Is Atlassian HIPAA Compliant? BAA and Security Controls for Jira & Confluence

Product Pricing Demo Video Free HIPAA Training
LATEST
video thumbnail
Admin Dashboard Walkthrough Jake guides you step-by-step through the process of achieving HIPAA compliance
Ready to get started? Book a demo with our team
Talk to an expert

Is Atlassian HIPAA Compliant? BAA and Security Controls for Jira & Confluence

Kevin Henry

HIPAA

June 20, 2025

8 minutes read
Share this article
Is Atlassian HIPAA Compliant? BAA and Security Controls for Jira & Confluence

Business Associate Agreement Requirements

Atlassian can support HIPAA requirements for Jira and Confluence when you have a signed Business Associate Agreement (BAA) and you implement appropriate HIPAA security controls. A BAA sets the terms under which a vendor can handle Protected Health Information (PHI) and clarifies shared responsibilities.

What a BAA typically covers

  • Permitted and required uses/disclosures of PHI by the business associate.
  • Administrative, physical, and technical safeguards aligned to the HIPAA Security Rule.
  • Breach notification timelines and cooperation duties.
  • Subcontractor management and flow-down obligations.
  • Return or destruction of PHI at termination and ongoing compliance cooperation.

Eligibility and scope

  • BAAs are available only for eligible paid cloud offerings; free plans are not eligible.
  • The BAA applies to in-scope products and features defined in the agreement; features or third-party Marketplace apps outside that scope are your responsibility.
  • You must ensure any integrated vendor that can access PHI has its own BAA or contractual safeguards.

Your responsibilities under the BAA

  • Limit PHI to the minimum necessary and document Protected Health Information Handling policies.
  • Configure identity, access, and Compliance Configuration settings that meet your risk analysis.
  • Maintain workforce training, incident response, and Data Redaction Policies for risky channels like email and chat.

Configuring Atlassian for HIPAA Compliance

Configuration is where you translate policy into enforceable controls. The goal is to prevent PHI exposure, restrict access, and create an auditable trail.

Identity and access management

  • Enable SSO with SAML and enforce MFA for all users; provision/deprovision with SCIM to keep access current.
  • Apply least privilege using groups, project roles, and space permissions; remove generic or shared accounts.
  • Set session timeouts and consider IP allowlisting to reduce risk from untrusted networks.

Authorization and sharing controls

  • Jira: design permission schemes, issue security levels, and screen schemes that prevent PHI visibility to unauthorized roles.
  • Confluence: restrict spaces and pages; disable anonymous access and public links.
  • Attachments: block public sharing; require login to view; restrict download rights for high-risk groups.

Data protection and PHI Data Tagging

  • Create PHI Data Tagging conventions (for example, labels or custom fields like “PHI: yes/no” and “PHI category”).
  • Use structured fields for identifiers (patient ID, case ID) and avoid free-text PHI whenever possible.
  • Set Data Redaction Policies for comments, descriptions, and email content (mask SSNs, dates of birth, phone numbers, and addresses when detected).
  • Apply data residency/retention options aligned to your regulatory needs and internal records schedules.

Monitoring, logging, and response

  • Enable organization and product audit logs; centralize exports for long-term retention and review.
  • Alert on high-risk events: permission changes, public link creation, mass exports, or failed SSO attempts.
  • Document incident handling with clear playbooks for containment, eradication, and notification.

Integrations and Marketplace apps

  • Allowlist only vetted apps with minimal scopes; disable or remove apps that are not essential.
  • Ensure third parties with PHI exposure sign a BAA or equivalent contractual safeguards.
  • Review outbound webhooks and automation actions for unintended PHI transmissions.

Handling Protected Health Information in Jira and Confluence

Designate where PHI may appear, restrict it, and apply Safe-by-Default templates so staff avoid accidental disclosure.

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Jira: field design and workflows

  • Create PHI-specific custom fields and hide them from default screens; surface only to authorized roles.
  • Use issue security levels based on PHI tags to auto-restrict visibility when PHI is present.
  • Build workflows that require approval before PHI-bearing issues transition to broader audiences.

Confluence: space and page protections

  • Use dedicated PHI-restricted spaces with tight groups; apply page-level restrictions by default.
  • Provide page templates with PHI warnings, data minimization tips, and storage locations for identifiers.
  • Disable public or anonymous access and prevent public sharing of attachments.

Minimization, labeling, and lifecycle

  • Prefer pseudonymous IDs over names or full identifiers; keep look-up tables in a separate, more restricted area.
  • Apply PHI Data Tagging labels to issues and pages to drive automation, reporting, and access controls.
  • Archive or delete PHI content according to retention schedules; avoid copying PHI into test or demo projects.

Safe Customer Notifications in Jira Service Management

Email is a frequent source of leakage. Configure Safe Customer Notifications so PHI never leaves your boundary unintentionally.

Configuration essentials

  • Customize customer notification templates to remove free-text content; include only ticket numbers and portal links.
  • Disable inclusion of attachments or comment bodies in outbound emails for PHI-bearing request types.
  • Train agents to use internal comments for PHI and to convert misrouted public comments into internal notes.

Automation-based Data Redaction Policies

  • Create automation rules that detect PHI patterns (e.g., 9-digit SSN-like numbers, DOB formats) and replace them with “[redacted]”.
  • Block or hold notifications when PHI is detected; route for manual review or require agent confirmation.
  • Strip sensitive fields from the payload of notification events; log redaction actions to your audit trail.

Channel and access hygiene

  • Prefer the customer portal over inbound email for PHI; restrict who can raise requests via email.
  • Require authentication to view request details; prevent unauthenticated users from accessing ticket content.
  • Periodically test templates and notifications to confirm no PHI slips into subject lines or bodies.

Disabling AI Features to Protect PHI

Generative features can increase productivity but may expand data exposure. If your policy prohibits PHI in AI systems, disable them.

Organization-level controls

  • Turn off Atlassian Intelligence at the organization or product level where PHI could be present.
  • Disable AI for risky surfaces such as issue/page summarization, rewrite suggestions, and conversational assistants.
  • Restrict enablement to an allowlisted pilot group if partial use is necessary and keep PHI out of scope.

Operational safeguards

  • Update training to clarify that PHI must never be entered into AI prompts or virtual agents.
  • Review audit logs for AI feature usage; alert if PHI-tagged content is accessed by AI components.
  • Document your stance in policy and in-product help so end users understand acceptable use.

HIPAA Implementation Guide Overview

This guide summarizes a pragmatic path to make Jira and Confluence safe for PHI while honoring HIPAA Security Controls.

Phase 1 — Assess and plan

  • Inventory PHI data elements, flows, and storage locations; run a risk analysis and define use cases.
  • Decide which projects, spaces, and request types are allowed to store PHI; everything else remains PHI-free.

Phase 2 — Contracts and scope

  • Execute the Business Associate Agreement (BAA) for eligible products and confirm in-scope features.
  • Vet Marketplace apps and integrations; obtain BAAs or remove them from PHI environments.

Phase 3 — Configuration and hardening

  • Implement SSO/MFA, SCIM, least-privilege permissions, and IP allowlists.
  • Stand up PHI Data Tagging, Safe Customer Notifications, and Data Redaction Policies.
  • Disable AI features where PHI might appear; configure audit logging and alerting.

Phase 4 — Validation and training

  • Run tabletop exercises and red-team tests for email leaks, exports, and public links.
  • Train admins, agents, and authors on PHI handling, minimization, and escalation paths.

Phase 5 — Operate and improve

  • Review access quarterly, reconcile audit logs, and measure incidents averted by redaction rules.
  • Continuously refine templates, automation, and retention settings based on lessons learned.

Conclusion

Atlassian can be used with PHI when you pair a signed BAA with disciplined configuration. By enforcing least privilege, tagging PHI, redacting risky content, securing notifications, and disabling AI features where required, you create a defensible, auditable environment for Jira and Confluence.

FAQs

What is a Business Associate Agreement with Atlassian?

A Business Associate Agreement is a contract that defines how Atlassian, as a business associate, safeguards PHI on your behalf. It specifies permitted uses, breach response, subcontractor obligations, and the products/features covered. You remain responsible for configuring security controls, training users, and limiting PHI to the minimum necessary.

How can PHI be protected in Jira and Confluence?

Protect PHI by restricting where it can appear, tagging PHI content, and enforcing least-privilege permissions. Use issue security levels, space/page restrictions, and structured fields. Apply Data Redaction Policies for comments and emails, disable public links, log high-risk events, and require SSO with MFA. Train users to avoid free-text PHI and to use internal notes for sensitive information.

Are free Atlassian plans eligible for HIPAA compliance?

No. Free plans are not eligible for a BAA and lack critical administrative controls. To handle PHI, you need eligible paid plans, a signed BAA, and documented security controls that meet your risk analysis and HIPAA obligations.

What steps are required to enable safe customer notifications?

Customize Jira Service Management notification templates to exclude PHI, send portal links instead of comment bodies, and restrict attachments. Add automation to detect and redact PHI patterns or hold messages for review. Train agents to use internal comments for PHI and require authentication to view ticket details. Periodically test templates to confirm no PHI appears in subjects or email bodies.

Share this article

Ready to simplify HIPAA compliance?

Join thousands of organizations that trust Accountable to manage their compliance needs.

Related Articles