v0.1.0-draft AI Drafted

Jira Cloud Hardening Guide

Productivity Last updated: 2025-02-05

Issue tracking platform hardening for Atlassian Jira Cloud including SAML SSO, organization security, and access controls

Overview

Atlassian Jira is a leading issue tracking and project management platform used by millions of users for software development, IT service management, and business operations. As a repository for project data and development workflows, Jira security configurations directly impact operational security and compliance.

Intended Audience

  • Security engineers managing Atlassian products
  • IT administrators configuring Jira Cloud
  • GRC professionals assessing collaboration security
  • Organization administrators managing access controls

How to Use This Guide

  • L1 (Baseline): Essential controls for all organizations
  • L2 (Hardened): Enhanced controls for security-sensitive environments
  • L3 (Maximum Security): Strictest controls for regulated industries

Scope

This guide covers Atlassian Jira Cloud security including SAML SSO, organization policies, user provisioning, and access controls via Atlassian Administration.


Table of Contents

  1. Authentication & SSO
  2. Organization Security
  3. Access Controls
  4. Monitoring & Compliance
  5. Compliance Quick Reference

1. Authentication & SSO

1.1 Configure SAML Single Sign-On

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.3, 12.5
NIST 800-53 IA-2, IA-8

Description

Configure SAML SSO to centralize authentication for Jira Cloud users.

Prerequisites

  • Atlassian organization with verified domain
  • Atlassian Guard Standard subscription
  • Organization admin access
  • SAML 2.0 compatible IdP

ClickOps Implementation

Step 1: Verify Domain

  1. Navigate to: admin.atlassian.com
  2. Select your organization
  3. Add and verify your domain
  4. Domain verification required before SSO setup

Step 2: Configure Identity Provider

  1. Navigate to: SecurityIdentity Providers
  2. Select your IdP (Okta, Azure, etc.)
  3. Select your Directory

Step 3: Configure SAML SSO

  1. Under Authenticate users, select Set up SAML single sign-on
  2. Configure IdP with Atlassian metadata
  3. Upload IdP metadata to Atlassian

Step 4: Test and Enable

  1. Test SSO on smaller group first
  2. Verify authentication works
  3. Roll out across organization

Time to Complete: ~2 hours


1.2 Configure Authentication Policies

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 6.3
NIST 800-53 IA-2

Description

Create authentication policies to enforce SSO.

ClickOps Implementation

Step 1: Access Authentication Policies

  1. Navigate to: SecurityUser securityAuthentication policies
  2. Review existing policies

Step 2: Create SSO Policy

  1. Create policy for SSO enforcement
  2. Apply to managed users from verified domains
  3. Configure policy settings

Step 3: Configure Admin Fallback

  1. Set up different policy for admin accounts
  2. Allows troubleshooting SSO issues
  3. Use separate admin accounts for recovery

1.3 Configure Two-Step Verification

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 6.5
NIST 800-53 IA-2(1)

Description

Require two-step verification for all users.

ClickOps Implementation

Step 1: Configure via Organization

  1. Navigate to: SecurityAuthentication policies
  2. Enable two-step verification requirement

Step 2: Configure via IdP

  1. Enable MFA in your identity provider
  2. All SSO users subject to IdP MFA
  3. Use phishing-resistant methods for admins

Step 3: Test Configuration

  1. Test on smaller group first
  2. Verify before organization-wide rollout
  3. Document exceptions

1.4 Configure SAML JIT Provisioning

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 5.3
NIST 800-53 AC-2

Description

Enable Just-In-Time provisioning for automatic account creation.

ClickOps Implementation

Step 1: Enable JIT Provisioning

  1. Configure in SAML settings
  2. Users provisioned on first SSO login
  3. Accounts created automatically

Step 2: Configure Attribute Mapping

  1. Map IdP attributes to Atlassian fields
  2. Configure group membership
  3. Test provisioning flow

2. Organization Security

2.1 Configure Atlassian Guard

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 4.1
NIST 800-53 CM-6

Description

Enable Atlassian Guard for enhanced security features.

ClickOps Implementation

Step 1: Subscribe to Atlassian Guard

  1. Navigate to: admin.atlassian.com
  2. Subscribe to Atlassian Guard Standard
  3. Enables SSO and advanced security

Step 2: Configure Guard Features

  1. Enable security policies
  2. Configure audit logging
  3. Enable data security features

2.2 Configure Domain Verification

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.3
NIST 800-53 AC-2

Description

Verify domains to claim and manage user accounts.

ClickOps Implementation

Step 1: Add Domain

  1. Navigate to: DirectoryDomains
  2. Add your organization’s domain
  3. Complete DNS verification

Step 2: Claim Accounts

  1. Claim existing accounts using your domain
  2. Migrate to organization management
  3. Consolidate shadow accounts

2.3 Configure Organization Admin Roles

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6(1)

Description

Manage organization administrator access.

ClickOps Implementation

Step 1: Review Organization Admins

  1. Navigate to: admin.atlassian.com
  2. Review organization administrators
  3. Document all admins

Step 2: Apply Least Privilege

  1. Limit org admins to 2-3 users
  2. Use product admins for product-specific management
  3. Remove unnecessary admin access

3. Access Controls

3.1 Configure Project Permissions

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 5.4
NIST 800-53 AC-6

Description

Configure project-level permissions for least privilege.

ClickOps Implementation

Step 1: Review Permission Schemes

  1. Navigate to: Jira SettingsSystemPermission Schemes
  2. Review default and custom schemes
  3. Audit project assignments

Step 2: Configure Least Privilege

  1. Assign minimum necessary permissions
  2. Use groups for permission assignment
  3. Regular access reviews

3.2 Configure External User Access

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 3.3
NIST 800-53 AC-3

Description

Control access for external users and guests.

ClickOps Implementation

Step 1: Configure Guest Access

  1. Review external user access
  2. Configure appropriate permissions
  3. Limit capabilities

Step 2: Configure JSM Portal Access (if applicable)

  1. Configure portal-only customer SSO
  2. Enforce authentication for external customers
  3. Use separate IdP if needed

3.3 Configure App Access

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 3.11
NIST 800-53 SC-12

Description

Control third-party app access and permissions.

ClickOps Implementation

Step 1: Review Installed Apps

  1. Navigate to: AppsManage apps
  2. Review all installed apps
  3. Remove unnecessary apps

Step 2: Configure App Permissions

  1. Review app scopes
  2. Limit app access to necessary data
  3. Audit regularly

4. Monitoring & Compliance

4.1 Configure Audit Logging

Profile Level: L1 (Baseline)

Framework Control
CIS Controls 8.2
NIST 800-53 AU-2

Description

Enable and monitor audit logs (requires Atlassian Guard).

ClickOps Implementation

Step 1: Access Audit Logs

  1. Navigate to: admin.atlassian.comSecurityAudit log
  2. Review logged events
  3. Export for analysis

Step 2: Monitor Key Events

  1. User provisioning/deprovisioning
  2. Permission changes
  3. Admin actions
  4. SSO configuration changes

4.2 Configure Security Alerts

Profile Level: L2 (Hardened)

Framework Control
CIS Controls 8.11
NIST 800-53 SI-4

Description

Configure alerts for security events.

ClickOps Implementation

Step 1: Configure Notifications

  1. Set up alerts for critical events
  2. Notify security team
  3. Integrate with SIEM if available

Step 2: Regular Reviews

  1. Weekly security review
  2. Address findings promptly
  3. Document security posture

5. Compliance Quick Reference

SOC 2 Trust Services Criteria Mapping

Control ID Jira Cloud Control Guide Section
CC6.1 SSO/2SV 1.1
CC6.2 Admin roles 2.3
CC6.6 Authentication policies 1.2
CC7.2 Audit logging 4.1

NIST 800-53 Rev 5 Mapping

Control Jira Cloud Control Guide Section
IA-2 SSO 1.1
IA-2(1) 2SV 1.3
AC-2 JIT provisioning 1.4
AC-6 Permissions 3.1
AU-2 Audit logging 4.1

Appendix A: Plan Compatibility

Feature Free Standard Premium Enterprise
SAML SSO Requires Guard
SCIM Requires Guard
Audit Logs Requires Guard
Domain Verification

Note: Advanced security features require Atlassian Guard subscription.


Appendix B: References

Official Atlassian Documentation:

API & Developer Resources:

Compliance Frameworks:

Security Incidents:

  • CVE-2023-22523 (CVSS 9.8): Remote code execution in Assets Discovery for Jira Service Management (2023).
  • Credential-stuffing campaigns (2024): Multiple organizations experienced Jira account takeovers via compromised credentials, with attackers using integrated tools to scrape data. Six public breaches were reported in five months across various Jira customers.
  • Atlassian publishes security advisories at atlassian.com/trust/security/advisories.

Changelog

Date Version Maturity Changes Author
2025-02-05 0.1.0 draft Initial guide with SSO, organization security, and access controls Claude Code (Opus 4.5)

Contributing

Found an issue or want to improve this guide?