Wednesday, February 11, 2026, 2:35 PM - 2:50 PM at Polaris AB

Secure by Default: How Government Teams Can Harden Atlassian Cloud Without Killing Collaboration

Government agencies don’t just need “cloud”—they need defense in depth for highly sensitive workloads, from health data to mission operations. This lightning talk walks through a practical, opinionated blueprint for locking down Atlassian Government Cloud and Commercial Cloud Enterprise so you can meet stringent requirements without grinding collaboration to a halt.


We’ll start by reframing how you think about cloud architecture versus on‑prem—sites vs. instances, and the new concept of an Atlassian Organization. From there, we’ll dig into concrete decisions that matter for auditors: how many org, site, and product admins you should have (and how to keep them from becoming crown‑jewel targets), how to structure SSO and your identity provider for AGC and commercial, and when to split sites by sensitivity or app usage.


Finally, we’ll cover the high‑impact controls: data security policies, IP allowlists, audit log retention, and key product settings (like bulk changes, dashboards, and project creation) that can quietly expose data if left at defaults. Attendees leave with a concrete checklist they can bring back to their ISSO and security teams the same day.

Tags
Track
session option 2