Security is built into the fabric of Atlassian products and apps, so that customers can feel assured that their data is safeguarded.
The Security Bug Fix Policy outlines Atlassian’s security expectations of developers who host apps on the Atlassian Marketplace, specifically regarding security vulnerabilities. Developers must follow this policy to ensure they are protecting our customers' data.
Most vulnerabilities reported in the Atlassian Marketplace Security (AMS) Jira Project have a “Remediation Due Date”, which is determined by the severity of the vulnerability, and the hosting type. Atlassian requires all apps to meet these due dates.
The following table outlines a vulnerability’s timeframe for resolution by severity type for cloud apps.
Severity | CVSS Score | Timeframe for resolution |
---|---|---|
Critical | CVSS v3 >= 9.0 | Must be fixed within 4 weeks of being reported or triaged. |
High | CVSS v3 >= 7.0 | Must be fixed within 6 weeks of being reported or triaged. |
Medium | CVSS v3 >= 4.0 | Must be fixed within 8 weeks of being reported or triaged. |
Low | CVSS v3 < 4.0 | Must be fixed within 25 weeks of being reported or triaged. |
The following table outlines a vulnerability’s timeframe for resolution by severity type for Data Center and server apps.
Severity | CVSS Score | Timeframe for resolution |
---|---|---|
Critical | CVSS v3 >= 9.0 | Must be fixed within 12 weeks of being reported or triaged. |
High | CVSS v3 >= 7.0 | Must be fixed within 12 weeks of being reported or triaged. |
Medium | CVSS v3 >= 4.0 | Must be fixed within 12 weeks of being reported or triaged. |
Low | CVSS v3 < 4.0 | Must be fixed within 25 weeks of being reported or triaged. |
Atlassian doesn't accept extension requests for the Remediation Due Date, unless one of the following applies:
To request an extension, please transition the AMS ticket to "Extension Requested" state . Extensions aren't guaranteed - Atlassian will review and accept requests on a case-by-case basis.
Failure to meet vulnerability due dates reported in AMS may result in either temporary or permanent enforcement. Atlassian doesn't take enforcement lightly, and we're committed to working with partners to determine a plan in addressing vulnerabilities by their due dates.
The following enforcement happens once the due date is breached. Vulnerabilities that pose the greatest risk to customers will be taken the most seriously. Therefore, there are differences in enforcement based on the severity of the vulnerability and the hosting type.
Severity | Cloud | Data Center & server |
---|---|---|
Critical | Hide the app | Hide the app |
High |
| Hide the app |
Medium | Only applies when the enforcement threshold is met, which is 3 active medium due date breaches
| Hide the app |
Low | Only applies when the enforcement threshold is met, which is 4 active low due date breaches
| Hide the app |
Hiding an app will hide the app from the Atlassian Marketplace and the Atlassian Universal Plugin Manager. New customers won't be able to install the app.
Badge Removal removes the Cloud Security Participant Badge from the Atlassian Marketplace.
Apps that have the Cloud Fortified App Badge will also have this badge removed, since the Cloud Security Participant Badge is a requirement for the Cloud Fortified App Badge.
Badge removal also includes removing the checkmark that identifies an app as a participant in the Marketplace Bug Bounty Program.
For medium and low vulnerabilities, there are enforcement thresholds:
We require developers to maintain communication with us.
In AMS, Atlassian will contact the app’s security contacts regarding the outstanding vulnerability for up to 90 days.
If we don't hear from the partner within 90 days, and the partner doesn't make clear efforts to address and fix the vulnerability, Atlassian will hide the app from the Atlassian Marketplace, in addition to the enforcements listed in the above table. Ultimately, Atlassian reserves the right to pause the app after all enforcement measures and attempts to communicate have been exhausted.
Rate this page: