Understand your JSM environment. Install structure. Improve operations.Get Early Access →

Security

How JSM LaunchPad protects your data, our security posture, and CSA CAIQ self-assessment.

JSM LaunchPad is an Atlassian Forge application that runs entirely within Atlassian Cloud infrastructure. The app does not host customer data outside Atlassian, does not operate external servers, and relies on Atlassian's own authentication and permission controls. All data at rest is encrypted with AES-256 and all data in transit is protected by TLS 1.2+, managed by the Atlassian platform. A Cloud Security Alliance (CSA) CAIQ self-assessment covering 283 controls across 17 security domains is available below.

No External Servers

JSM LaunchPad runs on Atlassian Forge. There are no third-party servers, no external databases, and no data leaving the Atlassian trust boundary.

Least Privilege

The Forge manifest declares only the minimum permission scopes required. The app requests only JSM Assets API permissions necessary for schema deployment.

Tenant Isolation

Multi-tenant isolation is enforced by the Forge platform at the infrastructure level. Each customer's data is fully segregated by Atlassian.

Data Handling

JSM LaunchPad processes CMDB configuration metadata — object types, attributes, and relationships. The app processes limited personal data provided by Atlassian Forge (Atlassian account ID and permission context) solely for authorisation and audit purposes. The app does not access or store user content, tickets, attachments, or CMDB records outside the Atlassian platform.

Data processed

JSM Assets schema definitions: object type names, attribute configurations, reference types, and optional sample data for seeding.

Data residency

All processing occurs within Atlassian Forge infrastructure (AWS regions). No data is transferred outside the platform.

Data portability

On app uninstallation, all schemas and data created by the app remain in the customer's JSM Assets instance. No data is held hostage.

Storage encryption

Forge Storage is encrypted at rest with AES-256 and in transit with TLS 1.2+, managed entirely by the Atlassian platform.

Privacy by design

The app minimises data collection, processes only limited personal data required for authorisation, respects tenant boundaries enforced by Forge, and defaults to the most privacy-preserving configuration.

External calls

The only external endpoint the app communicates with is api.atlassian.com for Atlassian API operations. No third-party services. The app never requests Atlassian user passwords, API tokens, or personal credentials. Authentication is handled entirely through Atlassian Forge app authentication.

Logging and operational metrics

Application logs do not contain personal data. Operational logs may include technical identifiers such as Atlassian Account ID strictly for audit and debugging purposes. All logs remain within Atlassian Forge infrastructure and are not accessible to Let's Talk Solutions outside the Atlassian platform.

The app also records lightweight operational metrics (aggregated usage counters and a rolling log of the most recent 20 events) within Forge storage in the customer's own Jira Cloud tenant. These metrics contain no personal data and are never transmitted externally. They power the in-app activity dashboard and diagnostics bundle, and are removed automatically on uninstall. Full details are described in our Privacy Policy.

Shared Responsibility Model

As a Forge marketplace app, security responsibilities are shared between Atlassian (the cloud service provider) and Let's Talk Solutions Ltd (the app vendor). This follows the CSA Shared Security Responsibility Model (SSRM).

Security domain Owner Detail
Infrastructure & datacenter Atlassian Physical security, network, compute, OS hardening, time synchronisation
Encryption & key management Atlassian AES-256 at rest, TLS 1.2+ in transit, key lifecycle management
Authentication & SSO Atlassian User authentication, SSO integration, session management
Backup & disaster recovery Atlassian Platform-level backups, availability SLAs, failover
Permission scoping Shared Atlassian enforces Forge scopes; app declares minimum required permissions
API security Shared Forge authentication framework + app-level permission scoping and input validation
Logging & monitoring Shared Forge platform logging + app-level structured logging for operations audit
Data minimisation Shared Platform-level encryption + app-level data minimisation and privacy-by-design
Application security (SDLC) Let's Talk Solutions Secure development lifecycle, code reviews, automated testing, deployment via Forge CLI
Dependency management Let's Talk Solutions npm audit, Dependabot/Snyk scanning, SBOM via package-lock.json
Change management Let's Talk Solutions Git version control, pull request reviews, CI/CD pipeline, Forge deployment controls
Incident response Let's Talk Solutions Defined procedures, Jira tracking, breach notification within 72 hours
Governance & compliance Let's Talk Solutions Policy reviews, regulatory mapping, GDPR & UK DPA 2018 compliance

Vulnerability Management

Dependencies are continuously scanned using automated tools (npm audit, Dependabot, Snyk). Vulnerabilities are triaged by CVSS score with the following remediation targets:

Critical
24 hours
High
72 hours
Medium
2 weeks
Low
Next release

CSA CAIQ Self-Assessment

We have completed a Cloud Security Alliance (CSA) Consensus Assessment Initiative Questionnaire (CAIQ) v4.1 covering 283 controls across 17 security domains. The assessment follows the CSA Shared Security Responsibility Model, documenting which controls are owned by Atlassian (CSP), by Let's Talk Solutions (CSC), or shared.

185
Controls answered Yes
98
Not applicable (CSP-managed)
0
Controls answered No
17
Security domains covered

Domain coverage

Application & Interface Security
13 Yes
Audit & Assurance
5 Yes3 NA
Business Continuity Mgmt
6 Yes13 NA
Change Control & Configuration
12 Yes
Cryptography & Key Mgmt
4 Yes19 NA
Data Security & Privacy
19 Yes5 NA
Datacenter Security
28 NA
Governance, Risk & Compliance
10 Yes
Human Resources
7 Yes13 NA
Identity & Access Mgmt
19 Yes
Infrastructure Security
8 Yes7 NA
Interoperability & Portability
8 Yes
Logging & Monitoring
12 Yes7 NA
Security Incident Mgmt
16 Yes
Supply Chain Mgmt
19 Yes
Threat & Vulnerability Mgmt
14 Yes1 NA
Universal Endpoint Mgmt
13 Yes2 NA

Download CAIQ Assessment

Complete CSA CAIQ v4.1 with 283 answered controls, implementation descriptions, and SSRM ownership classification.

PDF · CAIQ v4.1.0 · February 2026
Download PDF

Regulatory Compliance

JSM LaunchPad is developed and operated by Let's Talk Solutions Ltd, a UK-registered company. The app complies with applicable data protection and marketplace regulations.

GDPR
UK Data Protection Act 2018
Atlassian Marketplace Partner Agreement
Forge Security Requirements
CSA CAIQ v4.1

A Data Protection Impact Assessment (DPIA) is not required because the app performs only limited, transient processing of Atlassian account identifiers within Atlassian-managed infrastructure and does not persist personal data beyond the runtime session. Material breaches are reported within GDPR/UK DPA mandated timeframes (72 hours to supervisory authority where applicable).

Data Protection Roles

Data Controller

The customer organisation that installs JSM LaunchPad. The controller determines the purposes and means of processing any data within their Jira instance.

Data Processor

Atlassian, as the operator of the Forge platform and Jira Service Management infrastructure on which the app executes.

Sub-processor

JSM LaunchPad (the app) operates as a sub-processor under Atlassian's data processing framework. It processes data only within Atlassian-managed infrastructure and solely for the purposes initiated by the customer.

Security Contact

If you have security questions, need the CAIQ for procurement review, or want to report a vulnerability, contact us at security@jsm-launchpad.com or raise a request through the support portal.

For data protection and privacy enquiries, see our Privacy Policy or contact privacy@jsm-launchpad.com.

Last updated: February 2026

Ready to Get Started?

See what LaunchPad installs into your Jira Service Management environment, or get in touch to discuss your implementation.