Summary
Scaling Confluence is a complex task that requires careful planning and consideration, especially regarding security. In this chapter, we have outlined the integral components that make up a secure scaling strategy. We saw that identifying security requirements involves understanding your organization’s specific needs and implementing robust access control to ensure that permissions are well-defined. Also, we have learned that including real-time auditing and monitoring adds another layer of protection. Furthermore, we covered how Confluence Cloud handles data security and backups and how creating and maintaining a security checklist can guide your ongoing efforts. These components form a comprehensive approach to security in the scaling process. In the Further readings section of this chapter, we include useful links to give you more information about how Atlassian handles information security.
In the next chapter, we will delve deeper into the intricacies of protecting...