SlideShare a Scribd company logo
SaaS Shared Responsibility Model
Strategies to Protect Your Cloud Data
Vish Reddy
Topics of Discussion
● Who is responsible for data in a SaaS application
● What is the shared responsibility model
● SaaS data protection strategies for Atlassian
● How can Revyz Help
Who is Responsible for Data in SaaS
I can’t be
responsible
for that!
It’s the cloud
SaaS Data Loss | Who is responsible?
SaaS Data Loss | Top Causes
1 Service outage / data corruption 22%
2 Accidental deletion 20%
3 External malicious deletion 19%
4 Inability to recover from current backups 12%
5 Misunderstanding of retention / deletion policies 9%
6 Account closure 8%
7 Internal Malicious deletion 6%
8 Don't know 4%
9 Other 1%
Greater than
of Data loss is
due to deletion of
data
ESG Research Report: Evolution of Data Protection Cloud Strategies
https://www.esg-global.com/hubfs/ESG-Infographic-DP-Cloud-Strategies.pdf
50%
SaaS Data Loss | Impact to You?
● What type of data do you have in your Atlassian Apps?
○ Software development
○ Product plans
○ Customer requests
○ Change management
○ Business HR / Legal / Finance
○ …
● What would be the impact if you lose any of the data?
Atlassian community posts
SaaS Data Loss | Impact
Loss in revenue &
reputation
An hour of downtime costs
$8,000 for a small company,
$74,000 for a medium
company and $700,000 for a
large enterprise1
1. The cost of downtime - Datto (https://www.datto.com/au/resources/the-cost-of-downtime)
2. Real costs of data loss - (https://www.backupify.com/blog/the-real-costs-of-data-loss)
Inability to meet audit &
compliance
Depending on the severity of
negligence, a HIPAA violation
can cost anywhere from $100
to $50,000 per record2
Productivity loss
Cost of productivity
$8,500 per hour2
On-Premises vs. SaaS
Courtesy - Checkpoint
Shared Responsibility Model | SaaS Industry
https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility https://www.veeam.com/blog/salesforce-shared-responsibility-model.html
Customer Responsible for Endpoint Security,
Access Management & Data Protection
Shared Responsibility Model | Atlassian Model
“We do not use these backups to revert
customer-initiated destructive changes, such
as fields overwritten using scripts, or deleted
issues, projects, or sites. To avoid data loss, we
recommend making regular backups.
Trust at Atlassian / Security @ Atlassian / Security Practices
https://www.atlassian.com/trust/security/security-practices#service-availability
Atlassian Cloud Security Shared Responsibilities
https://www.atlassian.com/whitepapers/cloud-security-shared-responsibilities
Shared Responsibility Model | Key Takeaways
01 Policy & Compliance
● Assess the suitability of Atlassian Cloud-based platforms based on the information
Atlassian provides
● Protect your endpoints through good security practices
02 Users
● Who accesses the Atlassian platform and what access they have to your data is
your responsibility
03 Information ● Create backups of your data
04 Marketplace Apps
● Assess the suitability of any Marketplace Apps you want to use
● Notify Atlassian of any malicious behavior identified in a Marketplace App
Types of Disasters & Ownership
Disaster Type
Data Center
Disaster
Data Center Data
Breach
Data
Breach
3rd Party
Errors
Malicious
Deletion
Data Import
Human
Error
Frequency of Occurrence Rare Occasional Frequent
Responsibility SaaS Vendor Customer
Increasing probability
Atlassian Jira | Data Protection Gaps
Customer tenant
Accidental
deletion
Bulk changes
Configuration
changes
Insider attack
Account
takeover
Data risks
60 days
Permanent data loss
● Only projects are sent to trash can
● Issues, attachments, comments, config
objects - deletion is immediate
Immediate
deletion
Projects
Only
Impact / Exposure
Motive 👉 Accidental
Malicious
Insider
Malicious
Outsider
Site Admin Entire Site
Project Admin Projects & Configuration*
User Based on Permissions Given
Automation Based on Permissions Given
*Configuration changes can have a bigger impact
Issue deletion in Jira is silent & permanent - no log of deletion available
SaaS Data Loss | Impact
Atlassian Data Protection Strategies
● Do nothing
● Access management controls
● CSV exports
● Database export
● Backup as a service
Alternate
Cloud
Backup
Restore
Atlassian | Data Protection Strategies
Process
Data
Management
Data Coverage
Export
Limits
Granular
Restore
Restore
data
loss
Restore
System
downtime
Data Loss
Risk
Do Nothing Extreme
Access Management Controls High
CSV Exports Manual
Manual
Hard to
Catalog
Limited Limited
Manual
Yes
None None High
Database Exports Manual
Manual
Hard to
Catalog
Comprehensive
48 Hr
Cycle
Not
Possible
Yes Yes Medium
Backup As A Service Automatic Automatic
Depends on
Service
None Yes None None Low
Notes:
● Database Exports could be automated with some scripting, scripts have to be maintained, high dependency on data set size for scripts to work
● Data Management= Storage, Cataloging, Policy & Governance
● Granular restore includes the ability to search and restore in targeted manner
● Restore data loss depends on how old the last backup was
● Complete restore of the database leads to data loss and downtime of the overall system
Revyz Jira Software Backup & Restore Service
Automatic backups and stress-free data recovery for your Jira
Software - Secure, Native and Compliant
CLOUD FORTIFIED
Atlassian Cloud
Backup
Restore
Revyz Cloud
Backed by:
● Automatic daily backups & On-demand
backups
● Easy, Granular data Restores
● End to End Native Atlassian Experience
● 1 yr data retention
● Unlimited backups & restores with upto
250GB in attachments
Thank You

More Related Content

Similar to Shared Responsibility - Presentation ACE Vancouver.pdf

Getting Managers to Ride the Cloud
Getting Managers to Ride the CloudGetting Managers to Ride the Cloud
Getting Managers to Ride the Cloud
David Amaya
 
Optimize Atlassian Cloud for your Business Process and Compliance Needs
Optimize Atlassian Cloud for your Business Process and Compliance NeedsOptimize Atlassian Cloud for your Business Process and Compliance Needs
Optimize Atlassian Cloud for your Business Process and Compliance Needs
Cprime
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Christian Buckley
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
AndreBolo1
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
 
Team 2022 Recap - YVR ACE May '22.pdf
Team 2022 Recap - YVR ACE May '22.pdfTeam 2022 Recap - YVR ACE May '22.pdf
Team 2022 Recap - YVR ACE May '22.pdf
BrendanByers2
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Kaseya
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
Amazon Web Services
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
DATAVERSITY
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
Data Blueprint
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
Thomas Teske
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
Cloudera, Inc.
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
Happiest Minds Technologies
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
Darren Cunningham
 
8 Process Engineering
8 Process Engineering8 Process Engineering
8 Process Engineering
Jeremiah Loscalzo
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
 
What’s Happening in Information Risk Management
What’s Happening in Information Risk ManagementWhat’s Happening in Information Risk Management
What’s Happening in Information Risk Management
Michael S. Gurican
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 

Similar to Shared Responsibility - Presentation ACE Vancouver.pdf (20)

Getting Managers to Ride the Cloud
Getting Managers to Ride the CloudGetting Managers to Ride the Cloud
Getting Managers to Ride the Cloud
 
Optimize Atlassian Cloud for your Business Process and Compliance Needs
Optimize Atlassian Cloud for your Business Process and Compliance NeedsOptimize Atlassian Cloud for your Business Process and Compliance Needs
Optimize Atlassian Cloud for your Business Process and Compliance Needs
 
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
Team 2022 Recap - YVR ACE May '22.pdf
Team 2022 Recap - YVR ACE May '22.pdfTeam 2022 Recap - YVR ACE May '22.pdf
Team 2022 Recap - YVR ACE May '22.pdf
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
Data Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: CloudData Systems Integration & Business Value Pt. 2: Cloud
Data Systems Integration & Business Value Pt. 2: Cloud
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
Cloud Data Integration Best Practices
Cloud Data Integration Best PracticesCloud Data Integration Best Practices
Cloud Data Integration Best Practices
 
8 Process Engineering
8 Process Engineering8 Process Engineering
8 Process Engineering
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
What’s Happening in Information Risk Management
What’s Happening in Information Risk ManagementWhat’s Happening in Information Risk Management
What’s Happening in Information Risk Management
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Shared Responsibility - Presentation ACE Vancouver.pdf

  • 1. SaaS Shared Responsibility Model Strategies to Protect Your Cloud Data Vish Reddy
  • 2. Topics of Discussion ● Who is responsible for data in a SaaS application ● What is the shared responsibility model ● SaaS data protection strategies for Atlassian ● How can Revyz Help
  • 3. Who is Responsible for Data in SaaS I can’t be responsible for that! It’s the cloud
  • 4. SaaS Data Loss | Who is responsible?
  • 5. SaaS Data Loss | Top Causes 1 Service outage / data corruption 22% 2 Accidental deletion 20% 3 External malicious deletion 19% 4 Inability to recover from current backups 12% 5 Misunderstanding of retention / deletion policies 9% 6 Account closure 8% 7 Internal Malicious deletion 6% 8 Don't know 4% 9 Other 1% Greater than of Data loss is due to deletion of data ESG Research Report: Evolution of Data Protection Cloud Strategies https://www.esg-global.com/hubfs/ESG-Infographic-DP-Cloud-Strategies.pdf 50%
  • 6. SaaS Data Loss | Impact to You? ● What type of data do you have in your Atlassian Apps? ○ Software development ○ Product plans ○ Customer requests ○ Change management ○ Business HR / Legal / Finance ○ … ● What would be the impact if you lose any of the data? Atlassian community posts
  • 7. SaaS Data Loss | Impact Loss in revenue & reputation An hour of downtime costs $8,000 for a small company, $74,000 for a medium company and $700,000 for a large enterprise1 1. The cost of downtime - Datto (https://www.datto.com/au/resources/the-cost-of-downtime) 2. Real costs of data loss - (https://www.backupify.com/blog/the-real-costs-of-data-loss) Inability to meet audit & compliance Depending on the severity of negligence, a HIPAA violation can cost anywhere from $100 to $50,000 per record2 Productivity loss Cost of productivity $8,500 per hour2
  • 9. Shared Responsibility Model | SaaS Industry https://learn.microsoft.com/en-us/azure/security/fundamentals/shared-responsibility https://www.veeam.com/blog/salesforce-shared-responsibility-model.html Customer Responsible for Endpoint Security, Access Management & Data Protection
  • 10. Shared Responsibility Model | Atlassian Model “We do not use these backups to revert customer-initiated destructive changes, such as fields overwritten using scripts, or deleted issues, projects, or sites. To avoid data loss, we recommend making regular backups. Trust at Atlassian / Security @ Atlassian / Security Practices https://www.atlassian.com/trust/security/security-practices#service-availability Atlassian Cloud Security Shared Responsibilities https://www.atlassian.com/whitepapers/cloud-security-shared-responsibilities
  • 11. Shared Responsibility Model | Key Takeaways 01 Policy & Compliance ● Assess the suitability of Atlassian Cloud-based platforms based on the information Atlassian provides ● Protect your endpoints through good security practices 02 Users ● Who accesses the Atlassian platform and what access they have to your data is your responsibility 03 Information ● Create backups of your data 04 Marketplace Apps ● Assess the suitability of any Marketplace Apps you want to use ● Notify Atlassian of any malicious behavior identified in a Marketplace App
  • 12. Types of Disasters & Ownership Disaster Type Data Center Disaster Data Center Data Breach Data Breach 3rd Party Errors Malicious Deletion Data Import Human Error Frequency of Occurrence Rare Occasional Frequent Responsibility SaaS Vendor Customer Increasing probability
  • 13. Atlassian Jira | Data Protection Gaps Customer tenant Accidental deletion Bulk changes Configuration changes Insider attack Account takeover Data risks 60 days Permanent data loss ● Only projects are sent to trash can ● Issues, attachments, comments, config objects - deletion is immediate Immediate deletion Projects Only
  • 14. Impact / Exposure Motive 👉 Accidental Malicious Insider Malicious Outsider Site Admin Entire Site Project Admin Projects & Configuration* User Based on Permissions Given Automation Based on Permissions Given *Configuration changes can have a bigger impact Issue deletion in Jira is silent & permanent - no log of deletion available SaaS Data Loss | Impact
  • 15. Atlassian Data Protection Strategies ● Do nothing ● Access management controls ● CSV exports ● Database export ● Backup as a service Alternate Cloud Backup Restore
  • 16. Atlassian | Data Protection Strategies Process Data Management Data Coverage Export Limits Granular Restore Restore data loss Restore System downtime Data Loss Risk Do Nothing Extreme Access Management Controls High CSV Exports Manual Manual Hard to Catalog Limited Limited Manual Yes None None High Database Exports Manual Manual Hard to Catalog Comprehensive 48 Hr Cycle Not Possible Yes Yes Medium Backup As A Service Automatic Automatic Depends on Service None Yes None None Low Notes: ● Database Exports could be automated with some scripting, scripts have to be maintained, high dependency on data set size for scripts to work ● Data Management= Storage, Cataloging, Policy & Governance ● Granular restore includes the ability to search and restore in targeted manner ● Restore data loss depends on how old the last backup was ● Complete restore of the database leads to data loss and downtime of the overall system
  • 17. Revyz Jira Software Backup & Restore Service Automatic backups and stress-free data recovery for your Jira Software - Secure, Native and Compliant CLOUD FORTIFIED Atlassian Cloud Backup Restore Revyz Cloud Backed by: ● Automatic daily backups & On-demand backups ● Easy, Granular data Restores ● End to End Native Atlassian Experience ● 1 yr data retention ● Unlimited backups & restores with upto 250GB in attachments