Data encryption after migration
Opsgenie’s edge encryption is no longer available
You can use Atlassian’s BYOK (Bring your own key) encryption as an alternative to edge encryption if you’re migrating to Jira Service Management Enterprise plan.
BYOK encryption can only be enabled on a new site. You should contact support to get support team to create a BYOK-enabled site for you. In this case, you cannot migrate your data automatically with Opsgenie’s migration tool. You must migrate your data manually.
Your previously encrypted alerts will remain encrypted during the migration and cannot be decrypted.
In Jira Service Management we recommend using edge encryption with Bring Your Own Key (BYOK) encryption. Read more about BYOK encryption.
Migration summary
Is this feature fully available in all Jira Service Management plans?
Jira Service Management supports encryption only through BYOK in Enterprise plan.
Is this feature auto-synced after data migration?
Opsgenie data that was previously encrypted remains encrypted after migration, except for the fields that were never encrypted such as alias, message, tags, and priority. You can’t continue to receive encrypted alerts unless you enable BYOK encryption in a new Jira Service Management instance.
Are there required actions for full workflow parity?
If you want to enable edge encryption post-migration, you must manually migrate your data to a BYOK-encrypted Jira Service Management site.
What has changed?
Jira Service Management replaces edge encryption with BYOK encryption
If encryption is required, you can configure BYOK encryption in Jira Service Management to replace edge encryption. To migrate to a BYOK-enabled Jira Service Management site, contact Atlassian Support to request a destination site that supports BYOK encryption. Even if you have an existing Jira Service Management site, you must migrate to a new Jira Service Management site that supports BYOK. It can’t be enabled on an existing site.
Review your security policies to ensure that BYOK encryption settings align with your organization’s security requirements.
Was this helpful?