Security Policy

Last Updated: March 20, 2026

Overview

LinkMap is a Jira and Service Desk add-on that prioritizes security and privacy. This document outlines our security architecture, data handling practices, and measures to protect customer data.

Architecture and Technology Stack

Hybrid Architecture

LinkMap operates using a hybrid architecture combining Atlassian Forge (frontend) and Atlassian Connect (backend remote):

Infrastructure Provider

Data Collection and Storage

What Data We Collect

LinkMap follows the principle of data minimization, collecting only what is necessary for functionality:

Data Type Purpose Storage Location Personal Data?
Atlassian Account ID Associate saved layouts and settings with users Heroku PostgreSQL (EU) Yes (online identifier)
Instance authentication data (base URL, client key, public key) JWT authentication and secure communication Heroku PostgreSQL (EU) No
User-created configurations (saved layouts, JQL queries, display settings) Provide personalized functionality Heroku PostgreSQL (EU) No (associated with Account ID)
Application logs Security monitoring, error diagnosis, support Heroku (EU) No (anonymized)

What We Don't Collect

Data Storage Details

Data Deletion

We implement multiple mechanisms to ensure timely data deletion:

Authentication and Access Control

User Authentication

Administrative Access

Permission Scopes and Justification

LinkMap requests the minimum permissions necessary for functionality, following the principle of least privilege:

Scope Justification Risk Level
read:jira-work Essential: Read issue and link data for visualization (core functionality) Low - Read Only
read:connect-jira Required: Validate JQL queries Low - Read Only
read:jql:jira Essential: Execute JQL searches to define issue scope for layouts Low - Read Only
delete:issue-link:jira Required: Allow users to delete links (user-initiated action only, respects permissions) Medium - Write
read:sprint:jira-software Feature: Apply LinkMap to sprint issues in Jira Software Low - Read Only
read:app-user-token Architecture: Enable remote backend to invoke Atlassian APIs with user permissions (Forge remote requirement) Low - Token Only
report:personal-data GDPR Compliance: Use Personal Data Reporting API to identify closed accounts for data deletion Low - Compliance

Scope Usage Details

Data Flow and Browser Communication

Security Measures (Technical and Organizational)

Technical Security Measures

Organizational Security Measures

Vulnerability Management

GDPR and Privacy Compliance

Data Subject Rights

We support all GDPR data subject rights:

Contact: To exercise any of these rights, contact LinkMap@buering.net

Personal Data Reporting API

Data Processing Agreement

Data Residency

Current Implementation

Forge Remote and Data Residency

For apps using Forge Remote (like LinkMap), Atlassian provides realm pinning capabilities. However, since LinkMap stores data in a fixed European location via Heroku, automatic migration is not currently supported. Customers requiring specific data residency guarantees should contact us to discuss options.

Compliance and Certifications

Our Commitments

Infrastructure Provider Certifications

Heroku/Salesforce maintains the following certifications:

Incident Response

Security Incident Procedures

Breach Notification

In the event of a personal data breach, we will:

Support Data Handling

Customer Support

Customer Responsibilities

No Third-Party Data Sharing

Updates to This Security Policy

We reserve the right to update this Security Policy as our practices evolve or as required by law. Material changes will be announced through:

Customers are encouraged to review this policy periodically to stay informed about how we protect data.

Contact and Responsible Disclosure

For security concerns, questions, or to report a vulnerability, please contact:

Security Contact:
Thorsten Büring
LinkMap@buering.net
Bommershöfer Weg 46
40670 Meerbusch
Germany

Responsible Disclosure: If you discover a security vulnerability, please report it to us at LinkMap@buering.net. We request that you do not publicly disclose the issue until we have had an opportunity to address it. We will acknowledge receipt within 48 hours and provide a timeline for resolution.

Acceptance

Related Documentation