Skip to main content

Security Incident Reporting Process

1. Purpose

This document outlines the process for identifying, reporting, and responding to security incidents related to our Confluence Cloud apps. The goal is to ensure a rapid and effective response to mitigate risks and protect customer data.

2. Scope

This process applies to all employees, contractors, and third parties who develop, maintain, or support our Confluence Cloud apps.

3. Definitions

  • Security Incident: Any event that may compromise the confidentiality, integrity, or availability of our applications, data, or infrastructure.

  • Incident Response Team (IRT): A designated group responsible for managing security incidents including the Development Team Lead, Product Owner and QA Team.

4. Incident Identification

Security incidents may be identified through various sources, including but not limited to:

  • Internal monitoring and security alerts

  • Customer reports

  • Bug bounty programs

  • Atlassian Marketplace or Atlassian Security team notifications

  • External security researchers

5. Incident Reporting

5.1 Immediate Actions

When an incident is identified, the following steps should be taken immediately:

  • Do not attempt to fix the issue without proper authorization.

  • Collect relevant details, including:

    • Description of the issue

    • Date and time of detection

    • Affected systems or applications

    • Any logs, screenshots, or evidence

5.2 Reporting Channels

Security incidents must be reported immediately to the Incident Response Team (IRT) through one of the following channels:

6. Incident Assessment & Classification

The IRT will assess and classify the incident based on its severity and impact:

  • Low: Minor security issue with no direct impact on customers.

  • Medium: A potential risk with limited impact.

  • High: A confirmed vulnerability with customer data exposure risk.

  • Critical: Active exploitation or severe data breach.

7. Incident Response & Mitigation

Based on classification, the IRT will take the following steps:

  • Low/Medium Severity:

    • Log the issue and track it through resolution.

    • Apply patches or updates as necessary.

  • High/Critical Severity:

    • Immediately contain the issue.

    • Notify affected customers if applicable.

    • Work with Atlassian security teams if necessary.

    • Deploy fixes and monitor for further threats.

    • Create RCA document and add to public knowledge base

8. Communication & Notification

If the incident affects customers, the company will:

  • Notify impacted users within 24 hours of confirmation.

  • Provide mitigation steps or temporary workarounds.

  • Issue a post-mortem report with root cause analysis and future prevention measures.

9. Post-Incident Review

After resolution, the IRT will conduct a post-mortem analysis to:

  • Identify root causes and lessons learned.

  • Improve security measures.

  • Update internal documentation and policies as necessary.

10. Continuous Improvement

To prevent future incidents, the company will:

  • Conduct regular security audits.

  • Implement security training for developers and employees.

  • Encourage responsible disclosure through the bug bounty program.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.