We’re renaming ‘products’ to ‘apps’

Atlassian 'products’ are now ‘apps’. You may see both terms used across our documentation as we roll out this terminology change. Here’s why we’re making this change

Customer-managed key encryption for backups

At Atlassian, we offer two key models for encrypting data at rest:

Understanding the differences between Atlassian-managed and Customer-managed keys is essential for managing your organization's data security. Choose the key model that suits your organization’s policies.

Default Atlassian-managed keys

Default encryption is automatically applied to all data within Atlassian apps. This model uses Atlassian-managed keys to encrypt data, providing a seamless and secure experience without requiring any additional setup from the customers.

Customer-managed keys

Customer-managed keys (CMK) allow organizations to manage their own encryption keys using AWS Key Management Service (KMS). This model provides greater control over encryption keys. Read about setting up and managing customer-managed keys

Back up and restore encrypted Atlassian apps

Back up encrypted Atlassian apps

If you have enrolled in the CMK encryption policy, backups stored in the Atlassian storage will be encrypted with CMK.

Restore encrypted Atlassian apps

You can restore a CMK-enabled backup with CMK to a CMK-enabled app instance.

Back up and restore re-encrypted Atlassian apps

Re-encryption is the process of altering the underlying key material for encrypted data. For Atlassian CMK, this involves decrypting the existing ciphertext using the old key and then re-encrypting the resulting plaintext with a new key. This makes the old keys, together with the backups protected with the old keys, non-functional.

Re-encryption is only applied to the data in scope for CMK. Data protected by Atlassian-managed keys can’t be altered with CMK re-encryption requests.

Back up re-encrypted Atlassian apps

Backups are protected with the active encryption keys in use at that time. When you re-encrypt apps and then back up data, all your previous backups encrypted with old keys are disabled.

For data integrity, backups are skipped during the re-encryption process. All backups taken after re-encryption will be encrypted with the new keys.

Restore re-encrypted Atlassian apps

When restoring a backup, the encryption keys used to back up the data should be active for the restoration to be successful. When an app is re-encrypted, old backups aren’t re-encrypted with the new keys.

After re-encryption, you will not be able to access backups that were encrypted with old keys.

Back up and restore Atlassian apps when keys are revoked

When existing keys are revoked, this will affect your backups and restores.

Back up Atlassian apps when keys are revoked

When you revoke keys in AWS:

  1. Cloud sites or apps encrypted with the key are deactivated.

  2. Backups encrypted with CMKs are unavailable for restoration.

  3. We won’t backup any future data as your Cloud sites are deactivated.

Restore Atlassian apps when keys are revoked

When you revoke keys, any backups encrypted with those keys become unusable.

Still need help?

The Atlassian Community is here for you.