What type of data will be stored/processed/accessed?
Actonic’s Timesheet Builder app can access the following Jira data:
From work log:
Work log author (User ID)
Work log description
Work log Start date, Create date, Updated date
From current user:
Project Roles and permissions
Actonic’s Timesheet Builder app can store the following Jira data:
Actonic’s Timesheet Builder app can store the following app data:
Team name and team IDs
Team period list (capacity per period and start and end dates of each period, period status (opened, closed))
Team roles and team role IDs
Team member (role, join and leave dates, groups, user ID, global calendar ID, workload calendar ID)
Global calendars and global calendar IDs
Workload schemes and workload scheme IDs
Non-working days legends and non-working day IDs
User labels and user label IDs
How does the app get, add and modify data?
To get, add and modify data in Jira, our app is using public Jira REST APIs. For example, with the Jira cloud REST API, we are getting issues and fields to check if they match Team issues scope, Jira project permissions.
Our app is using all the required Authorization and Security technologies provided by Atlassian:
In the cloud version, the app is using all the required Authorization and Security technologies provided by Atlassian:
What platform and programming language was used to develop the application?
Which authentication protocols and technologies are supported?
Our Timesheet Builder app works with the Jira authentication system and supports all available authentication settings.
How do you achieve security of data at rest?
Timesheet Builder app is available over SSL only. We are using valid (not a self-signed) browser-trusted certificate, without any human intervention. All the communications between “Client ↔︎ Jira application ↔︎ Our app” are encrypted.
How is data from customers separated from other customers (if the solution is offered in a multi-tenant model)?
We have measures in place to ensure that all the customers are logically separated, so that the actions of one customer cannot compromise the data of other customers.
In Jira cloud app version, we use a concept that Atlassian refers to as the “tenant context” to achieve logical isolation of all the customers. This is implemented in the Atlassian Connect framework, and managed by the “Tenant Context Service” (TCS).
This concept ensures that:
Each customer’s data is kept logically segregated from other tenants when at-rest.
Any requests that are processed by Jira app versions have a “tenantspecific” view, so other tenants are not impacted.
How is the security monitoring for this app performed?
Our security monitoring includes the following:
Role based mechanism to access all the parts of infrastructure separately.
The app creates a massive collection of event logs for analysis and investigation.
Regularly reviewing of logs to improve alerting mechanisms or to manually identify security incidents.