Red Cup IT - Blog
  • 👋Welcome to Red Cup IT: Navigating the Modern Cybersecurity Landscape Together
  • ☄️Browser Security
    • Enhancing Security with the TalonWork Enterprise Browser and Okta for Sensitive Data Protection
      • How to Log into Office.com on Your Tesla and Check Azure Sign-In Logs for User Agent Version
    • Enhancing Web Security: The Case for Blocking JavaScript in the Omnibox
  • 👩‍💻IT & DevOps Security
    • Github
      • GitHub Cybersecurity Best Practices Checklist for Startups
      • Github Authentication with Passkeys
      • What is GitHub Domain Verification?
      • Essential GitHub Practices: Managing Member Privileges
    • Atlassian Jira
      • Understanding the New Atlassian Jira and Confluence External User Security Policy
    • Okta
      • Enhancing Authentication Security with Okta Identity Engine Factor Sequencing
  • 📨Domain Security
    • Importance of Secure SPF Records for Email Security
    • Strengthening Domain Registrar Security: Essential Strategies
    • Elevate Your Brand's Email Trust with BIMI and VMC: A Comprehensive Guide
    • The Critical Role of DNSSEC in Enhancing Business Domain Security
  • 🔐MSP Supply Chain Security
    • Leveraging Talon Browser's File Scanning Engine for Enhanced Security in MSP Environments
  • 🔎Real Time Threat Detection and Response
    • SentinelOne
      • SentinelOne and Okta Integration: Elevating Zero Trust Security in Okta
      • 🕵️‍♀️SentinelOne and Microsoft Entra ID Integration: Elevating Zero Trust Security in Azure AD
  • macOS Setup Guide for Software Engineers and Developers
    • Essential Tools and Software for macOS Developers
      • How to Install Homebrew on an Apple Silicon macOS Computer
      • Linking Visual Studio Code to GitHub on macOS: A Guide to Signed Commits
        • Choosing the Right GnuPG Key Type: A Guide to Secure Encryption
      • How to Enable Touch ID for sudo on macOS Sonoma (14.x) and Beyond
      • Enhance Your macOS Security with YubiKey as a PIV Card for Login and Terminal Access
Powered by GitBook
On this page

Was this helpful?

  1. IT & DevOps Security
  2. Atlassian Jira

Understanding the New Atlassian Jira and Confluence External User Security Policy

PreviousAtlassian JiraNextOkta

Last updated 1 year ago

Was this helpful?

Atlassian has recently released a new security feature that allows you, as an Atlassian Administrator, to perform the following:

  1. Require Two-factor authentication for external users via an email with a one-time passcode.

  2. Require external users to verify their identity with an extra step every seven (7) days.

  3. Block external users from making API calls to your organization's Atlassian products.

An Atlassian Access subscription is required for this feature to be available.

Our recommendations:

  1. Assess the impact of enabling this feature

  2. Download the list of external users to see who may potentially by this change

  3. Review and document the changes internally with your Change Approval Board

  4. Communicate with the potentially affected external users

  5. Enable the features as they will increase your organization's identity and data security.

Source:

👩‍💻
https://support.atlassian.com/security-and-access-policies/docs/understand-external-user-security/
Screenshot of the new "External Users" security policy