Bitband
Search…
Bitband
Documentation for Atlassian Apps
Slack Jira Integration
Jira+Git Integration
Automate Release Notes in Jira
Unlimited Workflow Automation
External Data Fields for Jira Cloud
Microsoft Teams-Jira Integration
Figma-Jira Integration
Miro-Jira Integration
CircleCI-Jira Integration
Cypress-Jira Integration
Jenkins-Jira Integration
Azure Pipelines-Jira Integration
Freshdesk-Jira Integration
Zendesk-Jira Integration
Sentry-Jira Integration
Bitband Security Policy
Powered By
GitBook
Bitband Security Policy
Overview
This document describes Bitband’s security policy. The purpose of this document is to provide Bitband customers with information on how we approach security and security policies.
Change Control and Release Management Processes of our Software
Our code is stored using a Git repo and we follow the release management process similar to:
https://nvie.com/posts/a-successful-git-branching-model/https://nvie.com/posts/a-successful-git-branching-model/
Audits and Reviews
We rely on the audits provided by AWS which include audits for the following designations: ISO 27001, 27017, and 27018 Certification SOC1, 2 and 3
Security Standards Accreditation
The AWS framework we use is accredited for ISO 27001, 27017, and 27018
Security Penetration Testing
We routinely code review our apps before we release to production, We also particpate in a BugCrowd program for our software.
Business Continuity and Disaster Recovery Plans
We rely on the AWS framework which is hosted at Amazon. The backup and redundancy mechanisms of AWS are described here:
https://aws.amazon.com/compliance/data-center/controls/
Security Self-Assessment Program
Bitband participates in the Atlassian self assessment program. Details of this can be found at:
https://developer.atlassian.com/platform/marketplace/security-self-assessment-program/
Security Policy
Our privacy policy is located at:
https://www.bitband.com/privacy-policy
Previous
Release Notes
Last modified
2mo ago
Copy link
Contents
Overview
Change Control and Release Management Processes of our Software
Audits and Reviews
Security Standards Accreditation
Security Penetration Testing
Business Continuity and Disaster Recovery Plans
Security Self-Assessment Program
Security Policy