{"id":27130,"date":"2019-04-27T10:08:00","date_gmt":"2019-04-27T09:08:00","guid":{"rendered":"https:\/\/www.automation-consultants.com\/atlassian-%e5%ae%89%e5%85%a8%e5%ae%a1%e8%ae%a1\/"},"modified":"2023-07-17T10:10:32","modified_gmt":"2023-07-17T09:10:32","slug":"atlassian-%e5%ae%89%e5%85%a8%e5%ae%a1%e8%ae%a1","status":"publish","type":"post","link":"https:\/\/www.automation-consultants.com\/cn\/atlassian-%e5%ae%89%e5%85%a8%e5%ae%a1%e8%ae%a1\/","title":{"rendered":"Atlassian \u5b89\u5168\u5ba1\u8ba1"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27130\" class=\"elementor elementor-27130\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c4aaa9e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c4aaa9e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1032eafb\" data-id=\"1032eafb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41df2e21 elementor-widget elementor-widget-text-editor\" data-id=\"41df2e21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<div class=\"wp-block-spacer\" style=\"height: 20px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"526\" class=\"wp-image-8265\" src=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-1024x526.jpg\" alt=\"\" srcset=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-1024x526.jpg 1024w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-600x308.jpg 600w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-300x154.jpg 300w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-768x394.jpg 768w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image.jpg 1091w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns: auto 30%;\">\n<figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"456\" height=\"356\" class=\"wp-image-8268\" src=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Framework.png\" alt=\"\" srcset=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Framework.png 456w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Framework-300x234.png 300w\" sizes=\"(max-width: 456px) 100vw, 456px\" \/><\/figure>\n<div class=\"wp-block-media-text__content\">\n<h5><strong>Framework<\/strong><\/h5>\n\n\n\n<p>As the world we live in becomes increasingly digitised and connected, it has never been more important to protect sensitive data and the reputation of an organisation from the growing array of attack vectors, through ensuring that adequate security strategies are implemented. The <a href=\"https:\/\/www.automation-consultants.com\/cn\/%e4%ba%a7%e5%93%81\/#atlassian-products\" target=\"_blank\" rel=\"noreferrer noopener\">Atlassian stack<\/a> is no exception to this \u2013 while it bolsters growth through enabling good record-keeping, encouraging knowledge-sharing and facilitating collaboration, mismanaged setups and configurations could jeopardise valuable assets.<\/p>\n\n\n\n<p>Automation Consultants has much experience in performing security audits on Atlassian applications such as <a href=\"https:\/\/www.automation-consultants.com\/products\/atlassian-products\/jira-software\" target=\"_blank\" rel=\"noreferrer noopener\">Jira<\/a>, <a href=\"https:\/\/www.automation-consultants.com\/products\/atlassian-products\/confluence\" target=\"_blank\" rel=\"noreferrer noopener\">Confluence<\/a> and <a href=\"https:\/\/www.automation-consultants.com\/products\/atlassian-products\/bitbucket\" target=\"_blank\" rel=\"noreferrer noopener\">Bitbucket<\/a> for all three available deployment options. We have a tried and tested approach developed from our successful framework for <a href=\"https:\/\/www.automation-consultants.com\/cn\/atlassian-%e8%bf%90%e8%a1%8c%e7%8a%b6%e5%86%b5%e6%a3%80%e6%9f%a5\/\" target=\"_blank\" rel=\"noreferrer noopener\">application audits and health checks<\/a> which consist of three phases: identification, presentation and enhancement.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns: 29% auto;\">\n<figure class=\"wp-block-media-text__media\"><img decoding=\"async\" class=\"wp-image-8269\" src=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Identification-1.png\" alt=\"\" \/><\/figure>\n<div class=\"wp-block-media-text__content\">\n<h5><strong>Identification<\/strong><\/h5>\n\n\n\n<p><br \/>During this phase, our consultants will conduct a detailed examination of each application in your Atlassian stack, including any third-party Apps and external integrations. We will document the configurations and interdependencies of your assets and compare them with our list best practices. Depending on how your Atlassian stack is deployed, below are some examples of what this may reveal:<\/p>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-17104db elementor-widget elementor-widget-shortcode\" data-id=\"17104db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div id=\"footable_parent_15412\"\n         class=\" footable_parent ninja_table_wrapper loading_ninja_table wp_table_data_press_parent bootstrap4 \">\n                <table data-ninja_table_instance=\"ninja_table_instance_0\" data-footable_id=\"15412\" data-filter-delay=\"1000\" aria-label=\"Atlassian Security Audit\"            id=\"footable_15412\"\n           data-unique_identifier=\"ninja_table_unique_id_724250575_15412\"\n           class=\" foo-table ninja_footable foo_table_15412 ninja_table_unique_id_724250575_15412 table  nt_type_ajax_table table-striped table-hover vertical_centered  footable-paging-right ninja_table_search_disabled\">\n                <colgroup>\n                            <col class=\"ninja_column_0 \">\n                            <col class=\"ninja_column_1 \">\n                            <col class=\"ninja_column_2 \">\n                            <col class=\"ninja_column_3 \">\n                    <\/colgroup>\n            <\/table>\n    \n    \n    \n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6256fca elementor-widget elementor-widget-text-editor\" data-id=\"6256fca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns: auto 29%;\">\n<figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"456\" height=\"356\" class=\"wp-image-8270\" src=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Presentation.png\" alt=\"\" srcset=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Presentation.png 456w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Presentation-300x234.png 300w\" sizes=\"(max-width: 456px) 100vw, 456px\" \/><\/figure>\n<div class=\"wp-block-media-text__content\">\n<h5><strong>Presentation<\/strong><\/h5>\n\n\n\n<p>Based on our findings, we will produce an executive report which details the state of the existing system. We will also highlight any security vulnerabilities and provide recommendations on mitigation strategies to address them. These suggestions will be broken down into two parts: one advising immediate actions for critical vulnerabilities and one proposing less urgent amelioration for remaining issues. To aid you with estimating the resources and schedule for any patches required, we will provide an assessment on the downtime required and how this would impact regular users in the organisation as well.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\" style=\"grid-template-columns: 30% auto;\">\n<figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"355\" class=\"wp-image-8271\" src=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Enhancement.png\" alt=\"\" srcset=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Enhancement.png 491w, https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Enhancement-300x217.png 300w\" sizes=\"(max-width: 491px) 100vw, 491px\" \/><\/figure>\n<div class=\"wp-block-media-text__content\">\n<h5><strong>Enhancement<\/strong><\/h5>\n\n\n\n<p>If you prefer to have the peace of mind to have everything taken care of for you, our consultants are happy to implement the necessary changes to tighten security based on the approaches discussed in the presentation stage. Alternatively, if you prefer effecting part or all of the recommendations with in-house resources, we could also offer support and guidance for your teams. If you are looking to optimise the inner workings of your Atlassian stack, thinking to set up a project in mind, or seeking someone reliable to <a href=\"https:\/\/www.automation-consultants.com\/support\" target=\"_blank\" rel=\"noreferrer noopener\">support<\/a> your instances, feel free to look through our <a href=\"https:\/\/www.automation-consultants.com\/cn\/%e6%9c%8d%e5%8a%a1\/#atlassian-consultancy\" target=\"_blank\" rel=\"noreferrer noopener\">other offerings<\/a> as well and <a href=\"https:\/\/www.automation-consultants.com\/cn\/%e8%81%94%e7%b3%bb%e6%88%91%e4%bb%ac\/\" target=\"_blank\" rel=\"noreferrer noopener\">let us know<\/a> how else we can assist with your needs.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 40px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<h2 class=\"has-text-align-center\">Get in Touch Today<\/h2>\n\n\n\n<div class=\"wp-block-spacer\" style=\"height: 30px;\" aria-hidden=\"true\">\u00a0<\/div>\n\n\n\n<div class=\"container\">\n<div class=\"col-md-9 offset-md-2\"><!-- [if lte IE 8]>\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]--> <script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script> <script>\n  hbspt.forms.create({\n\tportalId: \"2155711\",\n\tformId: \"5303b6c7-d4f2-417d-9722-20f9bbaba847\"\n});\n<\/script><\/div>\n<\/div>\n\n\n\n<p>&nbsp;<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u65e0\u8bba\u4f60\u662f\u521a\u521a\u5f00\u59cb\u6570\u5b57\u5316\u8f6c\u578b\u4e4b\u65c5\uff0c\u8fd8\u662f\u5df2\u7ecf\u638c\u63e1\u4e86\u4e00\u7cfb\u5217\u81ea\u52a8\u5316\u670d\u52a1\uff0c\u5bf9\u4fdd\u62a4\u654f\u611f\u6570\u636e\u548c\u673a\u6784\u58f0\u8a89\u6765\u8bf4\u81f3\u5173\u91cd\u8981\u7684\u4e00\u4e2a\u8981\u7d20\u662f\u5b89\u5168\u3002Automation Consultants \u62e5\u6709\u4e00\u652f\u7531 Atlassian \u4e13\u5bb6\u7ec4\u6210\u7684\u56e2\u961f\uff0c\u4ed6\u4eec\u53ef\u4ee5\u534f\u52a9\u8bc4\u4f30\u4f60\u7684 Atlassian \u5806\u6808\u7684\u5b89\u5168\u72b6\u51b5\u3002<\/p>\n","protected":false},"author":1,"featured_media":41002,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[54,55],"tags":[],"class_list":["post-27130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-atlassian","category-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants<\/title>\n<meta name=\"description\" content=\"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants\" \/>\n<meta property=\"og:description\" content=\"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"Automation Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/autoconsultUK\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-27T09:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-17T09:10:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-1024x526.jpg\" \/>\n<meta name=\"author\" content=\"Automation Consultants\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@autoconsultUK\" \/>\n<meta name=\"twitter:site\" content=\"@autoconsultUK\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Automation Consultants\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/\"},\"author\":{\"name\":\"Automation Consultants\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#\\\/schema\\\/person\\\/0a131008ef03ee4f6cc0feb3b1360d6c\"},\"headline\":\"Atlassian \u5b89\u5168\u5ba1\u8ba1\",\"datePublished\":\"2019-04-27T09:08:00+00:00\",\"dateModified\":\"2023-07-17T09:10:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/\"},\"wordCount\":400,\"publisher\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Security-Audit-01.png\",\"articleSection\":[\"Atlassian\",\"Services\"],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/\",\"url\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/\",\"name\":\"Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Security-Audit-01.png\",\"datePublished\":\"2019-04-27T09:08:00+00:00\",\"dateModified\":\"2023-07-17T09:10:32+00:00\",\"description\":\"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002\",\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/atlassian-security-audit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Security-Audit-01.png\",\"contentUrl\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Security-Audit-01.png\",\"width\":889,\"height\":495},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#website\",\"url\":\"https:\\\/\\\/www.automation-consultants.com\\\/\",\"name\":\"Automation Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.automation-consultants.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#organization\",\"name\":\"Automation Consultants\",\"url\":\"https:\\\/\\\/www.automation-consultants.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/AC_Profil_Picture_Dark.jpg\",\"contentUrl\":\"https:\\\/\\\/www.automation-consultants.com\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/AC_Profil_Picture_Dark.jpg\",\"width\":1067,\"height\":1067,\"caption\":\"Automation Consultants\"},\"image\":{\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/autoconsultUK\",\"https:\\\/\\\/x.com\\\/autoconsultUK\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/automation-consultants\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.automation-consultants.com\\\/#\\\/schema\\\/person\\\/0a131008ef03ee4f6cc0feb3b1360d6c\",\"name\":\"Automation Consultants\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g\",\"caption\":\"Automation Consultants\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants","description":"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/","og_locale":"zh_CN","og_type":"article","og_title":"Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants","og_description":"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002","og_url":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/","og_site_name":"Automation Consultants","article_publisher":"https:\/\/www.facebook.com\/autoconsultUK","article_published_time":"2019-04-27T09:08:00+00:00","article_modified_time":"2023-07-17T09:10:32+00:00","og_image":[{"url":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2020\/04\/Security-Audit-Cover-Image-1024x526.jpg","type":"","width":"","height":""}],"author":"Automation Consultants","twitter_card":"summary_large_image","twitter_creator":"@autoconsultUK","twitter_site":"@autoconsultUK","twitter_misc":{"\u4f5c\u8005":"Automation Consultants","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"2 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/#article","isPartOf":{"@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/"},"author":{"name":"Automation Consultants","@id":"https:\/\/www.automation-consultants.com\/#\/schema\/person\/0a131008ef03ee4f6cc0feb3b1360d6c"},"headline":"Atlassian \u5b89\u5168\u5ba1\u8ba1","datePublished":"2019-04-27T09:08:00+00:00","dateModified":"2023-07-17T09:10:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/"},"wordCount":400,"publisher":{"@id":"https:\/\/www.automation-consultants.com\/#organization"},"image":{"@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2019\/04\/Security-Audit-01.png","articleSection":["Atlassian","Services"],"inLanguage":"zh-Hans"},{"@type":"WebPage","@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/","url":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/","name":"Atlassian \u5b89\u5168\u5ba1\u8ba1 | Automation Consultants","isPartOf":{"@id":"https:\/\/www.automation-consultants.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/#primaryimage"},"image":{"@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2019\/04\/Security-Audit-01.png","datePublished":"2019-04-27T09:08:00+00:00","dateModified":"2023-07-17T09:10:32+00:00","description":"\u5728\u65e5\u76ca\u6570\u5b57\u5316\u548c\u4e92\u8054\u7684\u4e16\u754c\u4e2d\uff0c\u4fdd\u62a4\u654f\u611f\u6570\u636e\u4ece\u672a\u5982\u6b64\u91cd\u8981\u3002\u7acb\u5373\u4e86\u89e3\u66f4\u591a\u6709\u5173 Atlassian \u5b89\u5168\u5ba1\u8ba1\u7684\u4fe1\u606f\u3002","inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.automation-consultants.com\/atlassian-security-audit\/"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.automation-consultants.com\/atlassian-security-audit\/#primaryimage","url":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2019\/04\/Security-Audit-01.png","contentUrl":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2019\/04\/Security-Audit-01.png","width":889,"height":495},{"@type":"WebSite","@id":"https:\/\/www.automation-consultants.com\/#website","url":"https:\/\/www.automation-consultants.com\/","name":"Automation Consultants","description":"","publisher":{"@id":"https:\/\/www.automation-consultants.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.automation-consultants.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/www.automation-consultants.com\/#organization","name":"Automation Consultants","url":"https:\/\/www.automation-consultants.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.automation-consultants.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2023\/03\/AC_Profil_Picture_Dark.jpg","contentUrl":"https:\/\/www.automation-consultants.com\/wp-content\/uploads\/2023\/03\/AC_Profil_Picture_Dark.jpg","width":1067,"height":1067,"caption":"Automation Consultants"},"image":{"@id":"https:\/\/www.automation-consultants.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/autoconsultUK","https:\/\/x.com\/autoconsultUK","https:\/\/www.linkedin.com\/company\/automation-consultants\/"]},{"@type":"Person","@id":"https:\/\/www.automation-consultants.com\/#\/schema\/person\/0a131008ef03ee4f6cc0feb3b1360d6c","name":"Automation Consultants","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/secure.gravatar.com\/avatar\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f056a600aa11957581fb688bf499dbcf4341c8a93fc87cceb72e9142b174e737?s=96&d=mm&r=g","caption":"Automation Consultants"}}]}},"_links":{"self":[{"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/posts\/27130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/comments?post=27130"}],"version-history":[{"count":64,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/posts\/27130\/revisions"}],"predecessor-version":[{"id":39595,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/posts\/27130\/revisions\/39595"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/media\/41002"}],"wp:attachment":[{"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/media?parent=27130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/categories?post=27130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.automation-consultants.com\/cn\/wp-json\/wp\/v2\/tags?post=27130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}