Atlassian Security Page Overview

security landing page
Key Takeaways

Hero CTA button for

Security white paper

Display of partners

Okta, Microsoft Azure, OneLogin

Compliance badges

SOC, CSA, FedRAMPS
Based on the page highlights.

Short Overview

When examined from top-down, Atlassian security page has a single CTA button in the hero section to channel concerned readers to the All Security Practices page. Then follows a section that is divided into three sub-headings with brief explanations about main security issues and how the company deals with them, such as Platform network security. Since it provides many cloud applications and services, Atlassian also gives quick links to dedicated security pages of each product. Furthermore, it showcases their trusted partners, compliances badges, top security measures.

Highlighted keywords: Cloud products, security, trust

Security Page Structure

Atlassian groups all security-related information pages like Security, Reliability, Compliance, and Privacy under Atlassian Trust Center while making navigation between those pages easier by using tabs for each.

Security Page link: atlassian.com/trust/security

Compliance Page: atlassian.com/trust/compliance

Page highlights

  • Hero call to action button for security whitepaper
  • Security highlights backed by Atlassian's measures including Disaster Recovery and Business Continuity programs and its security detections program
  • Quick links to each Atlassian product's dedicated security page
  • Display of its partners including Okta, Microsoft Azure, and OneLogin
  • Badges of compliance certifications, standards, and regulations like SOC, CSA, and FedRAMP
  • Links to its trust and security community and support page
  • Data security measures and best practices mentioning the bug bounty program and CSA partnership

Compliance Certifications

  • ISO/IEC 27001
  • SOC 2 - SOC 3
  • FedRAMP
  • PCI DSS
  • VPAT
  • GDPR
  • EBA
  • BaFin
  • ISO/IEC 27001:2013
  • Cloud Security Alliance
  • ACSC - Essential 8 Maturity Model
  • ACSC - Cloud Computing Security

Best practices checklist

This checklist is based on the Minimum Viable Secure Product and the information on the concerning platform’s security and compliance pages.

Note that some details might be missing if the information is mentioned in a whitepaper or login-required Trust Portal and not directly on the page.

check icon
Backup and disaster recovery
check icon
Self-assessment
check icon
External testing
check icon
Incident handling
check icon
Single sign-on
check icon
Backup and disaster recovery
By Resmo

Security increases customer trust and sales

Learn how top SaaS companies apply security communication best practices and compare vendors with a free PDF guide.

Pagerduty logo