๐Ÿ›ก๏ธ Security Policy

๐Ÿ›ก๏ธ Security Policy

Built with security-first principles โ€” powered by Atlassian Forge.


๐Ÿงฑ Forge Sandbox

Flow Time Report is developed and deployed on Atlassian Forge, which enforces:

  • Code isolation per app and site

  • Data residency within Atlassian infrastructure

  • Read/write scope restrictions enforced by Forge manifest

  • Zero external server or database exposure


๐Ÿ” Permission Scopes

We only request whatโ€™s absolutely necessary โ€” nothing more.

Flow Time Report requires the following minimal scopes to operate effectively:

๐Ÿ”‘ Scope

Why Itโ€™s Needed

๐Ÿ”‘ Scope

Why Itโ€™s Needed

read:jira-work

Load issue details and status data

write:jira-work

Save badge selections using issue properties

read:jira-user

Display user display names in the status change log

storage:app

(Optional) Used for internal app settings or local persistence

๐Ÿ“Œ All data is stored inside Jira or Atlassian Forgeโ€™s secure storage. No external servers are used.


๐Ÿ—‚๏ธ Data Residency

All runtime activity and storage occurs within Atlassian's own cloud platform.
Flow Time Report does not transmit or store any data outside of Jira.


๐Ÿ” No Secrets Stored

  • No environment variables

  • No secret tokens

  • No user credentials

  • No external endpoints

Everything is handled within the user's active session, and stored only in issue properties.


๐Ÿ‘ฅ User Data

Flow Time Report only accesses displayName for the user who changed a status.
We never access email addresses, full profiles, or internal IDs.


๐Ÿงช Secure Dev Process

We follow secure development practices:

  • Code reviews on every change

  • Scope-based testing

  • Static analysis for React + Forge

  • Manual validation in Forge sandbox


โœ… Atlassian-Backed Protection

Forge apps benefit from Atlassianโ€™s:

  • โœ… SSO authentication

  • โœ… OAuth2-secured APIs

  • โœ… Isolation from other tenants

  • โœ… Enforced permission boundaries

  • โœ… Compliance with ISO/IEC 27001, SOC 2, GDPR