Trust Center - Cloud Apps

Data Security Policy for Mirrorlake Software Cloud Apps

At Mirrorlake Software, we prioritize the security and privacy of our users' data above all else. As a trusted app vendor for Atlassian Cloud products, we understand the importance of maintaining the integrity and confidentiality of sensitive information within cloud environments. Our commitment to data security is reflected in the design and implementation of our cloud apps.

Cloud Fortified

Our cloud apps are meticulously engineered to ensure robust security measures within the cloud infrastructure. For this our cloud apps have the “cloud fortified” badge from Atlassian.

Find more information about the cloud fortified program here:

Bug Bounty Program

The Marketplace Security Bug Bounty program is a collaboration between Atlassian and Marketplace Partners aiming to continuously improve the security posture of Atlassian Marketplace apps by leveraging crowdsourced vulnerability discovery methods available through bug bounty.

More information: https://developer.atlassian.com/platform/marketplace/marketplace-security-bug-bounty-program/

Non-Storage of User Data

Unlike some other platforms, Mirrorlake Software cloud apps do not store any user data on our own servers. We operate on a zero-storage policy, meaning that all user data remains within the Atlassian Cloud environment. This approach minimizes the risk of data breaches and unauthorized access, as sensitive information never leaves the trusted confines of the Atlassian ecosystem.

Encryption

To further enhance data security, we employ strong encryption mechanisms to safeguard data transmission and storage. All communication between our cloud apps and the Atlassian Cloud platform is encrypted using industry-standard protocols, ensuring that data remains protected both in transit and at rest.

Compliance

Mirrorlake Software is committed to complying with relevant data protection regulations and standards. Our data security practices align with industry regulations such as GDPR and others, ensuring that user data is handled with the utmost care and in accordance with applicable laws.

More information about GDPR handling can be found here:

Continuous Monitoring and Auditing

We continuously monitor our cloud infrastructure and applications for any suspicious activities or anomalies. Through proactive monitoring and regular audits, we promptly identify and address potential security threats, thereby maintaining the integrity and security of our cloud apps.

Monitoring includes:

  • App availability Monitor

  • Malware protection scans

At Mirrorlake Software, we are committed to providing our customers with cloud apps that not only deliver exceptional functionality but also prioritize the security and privacy of their data. Through stringent security measures, adherence to industry standards, and a dedication to continuous improvement, we strive to maintain the trust and confidence of our users in an ever-evolving digital landscape.