Security Policy

Last Updated: January 1, 2025

Version: 1.0

1. Security Architecture

Cheap AI for Workplace is designed with a privacy-first, zero-trust architecture that ensures your data never leaves your Jira instance.

🔒 Core Security Design Principles

2. Data Protection Measures

2.1 In-Transit Protection

2.2 At-Rest Protection

Critical: We do not store any of your Jira data at rest. The only data we retain is:

2.3 Processing Security

3. Vulnerability Management

3.1 Security Testing & Assessment

Activity Frequency Scope
Code Security Review Every release Static analysis for OWASP Top 10 vulnerabilities
Dependency Scanning Weekly NPM packages for known CVEs
Penetration Testing Annually Plugin installation and operation
Atlassian Security Check Per Marketplace submission Automated scans and manual review

3.2 Vulnerability Disclosure Program

We welcome security researchers to report vulnerabilities:

⚠️ Out of Scope

3.3 Security Updates

4. Compliance & Certifications

4.1 Atlassian Marketplace Requirements

4.2 Standards Alignment

5. Infrastructure Security

5.1 Website (cheap-ai.net / GitHub Pages)

5.2 Email Infrastructure

6. Incident Response

6.1 Security Incident Definition

Any event that compromises the confidentiality, integrity, or availability of:

6.2 Incident Response Process

Phase Action Timeline
Detection Monitor for anomalies via user reports and automated scans Continuous
Containment Isolate affected systems, revoke access if compromised Within 1 hour
Investigation Root cause analysis, impact assessment Within 24 hours
Notification Notify affected parties (if any) and Atlassian if Marketplace impact Within 48 hours
Remediation Patch, update, and verify fix Within 30 days

6.3 Customer Notification

We will notify you if we become aware of any security incident affecting:

7. User Security Responsibilities

While we ensure our service is secure, you are responsible for:

8. Security Best Practices

✅ Recommended Configuration

9. Audit & Compliance Reports

Available upon request for enterprise customers:

Requests take 5-7 business days to process. Available to customers with active licenses.

10. Security Contact

For all security-related inquiries:

Terms of Service Support Policy Service Level Agreement Privacy Policy End User License Agreement ← Back to Home