jira Work Management,Jira Align,Confluence,Hipchat,Bitbucket,Bamboo,Crucible,Crowd,Sourcetree,OpsGenie,Statuspage,Trello,Halp,Mindville",siteName:"Atlassian Support"},header:{id:"3wZXajO6t2W8mUgA486Wai",type:"globalHeader",cloudProducts:[{sys:{id:"3yydXRuQ88gGCKOyYsAGaU"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Project and issue tracking",url:"jira-software-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3tdm6nuuJrPlizPLgkWqZ5/d0a7942804abf2f8f6737197be1fc7f4/logo-light_Jira_mark_brand_RGB.svg"},productNameReference:{sys:{id:"jirasoftware"},productName:"Jira Software"},deploymentUrls:{cloud:"/jira-software-cloud/"},id:"3yydXRuQ88gGCKOyYsAGaU"},{sys:{id:"1gXBh54v1sayA6w8yowM8u"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Service management and customer support",url:"jira-service-management-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5DppKv8q5q206zQzIRDKQq/f31b8874021ee7d6dd54389f902b1421/logo-light_Jira-Service-Management_mark_brand_RGB.svg"},productNameReference:{sys:{id:"jiraservicedesk"},productName:"Jira Service Management"},deploymentUrls:{cloud:"/jira-service-management-cloud/"},id:"1gXBh54v1sayA6w8yowM8u"},{sys:{id:"4z1mIelYHYwE6ugCuqEg0y"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Document collaboration",url:"confluence-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"confluence"},productName:"Confluence"},deploymentUrls:{cloud:"/confluence-cloud/"},id:"4z1mIelYHYwE6ugCuqEg0y"},{sys:{id:"UhZk1Nq8UMkcuUsy6sI4C"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Git code management",url:"bitbucket-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1g4197x84jic8a1P3b3IGT/1a752272b12824d3a3df4bc1e7dd2c53/logo-light_Bitbucket_mark_brand_RGB.svg"},productNameReference:{sys:{id:"bitbucket"},productName:"Bitbucket"},deploymentUrls:{cloud:"/bitbucket-cloud/"},id:"UhZk1Nq8UMkcuUsy6sI4C"},{sys:{id:"7aO3e0I67vVoQJXGXm2pjr"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Work more collaboratively and get more done",url:"trello",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1j6nvsJ8txgcxgy3Vmk4aO/e3b6d56c299ae744c2f4b8109cf1a482/logo-light_Trello_mark_brand_RGB.svg"},productNameReference:{sys:{id:"3Pgvsvt3uylBV25qaoU8ui"},productName:"Trello"},deploymentUrls:{cloud:"/trello/"},id:"7aO3e0I67vVoQJXGXm2pjr"},{sys:{id:"OBPfqfSG24X1AQ74Oc9ob"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Rovo is helps your team find knowledge, learn from it and create action—through the power of AI.",url:"rovo",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/7GLXCkFtxe0MUSfmTNdrPL/1a042c58b850d16c6eb3339dc4532c0d/logo-light_Rovo_mark_brand_RGB.svg"},productNameReference:{sys:{id:"1wFXee3vB0OUMBK6dJ5ncZ"},productName:"Rovo"},deploymentUrls:{cloud:"/rovo/"},id:"OBPfqfSG24X1AQ74Oc9ob"},{sys:{id:"74UlBDi4bbCZFw5rNyxpjj"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Loom is the video communication platform for async work.",url:"loom",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1WJwDTYFClxfJJUOrhlevh/ea49afae7832f279d4769d04b004217e/Loom_blue.svg"},productNameReference:{sys:{id:"6TYrk1y0pRJilwiT69uMgM"},productName:"Loom"},deploymentUrls:{cloud:"/loom/"},id:"74UlBDi4bbCZFw5rNyxpjj"},{sys:{id:"1IrNp77C6KQk9FZ7y8V1f2"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Mission control for your distributed architecture",url:"compass",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3UAMHJdzO6e6NhYGD07Ugg/bf460d12761faed44a807bf7eb8a8c45/logo-light_Compass_mark_brand_RGB.svg"},productNameReference:{sys:{id:"1ndBBFKwZNMEzDmJzMd6Wo"},productName:"Compass"},deploymentUrls:{cloud:"/compass/"},id:"1IrNp77C6KQk9FZ7y8V1f2"},{sys:{id:"10SbTAPoOxxVcyZMNH20Kf"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Your team’s home for product discovery",url:"jira-product-discovery",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/UoGuPi0Q5W6nxm8P76Zun/7ff53cd380f66b6fe1dc27b8a9fd645a/logo-light_Jira-Product-Discovery_mark_brand_RGB.svg"},productNameReference:{sys:{id:"22bKMdHH2crmVtvOW4gfGg"},productName:"Jira Product Discovery"},deploymentUrls:{cloud:"/jira-product-discovery/"},id:"10SbTAPoOxxVcyZMNH20Kf"},{sys:{id:"2QnaIiOyGAeI4aWeg4y8ms"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Manage any business project",url:"jira-work-management",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3vfg7u3DhUSKK0pXuJ88hK/5619c55b3e05a43bee3af77f4e293824/JWM.svg"},productNameReference:{sys:{id:"7kTpVjbv8bjQ67yVJiWQyh"},productName:"Jira Work Management"},deploymentUrls:{cloud:"/jira-work-management/"},id:"2QnaIiOyGAeI4aWeg4y8ms"},{sys:{id:"53Ep5GwhITPflhp1tT1Ale"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Unlock the agility of your enterprise",url:"jira-align",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/6eS3KCOum0OuJfHEBmhIy6/32785683c67d135aae596e6e66ec9646/logo-light_Jira-Align_mark_brand_RGB.svg"},productNameReference:{sys:{id:"jiraalign"},productName:"Jira Align"},deploymentUrls:{cloud:"/jira-align/"},id:"53Ep5GwhITPflhp1tT1Ale"},{sys:{id:"5t76PH9Mw7zagigkXzUa8H"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Modern incident management",url:"opsgenie",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3Mgc7MIYvTJ3EQ3ghceiVk/76c6a20b69802c434b973cb8098d490a/logo-light_Opsgenie_mark_brand_RGB.svg"},productNameReference:{sys:{id:"opsgenie"},productName:"Opsgenie"},deploymentUrls:{cloud:"/opsgenie/"},id:"5t76PH9Mw7zagigkXzUa8H"},{sys:{id:"70RA5tkL23bUJmCn3bDjGy"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Build trust with every incident",url:"statuspage",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/39aRd69G7mmkTG6yY8H0EV/857285af871d13d1b6290d360a7cea67/logo-light_Statuspage_mark_brand_RGB.svg"},productNameReference:{sys:{id:"statuspage"},productName:"Statuspage"},deploymentUrls:{cloud:"/statuspage/"},id:"70RA5tkL23bUJmCn3bDjGy"},{sys:{id:"2U16wQipiL90JdLzRQMkon"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Focus drives enterprise-wide outcomes by connecting strategic priorities to goals and the supporting work and funds.",url:"focus",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5FToPwIc7QDnUPrVjacYoP/8ffbd2cd00e82736e3d45b1f26cc7016/logo-light_Focus_mark_brand_RGB.svg"},productNameReference:{sys:{id:"6rR5KiykJPeEyCIAMDCQ6p"},productName:"Focus"},deploymentUrls:{cloud:"/focus/"},id:"2U16wQipiL90JdLzRQMkon"},{sys:{id:"GRwdL69kctHpHtKJ7zcJ1"},version:"Not Applicable",deployment:"Cloud",productBlurb:"A teamwork directory",url:"platform-experiences",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1EJJvH8M9OzrklPFmjq3Cg/e476c435a1743db02b9c811ae7a6a0e8/logo-light_Atlassian_mark_brand_RGB.svg"},productNameReference:{sys:{id:"6kdRPGfYiLXS40s5lykYaS"},productName:"Platform experiences"},deploymentUrls:{cloud:"/platform-experiences/"},id:"GRwdL69kctHpHtKJ7zcJ1"},{sys:{id:"fEP36MruYtLOyVTTfFsBy"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Assets is Jira Service Management’s native asset and configuration management tool.",url:"assets",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/7F3zOpMU5QkUiV7F9cwM7b/110ed7096e27d83927897fbbe55057f6/Assets_SAC_tile__1_.svg"},productNameReference:{sys:{id:"1SpthyuLXrbbP2FgB0Sp1y"},productName:"Assets"},deploymentUrls:{cloud:"/assets/"},id:"fEP36MruYtLOyVTTfFsBy"},{sys:{id:"6wktSePjIQKs6KcqcCeyEO"},version:"Not Applicable",deployment:"Cloud",productBlurb:null,url:"team-calendars-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"teamcalendars"},productName:"Team Calendars"},deploymentUrls:{cloud:"/team-calendars-cloud/"},id:"6wktSePjIQKs6KcqcCeyEO"},{sys:{id:"1wFo6tw3l6OQYIoCoW04MW"},version:"Not Applicable",deployment:"Cloud",productBlurb:null,url:"questions-for-confluence-cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"questionsforconfluence"},productName:"Questions for Confluence"},deploymentUrls:{cloud:"/questions-for-confluence-cloud/"},id:"1wFo6tw3l6OQYIoCoW04MW"},{sys:{id:"2z0gZxjenWQMWqIqUIqSWw"},version:"Not Applicable",deployment:"Cloud",productBlurb:null,url:"cloud",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1EJJvH8M9OzrklPFmjq3Cg/e476c435a1743db02b9c811ae7a6a0e8/logo-light_Atlassian_mark_brand_RGB.svg"},productNameReference:{sys:{id:"atlassiancloud"},productName:"Atlassian Cloud"},deploymentUrls:{cloud:"/cloud/"},id:"2z0gZxjenWQMWqIqUIqSWw"},{sys:{id:"5H0E33RpbSIBhC4Rf3X6sK"},version:"Not Applicable",deployment:"Cloud",productBlurb:"Data visualization and analytics",url:"analytics",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1LlGSRpoyIRimE0F2CabNM/9c8a89a7196fe549fbb855c8597776fe/logo-light_Atlassian-Analytics_mark_brand_RGB.svg"},productNameReference:{sys:{id:"4114hkTUsuTHRSjjQUd8Dd"},productName:"Atlassian Analytics"},deploymentUrls:{cloud:"/analytics/"},id:"5H0E33RpbSIBhC4Rf3X6sK"}],serverProducts:[{sys:{id:"kvr1LpMbeXQeqBF6BJG5S"},version:"Latest",deployment:"Server",productBlurb:"Project and issue tracking",url:"jira-software-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1Ba3KU2ckjAMmeYoL9DgjO/e6710a37425ab1695046803d32c2db70/Jira_Software.svg"},productNameReference:{sys:{id:"jirasoftware"},productName:"Jira Software"},deploymentUrls:{server:"/jira-software-server/"},id:"kvr1LpMbeXQeqBF6BJG5S"},{sys:{id:"1XBrxhXDoqegKhDG1BLAvI"},version:"Latest",deployment:"Server",productBlurb:"Service management and customer support",url:"jira-service-management-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5DppKv8q5q206zQzIRDKQq/f31b8874021ee7d6dd54389f902b1421/logo-light_Jira-Service-Management_mark_brand_RGB.svg"},productNameReference:{sys:{id:"jiraservicedesk"},productName:"Jira Service Management"},deploymentUrls:{server:"/jira-service-management-server/"},id:"1XBrxhXDoqegKhDG1BLAvI"},{sys:{id:"1F1m8sxD1tMlsaORRYGD1f"},version:"Latest",deployment:"Server",productBlurb:"Manage any business project",url:"jira-core-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/33jpVupw41aFgHx33pk79p/9fc5a1d056827ace938a74dd3a825f1e/jira_core_flat.svg"},productNameReference:{sys:{id:"jiracore"},productName:"Jira Core"},deploymentUrls:{server:"/jira-core-server/"},id:"1F1m8sxD1tMlsaORRYGD1f"},{sys:{id:"zifyQJ8ZmqvAmcXgWIWSR"},version:"Latest",deployment:"Server",productBlurb:"Document collaboration",url:"confluence-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"confluence"},productName:"Confluence"},deploymentUrls:{server:"/confluence-server/"},id:"zifyQJ8ZmqvAmcXgWIWSR"},{sys:{id:"5nDH84LjHRq8Opn1Tmt2an"},version:"Latest",deployment:"Server",productBlurb:"Git code management",url:"bitbucket-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1g4197x84jic8a1P3b3IGT/1a752272b12824d3a3df4bc1e7dd2c53/logo-light_Bitbucket_mark_brand_RGB.svg"},productNameReference:{sys:{id:"bitbucket"},productName:"Bitbucket"},deploymentUrls:{server:"/bitbucket-server/"},id:"5nDH84LjHRq8Opn1Tmt2an"},{sys:{id:"6aFX6UNeJUogMmuSW04uEO"},version:"Latest",deployment:"Server",productBlurb:null,url:"bamboo",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3DpPNPOUpDyuOyzNTU0WhT/883c9475bbc82c16e9334e47d0c3cd81/logo-light_Bamboo_mark_brand_RGB.svg"},productNameReference:{sys:{id:"bamboo"},productName:"Bamboo"},deploymentUrls:{server:"/bamboo/"},id:"6aFX6UNeJUogMmuSW04uEO"},{sys:{id:"4pI1aZ1P4QW82KKcU2o2A2"},version:"Latest",deployment:"Server",productBlurb:null,url:"crowd",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/7C9qBlldQMCQQmZYW9cKST/d9b5609c85b500bb065c99e38cf1a80a/logo-light_Crowd_mark_brand_RGB.svg"},productNameReference:{sys:{id:"crowd"},productName:"Crowd"},deploymentUrls:{server:"/crowd/"},id:"4pI1aZ1P4QW82KKcU2o2A2"},{sys:{id:"5F7bce6w8w0eMqeqeGSa42"},version:"Latest",deployment:"Server",productBlurb:null,url:"crucible",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/Bmzjg8Jf9IjaKxJJRsdyg/18618a0ed9fb4c119be53772b6657197/logo-light_Crucible_mark_brand_RGB.svg"},productNameReference:{sys:{id:"crucible"},productName:"Crucible"},deploymentUrls:{server:"/crucible/"},id:"5F7bce6w8w0eMqeqeGSa42"},{sys:{id:"x5esi3PpaoAAaekGEGWqY"},version:"Latest",deployment:"Server",productBlurb:null,url:"fisheye",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1JPhscmMbQTiP584fioarJ/68c65896f78db9c082c74f029dfe14ba/logo-light_Fisheye_mark_brand_RGB.svg"},productNameReference:{sys:{id:"fisheye"},productName:"Fisheye"},deploymentUrls:{server:"/fisheye/"},id:"x5esi3PpaoAAaekGEGWqY"},{sys:{id:"6DftT4SP0A6eiAkISKuu6Y"},version:"Latest",deployment:"Server",productBlurb:null,url:"sourcetree",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/7r8051IqGKLJPwloKRYSVB/1a9b1a101e4419823993cfe79ae8f023/logo-light_Sourcetree_mark_brand_RGB.svg"},productNameReference:{sys:{id:"sourcetree"},productName:"Sourcetree"},deploymentUrls:{server:"/sourcetree/"},id:"6DftT4SP0A6eiAkISKuu6Y"},{sys:{id:"6pcStE2pewRQyCtz7yHnm1"},version:"Latest",deployment:"Server",productBlurb:null,url:"advanced-roadmaps-for-jira-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/33jpVupw41aFgHx33pk79p/9fc5a1d056827ace938a74dd3a825f1e/jira_core_flat.svg"},productNameReference:{sys:{id:"portfolioforjira"},productName:"Advanced Roadmaps for Jira"},deploymentUrls:{server:"/advanced-roadmaps-for-jira-server/"},id:"6pcStE2pewRQyCtz7yHnm1"},{sys:{id:"2oDTelIDk4LAM0Bxomfo7m"},version:"Latest",deployment:"Server",productBlurb:null,url:"team-calendars-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"teamcalendars"},productName:"Team Calendars"},deploymentUrls:{server:"/team-calendars-server/"},id:"2oDTelIDk4LAM0Bxomfo7m"},{sys:{id:"4FWxkzknncoyN31Gnft19o"},version:"Latest",deployment:"Server",productBlurb:null,url:"questions-for-confluence-server",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5VucmXIhBRYyBXA9ygFJ3Y/5082d769a81934af185dcf109b29f628/logo-light_Confluence_mark_brand_RGB.svg"},productNameReference:{sys:{id:"questionsforconfluence"},productName:"Questions for Confluence"},deploymentUrls:{server:"/questions-for-confluence-server/"},id:"4FWxkzknncoyN31Gnft19o"}],additionalLinks:[{linkLabel:"Contact support",linkUrl:"https://support.atlassian.com/contact/",linkIcon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/34aQizNVKUaasai48ASqg2/0ca6041940bcf6b5fd74e559b90eb9e9/question-circle.svg"}},{linkIcon:null,linkLabel:"Training & Certification",linkUrl:"https://www.atlassian.com/university"},{linkIcon:null,linkLabel:"Atlassian Migration Program",linkUrl:"https://www.atlassian.com/cloud-migration"},{linkIcon:null,linkLabel:"GDPR guides",linkUrl:"https://confluence.atlassian.com/gdpr"},{linkIcon:null,linkLabel:"Enterprise services",linkUrl:"https://www.atlassian.com/enterprise/services"},{linkIcon:null,linkLabel:"Atlassian Partners",linkUrl:"https://www.atlassian.com/partners"},{linkIcon:null,linkLabel:"Developers",linkUrl:"https://developer.atlassian.com"},{linkIcon:null,linkLabel:"Success Central",linkUrl:"https://success.atlassian.com"},{linkIcon:null,linkLabel:"User groups",linkUrl:"http://aug.atlassian.com"},{linkIcon:null,linkLabel:"Automation for Jira",linkUrl:"https://support.atlassian.com/cloud-automation/docs/jira-cloud-automation/"},{linkIcon:null,linkLabel:"Atlassian.com",linkUrl:"http://www.atlassian.com"}],atlassianSupportLogo:{url:"https://images.ctfassets.net/zsv3d0ugroxu/2a2EqJ1z4IOCa4EKCSAi2s/3f934328cbeb68b72892e7f50b65e380/support-logo-atlassian.svg"},atlassianLogo:{url:"https://images.ctfassets.net/zsv3d0ugroxu/2sOh4sF3DSm8Qy8GigKK0S/1c7619d9db378c5ee902d8eeb8fde65b/atlassian-logo-footer.svg"}},resources:{cards:[{sys:{id:"b3fTs5PrPymsKyewq2uee"},title:"Documentation",buttonLink:"https://confluence.atlassian.com",buttonText:"View documentation",shortTitle:null,shortDescription:"Usage and admin help",hideInHeader:!0,analytics:"${Product} Documentation",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/3zu24q81rSIszjUcYWS7rs/e203ecd5b877949db50052f2e2cc018a/rich_icon-Guidelines.svg"},id:"b3fTs5PrPymsKyewq2uee"},{sys:{id:"1eb4CYi6GQecc4S0amoCGm"},title:"Knowledge Base",buttonLink:"https://atlassian.com",buttonText:"View knowledge base",shortTitle:null,shortDescription:null,hideInHeader:!0,analytics:"KnowledgeBase",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/2bQqvQH3QFxNcjpOxCEQKD/cc250e1247072a531cf591444211da4a/rich_icon-Autofix.svg"},id:"1eb4CYi6GQecc4S0amoCGm"},{sys:{id:"1jekufjl8YMw4eUKoI6kg6"},title:"Community",buttonLink:"https://community.atlassian.com",buttonText:"Visit Atlassian Community",shortTitle:null,shortDescription:"Answers, support and inspiration",hideInHeader:null,analytics:"Community",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/199clY7qv6MQc2EasKkGim/2be1028a3452c791c46ebb4a4343a91b/rich_icon-Community.svg"},id:"1jekufjl8YMw4eUKoI6kg6"},{sys:{id:"5buCUK1TCgS2q6KMGkIkSy"},title:"System Status",buttonLink:"https://status.atlassian.com/",buttonText:"View system status",shortTitle:null,shortDescription:"Cloud services health",hideInHeader:null,analytics:"System Status",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/72Hws13erkU4jPlqQmD2SS/fd94e1b3f2b1b3e88315702c77b672cd/rich_icon-Announcement.svg"},id:"5buCUK1TCgS2q6KMGkIkSy"},{sys:{id:"2nRNjDkbCcUwSOq422y66"},title:"Suggestions and bug reports",buttonLink:"https://jira.atlassian.com/secure/Dasard.jspa?selectPageId=10440",buttonText:"View suggestions and bugs",shortTitle:"Suggestions and bugs",shortDescription:"Feature suggestions and bug reports",hideInHeader:null,analytics:"Suggestion bug",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/4LAr0Xsaq4gUk60Uy6eYwk/3914441924f9af9ae74908ad136c55b9/rich_icon-Lightbulb.svg"},id:"2nRNjDkbCcUwSOq422y66"},{sys:{id:"77KyWObmQowc8oycAK6mo2"},title:"Marketplace apps",buttonLink:"https://marketplace.atlassian.com/",buttonText:"View Marketplace",shortTitle:"Marketplace",shortDescription:"Product apps",hideInHeader:null,analytics:"Marketplace",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/1ss3lke3aYcVp07USZwdMY/f90bbe91db3ae373ea6dc008ce617373/rich_icon-Integration.svg"},id:"77KyWObmQowc8oycAK6mo2"},{sys:{id:"t7tq3EzI9qwcKMaES0i0y"},title:"Billing and licensing",buttonLink:"https://www.atlassian.com/licensing/purchase-licensing",buttonText:"View FAQs",shortTitle:null,shortDescription:"Frequently asked questions",hideInHeader:null,analytics:"Billing",icon:{url:"https://images.ctfassets.net/zsv3d0ugroxu/5Cb1EEBbNKkm8uK24mIeEs/4ffba62bbd992b75dc3b7f227c9cb3f3/rich_icon-Credit_cards.svg"},id:"t7tq3EzI9qwcKMaES0i0y"}]},preview:!1,contentType:"topic"},contentType:"topic",contentAri:"ari:third-party:contentful::entry/zsv3d0ugroxu/master/5HbeZD7gbn4PizMoFkHZNr",featureFlags:{isVideoEnabled:!1},pageTree:[{id:"5xfFYyjunqZC2TY5BC1Eel",updatedAt:"2024-10-02T05:07:56.169Z",slug:"/security-and-access-policies/docs/learn-about-security-solutions-standards/",title:"Learn about security solutions and standards",childList:[{id:"3zadZz6H4MEb5oSPIochr4",slug:"/security-and-access-policies/docs/how-to-keep-my-organization-secure/",updatedAt:"2025-02-14T06:42:06.062Z",title:"How to keep my organization secure?",description:"Learn about cloud security best practices.",collectionId:"5xfFYyjunqZC2TY5BC1Eel"},{id:"3pEtZgEF5kuqZlKonqnKt3",slug:"/security-and-access-policies/docs/understand-atlassian-guard/",updatedAt:"2025-05-06T21:40:26.709Z",title:"Understand Atlassian Guard",description:"Subscribe to Atlassian Guard and apply security policies and features to users and your organization.",collectionId:"5xfFYyjunqZC2TY5BC1Eel"},{id:"1U29y8TTaEUuMhDpPgYUv",slug:"/security-and-access-policies/docs/atlassian-guard-product-and-plan-availability/",updatedAt:"2025-03-27T03:26:43.884Z",title:"Atlassian Guard product and plan availability",description:"Check which Atlassian Guard capabilities are available for your products and plan.",collectionId:"5xfFYyjunqZC2TY5BC1Eel"},{id:"3QvqDCSgOfQ6540S4EWc6M",slug:"/security-and-access-policies/docs/supported-security-protocols-for-atlassian-cloud-products/",updatedAt:"2025-03-03T02:33:39.145Z",title:"Supported security protocols for Atlassian cloud products",description:"Keep your data secure with the TLS protocols and cipher suites that we support for Atlassian cloud products.",collectionId:"5xfFYyjunqZC2TY5BC1Eel"}],pageType:"Documentation"},{id:"EGH14sCmDujBi7cQ6FSlm",updatedAt:"2025-02-27T22:33:08.381Z",slug:"/security-and-access-policies/docs/configure-authentication-policies-for-your-organization/",title:"Configure authentication policies for your organization",childList:[{id:"3aA4pQkuuJluPZ5rpD3II7",slug:"/security-and-access-policies/docs/understand-authentication-policies/",updatedAt:"2025-05-08T00:54:31.213Z",title:"Understand authentication policies",description:"Take advantage of authentication policies.",collectionId:"EGH14sCmDujBi7cQ6FSlm"},{id:"72SheYiCH5NIAAd44qsRWK",slug:"/security-and-access-policies/docs/what-is-a-default-authentication-policy/",updatedAt:"2025-02-27T21:23:43.180Z",title:"What is a default authentication policy?",description:"Update which authentication policy is the default and add or delete additional policies.",collectionId:"EGH14sCmDujBi7cQ6FSlm"},{id:"3ZivnJ13tzlFmSuA1lLAJf",slug:"/security-and-access-policies/docs/what-is-a-non-billable-policy/",updatedAt:"2025-02-27T21:31:26.742Z",title:"What is a non-billable policy?",description:"Remove security settings from an authentication policy to avoid paying for users as part of your Atlassian Guard bill.",collectionId:"EGH14sCmDujBi7cQ6FSlm"},{id:"7p4jGPKZ5PXdq4kgvQEQIC",slug:"/security-and-access-policies/docs/edit-authentication-settings-and-members/",updatedAt:"2025-05-07T11:24:16.065Z",title:"Edit authentication settings and members",description:"Edit settings and add members to your authentication policies.",collectionId:"EGH14sCmDujBi7cQ6FSlm"},{id:"5NSeu3ah8DYeEHDPF0QgWP",slug:"/security-and-access-policies/docs/authentication-policy-settings-for-your-organizations/",updatedAt:"2025-05-08T03:12:26.359Z",title:"Authentication policy settings for your organizations",description:"Update settings for your authentication policies to ensure that users log in securely.",collectionId:"EGH14sCmDujBi7cQ6FSlm"}],pageType:"Documentation"},{id:"3kGDvkKWjqC8812xJy9Jrt",updatedAt:"2023-07-10T01:15:04.739Z",slug:"/security-and-access-policies/docs/configure-single-sign-on-for-your-organizations-users/",title:"Configure single sign-on for your organization",childList:[{id:"3EVyf7wkhr0fMfkD7K97ZV",updatedAt:"2023-07-10T01:14:16.596Z",slug:"/security-and-access-policies/docs/configure-saml-single-sign-on/",title:"Configure SAML single sign-on",childList:[{id:"65JyqPi5n2NgJRdOwfNpKf",slug:"/security-and-access-policies/docs/configure-saml-single-sign-on-with-an-identity-provider/",updatedAt:"2025-05-01T12:45:51.031Z",title:"Configure SAML single sign-on with an identity provider",description:"Set up SAML single sign-on for your identity provider to connect with Atlassian apps."},{id:"2i26U1z5Pw8BjNcjqyeyDo",slug:"/security-and-access-policies/docs/configure-saml-single-sign-on-for-portal-only-customers/",updatedAt:"2025-05-07T11:45:06.078Z",title:"Configure SAML single sign-on for portal-only customers",description:"Set up SAML single sign-on with your identity provider for your portal-only customers."},{id:"4hOSO0nbCcyPz2i5KZ45wS",slug:"/security-and-access-policies/docs/configure-saml-single-sign-on-with-ad-fs/",updatedAt:"2025-05-07T11:17:29.811Z",title:"Configure SAML single sign-on with AD FS",description:"Set up SAML single sign-on for your AD FS to connect with Atlassian apps."}],description:"Set up SAML single sign-on for your identity provider to connect with Atlassian products."},{id:"4zFAygd7q4cMCfXkP7we78",slug:"/security-and-access-policies/docs/require-users-to-log-in-with-google/",updatedAt:"2021-03-12T16:44:10.382Z",title:"Require users to log in with Google",collectionId:"3kGDvkKWjqC8812xJy9Jrt"}],pageType:"Documentation"},{id:"2yKPD5ENCc7CIn2zB3WJfi",updatedAt:"2025-03-18T01:48:12.703Z",slug:"/security-and-access-policies/docs/configure-settings-for-secure-user-login/",title:"Configure settings for secure user login",childList:[{id:"5m3Visy8X2U8FmANvSnjyb",slug:"/security-and-access-policies/docs/manage-your-password-policy/",updatedAt:"2025-04-04T02:29:04.129Z",title:"Manage your password policy",description:"Ensure that users accessing your Atlassian cloud products are using best practices when creating passwords.",collectionId:"2yKPD5ENCc7CIn2zB3WJfi"},{id:"4QSnp6FCuuJ1ph6zpYG3nx",slug:"/security-and-access-policies/docs/enforce-two-step-verification/",updatedAt:"2025-04-04T02:29:24.193Z",title:"Enforce two-step verification",description:"Learn about how to make it mandatory or optional for users to log in with two-step verification.",collectionId:"2yKPD5ENCc7CIn2zB3WJfi"},{id:"5L8JgGEEIrCzFtZCMmpGf7",slug:"/security-and-access-policies/docs/update-idle-session-duration/",updatedAt:"2025-04-04T02:30:24.362Z",title:"Update idle session duration",description:"Manage session duration for your users.",collectionId:"2yKPD5ENCc7CIn2zB3WJfi"},{id:"3MagKmRqeM9TSqlwal65KC",slug:"/security-and-access-policies/docs/configure-your-organizations-login-page/",updatedAt:"2025-05-07T09:07:14.420Z",title:"Configure your organization’s login page ",description:"You can customize the login page for Confluence and Jira apps. Control whether users can log in to your Confluence and Jira apps with third-party accounts.",collectionId:"2yKPD5ENCc7CIn2zB3WJfi"},{id:"6DCp3wyicQIjpcHkfgop3G",updatedAt:"2025-04-04T02:33:16.761Z",slug:"/security-and-access-policies/docs/set-mobile-app-session-expiration/",title:"Set mobile app session expiration",childList:[],description:"Manage mobile app sessions for your users."}],pageType:"Documentation"},{id:"5UMAa519G8KvzBniliA55k",updatedAt:"2021-04-12T17:40:44.360Z",slug:"/security-and-access-policies/docs/report-and-track-data-across-your-organization/",title:"Report and track data across your organization",childList:[{id:"6kOt2sT7mVMhb33ZrPnYnx",slug:"/security-and-access-policies/docs/gain-insights-into-product-usage-and-security-practices/",updatedAt:"2025-05-08T01:27:59.298Z",title:"Gain insights into app usage and security practices",description:"Track adoption of Atlassian apps, make data-driven decisions, and evaluate the security of your organization.",collectionId:"5UMAa519G8KvzBniliA55k"},{id:"1IYIwHTuXPzvC8z100C1N3",slug:"/security-and-access-policies/docs/track-storage-and-move-data-across-products/",updatedAt:"2025-05-06T22:53:37.139Z",title:"Track storage and move data across apps",description:"Understand your cloud data storage limits, when we back up your data, and how you can import and export data.",collectionId:"5UMAa519G8KvzBniliA55k"},{id:"2wsrLVr17o4qryzM31QeJf",updatedAt:"2020-12-16T23:34:24.580Z",slug:"/security-and-access-policies/docs/export-user-accounts/",title:"Export user accounts",childList:[{id:"ybwoxcHN14x2eLzhHYPF1",slug:"/security-and-access-policies/docs/export-users-from-a-site/",updatedAt:"2025-05-08T03:47:45.921Z",title:"Export users from a site",description:"Get a list of your site's users by exporting a CSV file."},{id:"3WMMdU2E8fcCGQfwQt4NbQ",slug:"/security-and-access-policies/docs/export-managed-accounts/",updatedAt:"2025-05-08T04:07:13.992Z",title:"Export managed accounts",description:"Get a list of your managed accounts in a CSV file."},{id:"4FdVU4JThrMevA8ETbETma",slug:"/security-and-access-policies/docs/export-accounts-from-domains/",updatedAt:"2025-02-27T06:50:57.859Z",title:"Export accounts from domains",description:"Get a list of your accounts from domains in a CSV file."}],description:"Want to get a list of your user accounts? Export CSV files for site users and managed accounts."},{id:"1UnLLpzUktU2DnRxkAc78L",updatedAt:"2024-11-01T04:50:57.631Z",slug:"/security-and-access-policies/docs/track-user-api-tokens-in-your-organization/",title:"Track user API tokens in your organization",childList:[{id:"2gR5WQatRc764M55zeUz1N",slug:"/security-and-access-policies/docs/understand-user-api-tokens/",updatedAt:"2025-05-08T15:44:09.635Z",title:"Understand user API tokens",description:"Understand the user API token attributes you can monitor."},{id:"6aJbv4Bsf6XoVZYeLH2nhg",slug:"/security-and-access-policies/docs/view-user-api-tokens/",updatedAt:"2025-05-08T15:44:36.715Z",title:"View user API tokens",description:"How to view user API tokens for managed accounts."},{id:"jE4zlNqNUY6a9Mz4b87mR",slug:"/security-and-access-policies/docs/revoke-user-api-tokens/",updatedAt:"2025-05-08T15:45:14.915Z",title:"Revoke user API tokens",description:"How to revoke one or more of the user API tokens."}],description:"Monitor user API tokens from one central location in Atlassian administration."}],pageType:"Documentation"},{id:"1ida2MLk1DNof7bJCKP6CG",updatedAt:"2023-02-24T04:50:57.297Z",slug:"/security-and-access-policies/docs/manage-data-residency-for-products/",title:"Manage data residency",childList:[{id:"6iCEEus94WZeAzR0ZzA5Wz",slug:"/security-and-access-policies/docs/understand-data-residency/",updatedAt:"2025-04-07T18:38:17.105Z",title:"Understand data residency",description:"Learn about Atlassian data residency for cloud products and apps, as well as locations.",collectionId:"1ida2MLk1DNof7bJCKP6CG"},{id:"3VDZr35jAdP4B3tvH76iSy",slug:"/security-and-access-policies/docs/move-data-to-another-location/",updatedAt:"2025-03-31T17:43:12.116Z",title:"Move product data to another location",description:"Learn how to move your product data to a new location.",collectionId:"1ida2MLk1DNof7bJCKP6CG"},{id:"4zA3O6hIKBkk3B80ix4hdN",slug:"/security-and-access-policies/docs/moving-your-marketplace-apps-data-to-another-location/",updatedAt:"2024-08-15T08:33:25.441Z",title:"Moving your Marketplace apps data to another location",description:"Learn how to move Marketplace apps data to a new location.",collectionId:"1ida2MLk1DNof7bJCKP6CG"}],pageType:"Documentation"},{id:"36uK61Ve3Wjt9zIDQyuZRi",updatedAt:"2025-05-01T04:27:41.722Z",slug:"/security-and-access-policies/docs/maintain-secure-access-to-products/",title:"Maintain secure access to apps",childList:[{id:"1VDNYBe2ryvhwXkEtJkTt3",slug:"/security-and-access-policies/docs/specify-ip-addresses-for-product-access/",updatedAt:"2025-04-30T05:21:08.342Z",title:"Specify IP addresses for app access",description:"Control which IP addresses users can use to access your organization's Confluence and Jira apps.",collectionId:"36uK61Ve3Wjt9zIDQyuZRi"},{id:"975ciwC8jwQMdMBE28Uxu",slug:"/security-and-access-policies/docs/manage-your-users-third-party-apps/",updatedAt:"2025-02-27T17:57:38.122Z",title:"Manage your organization's third-party apps",description:"Uninstall and revoke access to apps your users have added to your organization's products.",collectionId:"36uK61Ve3Wjt9zIDQyuZRi"},{id:"16jOEJPYOcrWJiXXtjpIhc",slug:"/security-and-access-policies/docs/manage-third-party-contacts/",updatedAt:"2025-05-08T04:08:28.521Z",title:"Manage third-party contacts",description:"Manage setting that allows users to connect third-party contacts when adding and inviting people.",collectionId:"36uK61Ve3Wjt9zIDQyuZRi"},{id:"2iB4jQrzF4vlgNwq8hGs29",updatedAt:"2025-03-05T16:27:31.856Z",slug:"/security-and-access-policies/docs/mobile-app-management-mam-for-atlassian-mobile-apps/",title:"Mobile App Management for Atlassian mobile apps",childList:[{id:"12uy13DN2u8ex2FX5Mo1gg",slug:"/security-and-access-policies/docs/mobile-policy-mam-security-controls-and-supported-apps/",updatedAt:"2025-02-27T18:31:36.322Z",title:"Security settings in a mobile app policy",description:"Understand which security settings are available for Jira Cloud and Confluence Cloud mobile apps and how they work."},{id:"79rGhFuYsDvuFYwFAIwUPJ",slug:"/security-and-access-policies/docs/create-a-mobile-policy/",updatedAt:"2025-02-27T18:34:02.033Z",title:"Create a mobile app policy",description:"Learn how to create a mobile app policy to protect your organization’s data on mobile."},{id:"77zd3E5WiRtul44v4kyl4K",slug:"/security-and-access-policies/docs/edit-a-mobile-policy/",updatedAt:"2025-02-27T18:34:38.760Z",title:"Edit a mobile app policy",description:"Manage and make updates to your existing mobile app policy."},{id:"5rKft0qMVB11JZMkE37pHj",slug:"/security-and-access-policies/docs/delete-a-mobile-policy/",updatedAt:"2025-02-27T18:36:02.846Z",title:"Delete a mobile app policy",description:"Learn how to and what happens when you delete a mobile app policy."},{id:"6vaxhIsFQb1l9MpKdK26mB",slug:"/security-and-access-policies/docs/test-a-mobile-policy/",updatedAt:"2025-02-27T18:46:13.564Z",title:"Test a mobile app policy",description:"Test your mobile app policy with specific users before including everyone in your organization."},{id:"10QeNSGtyjTqaikAufKdNB",slug:"/security-and-access-policies/docs/what-is-the-end-user-experience-of-a-mobile-policy/",updatedAt:"2024-12-17T00:02:21.918Z",title:"What will my users experience when I set a mobile policy?",description:"Learn what your users see and experience on their devices after you create a mobile policy."}],description:"Learn how to configure security controls for your users' devices when they use the Confluence, Jira, and Opsgenie cloud mobile apps."},{id:"4fNrp6NRAwWxQ1kRLlboKm",updatedAt:"2021-04-15T23:26:30.889Z",slug:"/security-and-access-policies/docs/mobile-device-management-mdm-for-atlassian-mobile-apps/",title:"Mobile Device Management (MDM) for Atlassian mobile apps",childList:[{id:"4TQviCM9pfY0xAgzktXmJZ",slug:"/security-and-access-policies/docs/create-an-appconfig-json-string-for-ios/",updatedAt:"2024-10-31T18:39:19.585Z",title:"Create an AppConfig JSON string for iOS",description:"See an example of an AppConfig JSON string to help you set up security controls for your users' iOS devices."},{id:"4E17Uuyri62Yejikd0h1i",slug:"/security-and-access-policies/docs/what-are-the-appconfig-settings-for-mdm/",updatedAt:"2024-10-31T18:09:55.232Z",title:"What are the AppConfig settings for my MDM?",description:"Learn how to configure security controls for your users' devices within your current MDM solution. "},{id:"NjYxjJVmBIW6fQUkzsmWk",slug:"/security-and-access-policies/docs/mdm-security-controls-and-supported-apps/",updatedAt:"2024-04-12T03:22:41.118Z",title:"MDM security controls and supported apps",description:"Understand which security controls are available for supported Atlassian cloud mobile apps (iOS and Android) and where to configure."}],description:"Learn how to configure security controls for your users who access Atlassian cloud mobile apps from iOS or Android devices."},{id:"6R4lUT1PfilbYAG87BKlgc",slug:"/security-and-access-policies/docs/what-happens-when-apps-access-third-party-websites/",updatedAt:"2025-05-02T01:58:01.802Z",title:"What happens when third-party apps access third-party websites?",description:"Ensure that you and your users are using secure third-party apps with your Atlassian cloud apps.",collectionId:"36uK61Ve3Wjt9zIDQyuZRi"}],pageType:"Documentation"},{id:"1Me44pAylrmCaznImaQ6vn",updatedAt:"2023-12-01T16:11:46.443Z",slug:"/security-and-access-policies/docs/classify-your-organizations-data/",title:"Classify your organization’s data",childList:[{id:"1S2IDaqrpJjLofxSurRj76",slug:"/security-and-access-policies/docs/what-is-data-classification/",updatedAt:"2025-05-08T04:19:54.853Z",title:"What is data classification?",description:"Learn about how your organization can benefit from classifying data.",collectionId:"1Me44pAylrmCaznImaQ6vn"},{id:"6c3Mbx50sjf4in52nVOQm5",slug:"/security-and-access-policies/docs/what-can-users-classify/",updatedAt:"2025-05-08T04:21:16.748Z",title:"What can users classify?",description:"Understand what users can classify in Atlassian apps.",collectionId:"1Me44pAylrmCaznImaQ6vn"},{id:"3YS01mwswZByQXQdfBSNyn",updatedAt:"2025-02-05T04:55:07.965Z",slug:"/security-and-access-policies/docs/manage-classification-levels/",title:"Manage classification levels",childList:[{id:"3GpeabSngvdOeIKM2tzg2H",slug:"/security-and-access-policies/docs/create-a-classification-level/",updatedAt:"2025-02-24T22:01:39.370Z",title:"Create a classification level",description:"Create a classification level and make it available to users."},{id:"2cUavC2e0wNzywrgZnbxob",slug:"/security-and-access-policies/docs/customize-a-classification-level/",updatedAt:"2025-02-24T22:00:42.239Z",title:"Customize a classification level",description:"Change classification level details like name, definition, and guidelines."},{id:"3CQoZqYRk6y5P3m6vH6Uzn",slug:"/security-and-access-policies/docs/publish-a-classification-level/",updatedAt:"2025-02-24T22:01:36.585Z",title:"Publish a classification level",description:"Make classification levels available for users to apply to data."},{id:"4NgIiRmYhvyNgaw9z3lAv3",slug:"/security-and-access-policies/docs/archive-a-classification-level/",updatedAt:"2025-03-12T03:11:20.104Z",title:"Archive a classification level",description:"Archive classification levels you don’t need."},{id:"5CqCOe59wMX5bjEVNcjHQ",slug:"/security-and-access-policies/docs/restore-a-classification-level/",updatedAt:"2025-02-24T22:01:29.360Z",title:"Restore a classification level",description:"Restore a classification level from the archive."}],description:"Learn how to create, publish, archive, and restore classification levels."},{id:"1P2SVB6KkdR6OAMvogPI0J",updatedAt:"2024-05-01T22:11:39.633Z",slug:"/security-and-access-policies/docs/understand-default-classification-levels/",title:"Understand default classification levels",childList:[{id:"6yrEyI0E7Dl0EmO7i2bDt0",slug:"/security-and-access-policies/docs/what-is-a-default-classification-level/",updatedAt:"2025-02-24T22:00:46.457Z",title:"What is a default classification level?",description:"Default classification levels can help you classify data quickly."},{id:"3ckVnYx5Ie4YSp0FHPH4pS",slug:"/security-and-access-policies/docs/set-a-default-classification-level/",updatedAt:"2025-02-24T22:01:39.651Z",title:"Set a default classification level",description:"Ensure your work in a chosen space or project is always classified."}],description:"Learn how to classify data quickly."}],pageType:"Documentation"},{id:"4OoNb831CU8uT6y3LdGHli",updatedAt:"2025-05-01T04:48:23.430Z",slug:"/security-and-access-policies/docs/control-how-users-outside-your-organization-access-products/",title:"Control how users outside your organization access apps",childList:[{id:"7wMjA7vJMs1lrKaBQALjgP",updatedAt:"2025-02-27T23:07:20.185Z",slug:"/security-and-access-policies/docs/understand-external-user-security/",title:"Understand external user security",childList:[{id:"ZL3JzgubvZ3Xq0ZCuxMXP",slug:"/security-and-access-policies/docs/who-are-external-users/",updatedAt:"2023-10-06T19:24:42.581Z",title:"Who are external users?",description:"Understand the definition of an external user and how to manage external user access to your Atlassian products.\n\n"},{id:"1pQTt5SEMABNDRATXTet5C",slug:"/security-and-access-policies/docs/what-is-external-user-security/",updatedAt:"2025-02-27T22:57:54.602Z",title:"What is external user security?",description:"Discover how external user security helps you protect data in your organization. "},{id:"3Hwhf2hfaNxGqCkOGCn3Hy",slug:"/security-and-access-policies/docs/what-is-an-external-user-security-policy/",updatedAt:"2025-02-27T22:57:18.901Z",title:"What is an external user security policy?",description:"Apply security settings for external users, make a policy non-billable, and test settings for your organization."},{id:"69HEFXN5WiUSq72OAZSt4y",slug:"/security-and-access-policies/docs/available-external-user-security-settings/",updatedAt:"2025-02-27T23:06:47.484Z",title:"Available external user security policy settings",description:"Discover the external user security settings that apply to all external users in your Atlassian organization. "},{id:"4Op0KUKdfiaK9BH3juGIK0",slug:"/security-and-access-policies/docs/what-is-api-token-access/",updatedAt:"2025-05-07T00:28:41.938Z",title:"What is API token access?",description:"Understand how to set and update API token access for external users in a policy."}],description:"Learn how to protect your organization's products. "},{id:"52XAYdd7ZAWgtMcaZwGYAg",updatedAt:"2025-02-27T23:14:51.445Z",slug:"/security-and-access-policies/docs/edit-external-user-settings/",title:"Edit external user security settings",childList:[{id:"18auoxsJ4wxr6wwxpv1R92",slug:"/security-and-access-policies/docs/make-external-user-policy-non-billable/",updatedAt:"2025-02-27T23:10:01.879Z",title:"Make external user policy non-billable",description:"Apply one-time password to external users with a non-billable policy. "},{id:"7fY3JhOvFvbaYHCR1yJaYB",slug:"/security-and-access-policies/docs/set-api-token-access/",updatedAt:"2025-02-27T23:11:22.876Z",title:"Block user API token access",description:"Block or allow API token access to product data in your organization."},{id:"5zHDU6RrK1VQAGeo3VTms2",slug:"/security-and-access-policies/docs/add-test-policy/",updatedAt:"2025-02-27T23:11:37.268Z",title:"Add test policy",description:"Test external user security with a test policy"},{id:"1yI7AgY2JIy5yvNbHkwKwz",slug:"/security-and-access-policies/docs/export-external-users/",updatedAt:"2025-02-27T23:11:54.798Z",title:"Export external users",description:"You can export a list of all the external users in an organization to a CSV file."},{id:"3LTNBEKjd9XzAU7yKuQCdb",slug:"/security-and-access-policies/docs/reset-sessions-for-external-users/",updatedAt:"2025-02-27T23:12:14.442Z",title:"Reset sessions for external users",description:"Reset web sessions when you want to log out external users."},{id:"54c6ZIHt3mvOZGlHXrtaH2",slug:"/security-and-access-policies/docs/apply-authorization-method/",updatedAt:"2025-02-27T23:18:11.367Z",title:"Apply authorization method ",description:"Apply authorization methods such as single sign-on and one time password to external users in the policy."},{id:"6Ne0bbmiz19zW5axZvdfmU",slug:"/security-and-access-policies/docs/update-verification-frequency/",updatedAt:"2025-02-27T23:14:08.521Z",title:"Update session expiration",description:"Choose how oftern external users need to verify their identity."},{id:"45oMzNRjfy7lgMrgKj7FTW",slug:"/security-and-access-policies/docs/edit-external-user-policy/",updatedAt:"2025-02-27T23:14:35.715Z",title:"Edit external user policy ",description:"Update security setting to edit an external security policy."}],description:"Learn how to edit your external user security settings."}],pageType:"Documentation"},{id:"4yUMobKogCA4UUvkZuwmGt",updatedAt:"2025-05-08T06:24:46.756Z",slug:"/security-and-access-policies/docs/detect-investigate-and-respond-to-threats/",title:"Detect, investigate, and respond to threats",childList:[{id:"3n8lrixNB0xpu3VkK8joZF",slug:"/security-and-access-policies/docs/what-is-guard-detect/",updatedAt:"2025-02-24T22:01:39.786Z",title:"What is Guard Detect?",description:"Learn how your organization can identify, detect, and respond to threats.",collectionId:"4yUMobKogCA4UUvkZuwmGt"},{id:"5W94dnOZOBGz1p3Wv8SCET",slug:"/security-and-access-policies/docs/add-guard-detect-to-your-organization/",updatedAt:"2025-02-24T22:01:41.248Z",title:"Add Guard Detect to your organization",description:"How to set up Guard Detect for your organization.",collectionId:"4yUMobKogCA4UUvkZuwmGt"},{id:"5HDHpEVwAywnyEpj3avy8W",slug:"/security-and-access-policies/docs/add-people-to-guard-detect/",updatedAt:"2025-02-24T22:01:41.562Z",title:"Add people to Guard Detect",description:"Grant your security team access without giving them the organization admin roles.",collectionId:"4yUMobKogCA4UUvkZuwmGt"},{id:"7Gow6wfxiQmpLUvQgObyvn",updatedAt:"2024-10-09T06:01:50.037Z",slug:"/security-and-access-policies/docs/manage-detections/",title:"Manage detections",childList:[{id:"3gweR4usrGwG4gsGDRLqVq",slug:"/security-and-access-policies/docs/what-events-are-detected/",updatedAt:"2025-02-24T22:02:06.712Z",title:"What user activity is detected?",description:"Learn how we monitor user activity and scan content to detect threats to your organization."},{id:"76PfD6v23oHOvtB7n8vLnV",slug:"/security-and-access-policies/docs/what-sensitive-data-is-detected/",updatedAt:"2025-02-24T22:01:41.145Z",title:"What sensitive data is detected?",description:"How we detect potentially sensitive content in Confluence and Jira. "},{id:"OyKDmobdXSVZ8nJQq40JN",slug:"/security-and-access-policies/docs/exclude-a-page-from-detection/",updatedAt:"2025-02-24T22:02:11.938Z",title:"Exclude a page from a detection",description:"Don’t send content scanning alerts for particular pages."},{id:"5uCvDhohchSlKnwH738p3h",slug:"/security-and-access-policies/docs/exclude-a-user-from-a-detection/",updatedAt:"2025-02-24T22:01:37.933Z",title:"Exclude a user from a detection",description:"Don’t send user activity alerts for particular users."},{id:"5V2qXhf9v9aemepmg0AKyy",slug:"/security-and-access-policies/docs/create-a-custom-detection/",updatedAt:"2025-02-24T22:01:28.066Z",title:"Create a custom detection",description:"Get alerts when someone updates a page containing terms or phrases sensitive to your organization"},{id:"17FZq6sB5ZkPCmOTnqCGj9",slug:"/security-and-access-policies/docs/request-a-new-system-detection/",updatedAt:"2025-02-24T22:00:43.826Z",title:"Request a new system detection",description:"We’re building new detection rules all the time. Tell us what your organization needs."}],description:"Learn how threats are detected and how you can customize detection rules to suit your organization. "},{id:"5e5zyMku0eabXoKYIiEGgw",updatedAt:"2024-10-09T06:02:30.594Z",slug:"/security-and-access-policies/docs/manage-alerts/",title:"Manage alerts",childList:[{id:"7ea8Nm5LvXXfe37a1IQqNR",slug:"/security-and-access-policies/docs/view-an-alert/",updatedAt:"2025-02-24T22:02:10.760Z",title:"View an alert",description:"View, search, and filter alerts, and discover the details contained in an alert. "},{id:"2ODiLS4ZAmpUXEhB8Y0twU",slug:"/security-and-access-policies/docs/get-more-or-fewer-alerts/",updatedAt:"2025-02-24T22:00:47.443Z",title:"Get more or fewer alerts",description:"Change the detection threshold so you get more or fewer alerts. Useful if you get a lot of false positives."},{id:"kW1DalsYBRJqkl5jfeVTN",slug:"/security-and-access-policies/docs/track-the-status-of-an-alert/",updatedAt:"2025-02-24T22:01:39.249Z",title:"Track the status of an alert",description:"Let your team know the status of an alert or track your investigation in Jira."}],description:"Learn how to view alert details and track the status of alerts."},{id:"2Cwi8xfua41ebORdVTnAnH",updatedAt:"2024-10-16T06:22:28.453Z",slug:"/security-and-access-policies/docs/send-alerts-to-your-own-tools/",title:"Send alerts to your own tools",childList:[{id:"6M0qu7wY9TT8fF6fdqSTW6",slug:"/security-and-access-policies/docs/send-alerts-to-slack/",updatedAt:"2025-02-24T22:02:09.551Z",title:"Send alerts to Slack",description:"Send alerts to Slack so your team can react quickly."},{id:"X1vxkzXQ6MDlg3gEOqZ9n",slug:"/security-and-access-policies/docs/send-alerts-to-microsoft-teams/",updatedAt:"2025-03-12T02:39:01.647Z",title:"Send alerts to Microsoft Teams",description:"Send alerts to Microsoft Teams so your team can react quickly."},{id:"28GoGyYKAH1YuNSfxoa0dQ",slug:"/security-and-access-policies/docs/send-alerts-to-a-siem-slack-or-other-tools/",updatedAt:"2025-02-24T22:01:35.656Z",title:"Send alerts to a SIEM or other tool",description:"Send alerts to your team’s security information and event management (SIEM) tool."},{id:"7voq4pK2KG2YO6xhexEnIu",slug:"/security-and-access-policies/docs/send-alerts-to-jira/",updatedAt:"2025-02-24T22:01:28.135Z",title:"Send alerts to Jira",description:"Send alerts to Jira or Jira Service Management for action by your team."},{id:"3VHpLI9KQAzGJGIiLL5fhh",slug:"/security-and-access-policies/docs/send-alerts-to-opsgenie/",updatedAt:"2025-02-24T22:00:52.636Z",title:"Send alerts to Opsgenie",description:"Send alerts to Opsgenie for incident management and on-call rosters."},{id:"5k31xwAtPBMGKOmID02VOP",slug:"/security-and-access-policies/docs/send-alerts-to-splunk/",updatedAt:"2025-02-24T22:01:35.868Z",title:"Send alerts to Splunk",description:"Configure the Splunk app to send alerts directly to Splunk."}],description:"Make alerts available where your team works. Learn how to integrate with many popular tools."},{id:"1Y3X9YfO8toDrUGXwLC4fp",slug:"/security-and-access-policies/docs/investigate-and-remediate-an-alert/",updatedAt:"2025-02-24T23:00:18.827Z",title:"Investigate and remediate an alert",description:"Learn about the stages an investigation goes through from detection to remediation. ",collectionId:"4yUMobKogCA4UUvkZuwmGt"},{id:"32NZfhODoNCTx4qIeerDAa",updatedAt:"2024-11-15T04:04:17.712Z",slug:"/security-and-access-policies/docs/respond-to-alerts/",title:"Respond to alerts",childList:[{id:"3L1n6YXqr7jB3cRnr8Jybo",slug:"/security-and-access-policies/docs/create-an-automation-rule/",updatedAt:"2025-04-17T01:43:50.395Z",title:"Create an automation rule",description:"Create a Confluence or Jira automation rule from an alert or using a template. "},{id:"3oWqPCfAz5DGpfMJeeomBr",slug:"/security-and-access-policies/docs/how-does-automation-work-with-guard-detect/",updatedAt:"2025-04-21T23:03:34.338Z",title:"How does automation work with Guard Detect?",description:"Learn how you can use Confluence and Jira automation to streamline your workflow when sensitive data is detected. "},{id:"6eZNmiy9bBN7hkZTiR5vCc",slug:"/security-and-access-policies/docs/redact-sensitive-data-from-confluence/",updatedAt:"2025-03-25T03:37:29.339Z",title:"Redact sensitive data from Confluence",description:"Learn how to redact sensitive data detected in Confluence pages. "},{id:"45FT4JAO7maqbqQwgxY1h1",slug:"/security-and-access-policies/docs/redact-sensitive-data-from-jira/",updatedAt:"2025-04-08T05:27:03.886Z",title:"Redact sensitive data from Jira",description:"Learn how to redact sensitive data detected in Jira work items. "},{id:"4gZyXt4y65c8hBvJPnIK9A",slug:"/security-and-access-policies/docs/what-happens-when-data-is-redacted/",updatedAt:"2025-04-08T05:27:15.508Z",title:"What happens when data is redacted?",description:"Understand what happens when you redact sensitive data from a Guard Detect alert."}],description:"Learn about the tools available to your team when responding to alerts, including automation and redaction."},{id:"7e8NCJZqr1aTqUaBVOhUx2",slug:"/security-and-access-policies/docs/guard-detect-faq/",updatedAt:"2025-02-24T23:00:17.851Z",title:"Guard Detect frequently asked questions",description:"Get answers to all your questions including API support, data residency, and BYOK. ",collectionId:"4yUMobKogCA4UUvkZuwmGt"}],pageType:"Documentation"},{id:"4NQlta2s3tz2PbNmijvfdw",updatedAt:"2024-11-01T02:51:15.946Z",slug:"/security-and-access-policies/docs/manage-bring-your-own-key-encryption/",title:"Manage bring your own key encryption",childList:[{id:"5HbeZD7gbn4PizMoFkHZNr",slug:"/security-and-access-policies/docs/what-is-byok-encryption-for-atlassian-products/",updatedAt:"2025-05-07T06:04:45.103Z",title:"What is BYOK encryption?",description:"Learn what BYOK encryption is, as well as the benefits and who's eligible to use it. ",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"6bV29PCETCMqVGTA9IJVLU",slug:"/security-and-access-policies/docs/set-up-an-aws-account-and-create-iam-roles/",updatedAt:"2025-05-08T03:08:02.103Z",title:"Set up an AWS account and create an IAM role",description:"Learn what you need to set up in AWS before using BYOK encryption.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"19YASp5noFeTXqkCfJEauc",slug:"/security-and-access-policies/docs/set-up-byok-encryption/",updatedAt:"2025-05-08T03:12:35.030Z",title:"Set up BYOK encryption",description:"Read what you need to provide us so we can create the BYOK encryption for you.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"56Z36dd6Dlb4CR7MZSceel",slug:"/security-and-access-policies/docs/data-managed-with-byok-encryption/",updatedAt:"2025-04-24T22:04:53.239Z",title:"Data managed with BYOK encryption",description:"Learn what product data types are encrypted with keys hosted in your AWS account.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"337ZGZSKMTuQgrliAbcWtP",slug:"/security-and-access-policies/docs/revoke-your-byok-encryption-keys/",updatedAt:"2025-05-08T03:14:49.915Z",title:"Revoke access to your BYOK encryption keys",description:"See the steps you need to take to revoke access to your encryption keys.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"3hMZdLiwDo444nECMGMu9U",slug:"/security-and-access-policies/docs/restore-your-byok-encryption-keys/",updatedAt:"2025-05-08T03:16:06.419Z",title:"Restore access to your BYOK encryption keys",description:"See the steps you need to take to restore access to your encryption keys after revocation.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"4KQmsCHMS25OXJENQu36ke",slug:"/security-and-access-policies/docs/request-byok-re-encryption/",updatedAt:"2025-05-08T03:18:00.719Z",title:"Request BYOK re-encryption",description:"See the steps you need to take to re-encrypt data on your existing BYOK-encrypted apps.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"3Xkh9Off8wTn7H3hX3JmJK",slug:"/security-and-access-policies/docs/byok-limitations/",updatedAt:"2025-05-08T03:20:33.059Z",title:"BYOK encryption limitations",description:"Find out the limitations for BYOK encryption.",collectionId:"4NQlta2s3tz2PbNmijvfdw"},{id:"2ZOuMZ27wtNkAEm6vZtqwz",slug:"/security-and-access-policies/docs/byok-frequently-asked-questions/",updatedAt:"2025-04-24T22:07:51.386Z",title:"BYOK frequently asked questions",description:"Find answers to common questions regarding BYOK encryption.",collectionId:"4NQlta2s3tz2PbNmijvfdw"}],pageType:"Documentation"},{id:"5hzCVAb3Cz5z7vNbudCQT9",updatedAt:"2025-05-08T03:24:09.894Z",slug:"/security-and-access-policies/docs/monitor-and-audit-activity-in-your-organization/",title:"Monitor and audit activity in your organization",childList:[{id:"4Mu8rM0uufqjWEp3RM1vT",slug:"/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/",updatedAt:"2025-05-07T05:38:07.621Z",title:"What activities does the audit log include?",description:"Track app and user activity in your organization.",collectionId:"5hzCVAb3Cz5z7vNbudCQT9"},{id:"5oX4aGlAZpTN59EichscTG",slug:"/security-and-access-policies/docs/view-audit-log-activities/",updatedAt:"2025-04-11T05:54:48.333Z",title:"View audit log activities",description:"View audit log activities and detailed side panel",collectionId:"5hzCVAb3Cz5z7vNbudCQT9"},{id:"3c7ZoSOaezdEqmy2xKSz31",slug:"/security-and-access-policies/docs/export-audit-logs/",updatedAt:"2025-05-07T05:42:07.768Z",title:"Export audit log",description:"Export audit logs",collectionId:"5hzCVAb3Cz5z7vNbudCQT9"},{id:"64Yot9AFBCXCmDlLN87ciF",slug:"/security-and-access-policies/docs/learn-more-about-audit-log-webhooks/",updatedAt:"2025-04-03T02:53:40.409Z",title:"Send audit log activities to another tool using a webhook",description:"Send audit log activities to another tool using a webhook",collectionId:"5hzCVAb3Cz5z7vNbudCQT9"},{id:"R5anBa1FK72ORYnCio8hx",slug:"/security-and-access-policies/docs/audit-log-activities-database/",updatedAt:"2025-03-28T02:44:53.836Z",title:"Audit log activities database",description:"Audit log activities database",collectionId:"5hzCVAb3Cz5z7vNbudCQT9"}],pageType:"Documentation"},{id:"6vHTd8qr6GIfKc9xSpDqct",updatedAt:"2023-12-05T03:44:09.177Z",slug:"/security-and-access-policies/docs/secure-your-organizations-data/",title:"Secure your organization's data",childList:[{id:"2gnnez8NJAsZBgoAin8mJq",slug:"/security-and-access-policies/docs/what-is-a-data-security-policy/",updatedAt:"2025-02-24T22:00:52.797Z",title:"What is a data security policy?",description:"Learn about how a data security policy works.",collectionId:"6vHTd8qr6GIfKc9xSpDqct"},{id:"5XKyclODQbYTekJ9AvtpJJ",slug:"/security-and-access-policies/docs/create-a-data-security-policy/",updatedAt:"2025-04-04T02:40:46.107Z",title:"Create a data security policy",description:"Learn about how to create a data security policy.",collectionId:"6vHTd8qr6GIfKc9xSpDqct"},{id:"1sIoBJwEdrFsAa6qukuT6N",slug:"/security-and-access-policies/docs/edit-a-data-security-policy/",updatedAt:"2025-03-16T16:00:03.422Z",title:"Edit a data security policy",description:"Learn about how to edit a data security policy.",collectionId:"6vHTd8qr6GIfKc9xSpDqct"},{id:"68rDTG3014KYtGenjAfVM6",slug:"/security-and-access-policies/docs/deactivate-or-delete-a-data-security-policy/",updatedAt:"2025-02-24T22:01:34.134Z",title:"Deactivate or delete a data security policy",description:"Learn about the difference between deactivating and deleting a data security policy.",collectionId:"6vHTd8qr6GIfKc9xSpDqct"},{id:"1qkQyy0fvOMpFZxaCgM19Q",updatedAt:"2025-02-14T06:41:32.100Z",slug:"/security-and-access-policies/docs/manage-data-security-policy-rules/",title:"Manage data security policy rules",childList:[{id:"Z3G8Dz8dOeyRSNnPkXAku",slug:"/security-and-access-policies/docs/prevent-data-export/",updatedAt:"2025-04-28T23:30:12.336Z",title:"Prevent data export",description:"Learn about how to prevent data from being exported from your products."},{id:"6V53nBswp6VBP1Alwjng0d",slug:"/security-and-access-policies/docs/prevent-public-links/",updatedAt:"2025-02-24T22:01:30.059Z",title:"Prevent public links",description:"Learn how to prevent people using public links in Confluence"},{id:"75bsHnwNrGAZMk9FITRnnb",slug:"/security-and-access-policies/docs/prevent-anonymous-access/",updatedAt:"2025-02-24T22:02:10.247Z",title:"Prevent anonymous access",description:"Learn how to prevent people who are not logged in from from viewing issues covered by a data security policy."},{id:"32AWcu778IGwIPsq0bKagO",slug:"/security-and-access-policies/docs/block-app-access/",updatedAt:"2025-02-24T22:01:36.847Z",title:"Block app access",description:"Learn how to block apps from accessing data within your organization."},{id:"1eqgNG6VYOB7TUMl6NO4PS",slug:"/security-and-access-policies/docs/app-access-rule-coverage-summary/",updatedAt:"2025-02-24T22:01:41.741Z",title:"App access rule coverage summary",description:"This page describes, in general terms, the types of data that are blocked or not blocked by the rule."},{id:"5Y9ulRaeAzBLDjIXbmG50D",slug:"/security-and-access-policies/docs/apps-that-cannot-be-blocked-by-app-access-rules/",updatedAt:"2024-05-28T06:10:22.988Z",title:"Apps that cannot be blocked by app access rules",description:"This page lists the apps that cannot be blocked by app access rules. "},{id:"6ZWbN856G3NkwF6oUfh8m",slug:"/security-and-access-policies/docs/app-access-rule-coverage-summary-for-confluence-cloud/",updatedAt:"2024-04-02T07:39:22.649Z",title:"App access rule coverage summary for Confluence Cloud",description:"This page describes, in general terms, the types of Confluence Cloud data that are blocked or not blocked by the rule."},{id:"526ap5p2Xy2G2JnpwOtiD3",slug:"/security-and-access-policies/docs/app-access-rule-coverage-summary-for-jira-cloud/",updatedAt:"2024-05-02T05:54:50.055Z",title:"App access rule coverage summary for Jira Cloud",description:"This page describes, in general terms, the types of Jira Cloud, Jira Service Management, and Jira Software data that are blocked or not blocked by the rule."}],description:"Learn about what data security policy rules are available to configure."}],pageType:"Documentation"}],featuredEntries:[]}
Atlassian 'products’ are now ‘apps’. You may see both terms used across our documentation as we roll out this terminology change. Here’s why we’re making this change
What is BYOK encryption?
Who can do this? Role:Organization admin Atlassian Cloud:Jira, Confluence, and Jira Service Management customers with Enterprise plan Atlassian Government Cloud:Not available
Bring Your Own Key (BYOK) encryption lets you encrypt app data for Jira, Confluence, or Jira Service Management with keys hosted in your external AWS account. Data managed with encryption
Benefits of BYOK encryption
BYOK encryption gives you:
Added security for sensitive data. By hosting your own encryption keys, you manage and control the keys at all times.
Increased control over access to data. Revoking access to the keys suspends access to all your apps. With the ability to revoke access to encryption keys at any time, you can reduce risk of unauthorized access.
Visibility into account activity across your AWS infrastructure. Record activity and access audit logs using AWS CloudTrail.
BYOK encryption vs Atlassian-managed encryption
If you don’t use BYOK encryption, your data is encrypted using Atlassian-managed keys.
BYOK encryption
The keys are provisioned and managed in the customers’ own AWS accounts.
Atlassian-managed encryption
Atlassian generates keys in an Atlassian-owned AWS account, and the keys are shared among customers.
Next, contact your Enterprise account representative and provide us with information such as your AWS account ID, where you want to host your app data, and the apps you want to encrypt using BYOK. We’ll set up BYOK encryption for you and add BYOK-encrypted apps to your Enterprise plan. Learn how to set up BYOK encryption