Jira Cloud Hardening Guide
Issue tracking platform hardening for Atlassian Jira Cloud including SAML SSO, organization security, and access controls
Overview
Atlassian Jira is a leading issue tracking and project management platform used by millions of users for software development, IT service management, and business operations. As a repository for project data and development workflows, Jira security configurations directly impact operational security and compliance.
Intended Audience
- Security engineers managing Atlassian products
- IT administrators configuring Jira Cloud
- GRC professionals assessing collaboration security
- Organization administrators managing access controls
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers Atlassian Jira Cloud security including SAML SSO, organization policies, user provisioning, and access controls via Atlassian Administration.
Table of Contents
- Authentication & SSO
- Organization Security
- Access Controls
- Monitoring & Compliance
- Compliance Quick Reference
1. Authentication & SSO
1.1 Configure SAML Single Sign-On
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3, 12.5 |
| NIST 800-53 | IA-2, IA-8 |
Description
Configure SAML SSO to centralize authentication for Jira Cloud users.
Prerequisites
- Atlassian organization with verified domain
- Atlassian Guard Standard subscription
- Organization admin access
- SAML 2.0 compatible IdP
ClickOps Implementation
Step 1: Verify Domain
- Navigate to: admin.atlassian.com
- Select your organization
- Add and verify your domain
- Domain verification required before SSO setup
Step 2: Configure Identity Provider
- Navigate to: Security → Identity Providers
- Select your IdP (Okta, Azure, etc.)
- Select your Directory
Step 3: Configure SAML SSO
- Under Authenticate users, select Set up SAML single sign-on
- Configure IdP with Atlassian metadata
- Upload IdP metadata to Atlassian
Step 4: Test and Enable
- Test SSO on smaller group first
- Verify authentication works
- Roll out across organization
Time to Complete: ~2 hours
1.2 Configure Authentication Policies
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.3 |
| NIST 800-53 | IA-2 |
Description
Create authentication policies to enforce SSO.
ClickOps Implementation
Step 1: Access Authentication Policies
- Navigate to: Security → User security → Authentication policies
- Review existing policies
Step 2: Create SSO Policy
- Create policy for SSO enforcement
- Apply to managed users from verified domains
- Configure policy settings
Step 3: Configure Admin Fallback
- Set up different policy for admin accounts
- Allows troubleshooting SSO issues
- Use separate admin accounts for recovery
1.3 Configure Two-Step Verification
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require two-step verification for all users.
ClickOps Implementation
Step 1: Configure via Organization
- Navigate to: Security → Authentication policies
- Enable two-step verification requirement
Step 2: Configure via IdP
- Enable MFA in your identity provider
- All SSO users subject to IdP MFA
- Use phishing-resistant methods for admins
Step 3: Test Configuration
- Test on smaller group first
- Verify before organization-wide rollout
- Document exceptions
1.4 Configure SAML JIT Provisioning
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Enable Just-In-Time provisioning for automatic account creation.
ClickOps Implementation
Step 1: Enable JIT Provisioning
- Configure in SAML settings
- Users provisioned on first SSO login
- Accounts created automatically
Step 2: Configure Attribute Mapping
- Map IdP attributes to Atlassian fields
- Configure group membership
- Test provisioning flow
2. Organization Security
2.1 Configure Atlassian Guard
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 4.1 |
| NIST 800-53 | CM-6 |
Description
Enable Atlassian Guard for enhanced security features.
ClickOps Implementation
Step 1: Subscribe to Atlassian Guard
- Navigate to: admin.atlassian.com
- Subscribe to Atlassian Guard Standard
- Enables SSO and advanced security
Step 2: Configure Guard Features
- Enable security policies
- Configure audit logging
- Enable data security features
2.2 Configure Domain Verification
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.3 |
| NIST 800-53 | AC-2 |
Description
Verify domains to claim and manage user accounts.
ClickOps Implementation
Step 1: Add Domain
- Navigate to: Directory → Domains
- Add your organization’s domain
- Complete DNS verification
Step 2: Claim Accounts
- Claim existing accounts using your domain
- Migrate to organization management
- Consolidate shadow accounts
2.3 Configure Organization Admin Roles
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Manage organization administrator access.
ClickOps Implementation
Step 1: Review Organization Admins
- Navigate to: admin.atlassian.com
- Review organization administrators
- Document all admins
Step 2: Apply Least Privilege
- Limit org admins to 2-3 users
- Use product admins for product-specific management
- Remove unnecessary admin access
3. Access Controls
3.1 Configure Project Permissions
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Configure project-level permissions for least privilege.
ClickOps Implementation
Step 1: Review Permission Schemes
- Navigate to: Jira Settings → System → Permission Schemes
- Review default and custom schemes
- Audit project assignments
Step 2: Configure Least Privilege
- Assign minimum necessary permissions
- Use groups for permission assignment
- Regular access reviews
3.2 Configure External User Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.3 |
| NIST 800-53 | AC-3 |
Description
Control access for external users and guests.
ClickOps Implementation
Step 1: Configure Guest Access
- Review external user access
- Configure appropriate permissions
- Limit capabilities
Step 2: Configure JSM Portal Access (if applicable)
- Configure portal-only customer SSO
- Enforce authentication for external customers
- Use separate IdP if needed
3.3 Configure App Access
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 3.11 |
| NIST 800-53 | SC-12 |
Description
Control third-party app access and permissions.
ClickOps Implementation
Step 1: Review Installed Apps
- Navigate to: Apps → Manage apps
- Review all installed apps
- Remove unnecessary apps
Step 2: Configure App Permissions
- Review app scopes
- Limit app access to necessary data
- Audit regularly
4. Monitoring & Compliance
4.1 Configure Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs (requires Atlassian Guard).
ClickOps Implementation
Step 1: Access Audit Logs
- Navigate to: admin.atlassian.com → Security → Audit log
- Review logged events
- Export for analysis
Step 2: Monitor Key Events
- User provisioning/deprovisioning
- Permission changes
- Admin actions
- SSO configuration changes
4.2 Configure Security Alerts
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 8.11 |
| NIST 800-53 | SI-4 |
Description
Configure alerts for security events.
ClickOps Implementation
Step 1: Configure Notifications
- Set up alerts for critical events
- Notify security team
- Integrate with SIEM if available
Step 2: Regular Reviews
- Weekly security review
- Address findings promptly
- Document security posture
5. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | Jira Cloud Control | Guide Section |
|---|---|---|
| CC6.1 | SSO/2SV | 1.1 |
| CC6.2 | Admin roles | 2.3 |
| CC6.6 | Authentication policies | 1.2 |
| CC7.2 | Audit logging | 4.1 |
NIST 800-53 Rev 5 Mapping
| Control | Jira Cloud Control | Guide Section |
|---|---|---|
| IA-2 | SSO | 1.1 |
| IA-2(1) | 2SV | 1.3 |
| AC-2 | JIT provisioning | 1.4 |
| AC-6 | Permissions | 3.1 |
| AU-2 | Audit logging | 4.1 |
Appendix A: Plan Compatibility
| Feature | Free | Standard | Premium | Enterprise |
|---|---|---|---|---|
| SAML SSO | ❌ | ❌ | Requires Guard | ✅ |
| SCIM | ❌ | ❌ | Requires Guard | ✅ |
| Audit Logs | ❌ | ❌ | Requires Guard | ✅ |
| Domain Verification | ❌ | ❌ | ✅ | ✅ |
Note: Advanced security features require Atlassian Guard subscription.
Appendix B: References
Official Atlassian Documentation:
- Atlassian Trust Center
- Jira Software Cloud Support
- How to Keep Your Organization Secure
- Security Best Practices for Jira
- Understand Atlassian Guard
- Configure SAML SSO
- Manage API Tokens
- Atlassian Security Advisories
API & Developer Resources:
Compliance Frameworks:
- SOC 2 Type II, ISO 27001, ISO 27018 – via Atlassian Compliance Resource Center
Security Incidents:
- CVE-2023-22523 (CVSS 9.8): Remote code execution in Assets Discovery for Jira Service Management (2023).
- Credential-stuffing campaigns (2024): Multiple organizations experienced Jira account takeovers via compromised credentials, with attackers using integrated tools to scrape data. Six public breaches were reported in five months across various Jira customers.
- Atlassian publishes security advisories at atlassian.com/trust/security/advisories.
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with SSO, organization security, and access controls | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide