Last updated Sep 18, 2025

ISO 27001 responsibilities for Forge Marketplace Partners

This page is for Marketplace Partners building on Forge who are pursuing ISO 27001 certification.

ISO/IEC 27001:2022 is a global standard for establishing, operating, and continually improving an Information Security Management System (ISMS). It provides a proven framework to help you protect your people, data, and systems, and covers all your efforts to maintain the confidentiality, integrity, and availability (CIA) of information.

The standard’s requirements are divided into two main categories: Clause requirements, and Annex A Controls.

Clause requirements

Clause requirements set out the governance, leadership, planning, operations, and continual improvement obligations for your ISMS.

  • All clause requirements are mandatory. You must implement and demonstrate conformity with every clause to achieve certification.

  • Forge platform does not address clause requirements. These are organizational obligations that you must fulfill independently.

Annex A controls

Annex A provides a reference set of security controls to help you manage information security risks.

  • Annex A controls are risk-driven. You must assess each Annex A control, then select, justify, and implement (or formally exclude) them as part of your ISMS.

  • Forge platform can help with some Annex A controls. Forge primarily supports controls in:

    • Annex 7 (Physical)
    • Annex 8 (Technology)
  • You are still responsible for other controls. You must independently assess and implement controls in:

    • Annex 5 (Organizational)
    • Annex 6 (People)
    • Some parts of Annex 7 and Annex 8

How to approach ISO 27001 certification

When pursuing ISO 27001 certification:

  1. Start with the full standard. Review all requirements in ISO/IEC 27001:2022.

  2. Layer in Forge platform support. Where appropriate, leverage Forge’s features to help meet relevant Annex A controls, based on your risk assessment.

Next

See the breakdown below for Annex A controls where the Forge platform can help you meet your responsibilities.

Access controls

ISO 27001:2022 Annex ARequirementShared responsibility
A.8.2The allocation and use of privileged access rights shall be restricted and managed. While Atlassian manages privileged access to the Forge platform, you are responsible for:
  • managing privileged access for your developers or other users with access to the Forge app they create.
A.8.5Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control. While Forge establishes secure authentication technologies and processes for users to connect to the Forge platform, you are responsible for:
  • defining their access control policy and enforcing application-level authentication and authorization mechanisms for your Forge apps, including user roles, permissions, and secrets management
A.8.10Information stored in information systems, devices or in any other storage media shall be deleted when no longer required. While Atlassian manages the information deletion process for data stored on behalf of your Forge applications, you are responsible for:
  • the deletion process of any sensitive or confidential data you manage for yourself.
A.8.12Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive information. While Atlassian manages data leakage prevention measures for the Forge platform, you are responsible for:
  • identifying and assessing data leakage prevention measures for any other confidential or sensitive information not managed by Forge.
A.8.13Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup. While Atlassian manages the data stored on behalf of your Forge applications, you are responsible for:
  • backing up the code you deploy for the Forge application itself.
A.8.15Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed. Atlassian generates logs to manage the confidentiality, integrity and availability of the Forge platform. These logs are sent to Atlassian's centralised logging facility and analysed for action. You are responsible for:
  • Any logs your app generates, and the storage and management of these logs.
  • Analysis and action of app-generated logs.
  • Ensuring that these logs don't store any personally identifiable information (PII), authentication tokens, user-generated content (UGC), or confidential data Read more about [logging guidelines for app developers](/platform/forge/logging-guidelines/#should-i-log-this-).
A.8.17The clocks of information processing systems used by the organization shall be synchronized to approved time sources. While Atlassian manages clock synchronization for the Forge platform, you are responsible for:
  • ensuring the endpoints that connect to the Forge app are synchronized to approved time sources.
A.8.19Procedures and measures shall be implemented to securely manage software installation on operational systems. While Atlassian manages installation of software for systems that support the Forge platform, you are responsible for:
  • ensuring the management of software on endpoints that support the development of your Forge app.
A.8.22Groups of information services, users and information systems shall be segregated in the organization’s networks. While Atlassian maintains segregated networks for the Forge platform and related systems and users, you are responsible for:
  • establishing your own segregation of networks for the Forge app you develop.

Network security

ISO 27001:2022 Annex ARequirementShared Responsibility
A.8.24Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented. While Forge encrypts data at rest and in transit on behalf of your Forge applications, you are responsible for:
  • defining their cryptography policy and rules,
  • encrypting mobile endpoints with access to the Forge application.
A.8.26Information security requirements shall be identified, specified and approved when developing or acquiring applications. While Atlassian has implemented measures to detect and mitigate security vulnerabilities in the Forge platform, you are responsible for:
  • detecting and mitigating application security vulnerabilities for the application you deploy.
A.8.30The organization shall direct, monitor and review the activities related to outsourced system development. If you outsource the development of your Forge app, you must implement this requirement. Otherwise, you can descope this requirement from your Statement of Applicability.

Logging, monitoring & alerting

ISO 27001:2022 Annex ARequirementShared Responsibility
A.8.31Development, testing and production environments shall be separated and secured. While Atlassian maintains separate non-production and production environments for the Forge platform, you are responsible for:
  • establishing your own non-production and production applications, as necessary.

Vulnerability management

ISO 27001:2022 Annex ARequirementShared Responsibility
A.8.34Audit tests and other assurance activities involving assessment of operational systems shall be planned and agreed between the tester and appropriate management. While Atlassian is responsible for setting the terms of engagement and planning with its own auditors and testers, you are responsible for:
  • defining the terms of engagement
  • defining access for audits and assurance activities you have commissioned and planned.

Physical security

ISO 27001:2022 Annex ARequirementShared Responsibility
A.8.8Information about technical vulnerabilities of information systems in use shall be obtained, the organization’s exposure to such vulnerabilities should be evaluated and appropriate measures should be taken. While Atlassian has implemented measures to detect and mitigate security vulnerabilities in the Forge platform, you are responsible for:
  • detecting and mitigating application security vulnerabilities in the application you deploy.

Data security & availability

ISO 27001:2022 Annex ARequirementShared Responsibility
A.8.10Information stored in information systems, devices or in any other storage media shall be deleted when no longer required. While Atlassian manages the information deletion process for data stored on behalf of your Forge applications, you are responsible for:
  • the deletion process of any sensitive or confidential data you manage for yourself.
A.8.12Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive information. While Atlassian manages data leakage prevention measures for the Forge platform, you are responsible for:
  • identifying and assessing data leakage prevention measures for any other confidential or sensitive information not managed by Forge.
A.8.13Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup. While Atlassian manages the data stored on behalf of your Forge applications, you are responsible for:
  • backing up the code you deploy for the Forge application itself.
A.8.15Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed. Atlassian generates logs to manage the confidentiality, integrity and availability of the Forge platform. These logs are sent to Atlassian's centralised logging facility and analysed for action. You are responsible for:
  • Any logs your app generates, and the storage and management of these logs.
  • Analysis and action of app-generated logs.
  • Ensuring that these logs don't store any personally identifiable information (PII), authentication tokens, user-generated content (UGC), or confidential data Read more about [logging guidelines for app developers](/platform/forge/logging-guidelines/#should-i-log-this-).

The following table is a breakdown of the Annex A control requirements that you are fully responsible for assessing and implementing:

ISO 27001:2022 Req. IDsRequirement descriptions
A.5.1Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur.
A.5.2Information security roles and responsibilities shall be defined and allocated according to the organization needs.
A.5.3Conflicting duties and conflicting areas of responsibility shall be segregated.
A.5.4Management shall require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization.
A.5.5The organization shall establish and maintain contact with relevant authorities.
A.5.6The organization shall establish and maintain contact with special interest groups or other specialist security forums and professional associations.
A.5.7Information relating to information security threats shall be collected and analyzed to produce threat intelligence.
A.5.8Information security shall be integrated into project management.
A.5.9An inventory of information and other associated assets, including owners, shall be developed and maintained.
A.5.10Rules for the acceptable use and procedures for handling information and other associated assets shall be identified, documented and implemented.
A.5.11Personnel and other interested parties as appropriate shall return all the organization’s assets in their possession upon change or termination of their employment, contract or agreement.
A.5.12Information shall be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements.
A.5.13An appropriate set of procedures for information labelling shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
A.5.14Information transfer rules, procedures, or agreements shall be in place for all types of transfer facilities within the organization and between the organization and other parties.
A.5.15Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements.
A.5.16The full life cycle of identities shall be managed.
A.5.17Allocation and management of authentication information shall be controlled by a management process, including advising personnel on the appropriate handling of authentication information.
A.5.18Access rights to information and other associated assets shall be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy on and rules for access control.
A.5.19Processes and procedures shall be defined and implemented to manage the information security risks associated with the use of supplier’s products or services.
A.5.20Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.
A.5.21Processes and procedures shall be defined and implemented to manage the information security risks associated with the ICT products and services supply chain.
A.5.22The organization shall regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery.
A.5.23Processes for acquisition, use, management and exit from cloud services shall be established in accordance with the organization’s information security requirements.
A.5.24The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.
A.5.25The organization shall assess information security events and decide if they are to be categorized as information security incidents.
A.5.26Information security incidents shall be responded to in accordance with the documented procedures.
A.5.27Knowledge gained from information security incidents shall be used to strengthen and improve the information security controls.
A.5.28The organization shall establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events.
A.5.29The organization shall plan how to maintain information security at an appropriate level during disruption.
A.5.30ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.
A.5.31Legal, statutory, regulatory and contractual requirements relevant to information security and the organization’s approach to meet these requirements shall be identified, documented and kept up to date.
A.5.32The organization shall implement appropriate procedures to protect intellectual property rights.
A.5.33Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release.
A.5.34The organization shall identify and meet the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.
A.5.35The organization’s approach to managing information security and its implementation including people, processes and technologies shall be reviewed independently at planned intervals, or when significant changes occur.
A.5.36Compliance with the organization’s information security policy, topic-specific policies, rules and standards shall be regularly reviewed.
A.5.37Operating procedures for information processing facilities shall be documented and made available to personnel who need them.
A.6.1Background verification checks on all candidates to become personnel shall be carried out prior to joining the organization and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
A.6.2The employment contractual agreements shall state the personnel’s and the organization’s responsibilities for information security.
A.6.3Personnel of the organization and relevant interested parties shall receive appropriate information security awareness, education and training and regular updates of the organization's information security policy, topic-specific policies and procedures, as relevant for their job function.
A.6.4A disciplinary process shall be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation
A.6.5Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, enforced and communicated to relevant personnel and other interested parties.
A.6.6Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information shall be identified, documented, regularly reviewed and signed by personnel and other relevant interested parties.
A.6.7Security measures shall be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization’s premises.
A.6.8The organization shall provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.
A.7.7Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities shall be defined and appropriately enforced.
A.7.9Off-site assets shall be protected.
A.8.1Information stored on, processed by or accessible via user endpoint devices shall be protected.
A.8.3Access to information and other associated assets shall be restricted in accordance with the established topic-specific policy on access control.
A.8.4Read and write access to source code, development tools and software libraries shall be appropriately managed.

Next steps

Learn more about ISO/IEC 27001:2022

Rate this page: