Atlassian Zero Trust Guide
Atlassian Zero Trust Guide
Trust Security
Why It Matters and Where to Start
Table of Contents
3 Introduction
7 Device Authentication
10 Access Management
The corporate technology space has changed dramatically since the days
of castle-and-moat. That change brought the need for a new approach
to workplace security. Enter Zero Trust - the new security model industry
experts have turned to that addresses the growing security challenges in
the modern workplace.
In this paper, we will review the current state of workplace security, the
basic principles of the Zero Trust security model, and how you can begin
your journey towards a Zero Trust-secure workplace environment.
Not only are there more apps available that need to be protected, but
there are also ever-increasing ways to access these applications from
mobile and personal devices. In a traditional, on-premise environment,
most users would only access their work applications at the office, and
if they happened to work from home, they would access their work
applications using a VPN. The growing adoption of mobile devices, remote
work, and BYOD (bring your own device) in the workforce has complicated
the barrier between work data and personal data. The increasing
relevance of external devices has expanded the necessary security
perimeter outwards, making governance and perimeter security much
more difficult.
In order to track and manage all users across your systems, user identity
must be centralized in a user and group directory. Ideally this database
system integrates with your HR processes that manage job categorization,
usernames, and group memberships for all users. As employees join the
company, change roles or responsibilities, or leave the company, these
databases should update automatically to reflect those changes.
The user and group database acts as the single source of truth to validate
all users that need to access your systems. A single sign-on (SSO) system,
or centralized user authentication portal, can validate primary and
secondary credentials for users requesting access to any given resource or
application. After validating against the user and group directory, the SSO
system generates a time-sensitive token to authorize access to specific
resources.
OPEN All platforms Must comply with Service does not store
acceptable use policies or grant access to any
personal identifiable
information (PII), user
generated content (UGC),
or IP.
LOW SECURITY Personal mobile ·· Management agent Apps in this tier can:
(MDM) must be installed ·· Store or grant access
·· Password-protected to staff PI
screenlock ·· Be used for basic
·· Operating system must collaboration (chat,
be up-to-date, no end- email, Intranet)
of-life or out-of-date ·· Act as repositories for
versions unstructured corporate
·· Local drive encryption data (Dropbox, Google
·· Malware protection Drive)
·· Device is not rooted/
jailbroken Apps in low tier can
do these but where
Personal laptops ·· Enrolled in management possible should be
and desktops platform allocated to High:
·· Password-protected
·· Store financial, legal,
screenlock
or security information
·· Operating system must
·· Store information
be up-to-date, no end-
related to product
of-life or out-of-date
development
versions
·· Store information
·· Local drive encryption
related to product/
·· Malware protection
corporate
development
Apps in this tier cannot:
·· Store or grant access
to user generated
content (UGC)
·· Acquire, store or
process credit card
and/or payment
information
·· Have privileged or
administrative access
to Atlassian customer
facing systems
HIGH SECURITY Mobile Bring your own device Applications in this tier
(BYOD) is not permitted in can:
the high security tier ·· Store or grant access to
user generated content
Corportate ·· Enrolled in management ·· Acquire, store or process
laptops and platform credit card and/or
desktops ·· Atlassian owned & payment information
managed asset ·· Have privileged or
·· Approved contractor administrative access
devices to Atlassian customer
·· Password-protected facing systems
screenlock
·· Operating system must be
up-to-date, no end-of-life
or out-of-date versions
·· Local drive encryption
·· Malware protection
·· Adherence to password
policy
·· Ability to do forensics on
the device in the case of
security incidents
Building on this foundation, you can begin device health checks using
authentication and tracking tools such as mobile device management
(MDM), SSO platforms, and multi-factor providers like Duo. These providers
enable you to gain visibility into devices being used to access corporate
applications, whether or not the device is corporate-managed. From
there, you can continuously inspect all devices used to access corporate
applications and resources, to determine their security posture and
trustworthiness. If any devices are being used in a way that falls outside
of their service tier, you will be able to identify that device and work with
the employee to secure that endpoint.
Next Steps