Support & Downloads

Izymes builds easy-to-use apps for Atlassian applications that boost your productivity, free you from performing repetitive tasks inside Confluence, Jira and Bitbucket and enable you to use your time for what you do best – YOUR job.

Book a Demo

Interested in a 1-on-1 demonstration of Izymes’s products?
Here we will walk you through;

• All features and benefits of the product you are interested in trying.
• How to set up the account and configure the settings.
• Other tips, tricks and best practices.

It will also give us time to answer any questions you may have, or perhaps you just want to have a chat, we love a good chat.
You can schedule a time on the Calendly link below. Talk soon!

Contact Info
HQ Southport
Queensland, Australia
[email protected]
Follow Us

Izymes Security Incident Response Playbook

Scope

This playbook applies to all security incidents affecting Izymes apps running on the Atlassian Connect platform:

  • Workzone for Bitbucket Cloud (Connect)
  • AI Insights for Jira Service Management

Both apps run on AWS and integrate with Atlassian’s cloud ecosystem.

1. Incident Definition

A security incident includes but is not limited to:

  • Unauthorized access to data or systems
  • Data breach (real or suspected)
  • Compromise of app availability or integrity
  • Privilege escalation or abuse
  • Any issue materially degrading Atlassian’s platform or violating Marketplace Partner expectations

2. Detection & Initial Triage

Event Sources
  • AWS CloudWatch alerts (security group changes, abnormal usage)
  • Atlassian Marketplace partner reports
  • Customer-reported issues
  • Internal code monitoring / anomaly detection
Immediate Steps
StepActionOwner
1.1Acknowledge and triage alertSecurity Lead
1.2Check logs in AWS CloudWatchDevOps
1.3Assess potential data exposureApp Engineer
1.4Escalate severity if Atlassian systems or customer data are at riskIncident Manager

3. Notification & Communication

Contact Atlassian (if affected):
Internal Notifications
  • CTO
  • Engineering Lead
  • Legal/Compliance Advisor
  • Customer Support Manager
Optional External Notifications
  • Privacy Commissioner (if data privacy laws apply)
  • Affected customers (within 72 hours if required)

4. Investigation

StepActionToolOwner
4.1Pull relevant CloudWatch logs for affected resourcesCloudWatchDevOps
4.2Audit IAM roles, API access logs, deployment eventsAWS Console, GuardDutySecurity Lead
4.3Review source code and last deployment via BitbucketBitbucket PipelinesLead Developer
4.4Determine incident timeline and blast radiusTimeline TemplateIncident Manager

5. Containment & Eradication

  • Disable affected access tokens / credentials
  • Rotate secrets via AWS Secrets Manager
  • Isolate vulnerable systems (e.g., restrict public access)
  • Apply hotfixes and rollback if necessary

Optional: Temporarily delist affected app from Atlassian Marketplace if advised.

6. Recover

  • Restore services with validated clean state
  • Validate that all affected systems are patched and secured
  • Monitor logs for recurrence
  • Re-enable any disabled features or access

7. Post-Incident Review

Conduct within 5 business days.

Key Outputs:
  • Incident timeline
  • Root cause
  • Systems affected
  • Data affected (if any)
  • Remediation steps taken
  • Communication sent
  • Future prevention recommendations

Use a Confluence template for structured documentation and link Jira tickets for tasks/remediation.

Roles & Responsibilities

RoleName/TeamResponsibilities
Incident ManagerCTO / AppSec LeadOwns response process
Security LeadAppSecInvestigates root cause, containment
DevOpsCloudOps teamLogs, infrastructure, rollbacks
Developer LeadEngineeringCode review, hotfixes
Customer CommsSupport LeadCustomer messaging
Legal / PrivacyLegal advisorCompliance with regulations