{"id":68645,"date":"2023-07-10T15:07:27","date_gmt":"2023-07-10T07:07:27","guid":{"rendered":"https:\/\/version-2.com\/?p=68645"},"modified":"2023-07-10T16:46:11","modified_gmt":"2023-07-10T08:46:11","slug":"jira-security-best-practices-keeping-your-data-safe","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/07\/jira-security-best-practices-keeping-your-data-safe\/","title":{"rendered":"Jira security best practices: keeping your data safe"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"68645\" class=\"elementor elementor-68645\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"800\" \/><\/p><div class=\"nord-col lg:col-8 lg:offset-1 break-words mt-5 text-grey-shuttle\"><article><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira&#8217;s cloud-hosting solutions serve major corporate giants like the Coca-Cola Company, Delta Airlines, and CostCo. Every day, <strong>millions of people rely on Jira to access development apps and collaborate with colleagues<\/strong>. But Jira deployments require watertight security. Companies can easily fall victim to cloud data theft. This can inflict reputational damage or \u2013 in worst-case scenarios \u2013 lead to bankruptcy.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>This article will explore how to secure your Jira assets.<\/strong> We will look at best practices for Jira security and learn how shared responsibility works. We will also explain some of the most urgent cloud security threats. The result will be a solid foundation in Jira cloud security.<\/p><h2 id=\"understanding-the-significance-of-jira-security\" class=\"Heading Heading-h2 text-dark-blue\">Understanding the significance of Jira security<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud platforms are critical to the modern economy. The cloud hosts websites, customer databases, development environments, and collaboration tools. Lightweight cloud tools also dramatically lower networking costs. This makes it easier to create customized business architecture.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Operated by Atlassian, Jira is a cloud-hosting service known for supporting agile network deployments. Its development tools suit rapidly changing companies and scale smoothly. But as with all major cloud platforms,<strong> Jira is a tempting target for cyber attackers<\/strong>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira security is shared between the cloud provider and customers. As we will see, Jira has many native security features that guard customer data. But customers retain responsibility for:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Access management<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Endpoint security<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Application installation and management<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Protecting customer data<\/p><\/li><\/ul><h2 id=\"jira-security-best-practices\" class=\"Heading Heading-h2 text-dark-blue\">Jira security best practices<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira security aims to protect sensitive data stored on the cloud platform. Users (or &#8220;tenants&#8221;) must minimize data breach risks while understanding security areas covered by Jira\u2019s systems. This checklist covers <strong>actions required to secure Jira environments<\/strong>.<\/p><p><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1400&amp;h=578&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"578\" \/><\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><div style=\"opacity: 0; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\">\u00a0<\/div><p><picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=750&amp;h=310&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1080&amp;h=446&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1366&amp;h=564&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1400&amp;h=578&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" style=\"object-fit: cover; opacity: 1;\" title=\"jira security best practices list\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1400&amp;h=578&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=750&amp;h=310&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1080&amp;h=446&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1366&amp;h=564&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2pmbeZwvdKLOXOI1ltjLin\/b81c09883ce12db5139cdbd75ccf7e19\/1_1400x578.png?w=1400&amp;h=578&amp;q=50&amp;fm=png 1400w\" alt=\"jira security best practices list\" width=\"1\" height=\"0.41285714285714287\" data-main-image=\"\" \/>Security best practices include:<\/picture><\/p><\/div><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Verifying your domains<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Hardening your login security policies<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Auditing activity logs intelligently<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Managing accounts to minimize data breach risks<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Training staff to use Jira securely<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Making use of mobile security tools<\/p><\/li><\/ul><h3 class=\"Heading Heading-h3 text-dark-blue\">1. Verify and claim Jira domains<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">The first step in improving your security setup is <strong>verifying the Jira domains you own<\/strong>. Domain verification allows administrators to take control of access management policies for Jira assets. Admins can claim domains via the Atlassian admin panel.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Domain verification also enables admins to <strong>use Atlassian Access.<\/strong> After verifying their domains, admins need to subscribe to Access. When that\u2019s done, you can start applying security controls across your Jira-hosted assets.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">2. Harden login security policies<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Login portals are a critical security vulnerability. Jira tenants must exclude malicious actors while allowing legitimate requests. This is not always an easy balance to strike. Users should:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Implement two-factor authentication<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">2FA requires more than one authentication factor when logging on. Atlassian <strong>supports popular authentication providers like Google Authenticator and Authy.<\/strong> These tools integrate with Jira and deliver secure passcodes to smartphones. SMS verification is also possible, although it\u2019s seen as a less secure option.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Enforce two-step verification<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">This tool supplements 2FA for Jira. Enforced verification makes it <strong>impossible to access Jira assets without supplying two authentication factors.<\/strong> Admins configure enforced verification via the centralized access management panel.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Create SSO portals\u00a0<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Single Sign On combines all Jira cloud assets via a <strong>single set of credentials<\/strong>. SSO integrates smoothly with identity providers. You can transfer existing directories and groups to Jira while adding authentication tools.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Prevent third-party access<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Access requests from third-party cloud platforms presents a security risk. <strong>Restricting access requests from Slack, Google Cloud, or Apple platforms <\/strong>is a good idea. Enforce additional authentication procedures to prove user identities before granting access.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Use strong passwords<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Admins must require solid passwords for all accounts. Strong passwords feature a mix of characters and numbers and are usually between 12 and 15 characters long. This makes them very difficult to guess or brute force. Admins should also set password expiry deadlines that force users to change passwords regularly.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Exclude non-human users from authentication policies<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Bots and API service accounts may require access to Jira assets. But they do not require the same authentication processes. Admins should configure these users to remove SSO and two-step verification tools.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">3. Audit activity logs intelligently<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Product audit logs record activity across the Jira environment. This makes it possible to detect patterns of suspicious behavior and remediate network security vulnerabilities before threats emerge.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian operates <strong>separate audit processes for Confluence and Jira.<\/strong> In both cases, companies can track any changes made to their cloud setup. Tenants can determine which events to monitor. This includes group creation, data imports and exports, deletions, and changes to global settings.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">By default, logs are kept for one year. Tenants can change this setting, reducing the audit period to as little as one month. However, <strong>retaining audit data for the maximum period is a security best practice.<\/strong> This will deliver more actionable insights to improve security settings.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">4. Manage accounts to minimize data breach risks<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira tenants should audit both activity and user accounts. Account audits look at the entire range of active user accounts. And they perform a couple of important security tasks:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>De-escalation of administrative privileges<\/strong> when they are no longer needed.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Deletion of obsolete accounts. <\/strong>Without timely audits, user accounts may remain active after employees leave the organization. This creates a security risk and should be avoided if possible.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Carry out account audits regularly. <strong>Integrate external identity providers <\/strong>covered by Jira, such as SCIM or G Suite. This makes it easier to <strong>automate<\/strong> <strong>user provisioning and deletion tools<\/strong>. But do not assume that orphaned accounts have been deleted. Check thoroughly and make deletions as necessary.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">5. Train staff to use Jira securely<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Security teams are responsible for educating all Jira users<\/strong>. Solid training teaches employees to follow security best practices and should be critical to your cloud security policy. Training issues to focus on include:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">The importance of strong, regularly-changed passwords.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Eliminating confidential data from Jira tickets or pages. This could include cardholder data or personal health information.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Creating access controls for any pages that contain sensitive information.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Using two step-verification to access Atlassian products.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Using API tokens to access Confluence Cloud or Jira resources.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Avoiding phishing attacks related to the Atlassian cloud environment.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Schedule regular training events and log the participation of all cloud users. <strong>Include additional security training for administrative-level account holders<\/strong>. Admins have extensive powers to change global settings that regular users lack. Enforce prohibitions against shared admin accounts and reinforce the need for strong password security.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">6. Make use of mobile security tools<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Employees may require access from home workstations, industry events, or during global travel. But mobile access carries security risks. In these situations, companies should leverage the mobile security features supplied with Jira software.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian Access allows tenants to create <strong>Mobile Application Management (MAM) policies.<\/strong> This is a good option if your organization relies on either work-from-home or bring-your-own-device (BYOD). MAM policies should:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Enforce multi-factor authentication for remote access to the Atlassian cloud.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Check that devices have anti-malware protection and that the operating system is up to date.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Allow only authorized BYOD devices and require registration for new devices.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Mandate encryption for all remote connections. This could include Virtual Private Network connectivity or the use of other forms of secure gateway.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">If you are not an Atlassian Access member, you can <strong>integrate external MDM solutions with Jira deployments<\/strong>. Jira software supports Microsoft Intune, JAMF, and MobileIron. It should be possible to transfer existing MDM settings directly to the Atlassian cloud.<\/p><h2 id=\"understanding-jira-security-basics\" class=\"Heading Heading-h2 text-dark-blue\">Understanding Jira security basics<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">It is important to apply the security best practices outlined above. But <strong>Jira tenants must also understand what their cloud provider secures before taking action<\/strong>. There is no need to duplicate security measures. Tenants should be aware of tools available within the Jira platform before sourcing external solutions.<\/p><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><p><picture><source srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=750&amp;h=284&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1080&amp;h=409&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1366&amp;h=517&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=webp 1400w\" type=\"image\/webp\" sizes=\"100vw\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"530\" \/><\/picture><picture><img decoding=\"async\" style=\"object-fit: cover; opacity: 1;\" title=\"jira security best practices glossary\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=png\" sizes=\"100vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=750&amp;h=284&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1080&amp;h=409&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1366&amp;h=517&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=png 1400w\" alt=\"jira security best practices glossary\" width=\"1\" height=\"0.3785714285714286\" data-main-image=\"\" \/><\/picture><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=750&amp;h=284&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1080&amp;h=409&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1366&amp;h=517&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"jira security best practices glossary\" width=\"1\" height=\"0.3785714285714286\" data-main-image=\"\" style=\"object-fit:cover;opacity:1\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=750&amp;h=284&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1080&amp;h=409&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1366&amp;h=517&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/2gzY0IIBygqHP0AuB6XUeA\/59c60bf555ed4d91614d12798407450a\/3_1400x530.png?w=1400&amp;h=530&amp;q=50&amp;fm=png 1400w\" alt=\"jira security best practices glossary\"\/><\/picture><\/noscript><\/p><\/div><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian is vocal about its commitment to security, and the company builds both internal and client-side security features into its products. Let&#8217;s start with client-side features that tenants can control.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Client-side features:<\/h3><div class=\"gatsby-image-wrapper\" data-gatsby-image-wrapper=\"\"><div style=\"opacity: 0; transition: opacity 500ms linear; object-fit: cover;\" aria-hidden=\"true\" data-placeholder-image=\"\">\u00a0<\/div><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1400&amp;h=618&amp;q=50&amp;fm=webp\" width=\"1400\" height=\"618\" \/><br \/><noscript><picture><source type=\"image\/webp\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=750&amp;h=331&amp;q=50&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1080&amp;h=477&amp;q=50&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1366&amp;h=603&amp;q=50&amp;fm=webp 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1400&amp;h=618&amp;q=50&amp;fm=webp 1400w\" sizes=\"100vw\"\/><img title=\"authentication and authorization differences\" width=\"1\" height=\"0.4414285714285714\" data-main-image=\"\" style=\"object-fit:cover;opacity:1\" sizes=\"auto, 100vw\" decoding=\"async\" loading=\"lazy\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1400&amp;h=618&amp;q=50&amp;fm=png\" srcSet=\"https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=750&amp;h=331&amp;q=50&amp;fm=png 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1080&amp;h=477&amp;q=50&amp;fm=png 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1366&amp;h=603&amp;q=50&amp;fm=png 1366w, https:\/\/images.ctfassets.net\/5natoedl294r\/78VgzPugRGhBj5DO3TwsBw\/a12593a913134f27326cbe96298b16cc\/2_1400x618.png?w=1400&amp;h=618&amp;q=50&amp;fm=png 1400w\" alt=\"authentication and authorization differences\"\/><\/picture><\/noscript><\/p><\/div><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Authentication<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Authentication verifies the identity of every user accessing the cloud environment. These mechanisms compare user credentials to secure directories. If supplied credentials match the database, the network grants access. Jira authentication options include Basic Authentication via Atlassian Account. However, Jira also supports OAuth tokens, which offer more security. These secure tokens add an extra layer of protection against illegitimate access.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Authorization<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Authorization determines what users can do within the Jira environment. Each user receives a set of permissions. These permissions grant access to resources according to the user\u2019s role and work requirements. Admins can create temporary groups or assign precise powers to users. For instance, the user could possess create, view, and edit privileges. But they may not be able to delete records on Jira apps.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Logging<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira logs key activities and presents the data via the central administration console. The audit log captures project changes, user permissions, workflow changes, custom fields, data deletion, and suspicious access requests. Admins can export audit data via CSV files and amalgamate the information with other cloud platforms. Retention periods vary from one month to a year.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Incident management<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira&#8217;s incident response systems include collaboration tools, automated alerts, incident timelines, and incident response templates. Tenants can plan to neutralize threats and restore systems as quickly as possible.<\/p><h3 class=\"Heading Heading-h3 text-dark-blue\">Internal security features:<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian products secure hosting infrastructure with internal security controls. In keeping with the shared responsibility model, the company<a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"https:\/\/www.atlassian.com\/trust\/security\/security-practices#sharing-responsibility-for-managing-customer-data\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> undertakes to ensure<\/a> the \u201csecurity, availability, and performance of the applications we provide, the systems they run on, and the environments within which those systems are hosted.\u201d<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Encryption<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira encrypts data at rest and in transit. Data on the Rest API is encrypted using 256-bit AES ciphers. Data in transit is secured by TLS 1.2+ with perfect forward secrecy. Passwords are also encrypted, along with API keys. Tenants don\u2019t need to apply encryption to data hosted on the Jira platform. But it is necessary to encrypt data passing across the network edge, for example, via remote work connections.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Zero Trust architecture<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira\u2019s network is constructed in line with the Zero Trust principle \u201cnever trust, always verify\u201d. Private cloud routing, firewalls, and software-defined networking create secure zones. A three-tier access policy ensures that only authorized employees can access network resources.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Data center security<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian uses Amazon Web Services (AWS) to store data. Redundancy and failover are built into a global AWS architecture. Multiple physical security controls also guard Jira\u2019s data centers against malicious intruders.<\/p><h2 id=\"common-security-threats-to-jira\" class=\"Heading Heading-h2 text-dark-blue\">Common security threats to Jira<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira\u2019s cloud hosting services face many threats. Security controls should always be designed with threats in mind. Any of these threats could result in loss of data, system downtime, and regulatory penalties:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Insider threats<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Malicious individuals exploit legitimate access rights to carry out illegal actions. But insiders can also be unaware of the risks they pose. For example, employees might accidentally introduce malware via flash drives. Insiders can sabotage assets or steal data for sale. But identifying them isn\u2019t easy. Jira tenants can leverage activity monitoring logs to detect unusual access patterns, off-board orphaned accounts, and apply MFA to make access difficult.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Social engineering<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Also known as phishing. Social engineering involves persuading legitimate users to carry out risky actions. This could include opening attachments, clicking links, or even providing payment data directly. Training is the best remedy for social engineering attacks. Data Loss Prevention tools and tight access policies also help to prevent illicit data removal.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>External threats<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">\u00a0Malware can spread throughout insecure cloud deployments. Worms and Trojans leak information to outsiders. Other agents damage performance by leaching network resources for other purposes. Robust threat detection systems, network segmentation, and regular software updates are essential.<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\"><strong>Data breaches\u00a0<\/strong><\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Data breaches require a specific strategy because the risks of suffering data loss are critical. Tenants should secure confidential data with encryption at rest and in transit. Limit access with MFA and RBAC. And track critical data via audits and threat alerts.<\/p><h2 id=\"faq\" class=\"Heading Heading-h2 text-dark-blue\">FAQ<\/h2><h3 class=\"Heading Heading-h3 text-dark-blue\">How to keep my organization secure?<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Follow these basic steps to secure your organization on Atlassian\u2019s Jira platform:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Understand your Jira landscape. Inventory all apps and classify data held on Jira according to risk categories.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Ensure all assets are visible via the Atlassian admin panel.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Integrate your identity provider with Atlassian\u2019s SSO solution.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Test configurations to balance access and security.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Create role-based access controls. Limit access to high-risk data.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Schedule regular audits and monitor activity logs.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Manage user accounts and remove users when they leave the organization.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Train your staff on security best practices.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Create a mobile device management solution for secure remote work.<\/p><\/li><\/ul><h3 class=\"Heading Heading-h3 text-dark-blue\">What are the security features of Jira?<\/h3><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira is equipped with many security features. Use relevant features to secure cloud assets under the shared responsibility model. Tenants can configure Jira to include:<\/p><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">256-bit at rest encryption of sensitive data and TLS encryption for data in transit.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Flexible access controls. SSO and MFA options that integrate with identity providers.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Regular network scanning and audits of Jira infrastructure. Constant monitoring for cloud security threats.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Compliance with major standards such as GDPR and ISO 27001.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">The Bug Bounty program rewards developers who find security weaknesses.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Secure development under the Peer Review\/Green Build system. Testing of all new app deployments before they go live.<\/p><\/li><\/ul><p class=\"my-4 blog-paragraph text-still-dark-blue\">Atlassian has covered the most crucial security themes. But this still leaves customers with the responsibility to extend access controls to users, encrypt data outside the Jira environment, and train staff to use the cloud safely.<\/p><h2 id=\"key-takeaways\" class=\"Heading Heading-h2 text-dark-blue\">Key takeaways<\/h2><ul class=\"list\"><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Jira provides a wide range of security features to assist cloud tenants. This includes authentication systems that integrate easily with identity providers.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Automated user provisioning offers users the right permissions to access essential resources.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Tenants benefit from data encryption and proactive threat monitoring. Jira tools include customized audit processes and security alerts.<\/p><\/li><li class=\"ml-4 pl-4\"><p class=\"my-4 blog-paragraph text-still-dark-blue\">Cloud users must always be aware of the shared responsibility model when designing security solutions.<\/p><\/li><\/ul><h2 id=\"how-can-nordlayer-help\" class=\"Heading Heading-h2 text-dark-blue\">How can NordLayer help?<\/h2><p class=\"my-4 blog-paragraph text-still-dark-blue\">The Atlassian suite enables businesses to manage projects of varying scope and complexity effectively, but its security leaves much room for improvement. This is where <strong>NordLayer can reach out a helping hand to companies <\/strong>that are struggling to find the right balance between ease of use and security.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">Using Virtual Private Gateways, network administrators have much better control over user access. Only gateway-connected users are allowed to reach the Jira portal. The login to NordLayer itself can be <strong>further secured by enabling Single-sign on and multi-factor authentication<\/strong>, ensuring that the connecting user\u2019s identity is genuine.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">With IP allow-listing (whitelisting), companies can <strong>permit access to Atlassian suite only from trusted IPs<\/strong>, which also shrinks the attack surface. The connections from unrecognized IP addresses are immediately blocked.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\">NordLayer\u2019s suite of ZTNA and SSE-focused features allows additional layers of security and combines built-in Jira security tools with NordLayer\u2019s solutions. This combination is a sure way to improve <a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/saas-access-control\/\">SaaS access control<\/a>.<\/p><p class=\"my-4 blog-paragraph text-still-dark-blue\"><a class=\"hyperlink Link Link--blue-dodger font-medium\" href=\"\/contact-sales\/\">Get in touch with us<\/a>, and discover how to reap the benefits of Atlassian suite without putting your sensitive data at risk.<\/p><\/article><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Jira&#8217;s cloud-hosting solutions serve major corpor [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[974,1076,1132],"class_list":["post-68645","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nord-security","tag-1076","tag-nordlayer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jira security best practices: keeping your data safe - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jira security best practices: keeping your data safe - Version 2\" \/>\n<meta property=\"og:description\" content=\"Jira&#8217;s cloud-hosting solutions serve major corpor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T07:07:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-10T08:46:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/jira-security-best-practices-keeping-your-data-safe\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Jira security best practices: keeping your data safe\",\"datePublished\":\"2023-07-10T07:07:27+00:00\",\"dateModified\":\"2023-07-10T08:46:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/jira-security-best-practices-keeping-your-data-safe\\\/\"},\"wordCount\":2469,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1iNq9UbXYTmK5YtIvmV7Ky\\\/bfe5aff7d274bef7e6582f61af6d85b8\\\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"2023\",\"NordLayer\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/07\\\/jira-security-best-practices-keeping-your-data-safe\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/\",\"name\":\"Jira security best practices: keeping your data safe - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1iNq9UbXYTmK5YtIvmV7Ky\\\/bfe5aff7d274bef7e6582f61af6d85b8\\\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"datePublished\":\"2023-07-10T07:07:27+00:00\",\"dateModified\":\"2023-07-10T08:46:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1iNq9UbXYTmK5YtIvmV7Ky\\\/bfe5aff7d274bef7e6582f61af6d85b8\\\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/1iNq9UbXYTmK5YtIvmV7Ky\\\/bfe5aff7d274bef7e6582f61af6d85b8\\\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/jira-security-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jira security best practices: keeping your data safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jira security best practices: keeping your data safe - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/","og_locale":"zh_HK","og_type":"article","og_title":"Jira security best practices: keeping your data safe - Version 2","og_description":"Jira&#8217;s cloud-hosting solutions serve major corpor [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/","og_site_name":"Version 2","article_published_time":"2023-07-10T07:07:27+00:00","article_modified_time":"2023-07-10T08:46:11+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"14 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/07\/jira-security-best-practices-keeping-your-data-safe\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Jira security best practices: keeping your data safe","datePublished":"2023-07-10T07:07:27+00:00","dateModified":"2023-07-10T08:46:11+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/07\/jira-security-best-practices-keeping-your-data-safe\/"},"wordCount":2469,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","keywords":["Nord Security","2023","NordLayer"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/07\/jira-security-best-practices-keeping-your-data-safe\/","url":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/","name":"Jira security best practices: keeping your data safe - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","datePublished":"2023-07-10T07:07:27+00:00","dateModified":"2023-07-10T08:46:11+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/1iNq9UbXYTmK5YtIvmV7Ky\/bfe5aff7d274bef7e6582f61af6d85b8\/JIRA-security-best-practices-keeping-your-data-safe_1400x800.png?w=1400&amp;h=800&amp;q=50&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/jira-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Jira security best practices: keeping your data safe"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-hRb","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68645","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=68645"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68645\/revisions"}],"predecessor-version":[{"id":68649,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/68645\/revisions\/68649"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=68645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=68645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=68645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}